1-100 101-200 201-300 1201-1300 1301-1400 1401-1500 1501-1600 1601-1700 1701-1706
                                 
Please use { Ctrl and F } simultaneously and enter kayword to find the Cases

List of Cases available in ABI INFO PROQUEST COMPLETE

Table of contents, 1101 - 1200

1101. CRM Systems in German Hospitals: Illustrations of Issues & Trends
2. Development of an Information Kiosk for a Large Transport Company: Lessons Learned
3. Challenges of Complex Information Technology Projects: The MAC Initiative
4. New Forms of Collaboration & Information Sharing in Grocery Retailing: The PCSO Pilot at Veropoulos
5. Information System for a Volunteer Center: System Design for Not-For-Profit Organizations with Limited Resources
6. Balanced Scorecard: A Tool to Improve IS Department Planning and Evaluation
7. THE DEVELOPMENT OF A DATA MART SYSTEM AT A PUBLIC INSTITUTION
8. The Case of Implementing a CRM System at Indigo
9. A PROPOSED CURRENCY ARRANGEMENT FOR PALESTINE
10. THIS PIZZA PARLOR'S FOR SALE
11. WHAT NEXT FOR KROGER?
12. ENTERPRISE NATIONAL BANK: A STUDY IN COST CONTROL
13. RYANAIR (2005): SUCCESSFUL LOW COST LEADERSHIP
14. START-UP CULTURE AT TOPS
15. JEFF GILLUM'S NEW VENTURE
16. JAVA & HOLES: AN INSTRUCTIONAL CASE TO REVIEW FINANCIAL ACCOUNTING AND COST OF CAPITAL CONCEPTS
17. THE CASE OF THE DIMINISHING BUDGET
18. THE PROPOSED MERGER OF AMERICA WEST AND US AIRWAYS: WILL IT FLY?
19. ACCOUNTING FOR CAPITAL FORMATION: FINANCIAL ACCOUNTING AND INCOME TAX ISSUES OF RELATED PARTY LOANS AT UNREALISTIC INTEREST RATES
20. ONE STEP FORWARD, TWO STEPS BACK?
21. RIVERSIDE COUNTRY CLUB, PRIVATE OR SEMI-PRIVATE: MUTUALLY EXCLUSIVE DECISION MAKING UNDER UNCERTAINTY
22. BOGART'S MARINA
23. ELEVEN: A START-UP RESTAURANT CASE STUDY
24. ID PRO SYSTEMS: DISCIPLINING OFF DUTY BEHAVIOR
25. INTERLANDDATA WEB HOSTING: STRUCTURING THE ORGANIZATION FOR GROWTH
26. TRANSFORMATION AT BTR
27. STONEBRIDGE COUNTRY CLUB: CASH... IS THERE ENOUGH?
28. WHITTAKER MEMORIAL HOSPITAL
29. ZEIT SAIC: THE ENTREPRENEURIAL HISTORY OF A FAMILY BUSINESS IN ARGENTINA
30. MR. FAHAD AL BANNAI, VICE PRESIDENT AXIOM TELECOM
31. ADEL ALI, CEO, AIR ARABIA
32. MORE THAN JUST A SOFT DRINK
33. COOKIE JAR RESERVES-THE CASE OF CALLAWAY GOLF COMPANY
34. GELATO NATURAL S.A.
35. JONES' MARKETS, INC.
36. REIT VALUATION: THE CASE OF DUKE REALTY CORPORATION
37. VENDOR REBATE MANAGEMENT: KHF, INC.
38. MONOCHROMATIC PERSONNEL SCANNING AT TECHMARK
39. FITNESS PRO: MANAGING A GROWING BUSINESS
40. RFID AT RODNEY STRONG VINEYARDS
41. Social Construction of Information Technology Supporting Work
42. Power Conflict, Commitment & the Development of Sales & Marketing IS/IT Infrastructures at Digital Devices, Inc.
43. From Principles to Practice: Analyzing a Student Learning Outcomes Assessment System
44. The Columbia Disaster: Culture, Communication & Change
45. LIBNET: A Case Study in Information Ownership & Tariff Incentives in a Collaborative Library Database
46. ERP Implementation for Production Planning at EA Cakes Ltd.
47. Experiences from Using the CORAS Methodology to Analyze a Web Application
48. The Algos Center: Information Systems in a Small Non-Profit Organization
49. Automotive Industry Information Systems: From Mass Production to Build-to-Order
50. Up In Smoke: Rebuilding After an IT Disaster
51. A Case of Information Systems Pre-Implementation Failure: Pitfalls of Overlooking the Key Stakeholders' Interests
52. End-User System Development: Lessons from a Case Study of IT Usage in an Engineering Organization
53. Enterprise System Development in Higher Education
54. IT-Business Strategic Alignment Maturity: A Case Study
55. Cross-Cultural Implementation of Information System
56. The Rise and Fall of a Software Startup1
57. CREATING CUSTOMER VALUE AT ROCKY MOUNTAIN FIBERBOARD
58. PORTFOLIO PENSION PLANNING AND ASSESSMENT PROCESS
59. ST. LOUIS CHEMICAL: THE ACQUISITION
60. KIRKLAND'S, INC.
61. NEW CREDIT PROGRAM AT THE DISCOUNT WINDOW
62. PREDICTING A BANK'S FAILURE: A CASE STUDY OF A MINORITY BANK
63. THE SEDUCTION OF ARTHUR THOMPSON: AN INSTRUCTIONAL CASE ON ETHICS IN THE ACCOUNTING WORKPLACE
64. POWER PLAY IN A BUYER-SELLER AGREEMENT: A CASE OF EXTREME COMPETITION
65. A TALE OF TWO AIRLINES: WESTJET AND CANADA 3000
66. THE CASE OF 'FOR A FEW DOLLARS MORE'
67. THE USE OF BUILDING MORATORIA TO CONTROL GROWTH IN RURAL COMMUNITIES
68. MUTUAL FUNDS' BEFORE- AND AFTER-TAX RETURNS: THE CASE OF TAX CLIENTELE
69. MCDOLLARS MOVES TO MOTHER ROOSHKA
70. ECAMPUS.COM: THE TURNAROUND STRATEGY
71. INSTALLING ERP SOFTWARE AT VALVOLINE
72. DIPPIN' DOTS ICE CREAM
73. THE FEDERAL GOVERNMENT VS. YORK COUNTY: A TRANSFER PRICING CASE FOR MANAGERIAL ACCOUNTING STUDENTS
74. A CASE STUDY OF INTRINSIC VALUE, ACCOUNTING FUNDAMENTALS, AND MARKET EFFICIENCY USING AN INTERNET IPO
75. PROCTER & GAMBLE: THE GROWTH OF A GIANT
76. VALUATION OF A DREAM: RIVERSIDE COUNTRY CLUB FOR SALE
77. THE WESTERN NORTH CAROLINA PLAYHOUSE
78. ROSA
79. THE ORANGE PEEL SOCIAL AID AND PLEASURE CLUB
80. MAJOR LEAGUE BASEBALL'S GLOBAL EXPANSION: IS BASEBALL IN MLB'S FUTURE?
81. THE UTAH SUMMER GAMES
82. THE MILTON HEALTH AND REHABILITATION CENTER
83. CAPE TRAVEL, INC.
84. SOUTHEAST MISSOURI STATE UNIVERSITY
85. BUSINESS ETHICS AND THE NEW EMPLOYEE: SOME PITFALLS
86. An Experiential Case Study in IT Project Management Planning: The Petroleum Engineering Economics Evaluation Software Imperative
87. The Selection of the IT Platform: Enterprise System Implementation in the NZ Health Board
88. Beyond Knowledge Management: Introducing Learning Management Systems
89. Information Technology in the Practice of Law Enforcement
90. Siemens: Expanding the Knowledge Management System ShareNet to Research & Development
91. Development of KABISA: A Computer-Based Training Program for Clinical Diagnosis in Developing Countries
92. EASYCAR.COM: STRATEGIC SERVICE SYSTEM DESIGN
93. BEAUTY AND HONESTY AT AEROSPACE DESIGNS' MARKETING DEPARTMENT
94. THE SHORT BUT HAPPY LIFE OF DYERSBURG FABRICS
95. TAHITIAN BLACK PEARLS: A FAMILY BUSINESS STRATEGY CASE
96. WEB ASSURANCE SEALS - ARE THEY ALL ALIKE?: A LOOK AT WebTrust AND OTHER WEB ASSURANCE SEALS
97. A SUBCONTRACTOR'S DILEMMA: READY FOR PRIME TIME?
98. CREATE-A-CANDLE, INC.: A CONCEPTUAL APPROACH TO FINANCING FEEDBACK
99. THE MISSOURI DEPARTMENT OF ECONOMIC DEVELOPMENT
1200. ST. LOUIS CHEMICAL: THE INVESTMENT DECISION

Document 1 of 100

CRM Systems in German Hospitals: Illustrations of Issues & Trends

Author: Raisinghani, Mahesh S; E-Lin, Tan; Untama, Jose Antonio; Weiershaus, Heidi; et al

ProQuest document link

Abstract:

German public hospitals face governmental and regulatory pressures to implement efficiency and effectiveness metrics, such as the classification of a Diagnosis Related Groups (DRG) system, by the year 2005. The current average patient stay of nine days in German hospitals is relatively high compared to France with 5.5 days and USA with 6.2 days. CRM will help increase customer satisfaction, loyalty and retention. Multiple case studies, including one German hospital compared to two Dutch hospitals, as well as interviews with the management of two additional German hospitals, reveal that no hospital currently has an integrated CRM system. Rather, separate organizational functions collect and store quantitative and qualitative patient data. Furthermore, the challenges of data sharing and data security are significant barriers for technological changes in hospitals. This study focuses on CRM in a modern German hospital as it realigns its processes and strategies in order to focus on efficiency and customer satisfaction in a very competitive market. [PUBLICATION ABSTRACT]

Full text:

Headnote

EXECUTIVE SUMMARY

German public hospitals face governmental and regulatory pressures to implement efficiency and effectiveness metrics, such as the classification of a Diagnosis Related Groups (DRG) system, by the year 2005. The current average patient stay of nine days in German hospitals is relatively high compared to France with 5.5 days and USA with 6.2 days. CRM will help increase customer satisfaction, loyalty and retention. Multiple case studies, including one German hospital compared to two Dutch hospitals, as well as interviews with the management of two additional German hospitals, reveal that no hospital currently has an integrated CRM system. Rather, separate organizational functions collect and store quantitative and qualitative patient data. Furthermore, the challenges of data sharing and data security are significant barriers for technological changes in hospitals. This study focuses on CRM in a modern German hospital as it realigns its processes and strategies in order to focus on efficiency and customer satisfaction in a very competitive market.

Keywords: customer relationship management; diagnosis related groups (DRG) system; German Healthcare industry; hospital management strategy; information technology (IT) in hospitals

(ProQuest Information and Learning: ... denotes formula omitted.)

ORGANIZATIONAL BACKGROUND

The German Healthcare industry is currently undergoing a major change due to the changing demographics of the German population and budget limitations. Due to the aging and/or retired German population, there is less money contributed to taxes. This is resulting in a substantial reduction in the allocation of funds to the healthcare sector. The current cost allocation system, that is, the generation contract, is put in question, and the public healthcare system is forced to charge more of its costs to its clients. The generation contract was the standard structure for the social security systems in many countries including Germany, where the following generation would provide funding for the previous generation. At present, deregulation, increased competition, cost pressures and price reduction from the private hospitals are forcing the public hospital sector to introduce efficient economic processes and systems.

The introduction of the Diagnosis Related Group (DRG) calculation system by the German government requires hospitals to review their strategy in order to focus their communication on the patient of today and tomorrow. The DRG calculation system was initially a collaborative effort of insurance companies to establish a control system for payments for healthcare services provided. With the DRG calculation system, illnesses are categorized and acceptable treatments and standards, such as length of hospital stay, are determined. A fixed cost, or payment amount, is then assigned to each treatment or service. Insurance companies will only pay the specified amount for each service. The purpose of DRG is to provide complete patient care for a standardized disease pattern with a fixed budget. This system should also aid hospitals in meeting their budgets by reducing the length of a patient's stay in the hospital, increasing productivity and using more cost-cutting technologies (Riedel, 2001). In these situations, hospitals need intelligent Customer Relationship Management (CRM) models that interface with the DRG system to help them acquire and "nurse" their customers - both domestic and foreign patients. The key motivator for CRM system implementation is the hospital administration's realization that they have to be customer-oriented and cost-effective to survive the increased competition in the healthcare sector (MCC Health World, 2002).

CRM is an approach that focuses on the acquisition, development and, most importantly, retention of customer relationships through the collection of data and the sharing of this customer information across all areas of an organization. It encompasses both software applications and business strategies that anticipate, interpret, and respond to the needs of current and prospective customers. Access to collected customer information by employees from all areas of an organization provides a complete picture of the customer to everyone in the company and helps employees react to customer inquiries more efficiently. Handling customer requests with ease will increase customer satisfaction, resulting in customer loyalty and, ultimately, an increase in customer retention.

Customer/patient-centric orientation is being adopted by contemporary businesses/ hospitals as a necessary condition for competing effectively in today's marketplace. Despite the steady growth in number of worldwide installations and sales, not all is perfect in the world of CRM applications. Industry studies suggest that approximately 60% of CRM software installations are failures. CRM applications are prone to problems associated with lack of application flexibility that allows for customized integration and updating, and data management as a function of scale (Crosby and Johnson, 2000; Juki et al., 2002).

Structure & Organization of this Manuscript

This exploratory study is fundamentally based on E.M. Rogers' theory of new product diffusion, also known as Diffusion of Innovation (Dol) (Rogers, 1983). The primary research objective of this study is to explore the diffusion and infusion of CRM systems in the hospital environment. Diffusion is defined as the extent of use of an innovation across people, projects, tasks or organizational units, while infusion is the extent to which an innovation's features are used in a complete and sophisticated way (Fichman, 2001 ). In this article, we first discuss the trends and governmental/regulatory pressures that confront public hospitals in Germany. As these problems are very real and directly affect the general public, this topic is of keen interest and has been making headlines in Germany in recent years. Next we discuss the organizational structure of an old German hospital that forms the basis of the economic issues it now faces and the steps it should take in order to prevent a possible financial crisis in today's fast-paced economy. Furthermore, we explain how the implementation of CRM can play a crucial role in bringing the German hospital up to speed with technology and the effective business models of today.

Next, the case studies of five hospitals are presented along with a discussion of the objectives, benefits and costs of implementing a CRM system, the technical and strategic composition, the implementation phases and the pitfalls to avoid during the implementation phase. This is followed by the current challenges/problems facing the organization. The conclusion section summarizes the importance of a CRM system to steer the German hospital in the right direction, as well as outlines the potential of information technology in creating new business value for the hospital.

Market Description

The healthcare institutions in Germany are divided into Akut-Kliniken (general hospitals), Reha-Kliniken (rehabilitation facilities) and nursing homes. Most of the German clinics are owned and administered by public authorities. These clinics are financed by the association of local authorities and the federal state. Moreover, some health insurance companies fund and even run hospitals (HPS Research, 2002). According to a study by Kienbaum Management Consultants (Amblank, 2003), German hospital administrators predict a further reduction of clinical beds, as well as nursing, administrative and non-medical staff. However, it is necessary to increase the number of doctors and information technology personnel in order to implement efficient and cost-effective business processes in German hospitals, especially in the field of general healthcare services. The survey conducted on more than a hundred Akut-Kliniken (general hospitals), with more than a hundred beds, found the following results (Amblank, 2002):

* Process optimization: Hospitals need to focus on the optimization of a processoriented organization while taking into account the internal and external information flow. Clinic-specific processes between horizontal levels, particularly between the activity units and functions of a hospital, must also be considered.

* Hospital cooperation: Hospitals should increase cooperation with other activity units and participants in the healthcare sector, especially with regard to communication.

* Managerial tools for hospitals: In view of the compulsory introduction of a Diagnosis Related Groups (DRG) cost calculation system, the implementation of process- and profit-oriented cost calculation systems for hospitals must be completed in 2004. At present, 76% of the hospitals are still using budgets as their controlling system. The implementation of DRG systems requires changes in hospital IT systems, training of personnel and data-protection measures - approximately 68% of the hospitals have already started to change their processes.

Key Market Statistics

In 2001, the hospital costs in Germany amounted to about EUR 60 billion, a figure that, according to the German Federal Statistical Office, corresponds to the domestic annual sales of the German automotive industry. The limited budgets of the federal states are forcing hospitals to implement efficient communication and information channels in order to reduce resources and to streamline their operations. The introduction of the DRG system should bring about greater transparency and economic efficiency, which the authorities hope will cause a considerable reduction in the time that patients stay in hospitals. In 2001, the average patient stay was of 9.9 days in German hospitals. In comparison, in Austria, the average patient stay is 5.9 days; in France, 5.5 days; and in the U.S., 6.2 days (Amblank, 2002). Table 1 lists the key statistics on German hospitals in 2000 and 2001.

View Image -   Table 1: Key Statistics on German Hospitals in 2000 & 2001

Furthermore, the introduction of the DRG system in Australia in 1992 comprised 667 groups and has continuously improved. As a result, patient stays have been reduced by 20% to 30%, and 20% of the released capacity has been abolished or reallocated to new innovative services (Higbie and Kerres, 2001). In general, a German mid-sized hospital (defined as 100 to 200 beds) settles over 20,000 cases per year, a figure that continues to grow. Consequently, there is a strong need for new, integrated IT systems to streamline all patient-related processes and to integrate, where possible, or even replace the systems currently used in hospitals (Staffers, 2002). Moreover, IT systems must be flexible enough for improvements as the initial number of DRG classifications has already risen from about 600 to 881 in German hospitals (Riedel, 2001).

SETTING THE STAGE

Hospital Management Strategy: Importance of Patients as Customers

In the past, the principal customer of the hospital was the physician. The patient was secondary, merely the physician's customer. However, the trend has evolved to where the interaction has broadened, and patients communicate directly with the hospital, as well as with the physicians. The relationship is now triangular, with relations between the hospital and its customers, and between the physician and the patient. The hospital must therefore focus its efforts on satisfying a more demanding patient, who wants to see quality, cost and value in the products and services delivered by the hospital. Patients today are savvier; they do their own research for information, treatment options and sources where they can obtain the relevant services in the most optimal way. The onus lies with the discerning hospital to take advantage of this fact and to stay ahead of their competitors by collecting, storing and disseminating this information to their key current or potential patients. It is important for the hospital to build a strong and long-term relationship with the patient and pursue referrals from the satisfied patient, which could attract potential new customers.

In terms of information management systems and business models focused on efficient process systems, the healthcare industry is lagging behind other industries. Therefore, it is ever so critical that the healthcare industry review its strategy in order to survive. According to Cap Gemini, Ernst & Young (2002), all industries should adopt a business model that is customer-centric. A customer-centric business model is one in which a company proactively identifies, attracts, engages, serves and covets customers. In their study, the consultancy identifies seven universal elements of this paradigm as follows (Cap Gemini, Ernst & Young, 2002):

* profile, identify and connect with current and prospective customers;

* give customers a choice about how and when they interact with you;

* ensure access to the customer's profile and any information that he or she requests with every interaction;

* ensure that new information is captured, disseminated and used effectively;

* develop mechanisms that minimize customer irritation, such as long hold times, multiple handoffs and unavailable or insufficient information;

* develop the capability to satisfy customers' requests for insights and information at first contact; and

* treat customers as valued individuals by learning about their preferences, interests, concerns and wishes.

All of these elements form the building blocks of a CRM system. According to the German Hospital Institute, DKI (Deutsches Krankenhaus Institut), 70% of hospitals decided in favor of replacing of IT systems because this method allows them to precisely quantify costs (Staffers, 2002). In addition, hospital management strategy should consider a comprehensive, efficient hospital information system, which supports the shift of focus to the patients. Respectively, doctors and hospital staff should be trained to lead patient-oriented discussions in order to provide optimal healthcare service. The reformation of the German healthcare system calls for the participation of the German citizens, health insurance companies and patients. Therefore, all parties involved should have easy access to healthcare information. Independent institutions for healthcare services, call centers of insurance companies, Web-based information services, hospital information services, as well as other networks and institutions, are the main communication channels for distributing this information (Deutsche Krankenhausgesellschaft, 2003).

Work Flows & Cost Drivers in Hospitals

A hospital information communication system should also provide information to the stakeholders and patient care centers, as shown in Figure 1. The information elements flowing across the various entities are the patient's medical records, insurance information, DRG information, government regulations, hospital policy and procedure, and so forth.

The main cost drivers in the hospital are in the areas of accounting, patient administration, procurement and human resource management. For instance, personnel costs account for 70% of overall costs in a general hospital. With the introduction of DRG calculations, the main cost driver for hospitals has changed from bed turnover to treatments per case (Higbie and Kerres, 2001). Research has shown that the average hospital loses between 2% and 4% of its revenues because of poor revenue-cycle management resulting from a lack of system integration (Cap Gemini, Ernst & Young 2002). There are CRM systems available in the market today, which can merge these areas of the hospital into end-to-end processes and integrate them into a seamless network. These CRM systems increase the transparency of cost and resource allocation within the hospital. This increased transparency can be a great aid to hospital management in the reengineering of the fundamental hospital structure, with the objective of minimizing costs, while remaining within the guidelines of DRG.

A major cost reduction area that the CRM system has handled effectively is the mapping of documentation during a patient's treatment, from the moment he enters the hospital until the day he leaves. This information is important in order to have a full picture of the situation, even though DRG is only applied on the day that the patient is discharged (SAP, 2003). IT systems must support the improvement of information flow between patients and physicians, as well as work and decision processes as illustrated in Figure 2.

View Image -   Figure 1: Stakeholders & Information Communication Technology

In the past, some hospitals ignored their relations to their public environment, employees and patients. Today, hospitals are beginning to realize the importance of patients as a source of income. Thus, hospitals are developing marketing instruments in order to compete with other hospitals for the future patient. However, the communication methodology must comply with the German regulations for clinics, which forbid the simple promotion of clinical operations. Moreover, patient data is not allowed to be published, as this would violate the Bundesdatenschutzgesetz - the federal data protection/privacy law.

The installation of CRM systems enables the introduction of patient-oriented marketing measures that allow patients to give feedback to hospitals in order to improve treatment (Torex-Deutschland, 2003). Furthermore, hospitals should not forget that healthcare is a field absolutely rife with emotion because a person's health, and even life, is being addressed. Therefore, an accurate and reliable communication system must be implemented (Barnes, 2003).

View Image -   Figure 2: Decentralized Decisions Exemplified for the Heart Surgical Ward

Role of Information Technology (IT) in Hospitals

In IT solutions, simulation models that represent organizational processes in hospitals are used to optimize work processes. There are two types of simulation models with different strengths and weaknesses. In the first model, the underlying structure aligns the hospital's organizational processes with the physical layout of the hospital. Patients are viewed as mobile units with assigned plans who move from one location, such as a ward or treatment room, to another, receiving the respective treatment plan at any given location. The treatment facilities are regarded as functional units where specific services are carried out. The physicians and medical staff are considered passive resources in the model. They are simply there to perform medical services. The doctors and medical staff are guided by the established procedures and local assignments in their administrative decision making.

The limitation of this model is that human behavior of patients, as well as medical staff, is not taken into consideration as much as it should be. In this model, the prescribed treatment plans are standardized. There is no room to allow the medical staff to adjust treatment according to individual case, such as a set back or complication. Furthermore, the failure to consider the human element in the hospital's systems and procedures also makes it difficult to accurately forecast and measure performance.

The second simulation model, the agent-based simulation system, is able to support the economic and organizational decision-making process in the hospital domain. Such a system is developed in a two-step process. In the first step, a specific application context is modeled after a real situation in a selected hospital. The basic requirements posed on the simulation model within the hospital domain are analyzed. Based on the information gathered, one attempts to generalize the concepts concluded from this study. In the second step, a general-purpose, component-oriented, agent-based simulation system is developed. It can be used as a general modeling framework in the hospital domain (Sibbel and Urban, 2001).

Technological Infrastructure

The technology component of a CRM strategy is vital to its success. Areas requiring integration in CRM are cross-channels, back to front office and operations to analysis. Therefore, the IT architecture and infrastructure must be reliable, well-designed and easy-to-maintain to meet the present and future needs of the organization. The Enterprise Solution Architecture Model (Cap Gemini, Ernst & Young, 2002) in Figure 3 illustrates how technology supports CRM.

Health CRM applications have operational CRM (that includes analytical CRM) at the center of the model. Operational CRM deals with automation and streamlining workflow. Specific tasks of operational CRM include collecting data, processing transactions and controlling workflow. Some of the elements of operational CRM are described:

View Image -   Figure 3: The Enterprise Solution Architecture Model

* Portal technology: enables customers to connect with a company over the Internet.

* Workflow/workload management rules engines: are instructions set forth by managers that enable computer applications to make decisions.

* Case management/accountability functionality: accounting system used for tracking patient inquiries, from initiation to resolution.

* Knowledge management: deals with software and applications that include analytical tools and databases, and is generally used to solve business problems.

Analytical CRM is sometimes treated as a subset of operational CRM. However, some healthcare providers prefer to use it as a stand-alone application in order to take advantage of its data analysis and management capabilities. Both CRM applications utilize OLAP (online analytical processing) technologies and other tools that aid decision makers in the development and revision of plans. The next component of the Enterprise Solution Architecture Model is the Connected Health Business Model. This component comprises functional tools such as strategy alignment, solution design and change management. Finally, the last component of this model is the Health Integration Architecture. The main purpose of this component is to streamline and link the technologies and processes efficiently and effectively (Cap Gemini, Ernst & Young, 2002).

Rationale for a CRM Solution

Poor revenue-cycle management is one of the major costs of a hospital. CRM can redeem this cost with its enterprise-wide platform of information sharing, customer database, contact management, and system to coordinate and identify payers with external resources. A CRM solution can add business value to the hospital in the following areas (Cap Gemini, Ernst & Young, 2002; L&T Infotech, 2003):

* Reducing transaction costs for processes involving the customer

* Improving patient/physician satisfaction and loyalty

* Optimizing revenue potential by reducing "missed appointments" and via improved care-plan compliance

* Reducing claim refusals by insurance companies

* Lowering accounts receivable balances

* Differentiating itself by offering a better service experience to customers (i.e., patients and physicians)

* Creating a complete 360-degree view of the customer

Implementing a CRM system gives the hospital the capability to integrate its internal processes of marketing, sales, services, analytics, interaction center, field applications, e-commerce and channel management, in order to deliver a people-centric solution leveraged on existing technology and to lower overall costs (SAP, 2003). Since CRM is an approach towards dealing with customers, it is critical for companies to rethink and redesign their basic business processes and organizational structures in order to succeed. Previously, healthcare providers took an episodic approach to their interaction with patients and physicians, where costs and benefits were assessed per episode of care. Today, healthcare is treated as an ongoing mutual value, where relationships between patients and physicians develop over time.

Another consideration before CRM implementation is performance measurement. Performance measures around CRM can be qualitative (e.g., customer satisfaction) as well as quantitative (e.g., percentage of inquiries handled per day). The study prepared by Cap Gemini Ernst & Young identifies efficiency (e.g., developing more customer self-service capabilities, such as scheduling of follow-up appointments, prescription refills, pre-registration, class registrations and concierge service requests), service effectiveness, and market/revenue growth as three objectives on which healthcare providers should focus and are described below (Cap Gemini & Ernst Young, 2002). For instance, a hospital can conduct a patient-focused campaign, with the goal of increasing the number of interactions with patients by cross-selling healthcare services or using current patients as referral sources to their friends and family.

Rationale for CRM: Identification of Organizational Change

In the past decade, hospitals generally evolved through the following three types of organizational focus (Lorenzi and Riley, 1995):

i. Functional-oriented organizational focus - organized around the various healthcare and administrative functions in the hospital as illustrated in Figure 4.

ii. Specialism-oriented organizational focus - organized around the various specialty areas in the hospital as illustrated in Figure 5.

View Image -   Figure 4: Functional-Oriented Organizational Focus
View Image -   Figure 5: Specialism-Oriented Organizational Focus  Figure 6: Patient-Oriented Organization Focus

iii. Patient-oriented organizational focus - organized around the patient needs as illustrated in Figure 6.

At present, hospital organizations are categorized into too many different functions and specialty areas. There is a lack of inter-connectedness and communication among the general business functions, specialty areas, administration, finance and customer care. Hence the functional and specialism-oriented organization structures may not be optimal from a business process standpoint. In the patient-oriented organization, processes are categorized by flows of patients, with multi-disciplinary teams and management integrated into a seamless network. The ultimate vision of the CRM system is customer service transformation of the hospital-healthcare organization, which integrates all patient-related data from the different functions (Cap Gemini, Ernst & Young, 2002). Table 2 illustrates the direction in which the hospital must move in order to effectively and efficiently integrate its processes, while keeping costs at a minimum.

View Image -   Table2: Comparison of the Old Model & Future-State Vision of a Hospital

Project Team

In a hospital, there is a strong personnel-related type of performance process between medical staff and patients. The employees are the most important factor for a hospital's success in improving the quality of its service and the satisfaction of its patients. A successful CRM-implementation team must consider the following:

* Start with a pilot project that incorporates all the necessary departments and groups that gets projects rolling quickly but is small enough and flexible enough to allow tinkering along the way

* Design a scalable CRM architecture

* Confirm that if the company needs to expand the system, it has the capability and flexibility to know what data is to be collected and stored

* Recognize the individuality of customers and respond appropriately

* Ensure that everyone within the organization, especially the IT department, has a comprehensive understanding of the business strategies and customers' needs

* Implement the CRM project across all departments and make the implementation easy for the customers, not the company

The main reason why the introduction of a CRM system in a hospital might fail is a lack of communication between everyone in the customer relationship chain, leading to an incomplete picture of the customer. Poor communication can also lead to technology being implemented without proper support or buy-in from users. Any change made must involve and come from the people (SRD Group, 2003).

Rationale for CRM: Identification of Technological Potential

A CRM IT system is a valuable tool in the implementation of this new business strategy. The most relevant advantage of a CRM system is its flexibility to adapt to future requirements such as the addition of more DRGs. Furthermore, most CRM systems are designed with expansion capabilities and to interact with other systems such as the supply chain management, enterprise management, knowledge management, and other technologies.

The crucial interaction with the patient is made possible via various technological advances that are popular and ubiquitous today - the Internet (Web page), e-mail, cellphone, personal digital assistant, pager, fax, phone (call center) and electronic kiosk. The patient is able to review his personal information (i.e, billing, scheduling, drug prescription and medication information) and to access relevant information (Web portals, library resources, physician directories, referral requests and community chats for various diseases). A CRM system can also greatly improve the internal process integration through the sharing of patient databases among different departments of the hospital. Doctors and hospital staff can access necessary information about their patients, regardless of their location. This would allow them to integrate their results in real-time, thereby saving the critical hours that may mean life or death for their patient.

Processes Involved in the Implementation

When implementing a CRM system, a hospital should focus its activities on following three different process areas:

* Patient-oriented information -> Patient database

* Hospital facilities marketing -> Quality management

* Development of preventive actions -> Information policy

Hospital management should concentrate on the patient in the following perspectives during the establishment of a CRM system (L&T Infotech, 2003):

* Design and administer health policies for corporate clients

* Process medical claims (insurance/hospital claims, domiciliary claims)

* Liaise with the insurance companies for claims assessment and payment

* Facilitate the services of the network hospitals

* Provide information regarding medical facilities and advise on occupational health

Figure 7 illustrates the different objectives of a CRM system in terms of processes and information flow to patients and physicians and the customer "touchpoints" or channels at the top, where contact with patients begins. Some examples of these customer channels are e-mail, telephone, fax, Internet, mail and walk-ins. Customer Interaction Management, the next component of the model, is basically a desktop platform that allows healthcare providers to manage interaction with patients through all the various "touchpoints." Enabling technologies are the technical devices that arrange and distribute the information. Some examples of enabling technologies are interactive voice response (IVR), computer-telephone integration (CTI), personal digital assistance (PDA) and Web application protocol (WAP). The establishment of a Web-based, information platform for instance, could facilitate the integration of the different inquiries for patients and physicians. Continuous integration feedback facilitates the development of a more customer-oriented hospital organization.

View Image -   Figure 7: Integrated CRM for Customer- and Physician-Related Processes

CASE DESCRIPTION

The current healthcare reform in progress in Germany is looking at the financial viability of German hospitals that have to become more competitive in order to survive in the long run. Thus, many private hospitals decline providing any internal financial data as they do not want to inform their current and future potential customers. Five case studies, including one German hospital compared to two Dutch hospitals, as well as interviews with the management of two additional German hospitals, are used to compare and contrast the separate organizational functions that collect and store quantitative and qualitative patient data. The five case studies were chosen since the intent was to explore the breadth of awareness of CRM systems solutions across enterprises (i.e., diffusion), and the depth of penetration of CRM implementations within organizations (i.e., infusion). The first case study is based on the secondary research available on ICT technology in one German and two Dutch hospitals.

The second and third case studies are based on face-to-face interviews with Dr. Schulz, IT Administration Officer of Medizinische Hochschule Hannover (a public hospital); and Dr. Herr Kohnert, managing director of the International Neuroscience Research Institute (a private hospital), Hannover. Furthermore, the challenges of data sharing and data security as significant barriers for technological changes in hospitals are also discussed. The key focus is on CRM in a modern German hospital as it realigns its processes and strategies in order to focus on efficiency and customer satisfaction in a very competitive market.

Leipzig University Hospital (General Hospital)

This former East German hospital has a capacity of 1,500 clinical beds and 4,650 employees, with 15 locations. After the re-unification of Germany, there was a move to restructure and integrate the many systems in the numerous buildings, clinical and ambulant wards, and service facilities using ICT, specifically SAP/R3 modules. Although the Leipzig University Hospital has regional and national collaborations with other general and university hospitals, networking among the centers is uncommon. This lack of integration has caused issues such as unnecessary costs from inefficient and ineffective use of capacity and competence, and poor marketing (i.e., cannot attract the "right" patients). Thus, with ICT, the hospital was looking to solve or at least to reduce these aforesaid problems. The ICT project was controlled by a central team comprising members from IMISE (Institut fuer Medizinische Informatik, Statistik und Epidemiologie), ZMAI (Zentrum fuer Medizinische und Administrative Informationssysteme), and the administrative and ICT departments.

The Leipzig University Hospital evolved from a functional-oriented hospital to a specialism-oriented one (see Figures 3 and 4). Even in this early stage, the main goals of the Leipzig University Hospital centered around the patient (customer) database. At the end of the project, the final design of the network organization that resulted was not able to fully integrate all its information system. The system was based on bilateral agreements and uni-directional data flow (low reach and low range). Some of the problems facing the project were very similar to those commonly faced in the implementation of a CRM system, such as lack of a clear hospital strategy and foresight for future development, for example, to reach beyond organizational boundaries in seamless network projects; lack of clear measures for performance and integration; and/or lack of technical support and expertise since implementation and central computing facilities were mostly in-sourced.

View Image -   Table 3: Information Communication Technology Characteristics in One German and Two Dutch Hospitals

On the other hand, the ICT infrastructure implemented in the Leipzig University Hospital was based on current technology that has the scalability to accommodate future networking projects. This scalability is indeed advantageous as the hospital moves on to the patient-oriented organizational focus that may help the hospital administrators and staff to look into more advanced CRM-solutions. As the trend for implementing CRM systems in German hospitals is relatively new, we reviewed the relevant information on Information and Communication Technology (ICT) for the Leipzig University Hospital and two Dutch hospitals to get a sense of the European contextual perspective (Spanjers, Hasselbring, Peterson, and Smits, 2001; Sibbel and Urban, 2001). Table 3 compares and contrasts the ICT characteristics in one German and two Dutch hospitals.

View Image -   Table 3: Information Communication Technology Characteristics in One German and Two Dutch Hospitals

Medizinische Hochschule Hannover (General/Public Hospital)

The Medizinische Hochschule Hannover (MHH) opened in 1965 and has performed clinical operations since 1972. In 2001, the hospital comprised 1,330 beds, 42,000 in-patient customers, 80% bed use and an average bed stay of 9.4 days. There were approximately 7,000 employees working at MHH and the overall budget was about * 370 million. The organization chart of MHH is available at www.mh-hannover.de/ ueberblick/verwaltung/organigramm/mhh_frame.htm. MHH comprises 18 medical centers with 75 divisions, 13 business units and central administration and the university center. It has university institutions within these medical centers such as dermatology in the Linden hospital and orthopedics at the Annastift hospital. At present, the MHH does not have an integrated CRM system. The transformation into a more patient-oriented organization hospital is planned for the near future. The patient-oriented improvements are controlled and conducted by the department of quality management, a separate division of the MHH.

View Image -   Figure 8: Medizinische Hochschule Hannover's Services

The biggest challenge faced by the MHH is the integration of its 36 decentralized systems into a more centralized and standardized IT infrastructure. The main systems in use are a hospital information system (HIS) and an enterprise resource planning (ERP) system provided by proKIM and SAP/R3. Figure 8 illustrates the various services offered by MHH and the interface between them. The HIS is linked with a laboratory information system (LIS) enabling MHH to collect and record all patient-oriented data digitally. In 1999, the migration of hardware and software from a mainframe to client-server was completed. At present there are Internet, intranet, mail-servers, directory-list servers and backup servers installed. Data security is achieved by an internal control and tracking system of all user-registration in the hospital matched with personnel data files and a firewall that secures the backbone system. There is an emergency concept for ensuring system operations in the case of an outside attack. The integration of the different functional data is very important for the introduction of DRGs in 2005.

View Image -   Table 4: Comparison of ICT Between INRI and MHH

Until 2005, MHH plans to introduce a PAC-System that transfers diagnosis pictures and x-rays within the hospital via both internal networks and wireless local area networks. The exchange of data via mobile work places that are equipped with a laptop and linked over a wireless network with a transfer rate of up to 2 MBit/sec will be extended over the entire hospital. In addition, the AIRONET/Cisco APA 4500 and Artem Compoint permit a codified data transfer at a transfer rate of 11 MBit/sec. A new multifunctional identification card is under discussion to improve access control to internal patient data. The establishment of a digital, comprehensive and integrated CRM-system with its focus on patients is on the medium to long-term horizon, as public hospitals such as the MHH optimize their internal information flow processes.

International Neuroscience Research Institute (INRI)

(Categorical Private Hospital)

INRI provides a comprehensive range of diagnostic procedures and treatment options for diseases and disorders of the nervous system. At the INI a team of internationally renowned specialists provide the full range of modern neuromedical techniques with notable diagnostic and therapeutic neurosurgery, neuroradiotherapy and neuroradiology. A special emphasis of the INI is the interdisciplinary, surgical and interventional radiological treatment of vascular malformations and tumors of the nervous system. The INI also offers highly specialized surgery, including brainstem implants for the treatment of hearing loss and deep brain stimulation for the treatment of Parkinson's disease.

The INRI private hospital uses a patient-oriented strategy but does not have an integrated CRM system in place yet. At present, INRI's quality management department is collecting patient-feedback (questionnaires) in order to optimize internal processes and the treatment of patients. INRI uses scientific opinion leaders and physicians to get access to its potential patients. Its information communication technology comprises an HIS and an ERP system provided by ISHMed and SAP. The ERP system collects the quantified data, and HIS registers all qualitative data related to the patient. In the long run, INRI plans to establish an integrated CRM system. Table 4 compares and contrasts the information and communications technology (ICT) between INRI (a private German hospital) and MHH (a general/public German hospital).

The INRI has a patient-oriented organization and lower operating costs in terms of personnel than the MHH. The investment in a CRM system is postponed because INRI is still screening the market for a standardized software solution.

CURRENT CHALLENGES FACING THE ORGANIZATION

Both Gartner Dataquest and Giga Information Group estimate that failure rates of CRM implementation projects remain at approximately 60% due to unclear organizational goals and a lack of success metrics, made worse by the complexity of enterprise CRM initiatives. In light of the above case studies, a CRM application that is appropriate to the organization in terms of its functional breadth and depth is paramount to a successful CRM implementation. Next we discuss the management and technical issues related to CRM.

Management Issues Related to CRM

CRM is not only about the technology. It is more about organizational and cultural change demands from hospitals to conduct transformations to patient-oriented organizations. Many CRM initiatives fail because senior management lacks the involvement, vision or enthusiasm necessary to achieve the anticipated outcomes. Figure 9 illustrates the transformational change cycle that is applicable to the cases we have discussed in this study.

Cultural changes require a transformational change cycle that involves four phases:

1. Initial phase: It is necessary to have a real focus on the result desired that includes business needs, objectives, strategy and planning; not on the technology. In the hospital, every member of the medical staff needs to understand that the purpose of this change is to increase the number of patients and to maintain the loyalty of the existing ones. Other purpose of this change is to reduce costs and to increase the ROI.

View Image -   Figure 9: The Transformational Change Cycle

2. Uncertainty phase: The employees need to know, understand, and have the enough time to discuss and accept the change. It is necessary to have good communication levels amongst them. It is important to know that in the healthcare business, the doctors are dealing with patients every working day, and thus, they have a good knowledge of customer relationship. However, they need to know that there are other ways to improve that relationship and to make it more efficient using CRM strategy.

3. Breakthrough phase: Training the staff in this new technology is a good approach, but it is also necessary to evaluate the feedback of this training. In the hospital, it is important that personal staff develop their abilities to manage this new system and to apply it in their normal work.

4. Competence phase: This phase is normally missed and not recognized as important. The impact of this phase deals with the acceptance. In a hospital, it is not easy to measure the acceptance level of the employees and the customers of this new technology, but it is basic guideline to estimate it with the ROI (SRD Group, 2003).

For Healthcare provider services, the customers tend to be much more forgiving, as they will put up with a great deal more than they will in normal commercial situations. Some healthcare professionals may resist the very notion of measuring customer satisfaction. It is not easy to have quick feedback of how a CRM business strategy is doing, but it can be measured using the following parameters:

* Reduced reporting and/or sales cycle

* Reduced expenses/cost of doing business

* Improved external/internal customer satisfaction

* Increased sales and productivity

Technical Issues Related to CRM

The ability to integrate the operational and analytic CRM/the front- and back-end applications, the length of time required for deployment, scalability, ease of maintenance and the potential to upgrade are important technical issues for CRM products. Based on the above case studies, the key challenge areas with respect to technical CRM are patient access and integrated call centers.

Patient Access

Since many customers have access to online information of various healthcare providers, the information needs to be interactive. One of the CRM solutions is to give the customers the option to customize the Web site based on their specific needs. The hospital can interact with the customers easily via personalized e-mails and provide prompt feedback. On those Web pages, the end-users such as patients and hospital administrators/staff/physicians can find a wealth of comprehensive information about the hospital staff, appointment schedules, registration for healthcare programs and library resources.

Integrated Call Centers

Call centers have an important role for patients, their families and physicians, who want a unique point of access to the hospital organization. Normally, the call centers are structured for specific functions and there is little or no interaction with most departments of the hospital. They are also set up to manage call processing, instead of relationship building, and are based on elementary call-routing or automated call-distributor systems, with some basic voice-recognition capability. Now, most healthcare organizations have changed their view of call centers - they are arguably the best way the hospital can improve their customer service and customer relationships and in turn, profits (Cap Gemini Ernst & Young, 2002). Thus these call centers will increasingly be turned into "contact centers" that handle e-mail and Web interaction, as well as inbound and outbound telemarketing.

In summary, the German hospital is now facing many governmental and regulatory pressures as it enters the new technology era. It needs to review its fundamental structure in order to increase its hold on its key asset - the customer/patient. It has to realign its processes and strategies to focus on efficiency and customer satisfaction. In the midst of a highly competitive market, in order to remain in the business, it should not only seek to compete against its rivals, but it should look into cooperating and collaborating with the other healthcare providers. It is essential to share information within the network of the hospital and if possible, to extend to external partners so that it can provide the customers with an optimal service. The goal must be to build a lifetime relationship with the patients and to gain new, domestic and international customers. In this respect, CRM systems and other existing IT solutions that facilitate information sharing and networking are key to the success of a modern German hospital.

References

REFERENCES

Amblank, O. (2002). Kienbaum-Krankenhaus-Studie 2002. Kienbaum Management Consultants.

Barnes, J. (2003). Bristol Group Inc. Retrieved September 18, 2003: http:// www.bristolgroup.ca

Cap Gemini Ernst & Young (2002). Building the customer centric HDO. Customer Relationship Management in Healthcare, (July).

Crosby, L.A. and Johnson, S.L. (2000, Winter). What to do before going 1-to-1. Marketing Management, 9(4), 15-21.

Fichman, R.G. (2001 ). The role of aggregation in the measurement of IT-related organizational innovation. Management Information Systems Quaterly, 23(4), 4.

Filiuolo, M. L., Mango, P. D., and McCormick, D. H. (2000). Hospital heal thyself. McKinsey Quarterly Report, 1, 91-97.

Gutachten, Finanzierung,Nutzerorientierung und Qualität. (2003). Retrieved September 18, 2003, from Deutsche Krankenhausgesellschaft, Sachverständigenrat für die Konzertierte Aktion im Gesundheitswesen: http://www.dkgev.de/ pol/pol2003 RS-66 SVR-Gutachten-2003.htm

Healthvision (2003). To Enhance Customer Relationships - Leveraging the Internet [electronic version]. Retrieved September 18, 2003: www.heathvision.com

Higbie, W. and Kerres, M. (2001 ). Auf dem weg zum Gesundheits-Unternehmen. Management & Krankenhaus, 7(8), 9.

Juki, N., Juki, B., Meamber, L. and Nezlek, G. (2002). Employing a multilevel secure approach in CRM systems. The Journal of Information Technology Theory and Application (JITTA), 4(2), 17-31.

L&T Infotech. (2003). Case Study: CRM Implementation for a Health Management Consultant.

Lorenzi, N.M. & Riley R.T. (1995). Organizational aspects of health informatics. Managing Technological Change. New York: Springer-Verlag.

MCC Health World. (2002). Modernes Krankenhausmanagement im Zeichen v. e-Business u. CRM. Dos Krankenhaus von (über-) Morgen, Forum 4, Cologne, October.

MHH. (2002). EDV Gesamt Konzeption: 3-Fortschreibung bis zum Jahr 2005. Medizinisches Hochschulrechenzentrum.

Rogers, E.M. (1983). Diffusion of Innovations (DoI). New York: The Free Press.

Riedel, T. (2001). Das Medicare-DRG-System und seine Anwendung auf das deutsche Fallpauschalsystem. Fachhochschule Giessen-Friedberg Fachbereich KMUB: Krankenhaus-, Medizintschnik, Umwelt und Biotechnologie.

SAP. (2003). SAP® for Healthcare. Retrieved September 18, 2003: http://www.sap.com/ company/press/factsheets/industry/healthcare.asp

Schmidt, H. (2002) Gesundheitsreport. HPS Research, July.

Sibbel, R. and Urban, C. (2001). Agent-Based Modeling and Simulation for Hospital Management. Cooperative Agents. Kluwer Academic Publishers (pp. 1-18).

Spanjers, R., Hasselbring, W., Peterson, R. and Smits, M. (2001). Exploring ICT-enabled networking in hospital organizations. Proceedings of the 34th Hawaii International Conference on System Sciences, (pp. 1-10).

SRD Group Auckland. (2003). CRM and Cultural Change: It's about People, Process and Technology. Retrieved September 18, 2003: http://www.srd-grp.com/ crm.php/crm-cultural-change

Statistisches Bundesamt (2003). Eckdaten der Krankenhausstatistik 2001.

Stoffers, C. (2002). A Healthy Economy for Hospitals. Retrieved September 18, 2003: http://www.sapinfo.net/public/en/search.php4/start/t/hospitals/cat

Zünkeler, M. (2003). Marketing fur Kliniken - Das Krankenhaus als regionale Gesundheitszentrale. Torex Deutschland.

AuthorAffiliation

Mahesh S. Raisinghani, Texas Woman's University, USA

E-Lin Tan, Jose Antonio Untama, Heidi Weiershaus, Thomas Levermann & Natalie Verdeflor

Purdue University, German Int. School of Management & Administration, Germany

AuthorAffiliation

Mahesh S. Raisinghani, from India, is program director of e-Business and faculty of Information Systems at the University of Dallas' Graduate School of Management, Texas. Dr. Raisinghani was the recipient of the 1999 UD Presidential Award and the 2001 King Hagar Award for excellence in teaching, research and service. His research focuses on strategic information systems and e-Business.

E-Lin Tan, from Malaysia, studied chemical engineering (minor in law) in Singapore. She then worked in quality assurance in a Japanese multinational company for four years, specializing in strategic vendor development, technology management and quality auditing. When she left the company, she was managing her own team of engineers, a new section she had envisioned and formed with top management, in line with improved business process and total quality management.

Jose Antonio Untama, from Peru, studied electronics engineering at the pontifical Catholic University of Peru. He then worked in a German multinational company for seven years in the Medical Solutions Division, starting as customer service engineer and having as his last position technical/service manager of the Division for Peru; dealing with the latest technology for medical diagnostic equipments.

Heidi Weiershaus, from Peru, has a Professional Degree in Business Administration from the Universidad de Lima, Peru. She has seven years of professional experience in banking and finance, including three years in business strategy.

Thomas Levermann, from Germany, has a degree as Dipl-Kfm and LLM. Reworked as a corporate finance consultant in the field of mergers and acquisitions and financial transactions. Furthermore, he worked as assistant, consultant and controller for different industries and European institutions.

Natalie Verdeflor, from Germany, has an undergraduate degree in Business Administration from Pace University, New York. Ms. Verdeflor worked in the financial services sector for two major banks over the course of seven years. Upon relocating to Germany, Ms. Verdeflor went into consulting where she managed an internal Internet project and was a member of the committee that was responsible for the selection of a new CRM system for a large financial services and consulting firm.

Subject: Customer relationship management; Hospitals; Customer satisfaction; Information sharing; Diagnosis related groups--DRGs; Information technology; Studies

Location: Germany

Classification: 5220: Information technology management; 9130: Experiment/theoretical treatment; 8320: Health care industry; 9175: Western Europe

Publication title: Journal of Cases on Information Technology

Volume: 7

Issue: 4

Pages: 1-26

Number of pages: 26

Publication year: 2005

Publication date: Oct-Dec 2005

Year: 2005

Publisher: IGI Global

Place of publication: Hershey

Country of publication: United States

Publication subject: Business And Economics--Computer Applications

ISSN: 15487717

Source type: Reports

Language of publication: English

Document type: Business Case

Document feature: Tables Diagrams Illustrations References

ProQuest document ID: 198678898

Document URL: http://search.proquest.com/docview/198678898?accountid=38610

Copyright: Copyright Idea Group Inc. Oct-Dec 2005

Last updated: 2011-07-21

Database: ABI/INFORM Complete

Document 2 of 100

Development of an Information Kiosk for a Large Transport Company: Lessons Learned

Author: Blignaut, Pieter; Cruywagen, Iann

ProQuest document link

Abstract:

An information kiosk system is a computer-based information system in a publicly accessible place. Such a system was developed for a large public transport company to provide African commuters with limited educational background with up-to-date information on schedules and ticket prices while also presenting general company information in a graphically attractive way. The challenges regarding liaison with passengers are highlighted and the use of a touchscreen kiosk to supplement current liaison media is justified. System architecture is motivated and special services offered by the system are discussed. Several lessons were learned regarding the implementation of such a system in general, as well as in this environment specifically. An online survey indicated that the system fulfils its role of providing useful information in an accessible medium to commuters in a reasonable time. [PUBLICATION ABSTRACT]

Full text:

Headnote

EXECUTIVE SUMMARY

An information kiosk system is a computer-based information system in a publicly accessible place. Such a system was developed for a large public transport company to provide African commuters with limited educational background with up-to-date information on schedules and ticket prices while also presenting general company information in a graphically attractive way. The challenges regarding liaison with passengers are highlighted and the use of a touchscreen kiosk to supplement current liaison media is justified. System architecture is motivated and special services offered by the system are discussed. Several lessons were learned regarding the implementation of such a system in general, as well as in this environment specifically. An online survey indicated that the system fulfils its role of providing useful information in an accessible medium to commuters in a reasonable time.

Keywords: public transport; system development; touchscreen information kiosks

ORGANIZATIONAL BACKGROUND

The transport of workers between their place of residence and workplace is a worldwide phenomenon, which has been given a unique twist in the Republic of South Africa due to the policy of Apartheid imposed by the previous government. This policy has given rise to cities such as Botshabelo in the central Free State, 47 kilometers from Bloemfontein, the industrial center of the region. Even though Apartheid has been abolished and citizens are free to stay where they choose, practical necessity dictates that Botshabelo, as a legacy of the Apartheid policy, will remain viable and populated for a longtime to come.

The workers of the central Free State, settled far from their workplace and unable to afford private means of motorized transport, use public passenger transport. In the absence of commuter trains in this region, this need is addressed by 16-seater minibus taxis and buses.

Interstate Bus Lines (Pty) Ltd. as a Major Transporting Company

The public transport service provider in the central Free State, Interstate Bus Lines (Pty) Ltd. (IBL), was founded in 1975 as Thaba 'Nchu Transport, and has since grown to a major company with 508 full-time employees. IBL operates a fleet of 62 train and 134 standard buses from the cities of Botshabelo, Thaba 'Nchu, and Mangaung to the terminal building at Central Park in Bloemfontein. A train bus pivots around a center point and may carry 110 seated passengers, whereas a standard bus is rigid and is designed to transport 65 seated passengers. IBL operates 702 trips daily in this area and transports 70,500 to 80,000 passengers weekly between their homes and workplaces (see the map of the operational area in Figure 1).

Depending on the exact area where a person lives or works, it may happen that he or she will have to take more than one bus for a one-way trip. At Central Park, commuters may transfer to other buses heading for various businesses and factories, as well as the traditionally white suburbs. Central Park also serves as the main ticket selling point.

IBL also provides other services to its community, for example, unsubsidized feeder services in Botshabelo, as well as between Botshabelo and Thaba 'Nchu, and the transport of students to and from schools. Passengers living to the north and south of Thaba 'Nchu are also provided with transport services (Figure 1).

Interstate Bus Lines has a fleet of buses fully committed to peak demand, with allowances made for workshop allocation. IBL is equipped to render a service, along with the minibus taxi industry, to satisfy the public demand. IBL itself services and maintains its fleet of buses. The bus fleet is of the most modern in the Republic of South Africa, with an average age of 4.8 years per bus. IBL trains its own drivers during an intensive six-week course. Drivers receive annual retraining and evaluation, lasting a further two weeks.

View Image -   Figure 1: Operational Area of IBL
View Image -   Figure 2: Average Number of Passengers Passing Through Central Park per Half Hour Interval During Week Days

IBL's income is based on ticket sales along with a government subsidy and a small special trip market, and averages around USD 2 million per month, which amounts to an annual turnover of around USD 24.2 million. IBL's fleet of buses travels approximately 14.5 million kilometers per year while consuming 5.6 million liters of fuel.

Services run from 04:15 to 22:30 daily. The peak requirement is from 06:00 to 07:45 in the mornings and from 15:30 to 18:00 in the afternoons - peak being defined as the time when the total bus fleet is fully committed to the transport of commuters. Figure 2 indicates the times when the largest concentration of commuters passes through Central Park. All commuters must be in possession of a valid ticket, purchased from the Central Park ticket kiosk. These tickets are daily, one-way, weekly or monthly tickets.

Passenger Profile

Interstate Bus Lines conducts frequent surveys in order to determine the profile of its passengers. According to the most recent survey (Breytenbach, 2003), passengers are mostly African (89.1%), Sotho-speaking (51.0%), female (52.3%), and are predominantly domestic workers (20.8%). According to the living standards index, 95.8% have electricity in their homes, and 63.2% earn between $135.00 and $275.00 per month. The average educational level of commuters is grade six, although 27.3% of passengers are enrolled for a post-school qualification. Less than 10% of IBL's passengers have access to computers and less than 5% have access to the Internet, either at home or at work.

View Image -   Figure 3: Graphical Representation of IBL's Clientele Base

IBL transports predominantly domestic workers, although students, part-time workers and shoppers constitute almost half of the company's clientele base (Figure 3). Many passengers are younger than 30 years of age and are studying or have just completed some form of education.

IT Infrastructure

Business processes are fully supported by information technology. IBL uses a system of electronic ticket machines (ETMs) and all ticket sales are recorded in a database. Tickets bear a magnetic strip and when a passenger boards a bus, the ticket is swiped and the passenger recorded for the specific route and trip. Special electronic equipment is installed in the gearbox of every bus that records movement times and speed. The raw data from these devices is processed and used to prepare statistics on passenger numbers and kilometers traveled on a monthly basis. These statistics are then used as proof for the monthly government subsidy claim.

On the passenger liaison side, however, IT applications are non-existent. One would think that potential for a web page exists but the lack of access to computer technology and the limited computer literacy of commuters would make this a futile exercise.

SETTING THE STAGE

Need for Communication

Dora Ramakoatse works as housekeeper in the home of a wealthy Bloemfontein business man. She is 46 years of age and her native tongue is Sesotho. She also speaks some Afrikaans and English. She has formal school education up to grade 5 and has a limited reading capability.

Dora lives in Botshabelo and every morning at 5:00, she boards a bus for a trip of some 50 kilometers to Central Park. There she transfers to another bus for the suburb of Hospital Park where her employer and his family live. At about 6:30 she is just in time to wake the kids, prepare breakfast and start her daily duties of washing, cleaning and ironing. At 15:30, she once again takes a bus to Central Park and from there to Botshabelo. At around 17:00, she arrives at her own home, exhausted but still with the responsibility of seeing to the basic needs of her own family, such as preparing meals for the evening and the day to come.

Dora is entirely dependent on the commuter service to get to and from her workplace. She used to complain about buses being late or not even turning up for scheduled trips. In the winter, she has a problem with buses being extremely cold in the early mornings. Sometimes she complains of buses being overloaded or having reckless or impatient drivers. Being dependent on a basic minimum wage, annual tariff increases hit hard and she does not always understand why these increases are necessary.

What Dora needs is to be able to express her complaints in a medium that will allow her to comment immediately when the problem occurs. Also, Dora needs the assurance that her complaints will reach those who can do something about it. This medium should not only allow commuters to give feedback on IBL's services, but should also present commuters with information on schedules and ticket prices.

Communicating with Commuters: The Traditional Approach

Upon taking up this matter with IBL's management, Dora's employer was told, as part of their customer care drive, IBL has implemented a toll-free hotline, where complaints, questions, and suggestions are handled and processed. Also, George Mokgothu, public relations officer of IBL, holds regular focus group discussions where community leaders can raise their concerns and express their needs on a monthly basis. George takes note of specific complaints, and provides information on relevant items such as route changes, tariff increases, and feedback on previous enquiries. George also hosts a weekly, hour-long radio talk show on Lesedi FM, the radio station patronized by 86.3% of IBL's passengers. As a part of this show, listeners are invited to phone in and question him, live on air, about IBL's service.

Infrequently, IBL also runs advertisements in local newspapers, advertising mostly for the special trip market. Annual tariff increases are communicated via major advertisements in the local media. Need-to-know passenger information, for example, tariffs for specific routes are available for perusal in each bus. Brochures with timetables, routes and stops are available on request at Central Park. These may also be faxed or emailed to passengers on request.

But Dora was still not happy. She does not have the confidence to phone in to the radio talk show and raise her concerns in public. She also does not have personal contact with the community leaders who represent her in the focus groups. She wants a medium of communication through which she can complain about IBL's services, knowing that her complaints will reach the right ears and will be attended to. She wants access to schedules and tariffs without having to wait for an initiative from IBL. She also complains that the brochures are often outdated before they hit the streets. People also remove the brochures from the buses and notice boards.

George confirms that it is difficult to replace brochures on just about 200 buses with updated ones at short notice. He also confirms that he cannot keep up with answering all the queries to the satisfaction of both IBL and its clientele on a regular basis. He needs a way to disseminate information regarding route and schedule changes, tariff increases, and so forth at short notice.

Communicating with Commuters: Alternative Approach

After consulting with George, passenger representatives and local authorities, Interstate Bus Lines approached the Department of Computer Science and Informatics (DCSI) at the University of the Free State (UFS) early in 2003 to assist in a search for a solution. A touchscreen information kiosk (Figure 4) was identified as a way of supplementing the communication techniques mentioned previously while at the same time overcoming some of the disadvantages of these techniques. Additionally, it could also serve the purpose of improving the company's corporate image among commuters and could expose previously deprived people to technology. The idea was that the system should present commuters with the opportunity to query a database regarding routes, schedules and ticket prices. During periods of inactivity, the system should present general company information on a continuous basis. As an added bonus, advertisements from shops in the center could be displayed. Passers-by or people queuing in front of a ticket box should then be able to follow the presentations which are accompanied by attractive graphic animations and sound or video clips.

It was imperative that the system be updatable on a regular basis as ticket prices increase, timetables change, shops change their special promotions, and so forth. Furthermore, it should be possible for George and other staff members of IBL to do these updates themselves after the developers of the system have handed over the completed system. In an attempt to conform to these requirements, a user-friendly switchboard application was integrated with a set of presentations and a single-user database package to set up a comprehensive information kiosk while allowing maintenance by people with end-user skills only.

View Image -   Figure 4: Touchscreen Information Kiosk at IBL Ticket Office in Central Park

Because of the centralized location of the ticket office, it was not necessary to connect the system to other information kiosks. Also, because of the non-existence of a web page, no need existed to connect the system to the Internet. Since the complete timetable is in any case maintained in an Access database for scheduling purposes and driver instructions as part of the business process, it was worthwhile exploring the possibility of connecting the kiosk system to this database by means of a local area network.

This case study outlines the impediments, design issues and pitfalls that were encountered during the implementation of the system.

CASE DESCRIPTION

Information kiosk systems are computer-based information systems in publicly accessible places, offering access to information or transactions for an anonymous, constantly varying group of users with typically short dialogue times and a simple user interface (Holfelder & Hehmann, 1994). Depending on the nature of the business, the presence of an information kiosk could be a necessity, but most probably is a supplement to existing means of communication. The success of such systems depends largely on the attractiveness of their user interfaces, how easily they allow access to information and how clearly the information is presented (Borchers, Deussen, & Knörzer, 1995). It is no use having the technology with all the latest information if Dora and others like her cannot access it or do not understand how to use it.

Classification of Information Kiosks

Borchers, Deussen, and Knörzer (1995) propose a classification of kiosk systems according to their major tasks:

* Information kiosks have the primary goal of providing information in a limited subject field, for example, at a railway station where users can find information on a connection to a chosen destination. Users of such systems use the system because they need the information - they do not have to be extrinsically motivated to use the system.

* Advertising kiosks are installed by companies to present themselves or their products to the public in an attractive and innovative way. The missing initial motivation of potential users has to be compensated for by a visually attractive design. The contents should be interesting and entertaining and should motivate the user to explore the system further.

* Service kiosks are similar to information kiosks with the added functionality of information entry by the user, for example, hotel reservation systems where data such as names and addresses have to be entered to make a booking.

* Entertainment kiosks usually do not have a specific task apart from entertaining the user.

Borchers, Deussen and Knörzer (1995) acknowledge that most information kiosk systems will belong to two or more of the previously mentioned classes. The system that was developed for the IBL ticket office can typically be regarded as both an information kiosk and an advertising kiosk with the potential to include the functionality of a service kiosk at a later stage.

System Architecture

Development Tools

Several possibilities regarding the development tools were considered in order to develop a system that would fulfill in the needs as expressed previously. A presentation package such as Microsoft PowerPoint® provides for easy end-user updates while allowing attractive graphical animations and multimedia effects. The preparation of an individual slide for every trip makes this, however, an impractical solution.

A user-friendly front-end system to query the database for the relevant information or a fully-fledged object-oriented database environment to store graphic images, video clips, and so forth as well as the route and timetable information, could have been developed by professional programmers. Another possibility that was considered was a series of HTML and ASP files to be viewed in a browser. Such an environment would have allowed the combination of graphic attractiveness, the use of multimedia and database querying. Although these tools might have done the job, they would have been difficult to maintain for people with end-user skills only.

Finally, it was decided to develop the IBL system by integrating a dedicated enduser application (developed in Delphi®) with a presentation package (Microsoft PowerPoint®) and a single-user database package (Microsoft Access®) inside Microsoft Windows® as operating system. Together with the fact that the complete timetable was already available in Microsoft Access, both PowerPoint and Access were reasonably well known by the staff members of IBL who would be responsible for system maintenance. The integration was done in such a way that commuters would not be aware of transitions between the environments. A diagrammatic representation of the system is shown in Figure 5.

View Image -   Figure 5: Diagrammatic Representation of the IBL System
View Image -   Figure 6: Switchboard and MS PowerPoint Presentation

A form at the bottom of the screen acts as a switchboard (Figure 6). Buttons on the switchboard allow users to navigate through the system. Some of the options activate MS PowerPoint® presentations in the upper part of the display. These presentations convey general company information, ticket office hours, contact telephone numbers, advertisements from shops in the center, and so on. Other options enable users to query the MS Access® database for route information, ticket prices, schedules, and so forth.

The use of a dedicated end-user application as switchboard also allows the programmatic capturing of research data such as frequencies of usage, commuters' preferences regarding language, typing speed, as well as a limited user profile. These values are saved into the underlying database and are analyzed periodically by the researchers.

Services Offered

One of the most important needs that Dora expressed was to be able to lodge complaints as they arose. Also, in order for George to be able to communicate passenger needs to management, he has to know what they think and how they experience the services that IBL renders.

View Image -   Figure 7: On-Screen Keyboard to Allow Free Text Input with Touch Typing

The information kiosk allows commuters to register comments, complaints, requests, and so forth by means of an on-screen keyboard (Figure 7). The idea for this technique is accredited to researchers at the Human Computer Interface Laboratory at the University of Maryland (Plaisant & Sears, 1992; Sears, 1991; Sears, Kochavy, & Shneiderman, 1990; Sears, Revis, Swatski, Crittendon, & Shneiderman, 1993). Valuable feedback for IBL has been generated in this way. Although many passerbys use this facility just for the sake of playing around and to get the feel of using a touchscreen, some 800 valid and useful comments were registered in the period May to December 2003. Since the information kiosk is available night and day, Dora is now happy that she has a way to express her concerns the moment that she gets off a bus. Also, George has expressed his satisfaction for getting honest and unbiased feedback on a daily basis.

Route and timetable information is kept in an MS Access® database. Commuters are able to query the database by means of a form that is displayed full-screen, covering the running presentation windows. Figure 8 shows a screen print of this form.

Lessons Learned During Development

Several sources are available that provides guidelines for the design of touchscreenbased information kiosks (Borchers, Deussen, & Knorzer, 1995; ELO Touch Systems, 2002; ELO Touch Systems, 2003; MicroTouch Systems, Inc., 2000). These guidelines are mostly generic of nature and not specific to a particular package or an integrated approach as is proposed here. During the development of this system, several lessons were learned that proved to be critical in an integrated development approach.

View Image -   Figure 8: Form to Query Database for Trip Details

Physical Mounting of the Screen

According to ELO Touch Systems (2002), the cabinet in which the touchscreen is installed should be in the company colors, have proper ventilation and should be mounted at a viewing angle that minimizes differences in user height. The design of the cabinet should be attractive and sturdy. In the current study, the system was installed in a metal casing just below average eye-level and mounted against the wall between two cubicles of the ticket office at a slight angle (Figure 4). The screen was placed inside the metal casing in such a way that only the glass part was accessible in order to avoid users tampering with the screen's adjustment controls. The screen could be closed by a lockable lid after hours. This has worked well and to date no incidences of tampering or vandalism have occurred. The continuous presentations attract the attention of passerbys and are visible to people queuing at the ticket offices. This near-vertical mounting also prevents people from putting objects, for example, food, parcels, and so forth, on the screen.

Touch Modes

Potter, Weldon and Shneiderman ( 1988) describe a lift-off strategy for touchscreens that implies that the selection is not made when the user touches the screen but when he lifts his finger from the screen. This allows the user to put his finger on the screen and then make a correction to adjust the position of the pointer. 3M Touch Systems (2002) indicates that the so-called desktop mode is most useful for general-purpose desktop applications. In this mode, a touch positions the cursor in much the same way as a mouse does. Holding the touch steady is equivalent to pressing and holding the mouse button. Lifting off is equivalent to releasing the mouse button.

In the current study, it was found that both these strategies seem to be unnatural to the average user from the IBL commuter community. These users expect a reaction from the system as soon as they press a button. If nothing happens, they tend to press harder without lifting the finger. It was found that the button-mode was the most appropriate strategy for this user group. In this mode, touching the screen is equivalent to pressing and releasing the mouse button. The action occurs as soon as you touch the screen.

System Cursor

The lift-off strategy proposed by Shneiderman (1991) implies that a cursor should be visible on the screen that is not obscured by the finger. The concept of a visible cursor is contradictory, however to the idea of ELO Touch Systems (2003) that there should be no cursor because the user should focus on the entire screen instead of the arrow.

The normal pointing cursor for button-aware applications is the northwest pointer, but for PowerPoint presentations, the default cursor for links is the pointing finger. In order not to confuse commuters, it was essential to change the cursor to a consistent graphic throughout the system. A top-down arrow has its hot spot on the bottom tip of the arrow and presents good feedback with regard to the exact item selected since the cursor is not entirely obscured by the finger. To replace the top-down arrow with a hand with finger pointing downward would, however, suggest an awkward physical position. In the end it was decided that the visual clue of a hand with a pointing finger outweighs the disadvantage of occasional obscuring.

Use of Sound

The effect of sound to attract attention and for purposes of feedback is well known (Preece, Rogers, Sharp, Benyon, Holland, & Carey, 1994). The value added with regard to information conveyed is somewhat less, however. Speech has a transient nature. If you did not catch the message then you did not catch it, while written text has the advantage that it can be read over and over again at the reader's own tempo until he/she understands what is said.

At the IBL kiosk, each one of the running presentations had accompanying sound effects and narration. The facilities that expected user input had short written as well as spoken instructions. Users could at any time press a button to listen to the instructions again.

Touchscreens have no tactile feedback like a button on a soft microwave oven keypad that gives when pressed or a button on an elevator's keypad that can physically be depressed. Sound effects (e.g., an audible click with every valid press) and display changes (e.g., a button that is displayed differently when selected) are important to inform the user that the input was accepted.

The placement of the loudspeakers presented a problem. The speakers were placed inside the metal casing, facing the ventilation holes at the sides of the unit. The kiosk was placed in a public foyer with very bad acoustics, noise from nearby stores, and even a night club. Users complained that they could not hear properly, even with the volume setting at its highest. It would have been better had the casing been made a little wider so that the speakers could fit in next to the screen, facing towards the users behind a grid similar to the ventilation holes. A sound amplifier would also have been an improvement.

One Window with Many Inputs or Many Windows with One Input Each?

Due to users' limited previous exposure to technology and limited educational background, the need to keep the user interface simple and easy to use was identified from the start. For example, it was thought that, whenever a series of user inputs was required, a single screen capturing all the inputs would provide the simplest user interface. It was found, however, that such a screen confused and frustrated the users. The error messages they got due to incomplete inputs caused them to walk away. This approach was then replaced with one where the user inputs were obtained through a series of modal dialog boxes, appearing one after the other (Figure 9). Each dialog box had only one set of mutually exclusive buttons. This was accepted much more easily as users were guided to answer one question after the other.

Navigating Through a Series of Dialog Boxes

Initially, the series of dialog boxes was provided with a set of Previous/Next buttons similar to the typical setup wizards for many software applications. It was found, however, that users at the IBL ticket office did not understand the concept of going back to edit a previous input, became frustrated, and walked away leaving the system halfway through a sequence. The Previous buttons were then replaced with Restart to allow users to start with the query all over again. The Next buttons were taken away when the user made a selection the next box in the sequence was automatically displayed. This approach was much better accepted. This might be another confirmation of the findings of Blake, Stevenson, Edge, and Foster (2001), as well as Walton and Vukovic (2003), that African people have a different view of hierarchies and sequences than Western people have.

View Image -   Figure 9: Series of Dialog Boxes to Determine User Profile

Control Types: Buttons, Scroll Bars, Sliders, Radio Buttons, etc.

According to Shneiderman (1991), it is possible to use actions other than clicking a button on a touchscreen, for instance, sliding, dragging, rubbing, etc. He asserts that many actions that are unnatural with a mouse are more intuitive with a touchscreen, for example, dragging the arms of an alarm clock to set the time. Shneiderman (1991) discusses evidence that most users succeed immediately in using a touchscreen information kiosk that utilizes these kinds of interactions.

Our experience with the current study, however, was that users find the single tap on the screen easier than a slide. It was easier for them to adjust the sound volume if the control consisted of a set of discrete values implemented with radio buttons (Figure 6) than when they had to drag a slider along a continuous scale. It must always be kept in mind that users of the IBL system are casual users who are unlikely to use the system time and time again and will, therefore, never have the opportunity to practice the action of dragging.

Do Away with the Windows Task Bar

ELO Touch Systems (2002) recommends that the system should not have a "Windows look". There should be no indication of the operating system and users should not even think of the system as a computer system. In the current system, this lesson was learned the hard way. Initially, the Windows task bar was always available at the bottom of the screen, even though it was set to "auto-hide". Some of the users would press on a specific button and then read the information presented on the screen while dropping their hands off the screen at the bottom edge; this sometimes caused accidental touching of the screen again, which caused the task bar to jump up. For computer literate users, especially teenagers, this presented a challenge to fiddle around with the system, edit the PowerPoint presentations, search for evidence of Internet availability, and even close down the system. For computer illiterate users, the sudden appearance of a bar at the bottom of the screen distracted their attention and even made them uncertain about whether some reaction on their part was expected. When the task bar was removed altogether, these problems were largely solved.

Cater for User Ignorance

One of the general design guidelines for information kiosks states that system reaction must be immediate to prevent users from walking away (ELO Touch Systems, 2003). Any presentation must at any time be immediately available on request of a commuter. In this case study, all presentations were activated to run in the memory simultaneously, one behind the other. On request, the appropriate presentation can only be brought forward on the screen with no time delay due to loading.

It was also observed that some of the commuters, especially teenagers, just played around with the system, pressing one button after the other in quick succession. Commuters can press the buttons on the screen much faster than they can click a mouse, thereby expecting the system to switch between the various presentations or query the database and display results in a matter of milliseconds. To cater for these scenarios, it was important to ensure ample resources for the computer system. In this case study a PIII 866MHz CPU with 256 MB memory proved to be stable and efficient enough.

In a typical information kiosk environment, it is always possible that a specific user may leave the system halfway through a process or query. The next user might then be confused and even unable to get to the information he or she requires. It was, therefore, essential to add functionality for the system to reset itself and to return to the main screen after a period of inactivity.

Commuters' Comments

An online questionnaire allows commuters to select their answers from a set of possibilities (Figure 10). Norman, Friedman, Norman, and Stevenson (2001) provides guidelines regarding the layout of such online questionnaires.

Results obtained from this survey revealed that 71.1% of first-time users and 83.8% of follow-up users found the system easy or moderately easy to use. Also, 68.6% of first-time users and 70.6% of follow-up users indicated that they experienced a positive emotion, e.g., satisfaction or enjoyment, while using the system.

View Image -   Figure 10: On-Screen Survey Form (extract only)

A rather low percentage of 40.2% first-time users indicated that they had found what they had been looking for. This was probably because the commuters expected the system to allow them to buy tickets from the machine rather than having to queue for them; something that had not, from the outset, been the intention of the system. The fact that 71.8% of follow-up users indicated that they had found what they had been looking for, confirms that the commuters realize the intention of the system after some exposure.

The fact that 70% of first-time users and 88% of follow-up users indicated that they found the information useful was regarded as an indication of commuters' rating of the value of the system.

In a usability study, selected users were asked to search for information on six specific items that were representative of the available information. On average, firsttime users found 90.1% of the requested items correctly while follow-up users found 97% of the items correctly. The fact that follow-up users could obtain these items in about 41⁄2 minutes can qualitatively be considered as acceptable to good in comparison with the two minutes that an expert user took to complete the tasks.

CURRENT CHALLENGES/PROBLEMS FACING THE ORGANIZATION

When a new IT installation is on the cards, one can always ask the question: Is this a "nice-to-have" or a critical necessity for business survival? How often does one see potential for implementation of an IT solution that promises to work better than the existing manual system with a concomitant saving in time, money and manpower and a positive impact on annual turnaround, but due to the skepticism of management and reluctance of employees to use it, the system is either not implemented or not utilized to the full?

This was and still is one of the biggest stumbling blocks that needed to be overcome with this kiosk system. Despite the fact that management and the PR, George, are convinced that the system adds value to the company, despite the fact that the usability results reported favorably to a large extent, and despite positive feedback from individuals such as Dora Ramakoatse, there are still those who are skeptical about the system. This was especially evident from employees at the ticket office who were assigned the task of ensuring that the system runs smoothly on a day-to-day basis. They were trained to restart the system in cases of power failures or system crashes. Those employees are, however, not enthusiastic about the system. It was found that, if one of the researchers or George or another member of management does not visit the installation at least once per week to prove interest in and the importance of the system, the employees do not consider the effort to keep the system up and running worthwhile. They view the system as an extra (unnecessary) burden that is nice to have but not essential.

Because of this lack of interest on the part of IBL employees, it was extremely difficult to find an individual who was willing to take responsibility for the system on a continuous basis. This meant that the researchers could not easily withdraw from the system once their job was done.

Because of the fact that ticket salespeople work with huge amounts of cash, and because of the high crime rate in the area where the ticket office complex is located, intensive security measures are in place. Among other things the whole environment, inside and out, is under constant surveillance of closed circuit television (CCTV). Because of the risk of insiders working together with criminals to deactivate the CCTV prior to a robbery attempt, the computer for the CCTV system is behind a security door where not even the sales people can enter. For reasons of limited space and power outlets, as well as the existence of a heat extracting fan, the computer for the information kiosk is also behind this security door. This isolation of the information kiosk computer causes a certain amount of inconvenience. It happens quite often that a power failure or, especially in the early days, a malfunctioning system causes the system to shut down. The salespeople cannot solve the problem or restart the computer and the researcher has to be called out time and again.

The public environment in which the system is functioning implies a high risk for potential vandalism and even theft of equipment. Currently the touchscreen is installed in a metal cabinet in such a way that only the glass part is accessible. Furthermore, the touchscreen is also undercover by CCTV. The risk still exists, however, that a person with a vandalistic inclination could hit the screen with a hammer during quiet hours and then disappear. Due to the high crime rate in South Africa, the police would probably not have the time nor the manpower to follow up the TV recording.

Much research has previously been done on user interfaces for touchscreen kiosks (Borchers, Deussen, & Knörzer, 1995; ELO Touch Systems, 2002; ELO Touch Systems, 2003; MicroTouch Systems, Inc., 2000; Sears & Shneiderman, 1991; Shneiderman, 1991). This research was, however, always focused on users with average computer literacy skills and exposure to technology according to Western standards. For an interface to be developed for users from the IBL passenger community, special considerations should be taken into account. As previously indicated, these people are mostly from an African community with very limited educational background. One of the initial research aims for this project was to investigate the ways in which a computer interface must be adapted to accommodate users of this profile. To date, no clear-cut set of guidelines could be formulated and it remains an open question as to how much users of this user community gain from a Westernized interface in a non-native tongue that is not always well understood.

Commuters who travel the same route every day do not have to consult the system time and again to determine departure times or ticket prices. This means that they would not have any motivation to consult the system on a regular basis, thereby probably missing out on important notices that IBL communicates from time to time. It is, therefore, essential to determine effective ways to motivate commuters to use the system on a regular basis.

With reference to the techniques of liaison and obtaining feedback that were in place prior to the implementation of the information kiosk, the ultimate question is whether or not the information kiosk adds value. It is accepted that the existing techniques should not be replaced by the information kiosk and that the kiosk should act as a supplementary source of information, but would the old ways not suffice without the information kiosk? In other words, does the information kiosk system really fulfill the needs of Dora Ramakoatse and others like her?

References

REFERENCES

3M Touch Systems. (2002). Online help of the TouchWare software driver for TouchScreen monitors. Version 5.63 SR3.

Blake, E., Steventon, L., Edge, J. & Foster, A. (2001). A Field Computer with Animal Trackers. Presented at the Second South African Conference on Human-Computer Interaction [CHI-SA 2001]. Pretoria, South Africa. Online: www.chi-sa. org.za/chi-sa2001/ chisa2001new.htm

Borchers, J., Deussen, O. & Knörzer, C. (1995). Getting it across: Layout issues for Kiosk Systems. SIGCHI Bulletin, 27(4), 68-74.

Breytenbach, H.J. (2003). Interstate Bus Lines Passenger Survey: Executive Summary. Passenger survey conducted by independent consultant.

ELO Touch Systems. (2002). Keys to a successful Kiosk application. Accessed January 5, 2003: http://www.elotouch.com

ELO Touch Systems. (2003). Touchscreen application tips. Accessed January 5, 2003: http://www. elotouch. com/support/10tips.asp

Holfelder, W. & Hehmann, D. (1994). A networked multimedia retrieval management system for distributed kiosk applications. Proceedings of the 1994 IEEE International Conference on Multimedia Computing and Systems.

MicroTouch Systems, Inc. (2000). Kiosk Planning & Design Guide. Document number 19-251, Version 2.0.

Norman, K.L., Friedman, Z., Norman, K., & Stevenson, R. (2001). Navigational issues in the design of online self-administered questionnaires. Behaviour & Information Technology, 20(1), 37-45.

Plaisant, C., & Sears, A. (1992). Touchscreen interfaces for alphanumeric data entry. Proceedings of the Human Factors Society: The 36th Annual Meeting, Atlanta, Georgia (vol. 1, pp. 293-297).

Potter, R.L., Weldon, L.J. & Shneiderman, B. (1988). Improving the accuracy of touchscreens: An experimental evaluation of three strategies. Proceedings of the Conference on Human Factors in Computing Systems, Washington DC (pp. 27-32).

Preece, J., Rogers, Y., Sharp, H., Benyon, D., Holland, S. & Carey, T. (1994). Human-Computer Interaction. Addison-Wesley.

Sears, A. (1991). Improving touchscreen keyboards: Design issues and a comparison with other devices. Interacting with Computers, 3(3), 253-269.

Sears, A., Kochavy, Y., & Shneiderman, B. (1990). Touchscreen field specification for public access database queries: Let your fingers do the walking. Proceedings of the ACM Computer Science Conference '90, (pp. 1-7).

Sears, A. & Shneiderman, B. (1991). High precision touchscreens: Design strategies and comparisons with a mouse. International Journal of Man-Machine Studies, 34(4), 593-613.

Sears, A., Revis, D., Swatski, J., Crittendon, R. & Shneiderman, B. (1993). Investigating touchscreen typing: The effect of keyboard size on typing speed. Behaviour & Information Technology, 12(1), 17-22.

Shneiderman, B. (1991). Touchscreens now offer compelling uses. IEEE Software, 8(2), 93-94, 107.

Walton, M. & Vukovic, W. (2003). Cultures, literacy, and the Web: Dimensions of information 'scent'. Interactions, 2, 64-71.

AuthorAffiliation

Pieter Blignaut, University of the Free State, South Africa

Iann Cruywagen, Interstate Bus Lines (Pty.) Ltd., Bloemfontein, South Africa

AuthorAffiliation

Pieter Blignaut is an associate professor at the Department of Computer Science and Informatics at the University of the Free State, South Africa. He is also head of the Centre of Excellence at the university that focuses on ICT related research. He teaches programming in high level languages as well as software engineering to senior students. His research interests are focused on adapting user interfaces for users with limited reading skills and the cognitive aspects that characterize successful computer users.

As traffic admin manager, Iann Cruywagen supervises the control room of Interstate Bus Lines. He has his pulse on the daily operational activities of the company and is also in close contact with passengers. He holds two MSc degrees and has also completed a diploma in transport economics. Having been a bus driver himself for eight years, he is well-acquainted with a wide variety of aspects in the passenger transport industry.

Subject: Public transportation; Studies; Systems development; Kiosks; Information dissemination

Location: South Africa

Classification: 9177: Africa; 8350: Transportation & travel industry; 9130: Experiment/theoretical treatment; 5240: Software & systems

Publication title: Journal of Cases on Information Technology

Volume: 7

Issue: 4

Pages: 27-45

Number of pages: 19

Publication year: 2005

Publication date: Oct-Dec 2005

Year: 2005

Publisher: IGI Global

Place of publication: Hershey

Country of publication: United States

Publication subject: Business And Economics--Computer Applications

ISSN: 15487717

Source type: Reports

Language of publication: English

Document type: Business Case

Document feature: References Maps Graphs Charts Illustrations

ProQuest document ID: 198651342

Document URL: http://search.proquest.com/docview/198651342?accountid=38610

Copyright: Copyright Idea Group Inc. Oct-Dec 2005

Last updated: 2011-07-21

Database: ABI/INFORM Complete

Document 3 of 100

Challenges of Complex Information Technology Projects: The MAC Initiative

Author: Teta Stamati; Kanellis, Panagiotis; Martakos, Drakoulis

ProQuest document link

Abstract:

Although painstaking planning usually precedes all large IT development efforts, 80% of new systems are delivered late (if ever) and over budget, frequently with functionality falling short of contract. This case study provides a detailed account of an ill-fated initiative to centrally plan and procure, with the aim to homogenize requirements, an integrated applications suite for a number of British higher education institutions. It is argued that because systems are so deeply embedded in operations and organization and, as you cannot possibly foresee and therefore plan for environmental discontinuities, high-risk, 'big-bang' approaches to information systems planning and development must be avoided. In this context the case illustrates the level of complexity that unpredictable change can bring to an information technology project that aims to establish the 'organizationally generic' and the destabilizing effects it has on the network of the project's stakeholders. [PUBLICATION ABSTRACT]

Full text:

Headnote

EXECUTIVE SUMMARY

Although painstaking planning usually precedes all large IT development efforts, 80% of new systems are delivered late (if ever) and over budget, frequently with functionality falling short of contract. This case study provides a detailed account of an ill-fated initiative to centrally plan and procure, with the aim to homogenize requirements, an integrated applications suite for a number of British higher education institutions. It is argued that because systems are so deeply embedded in operations and organization and, as you cannot possibly foresee and therefore plan for environmental discontinuities, high-risk, 'big-bang' approaches to information systems planning and development must be avoided. In this context the case illustrates the level of complexity that unpredictable change can bring to an information technology project that aims to establish the Organizationally generic' and the destabilizing effects it has on the network of the project's stakeholders.

Keywords: academic administration IS; information systems development; IS failure; IS/IT planning; IT project management

ORGANIZATIONAL BACKGROUND

Located on the western edge of London, Isambard University received its Royal Charter' in 1966 and since then enjoys a considerable reputation for research and teaching in the science and technology fields in which it specializes. Close connections with the public sector, industry and commerce characterize Isambard University. These links were built through a commitment to the thin sandwich2 undergraduate degrees which made the University's graduates among the most employable in the country and, by its distinctive competence in applied and strategic research. As a direct result, Isambard University is popular with undergraduates, while its earnings from contract research per member of academic staff are significantly above the national average in most of the cost centers in which it is active.

In the beginning of the 1990s the Higher Education (HE) sector in the UK started to experience dramatic changes. The Secretary of State invited comment on the scale, purpose and structure of HE, and the Government made its views clear through the introduction of numerous policy changes affecting universities' funding, teaching and research. Those were followed by the merger of the Ministries of Education and Employment, and the move of the Office of Science and Technology to the Ministry of Trade and Industry, signifying an increased requirement for public spending on HE to have a demonstrable effect on employment and national economic growth. For example, in November 1995, a 7% overall reduction in universities funding for 1996 was announced, including a 31% fall in capital funding, meaning that over a six-year period the unit of funding for teaching each student would have had to be reduced by 28%. Direct financial support for students was also reduced. The previous students' allowance scheme was terminated, with the balance between student grants and loans moving even more deterministically towards the latter, with the Government signaling its adamant intention to fundamentally review the funding mechanisms.

It was against this background of environmental turbulence that Isambard University, as indeed every other academic institution of HE, operated. Another one of the key environmental changes was the Government's plan to double the number of undergraduate students, from one million to two million, over a 25-year period beginning from 1989. In the medium term this was to be achieved through a strategy of 'expansion with greater efficiency'. Hence, a major challenge for Isambard University was to determine a plan and assure that the necessary infrastructure was in place for participating in this program of expansion in a way that would build upon and strengthen its distinctive characteristics. Associated with this change was the Government's decision to abolish the Council for National Academic Awards (CNAA3). Institutions with degrees validated by this body were now required to seek alternative means of validation, either through the acquisition of chartered status, or through association with an existing chartered institution. Opportunities to validate the awards of other institutions were therefore available for Isambard University.

Isambard University's strategy of actively seeking growth and diversity, by merging and fostering links with other institutions, came into fruition in February 1995, when the West London Institute of Higher Education was incorporated into the University as Isambard University College. This amalgamation marked the beginning of significant restructuring as the College departments had to be molded into a unified faculty structure. By the end of 1995, the Departments of Education from the two institutions were brought together into a single School of Education, and the Department of Design joined the Faculty of Technology. Furthermore, there were plans involving the splitting of the College Department of Human and Environmental Sciences into a Department of Sports Sciences and a separate Department of Geography and Earth Sciences. In addition, Isambard was for the first time planning to establish an Arts Faculty. This re-organization was the cause of considerable instability.

Adding to these was the intensification of the competition for research funding. Changes in the Funding Council's allocation model were directed towards greater selectivity in the use of research funding and an increased emphasis on research quality and proven research success. For these reasons, Isambard was experiencing a shift in its funding arrangements and had to obtain external funding to compensate for a reduction in central funds through the Higher Education Funding Council for England (HEFCE). Whereas in the past there were one or two revenue streams to be maximized, now there were at least five. These included:

* Central funding from the HEFCE based on a series of assessments (for example Research Assessment Exercise)

* Project-driven funding from UK research councils and from the European Community

* Collaborative and contract research for industry and commerce

* Overseas student fee income

* Conference accommodation and catering income

Hence it was towards the end of the '80s and the beginning of the '90s that Isambard University found itself exposed to an operating environment that in many respects was borrowing the business - like characteristics of the commercial sector. In the Vice Chancellor's own words:

"The only cloud on our horizon as we start the new year is the uncertainty of the environment in which we will be seeking to put those values [to continue to be a mixed teaching and research university which is financially sound; and to be characterized by teaching and research which is of relevance to its user community] into practice. 1995 entered with less clarity about the future of the UK Higher Education system than most of us working in it have ever known. " (Sterling, 1995, p. 16)

SETTING THE STAGE

Information systems played a critical role at Isambard University. Its orientation towards engineering and sciences dictated a high level of interest in, and use of such systems, among other high technology facilities. Since the mid-eighties its systems infrastructure developed from a central multi-user mainframe with islands of computation in the various departments, to a distributed computing system linking central and departmental resources and providing user access at required locations, via terminals, PCs, and workstations. Teaching and research staff, partnering with their close links to industry and commerce, demanded 'state-of-the-art' computing at industry standards. The following elements constituted the framework for the University's computing infrastructure:

* UNIX for main service operating systems

* Networks based on X.25 and Ethernet

* IBM compatibility for PCs

* Adoption of UNIX- based workstations

* Application software of industry standards

* Centralized file service

It was also recognized that all administrative work ought to be underpinned with effective information and management systems. Historically, the administrative computing capability had been developed to service the central administrative functions. As management and administrative tasks and activities by departments and faculties increased, so did the need for support in those areas. This change in responsibility brought about the development, within some departments and faculties, of local systems to support their management and administrative activities and needs. In parallel with this, there was an increasing demand from departments and faculties for management information from central administration and support, in terms of access to system facilities. In 1988, it was observed that in terms of hardware, the host machine supported about the maximum number of peripherals it could, and was utilized beyond the normal expected level. This meant that any further expansion of support was not feasible without increasing computing power and capacity. In addition, the terminal access of administrative systems for individual departments provided via the University's network did not provide an adequate response to those remote users, and the service level did not always fulfill their needs. It was not necessarily the case that the information held within the systems was inadequate, but barriers existed which prevented or hindered its use by the departmentally base staff that needed it. There were also issues associated with the data itself, and it was felt that they could probably be resolved by developing new hardware and software architectures to support the differing needs of the users. In summary, the main issues were:

* Format and structuring: Data was not formatted and structured so that it could be presented to the user in a useful and meaningful way.

* Access: There was limited access to the data caused primarily by technical constraints.

* Currency: Data was found to be current for one set of users but out of date for others, due to differences in need and timescale.

* Ownership: There were areas where lack of ownership definition and responsibility had resulted in a lapse in maintenance of the data. Where ownership was at the center, but data was derived from other sources, there were problems in maintaining it. An example was customer records where ongoing information was provided from many sources, but there was no area responsible for collecting the data and no means of distributed input. Any breakdown of communication resulted in central and departmental information being different.

* Completeness: There was a wealth of information in all subject areas held by individual departments and within the faculties, which was not captured effectively. The necessary mechanisms (i.e., coordinated and integrated systems) did not exist to enable this to happen.

The software applications processing this data had been developed over the last 12 years. Their development had been tailored to the specific needs of the users that applied at the time of development or subsequent amendment. As management and administrative roles and responsibilities were undergoing change, new users were bringing in a new set of needs to be satisfied. Similarly, changing circumstances - unpredictable demands from the Universities Funding Council (UFC)4 and changing rules for allocating funds - and pressures were bringing about different needs. During the period of 1988-1990 it became clear that while the existing systems satisfied many of the central administrative requirements, new needs in both the management and administration of the university arose.

CASE DESCRIPTION: MANAGEMENT & ADMINISTRATIVE COMPUTING INITIATIVE

The UFC's Management and Administrative Computing (MAC) initiative was announced in September 1988. The aim of the initiative was to promote the introduction of more effective and sophisticated systems to support the increasingly complex decisions that faced universities and colleges (Kyle, 1992). In addition, the systems were to provide the UFC with the information needed for allocating funds more effectively across the pool of universities. The cost of institutions 'doing it alone' was estimated at £ 0.5 million or more for each. To avoid this, the Universities Grants Committee (UGC5 precursor to the UFC) commissioned a study to develop an information/data specification or 'Blueprint', which aimed to cover 80-90% of the needs of any single institution. A Managing Team was formed, and an initial study based on direct input from five universities and contributions from 20 more was completed. The team, comprising senior computing staff and university administrators, was chaired by the Vice Chancellor of the University of Nottingham.

The UFC decided that they would only fund information technology developments for MAC that were organized to suit 'families' of universities. The objective was to group institutions into five or six families with similar computing requirements. Whilst geographic proximity was helpful in promoting frequent contact between the family members, it was not to be the only consideration. Others included similarity in size, structure, type of institution, existing collaboration (for example on purchasing), and computing development needs.

The Initial Phases

The Blueprint undertaken by Price Waterhouse (now PriceWaterhouseCoopers) delivered at the end of 1988. The five main participants were Manchester University, Strathclyde University, Newcastle University, University College London and lsambard University.

In March 1989 the blueprint was sent to all universities, together with a request that each university prepare a 'migration strategy' report. This would have to include each university's present administrative computing situation, both in terms of its computing hardware and its existing applications, and of its development priorities and requirements for the future and additionally:

* A comparison of the information needs of the University with the generalized blueprint and an identification of gaps between the two

* The identification of the characteristics of the institution in order for the Managing Team to classify it

* The development of an outline strategy for migration from the University's existing systems to the outline architecture in the blueprint

Isambard's migration strategy was prepared with the assistance of two consultants from Ernst and Young and emphasized the importance placed by the University on the provision of management as well as operational information. There were also two additional features that were highlighted: one was the need to conform to the University's own Information Technology strategy6; the other was the fact that a new development platform had to be selected for any future systems, as the existing systems were coming to the end of their useful life. The preparation of Isambard's migration strategy for MAC took place at about the same time and led to a decision to integrate management and administrative computing systems. This decision for integration was one of the principal factors that led to a commitment to the Oracle database platform as it was the one supported by the University's computing services. This migration strategy was sent to the UFC in July 1989.

The Formation of Families

The MAC Managing Team used the migration strategies submitted by all universities as the basis for the formation of different 'families'. A consultant from the National Computing Center (NCC) assisted in analyzing the strategies. As a result of his analysis and at a meeting held in September 1989, it was proposed that the families should be formed around the four main relational database products available at that time and in use in universities, as the universities believed it to be the most important factor regarding their future systems development. In addition it was thought that this would enable them to achieve the objective of developing a common code to run on their hardware. The products were Oracle, Ingres, Powerhouse and secqus. Each university was then asked to choose which family it wished to join, with the UGC hoping "that, in time, all members of any one family will be using the same administrative computing software which they will develop and maintain jointly." The process of forming the families took place during October 1989 and Isam bard joined the largest one - the Oracle Family which represented a wide variety of universities. Other reasons for this were the size of the family itself-the bigger the family, the smallerthe contribution Isambard believed it would have to make - and the viability of the supplier; in terms of sales, Oracle was by far the largest of the four as well as the most 'open'.

In October 1989, the Family was simply a collection of universities that agreed to cooperate on systems development using a particular product. A constitution and modus operandi had to be drawn up for the Family in addition to a plan of its activities. This was necessary in order to obtain funding from the UFC. The constitution established a Management Board in which each university had one representative and one vote. A Chairman was elected from among those representatives, and the Family incorporated as a limited company known as Delphic Ltd.

The Board also decided to form a number of what they called Application Groups, one for each area of the management and administrative systems identified in the Price Waterhouse's Blueprint. This did not mean that the groups had to undertake the development of the systems themselves, but that they were to be responsible for working directly with the commercial contractors employed by the Family. Each member of the Family had to be a member of at least one group, and Isambard took the decision to join the Management Information Application Group.

The Analysis, Design & Delivery Phases

In February 1990, it was decided to contract Mantis UK to undertake the analysis stage of the Family's systems development program. This involved the production of the functional analysis and data dictionary of the members' requirements, under the sections covered by the six Applications Groups set up by the Management Board: Students, Staff, Finance, Research and Consultancy, Physical Resources, and Management Information. The work on this contract commenced in February and ended in June 1990. It involved several consultants from Mantis UK plus many staff from all the member universities of the Family and was supervised by a Project Manager employed on a consultancy basis, together with a small group7 chaired by the administrative computing manager of Bristol University.

The result of all the work - a huge coordinated effort between Mantis UK and the Family members - culminated in an enormous document running into several hundreds of pages which contained everything one ever wanted to know about management and administrative computing requirements in UK universities. It was made up of two main parts. The first was the analysis of all the management and administrative functions that universities needed the systems to help them carry out (the Function Hierarchy). The second identified all the data items required by these functions and the relationships between them (the Entity Relationship Model). These were followed by proposals concerning the development of the required systems. The document therefore comprised the deliverables from the analysis stage on the basis of which the system was to be designed and built.

The next stage was to commission someone to design and build the systems software on the basis of this analysis and data dictionary. An initial description of the work to be tendered was issued by the NCC on behalf of the Family at the end of April 1990, and expressions of interest in receiving a full tender document were invited. The formal invitation to tender was issued in June to three companies expressing interest. These were Mantis UK, Hoskyns and Price Waterhouse. The Family received the three tenders on August 7, 1990, and spent the rest of the month assessing them. A detailed scoring system was used to evaluate the three tenders against a whole range of factors. This evaluation process was followed by a period of intense negotiation over the costs with each of the suppliers and significant reductions over the original tender price were eventually achieved.

The outcome was that Mantis UK was offered the contract to develop the full set of management and administrative systems. The recommendation was formally accepted by a meeting of the Management Board in September 1990, and a contract was subsequently drawn up with Mantis UK with the assistance of specialist legal advice. The complexities of the negotiations over the contract were such that it was not formally signed until May 1991, although the work itself started and continued during the negotiation period.

Although the MAC system was designed as one closely integrated system, its software was to be made available in phases (see Appendix). All applications, with the exception of payroll, would use SQL Forms V.3 with pop-up windows etc. as part of the user interface. The Finance application was based on Mantis's own accounting package that was to be enhanced to cater for the additional functionality requested by the Family. Whenever the Mantis development team finished writing and testing a release of software, this was to be passed over to the appropriate Application Group for them to run their own acceptance tests on it. It is important to note that the '80/2O' rule applied here. A small part of the system was left to the discretion of the programmers working at each of the universities, who after an Mantis software release and in close cooperation with Mantis developers, would attempt to 'tailor' the system to the specifics of the sites (Pollock, 2001). If an institution was encountering problems in running the software, the 'Delphic Support Desk' had to be contacted. This would assess the problem and then pass the solution back to the institution responsible for the particular application. If the problem could not be resolved, it was forwarded back to Mantis which had to redesign and rebuild the application.

Management & Administrative Computing Initiative Outcome for the Delphic Family

Towards the end of 1994 and with the funding for the MAC Initiative nearing its termination date of March 31, 1995, the Delphic members were experiencing severe delays concerning the delivery of the main application packages. The Anticipated Availability Schedule (see Appendix) shows the time slippages. Kyle (1994) summarized some of the main causes for the delays as follows:

1. The design of the Student Structure was found to be flawed, and had to be redone.

2. Mantis's decision to merge its development team responsible for its own Finance package with the one responsible for the MAC's Finance module.

3. The loss of senior Mantis development staff, particularly during critical design stages.

4. The introduction of a new stage: implementation by a test (lead) institute between the end of acceptance testing and the release of an application in its supported state.

5. The decision of Delphic to make modules available in 'baskets'. This meant that the first module accepted had to wait until the acceptance of the last module in the basket before it could be implemented.

Complementary to the above a number of observations can be made regarding this state of affairs concerning the initiative.

Price Waterhouse's approach for conducting the initial feasibility study (i.e., the Blueprint) was considered hardly appropriate for as complex a system as MAC was. On the basis of the knowledge they had acquired about university administration from developing information systems for Durham and Leeds Universities, and because time was of essence, they adopted a 'drive the user base instead of letting the user base drive you' approach. This meant that Price Waterhouse as in effect designing the Blueprint based on its assumptions of what was needed, and then presenting it to the representatives from a cross-sample of universities, inviting them to comment.

However, the representatives did not have the blueprints in advance to study and to comment interactively with the consultants - they were given to them at the meetings, where at the end a decision had to be made. This, coupled with the large size of the project and its Open' structure, resulted in some areas being overlooked and others not being looked at in sufficient detail. The final Blueprint was a huge and complicated technical document, and by large the universities did not check it out as they ought to have done. It was of a hierarchical structure cut down to functions described in little detail, which made it difficult for systems personnel to understand, let alone explain it to their line managers and get the much-needed feedback. The fact that this approach was problematic became evident when the families started their own individual developments. They found out that the result was not as much of the Blueprint as they had thought it to be.

The application of the '80/20' rule mentioned in the preceding section meant that the finalization and successful implementation of the various modules was heavily reliant on the skills and efforts of the programmers who were working the code so as to make it compatible to the specifics of each site. But they were tasked to work with the system only in certain ways, as Mantis wanted to ensure that the code would only be modified in the ways they deemed appropriate. In a sense they were "...attempting to configure the local programmers as their users..." (Pollock, 2001, p. 7) and this gave rise to a lot of friction. The following excerpt from a final report to the Delphic Support Desk regarding an issue illustrates this:

"...As y ou may know, [the University] migrated from [MAC] 1.3 to 1.4 last week and encountered some problems which we helped with. We also advised them to migrate to 1.5, as 1.4 was no longer supported. This they did over the weekend and again had some problems, which I have mentioned in the log. They contacted me on Monday morning and 1 have been looking at the problem (s) over the last day and a half. We have carried out a few checks and offered some advice on overcoming some of the problems, but it would appear that the problem lies in the data that they are working with and not a problem in any of our code... Quite simply, 1 cannot justify any more time on this problem as it does not appear to be a problem with our software, rather a problem on site which may well require a great deal of time to identify... Their current work-around is to me the basket 4 forms against the basket 5 database. I have expressed my concern over this and warned them that this is unsupported but they appear to be confident that they have an adequate work-around. " (Pollock, 2001, p. 14)

Arguably, the causes for the delays mentioned above can be experienced in any project of MAC's scope, scale and complexity. However, the first one on Kyle's list draws one's attention, as it was the result of an environmental discontinuity that could have not been anticipated - that of semesterizationS. It was felt as something that was clearly overdue, a departure from a rigid and inflexible academic structure that originated in the beginning of the last century to a more open and clearly cost-effective scheme. As a result of semesterization, Isambard, for example, was able to increase considerably its student numbers by offering a wider range of choice regarding the structure of its courses, rather than only the four-year thin sandwich course option. This change affected mainly the Student Module. The fact that in 1994 parts of it had not been contracted (see Appendix), although the initial delivery date for the completed module was July 1992, shows clearly the magnitude of the effect that this change had.

The Student Module was driven by what was called "Program Structures" schemes of study. "Program Structures" was designed in such a way that in an attempt to provide for integration, every single module was required to know what the structure was when dealing with student administration. For example, the Student Registration, Student Finance, and the Assessment and Degree Conferment modules related first of all to the Program Structure and its maintenance, and in effect were totally dependent on it. This module's development had to start virtually from scratch again because of semesterization, and it was estimated that its delivery had to be put back by a year to 18 months.

Twenty-six months later and there was still no definite delivery date, although an estimation was that a 'formal' deliverable had to wait for another two years. Needless to say, no member of the Family could afford to bear the cost of a product that had not been proven to work, and in which acceptance tests had to take place throughout a whole academic year and be evaluated against the annual cycle of activities. The metaphor of the old lady who is trying to cross the road and waits for someone else to do it first, in order to see if he gets run over, illustrates the case. Angela Crum Ewing, deputy registrar at Reading University (a member of the Delphic Family), said after they decided to hold onto their in-house applications, rather than implement a MAC solution: "MAC is in a position of transition. We did not want to commit to a new, untried system, when we had our own in-house systems which worked well" (Haney, 1994).

View Image -   Figure 1: MAC Modules Adopted by Isambard University after Almost Six Years of Systems Development

A 'sneak preview' of the modules by Family members resulted in a lot of skepticism about the future, stemming from the fact that continuous disappointment would mean dissatisfied stakeholders who will not stop placing pressure in favor of project abandonment. The effect of semesterization had major repercussions not only on Mantis UK as the system developer, but on all members in the Family who were counting on the deliverables and had already made their migration plans. For Isambard University, only the quantifiable costs amounted to the region of more than £50,000 - two extra man-years of further systems development work that no one had anticipated.

CURRENT CHALLENGES/PROBLEMS FACING THE ORGANIZATION

In September 1994, after almost six years of systems development and six months before the termination of the funding, only one of the Delphic modules that were to be made available was finally adopted by Isambard University (Figure 1).

The state of affairs regarding the seven main areas was as follows:

* Students: Although at the time Isambard's existing system infrastructure could hardly accommodate semesterization, the administration of the University, tired of waiting for Delphic to come up with a deliverable, was pushing persistently for a new system. In November 1993, after 'shopping around' for any Mantis-based student system in use that could be able to satisfy Isambard's own requirements, a decision was made to consider the system of the University of Liverpool. After some time it was found out that for a number of reasons, this was not the solution either. Firstly the system was designed to meet Liverpool's own requirements in a very specific way and it was never developed as a package for other universities to use. Isambard's own requirements were completely different to theirs. secondly, it was developed on an older version of Mantis. This meant that its blind adoption would pose problems in the future concerning its integration with any Delphic deliverables. On the other hand, an attempt to modify it would mean major overhead. Finally, from a technical point of view, the system was not documented - a 'black box' in the systems team's own words. Isambard had no alternative but to develop and design its own in-house student system whose first phase went live in the first week of October 1994 to coincide with the beginning of the new academic year. The system covered the Registration process, but no project was under way regarding the two other main areas - Student Finance and Student Accommodation.

* Finance: The development of the Finance module which was a base offering from Mantis UK and which had been enhanced to meet the extra requirements, was also off schedule. As a result, an Mantis quasi-commercial accounting package was adopted and implemented. The package had nothing specific to offer to universities, and if there were a choice, it would have not been taken on board by Isambard. It was developed by Mantis UK (in much the same way as Price Waterhouse delivered its MAC Blueprint) in an attempt to quickly capture a slice of the off-the-shelf software market when it had decided to enter it a couple of years ago. This meant that several enhancements were necessary and it took more that 200 person hours alone to determine whether or not it could replace the existing system. Subsystems to deal with the maintenance of research contracts, and to allow for the issuing of monthly statements of accounts to heads of departments and senior researchers, were designed, and eventually the system went 'live' in August 1994 - the beginning of the new financial year.

* Staff: Following the installation and assessment of the pre-release version of the first module from Delphic (Posts, People, Appointments and Organization), the implementation team agreed and the old system was subsequently discontinued in September 1993. It was replaced by this and the second module (Skills, Recruitment and USR Return). However, at that time (September 1993) Delphic still had not provided any documentation for the system.

* Physical Resources: The initial Delphic offering proved to be an Overkill' for Isambard's requirements. It provided more than was actually needed, and two key areas had already been covered by in-house-developed Mantis systems. One area was the administration of the University's own housing facilities and the people who occupied them, and the other was an inventory system for mobile equipment. The Delphic offering still held some level of attraction to Isambard's Management Services team, but only when used in conjunction with the Delphic Finance Module, as it offered the facility the option to debit directly a departmental account at a store as soon as an item was issued out. The Stock Control Module was at the time running at test mode, but as these two packages were designed to be highly integrated, there was a deadlock situation as the Finance module had not been delivered. Moreover, as mentioned above, a commitment had been made to the inhouse-developed finance system, which was unlikely to be replaced for at least two years.

* Research and Consultancy: No view had been formed about this module as there had not been a delivery. Supposedly it provided the ability to maintain profiles of staff and possible customers who could require applied research to be undertaken by the University on their behalf. An in-house-developed Mantis system was then in operation centered around publications of Isambard staff and information on customers. The accounting side (e.g., the recording of costs against research projects) was partly accommodated by the core finance system. Again, it was rather like Physical Resources - nothing particularly attractive given the overhead in implementing either of the Delphic modules that tended to be reasonably sophisticated for Isambard requirements.

* Payroll: A bureau service from a leading UK bank catered for the payroll function at Isambard. The consensus of the Director of Financial Services was that it was adequate, and therefore he was cautious and opposed any change. What were however lost by this decision were the integration and the economies, such as saving in paperwork and clerical time that came with the Delphic module, and that were associated with raising the cost of various processes between the two interconnected functions - payroll and personnel. However, the high level of integration offered between Delphic's Payroll (not delivered at that time) and Staff modules were attractive to Isambard, as it had implemented the latter. After some careful consideration it became clear that its adoption was very unlikely to happen, as at the outset it seemed a very general package; again, many enhancements would have been necessary. This was a significant requirement considering the size of Isambard's Management Systems Team and its constrained time scales.

* Management Information: Similarly, no 'final' view was formed. There had been a development where Management Information was considered to be the 'Cinderella' module - the sort of one where by residing within the other modules, management information requirements at a strategic level could be easily accommodated. In September 1994, only statistics of various sorts could be generated for Government use, and those with considerable difficulty. In order to cure the problem, Delphic bought the rights for individual universities to acquire Holis - a powerful expert system, as there was general consent that Mantis UK was delivering 'textbook' systems. This meant that they had gone too far in terms of splitting down to tables for the database, without considering that most legacy systems already in place at universities were hierarchical, thus operating with one table. This transition posed a considerable challenge. It required a lot of effort and man-hours for the Management Services team that had to undergo the process, as Holis was not available when the initial design decisions were made. Holis was generally looked upon as the solution in gluing and running the whole of the independent databases together as it could accommodate any set of computerized data-like spreadsheets and flat files which did not necessarily have to follow Delphic's database format.

The MAC Initiative was funded from 1988 to 1995 and a total of 11 million were invested in those seven years. "Universities snub software policy," read a headline in Computing (September 22, 1994) - a professional trade magazine. "UK universities are going their own way to buy core administrative software after finding a governmentsponsored scheme out of touch with their business needs," the article continued. Birmingham and Reading Universities both confirmed in September of that year that they were moving outside the MAC initiative for their latest developments, and the University of Sussex being dissatisfied with the delivered software for Undergraduate student admissions eventually chose a separate system. With the funding for MAC running out in July 1995, similar moves from other institutions were being planned, as there was no other viable alternative.

The outcome was that although Families continued to exist in a rather informal way, MAC-related activity slowly came to an end after the central funding terminated. The Delphic and Mantis UK Management Boards agreed and concluded their contract at the end of April 1996. The agreement was to deliver all remaining software in an 'asis' state at the end of January in order to be tested at the University of Liverpool. The software was to be accepted at the end of February, with any 'bugs' to be remedied under the warranty agreement. Delphic was to make no further development demands on Mantis (Philips, 1996). It is without doubt that many interpretations can be given regarding the final outcome, and in retrospect each Family managed to achieve the objective of producing software to cover a number of the Data Blueprint areas. Some of these systems did run quite successfully in a number of institutions (Hillicks, 2002). What must be noted, however, is the fact that no University managed to achieve the initial objective of using only the MAC modules exclusively.

The ending of the contract meant that Delphic was in total control of the situation rather than having to work through Mantis, and in 1996 MAC was a far cry from the initial objective for an integrated information system where all the functional subsystems could be seamlessly linked so that one would not end up with a collection of disjointed and ineffective systems (Kanellis & Paul, 1995; Kanellis, 1996). For Isambard University in particular, the main attraction in joining the Delphic Family was the integrated solution that they were offering. Graham KyIe, manager of the Management Services team, summarized eloquently the situation: "...as you can observe, the way we are staggering here at Isambard, there is no sign of integration as far as we are concerned." One feature of Delphic that did not apply to any of the other families was that from day one the deliverable was designed as one system. It caused Mantis UK problems because, when the first major slippage occurred (the Students Module), Mantis had to respond to pressure from the Delphic representatives who demanded some deliverables." This meant that Mantis had to unbundle the system by separating and redesigning the links, a major cause for MAC's failure to meet deadlines. Almost all deliverables were at least two years late, according to the dates quoted by Mantis UK in the original specification, and this caused considerable stress and frustration to Isambard, which had to decide which route to follow regarding its infrastructure: to wait and see how Delphic would handle the situation after the termination of the contract with Mantis, to see how to integrate the various probable solutions described in the beginning of this section or to make a fresh beginning abandoning all previous investments? Difficult choices indeed and hardly the type one expects to be faced with at the end of an information technology development project that started with the best of expectations.

Footnote

ENDNOTES

1 Royal Charters have a history dating back to the 13* century. The original purpose was to create public or private corporations and to define their privileges and purpose. Nowadays, Charters are normally reserved for bodies that work in the public interest and can demonstrate pre-eminence, stability and permanence in their particular field. Many older universities in England, Wales and Northern Ireland are also chartered bodies.

2 Sandwich courses involve a period of work in industry or a commercial organization. On a 'thick' sandwich course, the student spends the third year working away from university. The 'thin' sandwich course has placements lasting six months each calendar year.

3 The CNAA was founded by Royal Charter in 1964, with the object of advancing education, learning, knowledge, and the arts by means of the grant of academic awards and distinctions.

4 UFC became the Higher Education Funding Council for England (HEFCE) which was established following the Further and Higher Education Act 1992. A principal feature of the legislation was to create one unified higher education sector by abolishing the division between universities and polytechnics.

5 Under the education Reform Act of 1988, the University Grants Committee (UGC) was replaced with the Universities Funding Council (UFC) which in turn was replaced by the Higher Education Funding Council for England (HEFCE) to conform to the Further and Higher Education Act 1992 which made provision for a single system of higher education, with a unified funding structure and separate funding councils for England, Scotland and Wales.

6 It was during 1989 that Isambard University was required to prepare a renewed internal information technology strategy to support its bid to the UFC's Computer Board for funds related to academic computing from 1990 onwards. The principal objective of the strategy was to make available a range of integrated computing facilities to staff and students throughout the University using an infrastructure of distributed computing based on campus networking.

7 Members comprised of the chairmen of the six Applications Groups, plus a couple of other members nominated by the Management.

8 A standard of measurement in higher education used to group weeks of instructional time in the academic calendar. An academic year contains a minimum of 30 weeks of instructional time. An individual semester provides about 15 weeks of instruction, and full-time enrollment is defined as at least 12 semester hours per term. The academic calendar includes a fall and spring term, and often a summer term.

References

REFERENCES

Haney, C. (1994). Universities snub software policy. Computing, (September 22), 14.

Hillicks, J. (2002). Development Partnerships between HE and Vendors: Marriage made in Heaven or Recipe for Disaster? Online: www.jiscinfonet.ac.uk/Resources/external-resources/development-partnerships/view

Kanellis, P. & Paul, R.J. (1995, August 2-5). Unpredictable change and the effects on information systems development: A case study. In W.A. Hamel (Ed.), Proceedings of the 13th Annual International Conference of the Association of Management (pp. 90-98). Vancouver, BC: Maximilian Press Publishers.

Kanellis, P. (1996). Information Systems and Business Fit in Dynamic Environments. Unpublished PhD Dissertation, Brunei University, UK.

Kyle, G. W. (1992). Report on the UFC MAC Initiative. London: Brunei University.

Kyle, G. W. (1994). MAC Situation Report. Brunei University, UK.

Philips, T. (1996). MAC Progress Report. Online: www.bris.ac.uk/WorkingGroups/ISAC/ 13-2-96/i-95-10.htm

Pollock, N. (2001). The tension of work-arounds: How computer programmers. Paper submitted to Science, Technology & Human Values.

Sterling, M. (1995). Vice-Chancellor's Report to Court. Brunei University, UK.

AuthorAffiliation

Teta Stamati, Panagiotis Kanellis & Drakoulis Martakos

University of Athens, Greece

AuthorAffiliation

Teta Stamati is currently a sales manager in Delta Singular S.A. in Athens, Greece. She holds a degree in computing from the Informatics and Telecommunications Department at National and Kapodistrian University of Athens, an MPhil in computing and information systems at UMIST in UK, and an MBA in Lancaster Business School at Lancaster University. She is a research fellow in the Department of Informatics and Telecommunications at the National and Kapodistrian University of Athens.

Panagiotis Kanellis is currently a program manager with Information Society S.A. in Athens, Greece. He was educated at Western International University in business administration (BSc), at the University of Ulster in computing and information systems (Post-Graduate Diploma), and at Brunei University in data communication systems (MSc) and information systems (PhD). He is a research fellow in the Department of Informatics and Telecommunications at the National and Kapodistrian University of Athens and an adjunct faculty member at the Athens University of Economics and Business.

Drakoulis Martakos is an associate professor at the Department of Informatics and Telecommunications, National and Kapodistrian University of Athens. He received his BSc in physics, MSc in electronics and radio communications, and PhD in real-time computing from the same university. Professor Martakos is a consultant to public and private organizations and a project leader in numerous national and international projects. He is author or coauthor of more than 50 scientific publications and a number of technical reports and studies.

View Image -   APPENDIX
View Image -   APPENDIX

Subject: Studies; Information technology; Project management; Colleges & universities; Systems development

Location: United Kingdom--UK

Classification: 9175: Western Europe; 8306: Schools and educational services; 9130: Experiment/theoretical treatment; 5220: Information technology management

Publication title: Journal of Cases on Information Technology

Volume: 7

Issue: 4

Pages: 46-63

Number of pages: 18

Publication year: 2005

Publication date: Oct-Dec 2005

Year: 2005

Publisher: IGI Global

Place of publication: Hershey

Country of publication: United States

Publication subject: Business And Economics--Computer Applications

ISSN: 15487717

Source type: Reports

Language of publication: English

Document type: Business Case

Document feature: Diagrams References Tables

ProQuest document ID: 198719333

Document URL: http://search.proquest.com/docview/198719333?accountid=38610

Copyright: Copyright Idea Group Inc. Oct-Dec 2005

Last updated: 2011-07-21

Database: ABI/INFORM Complete

Document 4 of 100

New Forms of Collaboration & Information Sharing in Grocery Retailing: The PCSO Pilot at Veropoulos

Author: Pramatari, Katerina; Doukidis, Georgios I

ProQuest document link

Abstract:

In spring 2001, Veropoulos, the third biggest retailer in Greece and three of its top suppliers together with a service provider, started a pilot implementation to experiment with collaborative store ordering. The pilot involved the ordering from the retailer's stores to their central warehouse as well as to the direct-store-delivery suppliers. The four companies together with the service provider were starting an ambitious plan to use the Internet technology in order to enable the sharing of daily POS data between retail stores and suppliers with the objective to streamline the store replenishment process. This effort resulted in significant business results but at the same time several pitfalls and challenges as far as the use of technology was concerned. [PUBLICATION ABSTRACT]

Full text:

Headnote

EXECUTIVE SUMMARY

In spring 2001, Veropoulos, the third biggest retailer in Greece and three of its top suppliers together with a service provider, started a pilot implementation to experiment with collaborative store ordering. The pilot involved the ordering from the retailer's stores to their central warehouse as well as to the direct-store-delivery suppliers. The four companies together with the service provider were starting an ambitious plan to use the Internet technology in order to enable the sharing of daily POS data between retail stores and suppliers with the objective to streamline the store replenishment process. This effort resulted in significant business results but at the same time several pitfalls and challenges as far as the use of technology was concerned.

Keywords: accuracy of information; applications software; B2B; case study; data validation; e-commerce; electronic business; electronic markets; extranets; file maintenance; IS impacts; IS structure; novice users; online IS; software design; top management; user types; utility of information

ORGANIZATIONAL BACKGROUND

The pilot involving the retailer and the three suppliers, facilitated by the service provider, was initiated based on the concept of sharing the daily sales data (POS data) and other information between retailer and suppliers over an Internet-based collaboration platform. This concept, referred to as Process of Collaborative Store Ordering (PCSO), can be considered as a new form of supply-chain collaboration in the grocery retail sector (Pramatari et al., 2002). The top management of the four companies committed to this project after being presented with the PCSO concept by the service provider, and with the objective to decrease the level of out-of-shelf in the retailer's stores.

On-shelf availability is a critical issue for both manufacturers and retailers today because it improves consumer value, builds consumer loyalty to the brand and shopper loyalty to the store, increases sales and - most importantly - boosts category profitability (Roland Berger, 2002). However, the advances in supply chain management, the initiatives of Efficient Consumer Response (ECR) and category management (Dhar et al., 2001), and the investments in inventory-tracking technology have not-by and large - reduced the overall level of out-of-stocks on store shelves (Gruen et al., 2002), referred to as "out-of-shelf" (OOS).

A number of prior studies (Schary and Christopher, 1979; Straughn, 1991) have examined how product unavailability (via a temporary out-of-shelf) influences sales for a given product (SKU). Bell and Fitzsimons (2000) have studied the impact of OOS on category sales, while other studies have analyzed the possible consumer reactions to OOS from a marketing and retail management perspective (Campo et al., 2002, 2000; Fitzsimons, 2000; Verbeke et al., 1998).

But what are the causes behind the OOS problem? These are classified into the following areas (Gruen et al., 2002; Vuyk, 2003):

a. Retail store shelving and replenishment practices, in which the product is at the store but not on the shelf. This category comprises all reasons relating to shelfspace allocation, shelf-replenishment frequencies, store personnel capacity, etc.

b. Retail store ordering and forecasting causes, i.e., the product was not ordered or the ordered quantity was not enough to meet the actual consumer demand.

c. Combined upstream causes, referring to the fact that the product was not delivered due to out-of-stock situations or other problems with the retailer's distribution center (for centralized deliveries) or the supplier (for direct-store-deliveries).

The first area includes pure out-of-shelf situations, i.e., situations where the product exists in the store but not on the shelf, whereas the last two are out-of-stock situations. The analysis by Gruen et al. (2002), which is a compilation of several global studies, shows that 70-75% of out-of-shelf situations are a direct result of retail store practices, with 47% of the cases attributed to wrong store ordering and forecasting, and 25% to cases where the product was in the store but not on the shelf (Figure 1).

In the following we present the organizations that participated in this case, their incentives in doing so and attitude towards the problem of out-of-shelf.

The Retailer

In the competitive business environment of the Greek grocery retail market, where two international and three national retail chains account for approximately 60% of the total retail market, Veropoulos is ranked in third place. With 200 stores around Greece, Veropoulos covers almost the whole country, with sales estimated at around 710 million Euros for the year 2003.

Veropoulos had been the first and the only supermarket chain in Greece at that time offering Internet and call-center-based services to its customers. The company was open to new ideas and a great supporter of Efficient Consumer Response (ECR) activities, participating in both local and European ECR groups. The top management was young, second generation, and had the ownership of the retail chain.

View Image -   Figure 1: OOS Causes

The company owned a central warehouse serving all the stores around the country with its own fleet of vans. Almost half of the products in the assortment of a big store were replenished through the central warehouse, whereas for the smaller stores the percentage of centralization was around 60-70%.

Before the pilot start, in September 2001, Veropoulos suffered an average out-ofshelf rate of 8.4%, which can be translated into a yearly turnover loss of million Euros, leaving aside the negative impact on shopper loyalty and long-term profitability. More than 70% of these situations were attributed to two main reasons: wrong order quantity, i.e., the quantity ordered was not enough to fulfill consumer demand till the next replenishment cycle, and no-order at all, i.e., the product had not been ordered at the last replenishment cycle although it did not exist in the store (Figure 2).

The situation looked similar both for products delivered through the central warehouse and those delivered directly by the supplier. Clearly, these numbers indicated that there was a compelling need to improve the situation with the store ordering and replenishment practices. According to Nick Veropoulos, the company's owner and CEO, "even a small reduction in out-of-shelf can bring significant results in turnover increase and improved consumer satisfaction; ... clearly this is not a problem we can ignore and the suppliers have to get involved as well; it's not only ours but also their problem."

The Suppliers

Supplier A was a Greek company offering an integrated system of commercial services including sales, marketing, trade marketing, logistics and merchandising. Supplier A was working with companies in Greece, Europe and the USA, representing their brands in many different categories, where the brands were usually positioned in the first or second place. Its sales for the year 2003 were estimated at around 155 million Euros. One of the company's key aims had been to have a leading role in e-trading developments, and to use new technology in a way that facilitates everyday business with customers and enhance collaboration and synergies. Supplier A had a collaborative relationship with the retailer in many aspects and was also a shareholder in the service provider company.

View Image -   Figure 2: OOS Causes Before Pilot Start

Supplier A's product catalogue was one of the biggest in size compared to other suppliers (around 250-300 active product codes), containing food products but also smaller items usually located around the supermarket check-out counters. Supplier A mainly delivered to the retailer's stores directly, using own logistics facilities and fleet. Because of the large number of products in the catalogue, including also slow-moving products in specialized categories, Supplier A encountered increased out-of-shelf levels, as well as high logistics costs from direct-store-delivery. These two reasons formed a strong incentive for the supplier to pilot with Veropoulos on PCSO, in an attempt to improve the store replenishment process and achieve reduced costs.

The other two suppliers, Supplier B and Supplier C, were multinational companies with strong brands in several home and personal care categories. The two companies were major competitors in main categories and had a similar profile. They were both positioned among the top five suppliers of a supermarket, in terms of both turnover and number of products in their product catalogue (between 300-400 active product codes). They had been pioneers in the use of new ideas and technologies and great supporters of ECR activities.

The two companies delivered to the retail stores through the retailer's central warehouse, and managed the replenishment of the retailer's central warehouse following the VMI/CRP model (Cooke, 1998), which is a technique where the supplier has the sole responsibility for managing the customer's inventory policy, including the replenishment process. In this way, the two suppliers had greatly streamlined the replenishment process in the retailer's central warehouse, achieving great logistics efficiencies, but the positive effect of this had not been brought down to the store. Because of the large number of products in their catalogues and their continuous search for new areas of efficiency, the two centralized suppliers were concerned with the efficiency of the store replenishment processes and the level of out-of-shelf for their products. They were further excited by the idea of having access to the daily POS data, as this was an important piece of information they didn't have until then from any other source and would like to understand the potential usage of by participating in a pilot with the retailer.

The Service Provider

The service provider was a new company acting as an intermediary between supermarkets and their suppliers, supporting their business transactions and exchange of information via its electronic marketplace. The provider would build and operate the Internet-based platform to support PCSO, based on the concept and requirements that would be developed in collaboration with the four companies above. More specifically, PCSO was a new idea and concept upon which the provider wanted to develop and establish its business plan.

The company would then offer its services to both the retailer and the three suppliers following the Application Service Provider (ASP) model. According to this model, ASPs offer and manage outsourcing application services to many organizations via the Internet, while organizations outsource applications to ASPs to reduce upgrade and maintenance costs and to focus their efforts on core competencies (Soliman et al., 2003).

SETTING THE STAGE

The situation with the retailer, regarding the organization of the IT department and the utilization of technology was typical, as one would find it in almost any other Greek supermarket chain but also in many other retail chains across Europe. The internal IT department was located in the retailer's central offices and was responsible for maintaining and running the internally developed central information system. The central Warehouse was running a separate warehouse management system integrated with the central information system via the exchange of data files. Each store was equipped with POS-scanning facilities at the checkout counters and ran its own store information system, which was connected via a Virtual Private Network (VPN) with the central offices.

The data in all the retailer's information systems were maintained at the level of the retailer's internal product code, which resulted in a quite difficult data situation to manage, especially when one wanted to get some information at the level of the EAN product code (i.e., the barcode used for scanning a product through the cashier). The reason for this is that the relationship between the two codes is not one-to-one, as depicted in Figure 3, a situation that becomes even worse when the retailer wants to exchange data with its suppliers, using the EAN level as the bridge between the retailer's and the suppliers' product codes. In such a case, several data validation rules need be applied, and ensuring data quality becomes a challenge on its own.

In regard to the store ordering process, the stores used to follow two different processes for ordering to the central warehouse:

View Image -   Figure 3: Relation Between Retailer-SKU, Product EAN Code and Supplier-SKU

(a) Smaller stores with frequent replenishments were equipped with hand-scanners aimed to support the ordering process. The store personnel responsible for ordering used the hand-scanner to perform a check around the shelves and scan the products to be included in the order. At the end of the process, the order was downloaded from the hand-scanner to the store's computer and was electronically sent to the central warehouse.

(b) Larger stores used a printout of the store's product assortment as a guide while they did the check around the shelves and the store's back-room. Products and quantities to be ordered were marked on paper. At the end, the order was typed in the respective store system and was electronically sent to the central warehouse.

A comparative view of these two ordering practices in relation to the problem of out-of-shelf is provided in the Appendix. In each case, the process was supported by IT applications enabling the store personnel to find a product in the store's product assortment, scan or type in products and quantities to be ordered, and send the order electronically to the central warehouse. The retailer, like almost any other retailer in Greece, did not use the store sales data (POS data) in order to support the store ordering process, nor were the store stock data maintained in the store information system.

On the suppliers' side, each supplier had an internal IT department supporting the operation of the company. Supplier A had just completed the rollout of a new Enterprise Resource Planning System (SAP), while Suppliers B and C followed a global IT strategy, having implemented EDI (Perfett, 1992) for connecting with the retailers.

Overall, the objective of piloting PCSO in practice was threefold:

(1) To investigate the feasibility of timely sharing big amounts of large on a daily basis, and support critical business processes and supplier-retailer collaboration over an Internet-based platform.

(2) To understand the practical implications of this new process for retailers and suppliers, as well as the incentives and barriers for its implementation.

(3) To measure the impact of this new practice on order accuracy and ultimately shelf availability.

CASE DESCRIPTION

The PCSO Concept

In the last few years, CPFR (Collaborative Planning Forecasting and Replenishment) has emerged as the latest business practice aiming to ensure that there is always enough quantity to meet consumer demand, while maintaining optimum levels of stock across the supply chain (Holmstrom et al., 2002). Several CPFR cases to-date (ECR Europe, 2002) have reported the ability to effectively manage the replenishment process through more accurate forecasting. Specific benefits described include inventory reduction, reduced costs, more frequent deliveries, less stock-outs and more effective handling of promotional items.

The Process of Collaborative Store Ordering (PCSO), as briefly presented above, can be considered as a new form of CPFR, aiming to bring the impact of these potential benefits down to store level, affecting not only promotion and special line items but the full product range (Pramatari et al., 2002). This concept also builds on the notion of Vendor Managed Inventory (VMI), where the buyer shares demand information with the supplier who, in turn, manages the buyer's inventory (Cetinkaya and Lee, 2000, 2002). In grocery retailing, the VMI practice has been exercised at the level of the retailer's central warehouse, usually named Continuous Replenishment Program (CRP) (Clark and Lee, 2000). PCSO aims to bring this supply-chain collaboration practice to store level and enable its application on a large scale. In order to do so, it utilizes an Internet-based platform to enable information sharing and supplier-retailer collaboration in the store ordering process.

The following description illustrates the practical aspects of this process. By connecting to the collaboration platform, a supplier can monitor his products per each store, the store's product assortment, the product sell-out data, the in-store promotion activities, the level of stock and so forth on a daily basis. Moreover, the supplier can view the system's proposed order quantities and make an order proposal to the respective store manager. He can also track the order status throughout the fulfillment cycle. All this information is also available in dynamic online reports, allowing statistical analysis of those parameters down to store level.

View Image -   Figure 4: Information Sharing Between Retailer & Supplier in PCSO

The store manager, on the retailer's side, has an overview of the full product assortment of his store per category or supplier and can submit an order based on both the system's proposal and the supplier's proposed quantities, as well as on the rest of the information on product sales, promotions, stock, etc. The submitted order is automatically sent to the platform and then forwarded either directly to the supplier or to the retailer's central warehouse. Automatic order-generation tools are also in place to help both the salesman and the store manager identify the right products that need to be replenished on a daily basis. Figure 4 gives an overview of the information that the store managers and the supplier salesmen share for the products and stores they have in common and the unique information each of them has.

The PCSO Pilot

The project started for the Retailer when the top management was presented with the PCSO concept and committed to the idea. Supplier A was the first to commit while Suppliers B and C joined in afterwards, finding the idea interesting and willing to pilot with it. Figure 5 gives a schematic representation of the context in which the PCSO concept was piloted. Five representative stores of the retailer were selected to take part in the pilot. A key role from the retailer's organization, the chief buyer, assumed active responsibility of the project internally in the retailer.

The implementation for the pilot started in Spring 2001, with the definition of the requirements for the Internet-based collaboration platform. Because the project was initiated and managed by the service provider, the objective of the requirements-gathering phase was mainly to understand how to customize an electronic procurement platform to work in the context of grocery retailing, by enhancing it with the data (e.g., daily POS data, store assortment data, etc.) and the functionality (e.g., order suggestions) that are required to support work processes in this context. Based on the PCSO concept presented above, a demo of the system was initially built which was shared with people from the retailer's and the suppliers' organizations. From the retailer's side, the people involved in the requirements meetings were from the IT, the central warehouse, the buying department and the stores' management. The actual users from the stores were not actively involved in the requirements gathering process from the beginning, but only at the latter stages of the process. On the suppliers' end, interdepartmental project teams participated in the requirements meetings, with the salesmen having an active participation.

The implementation and testing of the system took place during the summer and was completed in September 2001. The platform was based on Microsoft technologies, utilizing SQL Server 2000 for the database and the data-loading processes through Data Transformation Services (DTS) and Active Server Pages (asp) for the Web front.

Because of the intense information exchange between the Internet platform and the retailer's information system (e.g., a daily POS data file for all the stores is more than 10 megabytes), back-end integration was necessary to allow for the automatic exchange and import/export of data files. The same applied to the relationship between the Internet platform and the suppliers' information systems for the exchange of the product catalogue, as well as orders and dispatch advice for direct-store-delivery. In summary, the way the system worked during the pilot phase was as follows:

* The system ran centrally on the platform of the service provider.

* The platform was back-end integrated, via the exchange of text files over ftp with the retailer's systems. This communication channel was used in order to send the orders from the platform to the retailer's central warehouse system and in order to receive the following data from the retailer's central information system:

* Daily POS sales data from the stores

* The product assortment of each store

View Image -   Figure 5: PCSO Case Settings

* The mapping between the product EAN code (consumer unit barcode) with the retailer's internal product code (retailer SKU)

* The promotion activities running in the stores

* At this stage, no information regarding the stock of the products in the stores was available.

* The platform received the product catalogue from the three suppliers' systems either in the form of an EDI message (for Suppliers B and C) or ASCII file (for Supplier A). Additional information regarding the products not contained in the EDI message was maintained by the suppliers over the Web, such as the association of promotional products to their non-promotional counterparts (i.e., to mother product codes).

* The platform sent order files in ASCII format to Supplier A over ftp which were automatically imported to the ERP system.

* The update of the sales data as well as other information took place during the night, so in the morning the user could see the sales in the respective store until the night before. The product EAN code (i.e., the unique number identifying the consumer unit of each product, which is assigned by the product manufacturer), was used for data alignment. This means that the EAN code was the bridge between the retailer's internal information system and the suppliers' information systems.

Before the start of the pilot, a lot of effort had to be invested in ensuring that the right products were loaded and appeared to each user. This was quite a difficult task, as the data from the retailer's and the suppliers' information systems had to be aligned. For example, there were centralized products that were not active in the supplier's current product catalogue, but still existed in the stores and the retailer's central warehouse. These products had to appear in the store's assortment so that they could be ordered. Other products were maintained with the wrong EAN code or supplier code in the retailer's system and thus could not match with the supplier's product catalogue. Thus, all the products had to be checked one by one to ensure that the information that appeared to the users was complete and accurate. This was much more difficult to ensure on an on-going basis through the automatic data loading procedures that had to be enhanced with several data-validation rules.

The pilot went live on October 1,2001 and ran in the five pilot stores for six weeks, from the first week of October to the second week of November 2001. At this stage the five pilot stores used the Internet-based collaboration platform for their collaboration with the direct-delivery Supplier A and for ordering the products of the two centralized suppliers, Supplier B and C, to the retailer's central warehouse. For the rest of the centralized products they followed the traditional process.

During the first two weeks, several data-validation issues, such as products that were missing from the platform and thus could not be ordered while they should, frustrated the users, especially since this problem was leading to out-of-shelf situations. However, after the third week, the data-loading processes had become more robust and these issues had been minimized. In the following section we discuss the results from the pilot phase and the issues that remained thereafter.

View Image -   Figure 6: Comparing the OOS Rate for Centralized Products Before & at the End of the Pilot

CURRENT CHALLENGES/PROBLEMS FACING THE ORGANIZATION

At the end of the pilot, shelf availability measurements were repeated to quantify the business impact of the new practice. For the centralized products of Suppliers B and C, these measurements showed a reduction of 59%, from 9.8% to 4%, in the total level of out-of-shelf and a similar (60%) reduction in the OOS caused by 'wrong order quantity' (Figure 6). The results for the direct-store-delivery supplier A were similar, showing a 67% reduction in the total level of OOS from 12% to 4%.

These were significant business results and raised management attention from the various organizations. However, the pilot had also revealed several issues regarding the usability and expandability of the solution. As was coming out from the users' feedback, while they could see the value behind exploiting the daily POS data and collaborating for supporting the store ordering process, they considered that there was still major room for improvement as far as the use of the system was concerned. Their main concern related to the long times it was taking them to complete the ordering process, due to the following reasons:

* As the system was centralized and they connected to it through a dial-up Internet connection, they experienced several problems and delays connecting to the Internet. This problem was due either to the Internet Service Provider (ISP) or the telecommunications infrastructure in the store or in the area.

* When connected, they also experienced delays in the system response. As the system was not running locally but was accessed over the Internet, these delays were mainly associated with the transfer rate of their Internet connection. In many cases the modems used were very slow (less than 19Kbps) so they had to be upgraded to 52Kbps.

* Another delay in the system response, as perceived by the users, was that the products in the system were not presented all at once but in pages. This fact combined with the low transfer rate meant that a user spent a lot of his/her time just waiting for the pages to download, which was not productive.

* As the stock information was not available in the system, they had to review the products on the shelf and in the store's back-room, in order to check the available stock. This fact resulted in further delays in the process, while for the suppliers' salesmen it meant that they had to visit the store in order to place a suggested order.

* During the pilot phase, matching the stock-count to the information on the screen was also a useless and time-consuming task just because the order of the products on the printout did not match with the order the products appeared on the screen. In addition, the system was not optimized at that time for printing and the attempt to print a list of products could take quite long, especially as old-technology printers were used.

All these issues resulted in time delays, both in the use of the system and the new ordering process, which varied from store-to-store depending on the size of the store. The smaller stores, which had a smaller number of products in the assortment and didn't have to check the stock, were experiencing smaller delays with the process than the larger stores. However, all the people in the stores involved were frustrated about these time delays, leaving aside their insecurity that products might be missing from the system. This insecurity was translated into anger in the two cases where the back-end integration between the Internet platform and the retailer's information system didn't work properly, resulting in the orders not being sent at all!

Apart from these usability and technical issues, the retailer had to face one other major concern regarding the expandability of the PCSO concept. During the pilot, the people in the store had to deal with four different ordering processes:

(1) the traditional one for direct-store-delivery products, in which they had to review and confirm the orders prepared by the supplier salesmen;

(2) the traditional one for centralized products, in which they had to prepare the order for all centralized products (from 4.000 to 6.000 products to be reviewed each time) and send it to the retailer's central warehouse;

(3) the PCSO process for direct-store-delivery Supplier A, in which they had to review the salesman's order proposal in the computer and confirm it there; and

(4) the PCSO process for the centralized products of Suppliers B and C, in which they had to prepare the order themselves, using the information that was available on the Internet platform and taking into account suggestions by the salesmen if they existed.

Taking into account that Veropoulos was selling products of around 1.000 suppliers, 500 of whom delivered through the central warehouse, this was too complicated an ordering process for the stores to follow in case there was a gradual adoption of the system by the suppliers. It was thus decided that rollout to the rest of the stores would only take place if the new process would incorporate the total ordering to the central warehouse. In this way, the store would have to deal with just one system when preparing the order for the central warehouse, no matter if the supplier participated in this process or not.

From an IT standpoint, this decision meant that the platform would have to be fed with product information from the retailer's information system, as the respective suppliers didn't participate in the process yet. This fact was a much greater data management challenge than confronted up-to-then. This information was not maintained correctly in the retailer's information system, which is a typical situation for almost any retailer in the supermarket sector. As a reference, we can mention that in the retailer's database there were 700,000 product records, of which only 15,000 should be selected and used, the ones that were actually active in the stores at the moment. Several data validation rules and filters had to be developed in order to deal with this issue. Another challenge had to do with the scalability of the platform, which had not been designed from the beginning to deal with so many products, stores, and the respective POS and assortment data.

With the support of the retailer's top management, the solutions towards overcoming the above problems and reaping the potential business benefits were sought in the following directions:

* The loading of all the centralized products on the Internet platform, to fully cover the internal store ordering process to the central warehouse. This also required the incorporation of an order proposal mechanism to deal with the large number of products to make this process usable for the store users.

* The development of several data-validation rules to initially clean up the data and set up robust data-loading procedures that perform several checks in order to ensure that the information is updated correctly, even in cases of failures.

* The redesign of the platform and upgrade of its user interface to deal with the new requirements.

* The development of robust mechanisms ensuring the reliable transmission of information between the retailer's and suppliers' information systems and the collaboration platform, which should also give notification in case of failure (e.g., by sending an e-mail or mobile SMS message in the opposite case).

There were many more technical barriers to be overcome in this effort to make the system efficient and effective in its use. Nowadays, Veropoulos is using the platform in all the 200 stores of the chain to support the internal store ordering to the central warehouse, while suppliers gradually start getting involved in the process of collaborative store ordering.

References

REFERENCES

Bell, D.R. & Fitzsimons, GJ. (2000). An Experimental and Empirical Analysis of Consumer Response to Stockants. Working Paper #00-001, Wharton Marketing Working Papers Series, The Wharton School, University of Pennsylvania, USA.

Campo, K., Gijsbrechts, E., & Nisol, P. (2000). Towards understanding consumer response to stock-outs. Journal of Retailing, 76(2), 219-242.

Campo, K., Gijsbrechts, E., & Nisol, P. (2002). Dynamics in consumer response to product unavailability: Do stock-out reactions signal response to permanent assortment reductions? Journal of Business Research. Article in Press, No: 5856. Available at: www.sciencedirect.com

Cetinkaya, S. & Lee, C.Y. (2000). Stock replenishment and shipment scheduling for vendor managed inventory. Management Science, 46(2), 217-232.

Cheung, K.L. & Lee, H.L. (2002). The inventory benefit of shipment coordination and stock rebalancing in a supply chain. Management Science, 48(2), 300-306.

Clark, T.H. & Lee, H.G. (2000). Performance interdependence and coordination in business-to-business electronic commerce and supply chain management. Information Technology and Management, 7(1/2), 85-105.

Cooke, J.A. (1998). VMI: Very mixed impact? Logistics Management Distribution Report, 37(12), 51.

Dhar, S.K., Hoch, S.J., & Kumar, N. (2001). Effective category management depends on the role of the category. Journal of Retailing, 77, 165-184.

ECR Europe (2002). European CPFR Insights. ECR Europe Publications. Available at: www.ecr-europe.com

Fitzsimons, G.J. (2000). Consumer response to stockouts. Journal of Consumer Research, 27(2), 249-266.

Gruen, T.W, Corsten, O.S., & Bharadwaj, S. (2002). Retail Out-of-Stocks: A Worldwide examination of Extent, Causes and Consumer Responses. The Food Institute Forum (CIES, FMI, GMA).

Holmstrom, J., Framling, K., Kaipia, R., & Saranen, J. (2002). Collaborative planning forecasting and replenishment: new solutions needed for mass collaboration. Supply Chain Management: An International Journal, 7(3), 136-145.

Kurt Salmon Associates (1993). Efficient Consumer Response: Enhancing Consumer Value in the Grocery Industry. Washington, DC: Food Marketing Institute.

Perfett, M. (1992). What is EDI? Oxford, UK: NCC Blackwell Limited.

Pramatari K., Papakiriakopoulos, D., Poulymenakou, A., & Doukidis, G.I. (2002). New forms of CPFR. ECR Journal, 2(2), 38-43.

Roland Berger (2002). Full-Shelf Satisfaction. Reducing out-of-stocks in the grocery channel, Grocery Manufactuers of America (GMA).

Roland Berger (2003). Key Industry Trends in the Food, Grocery and Consumer Product Supply Chain. Grocery Manufacturers of America (GMA).

Senary, P.B. & Christopher, M. (1979). The Anatomy of a Stock-Out. Journal of Retailing, 55(2), 59-70.

Soliman, K.S., Chen, L., & Frolick, M.N. (2003). ASPs: Do they work? Information Systems Management, 20(4), 50-57.

Straughn, K. (1991). The Relationship Between Stock-Outs and Brand Share. Unpublished Doctoral Dissertation, Florida State University.

Verbeke, W., Farris, P., & Thurik, R. (1998). Consumer response to the preferred brand out-of-stock situation. European Journal of Marketing, 32(11/12), 1008-1028.

Vuyk, C. (2003). Out-of-Stocks: A Nightmare for Retailer and Supplier. Beverage World, 722(2), 55.

AuthorAffiliation

Katerina Pramatari & Georgios I. Doukidis

Athens University of Economics & Business, Greece

AuthorAffiliation

Katerina Pramatari holds a PhD from Athens University of Economics & Business. She has worked as a research officer in the EL TRUN research group for several years, working in areas such as efficient replenishment, supply-chain collaboration practices, electronic marketplaces, electronic retailing, digital marketing, etc. She has worked as a system analyst for Procter & Gamble European Headquarters for two years, on the development of global category management applications, and another year in the Marketing Department of Procter & Gamble Greece. During her studies she has been granted eight state and school scholarships and has published more than 35 journal and conference articles.

Georgios I. Doukidis is a professor and chairman in IS at the Department of Management Science and Technology and director of the eCommerce MSc Specialization at the Athens University of Economics and Business (AUEB). He has published 12 books and more than 130 papers, and has acted as guest editor for the Journal of Operational Research Society, the European Journal of Information Systems, the Journal of Information Technology and the International Journal of Electronic Commerce. Since 1991, he is the director of the eBusiness Center of AUEB (called ELTRUN) - one of the largest in Europe with more than 40 researchers - which has completed successfully more than 40 innovative R&D projects.

View Image -   APPENDIX

Subject: Studies; Information sharing; Retail stores; Electronic commerce; Business to business commerce

Location: Greece

Classification: 9175: Western Europe; 8390: Retailing industry; 9130: Experiment/theoretical treatment; 5250: Telecommunications systems & Internet communications

Publication title: Journal of Cases on Information Technology

Volume: 7

Issue: 4

Pages: 64-79

Number of pages: 16

Publication year: 2005

Publication date: Oct-Dec 2005

Year: 2005

Publisher: IGI Global

Place of publication: Hershey

Country of publication: United States

Publication subject: Business And Economics--Computer Applications

ISSN: 15487717

Source type: Reports

Language of publication: English

Document type: Business Case

Document feature: Charts Graphs Diagrams References

ProQuest document ID: 198719505

Document URL: http://search.proquest.com/docview/198719505?accountid=38610

Copyright: Copyright Idea Group Inc. Oct-Dec 2005

Last updated: 2011-07-21

Database: ABI/INFORM Complete

Document 5 of 100

Information System for a Volunteer Center: System Design for Not-For-Profit Organizations with Limited Resources

Author: Chalasani, Suresh; Baldwin, Dirk; Souderpandian, Jayavel

ProQuest document link

Abstract:

This case focuses on the development of information systems for not-for-profit volunteer-based organizations. Specifically, we discuss an information system project for the Volunteer Center of Racine (VCR). This case targets the analysis and design phase of the project using the Unified Modeling Language (UML) methodology, database modeling, and aspects of project management including scope and risk management. Students must decide how to proceed, including recommending an IT solution, managing risk, managing scope, projecting a schedule, and managing personnel. The rewards and special issues involved with systems for not-for-profit organizations will be revealed. This case can be used in a variety of courses, including systems analysis and design, database management systems, and project management. [PUBLICATION ABSTRACT]

Full text:

Headnote

EXECUTIVE SUMMARY

This case focuses on the development of information systems for not-for-profit volunteer-based organizations. Specifically, we discuss an information system project for the Volunteer Center of Racine (VCR). This case targets the analysis and design phase of the project using the Unified Modeling Language (UML) methodology, database modeling, and aspects of project management including scope and risk management. Students must decide how to proceed, including recommending an IT solution, managing risk, managing scope, projecting a schedule, and managing personnel. The rewards and special issues involved with systems for not-for-profit organizations will be revealed. This case can be used in a variety of courses, including systems analysis and design, database management systems, and project management.

Keywords: case study; data dictionary; data modeling; IS project risk management; IS teams; non-profit organization; not-for-profit organization; relationship building; risk assessment; scope management; software design; system life cycle; unified modeling language; university/community partnership

ORGANIZATIONAL BACKGROUND

Jeff McCoy, project lead of a four-person project team, was finishing requirements and project status documentation related to an information system for the Volunteer Center of Racine (VCR). Jeff, the information systems team, and the client needed to make some important decisions concerning the future of the project. Jeff needed to formulate his own opinion, but it was getting late. He promised his fiancé that they would see a movie at the new cinema tonight. Recently, his promises have gone unfulfilled.

To this point, the VCR project had progressed smoothly. The focus of the project was the development of an application that helped the VCR place and track volunteers at various volunteer opportunities. The development team used the Unified Modeling Language (UML) to document the requirements of the system (Booch et al., 1999). A Gantt chart and a standardized project status report were used to record progress. The project status report contained fields to record the time, budget, people, process, and technology status of the project (Appendix B). A color code was used in each field: Green meant that the item was on task, yellow indicated concerns, and red signaled a danger. In addition to these fields, the team had an opportunity to specify their confidence in the project. A high score signaled that the project was moving along well and was within budget. The previously filed status reports were all very positive.

Jeff and the other development team members, themselves, were volunteers at the Information Technology Practice Center (ITPC). The ITPC is a consortium of IT professionals from the local university and industry. The ITPC provided consulting services for not-for-profit agencies and small businesses. Some of the consulting engagements, including the VCR engagement, were performed on a pro bono basis. Many of the engagements involved students so that the students could obtain experience with live IT projects. The project status reports were sent to the ITPC executive committee.

Jeff was concerned that the next status report would not be as positive. At the most recent team meeting, several issues emerged. First, the project team disagreed about the quality and adequacy of the UML documentation. Jeff made changes to the documentation produced by some members of the team, and these members took offense. Jeff wondered whether they had captured all of the key requirements and had accounted for these requirements in the project plan. Second, volunteer placement and tracking was not the only need of the VCR. Marilynn, the primary contact at the VCR, also needed a system to track donors and expenses. These additional features were part of the original project scope, but it was not clear whether the IS team could deliver a system with this functionality by the target delivery date in August. Third, other options emerged besides a custom-developed solution, including purchasing an off-the-shelf package. Jeff and the project team needed to recommend a particular approach. Finally, a recent problem emerged regarding the computer network. This problem must be solved before any solution is implemented. Could the team deliver the system within the target timeline?

Client Mission & Organization

The Volunteer Center of Racine (VCR) is a not-for-profit organization located in Racine, WI, a city with a population of 85,000. While it primarily serves the county of Racine, it also services occasional requests from nearby counties. Volunteer organizations have existed in Racine County for a long time, but were not formally managed. That is, it existed as a volunteer organization managed by volunteers, and with no full-time employees on its staff. Since there was no full-time management staff, it was difficult to coordinate activities of the volunteers and obtain the much-needed funds for volunteer activities. VCR emerged as a formal organization only three years ago. Within three years it grew rapidly to list and coordinate thousands of volunteers. It currently has 7,000 active volunteers. An active volunteer is one who has volunteered with VCR in the past 12 months. VCR finds volunteers and places these volunteers at various community events. The community events range from blood donation drives at hospitals to fund raising ceremonies for causes such as leukemia.

The mission of the VCR is stated on their Web site.

View Image -

Programs and services offered by VCR include:

1. Retired & Senior Volunteer Program (RSVP). This program involves adults, 55 and over. Volunteers use their life experiences and skills to help make the community stronger. These volunteers commonly work with children, adults, or help homeland security activities.

2. Youth with a Mission. This program serves several local organizations such as community centers, medical facilities, faith-based organizations, and schools. Volunteers who work in such programs are primarily from the youth population. The program strives to show how the power of community service can make a profound difference in their lives.

3. Special Projects. This program provides onetime volunteer opportunities for individuals, co-workers, families, or youth. Example special projects include Earth Day and Make a Difference Day, and walks to raise food to feed the poor and the hungry.

4. Volunteer Recruitment. VCR recruits volunteers and matches their interests, skills, and availability to a list of volunteer opportunities from local not-for-profit agencies, organizations, and schools in need of their support.

5. Volunteer Training. VCR provides quarterly training meetings for volunteer coordinators of not-for-profit groups and organizations.

Being a small not-for-profit organization funded completely by grants and donations, VCR has a very simple organization structure. It has a board of directors and an executive director. There are other coordinators and support staff as listed below. Marilynn, the Executive Director, believes that it is important that the organizational structure not be seen as a hierarchy. Rather, she pictures the full-time and part-time workers as a team working together to achieve the organization's goals (Figure 1).

VCR receives its funding primarily from federal/state grants, private companies, and individual donors. Its annual budget is approximately $278,000. Federal and state grants account for 65% of the budget. Corporate and private donations account for 27% and 8% respectively. The $278,000 annual budget is allocated to current employees, facilities, and programs. Additional expenditures, including funding for IT, can only be funded through new grants and donations.

View Image -   Figure 1

Marilynn, Executive Director, and Cheryl, RSVP Director, are responsible for developing the strategic plan. This plan, as well as progress toward the plan's goals, is discussed with the Board of Directors. Consistent with VCR's mission, the strategic plan identifies activities that will support VCR's mission of finding, encouraging, and placing volunteers. Practically, the plan must also identify grant and other funding opportunities. Successful grant writing is critical to VCR's survival. Over the last year, VCR has focused on operational efficiency. As the size of VCR's volunteer base and opportunities have grown, the task of assigning and tracking volunteers has become more arduous. Success at grants has also resulted in significant administrative work. Grant writing, reports to funding agencies, and submitting reports to the state increasingly occupy Marilynn and Cheryl's time. VCR believed that these tasks could be improved through the use of information technology.

Economic & Organizational Climate

The Wisconsin state budget and the budgets of local businesses, which are primarily manufacturing in nature, were adversely affected by the economy in 2003. These budgets are not expected to improve in the near future. The VCR and other not-for-profit agencies were increasingly under stress to find sources of revenue. Although the VCR has been successful in obtaining grants, the smaller pool of available funds is an ongoing concern.

As a result of the shrinking pool of money and their growth, Marilynn and Cheryl were eager to improve the operations of VCR. They met regularly with the ITPC group and were very appreciative of their efforts to date. Marilynn and CheryPs support helped to motivate the other staff. In October, seven of VCR's employees and volunteers met with the ITPC group to discuss the features of the new information system.

SETTING THE STAGE

Project Team

The IS project team is composed of Jeff McCoy, Lyndsay Nash, Rick Harrington, Judy Taft, Bob Ferguson, and Zoya Alvi. Zoya Alvi is a graduate student in Computer Information Systems, while the remaining team members are senior students of Management Information Systems. In addition, both Jeff McCoy and Lyndsay Nash work full time for a major pharmaceutical company. Jeff has been with this corporation for more than 11 years, and is currently a senior computer software validation analyst. Lyndsay has been working for the pharmaceutical company for more than six years, and is currently a director's assistant. Just as in any project team, different members of the IS team have different abilities and personalities (Whitten, 2004). Jeff and Lyndsay both handled large-scale, complex projects in the past. Jeff is undoubtedly the most experienced person on the team and Lyndsay's experience is next. Jeff, based on his experience, was designated as the project manager. Jeff, by nature, is a very motivated person and seeks perfection from himself and others around him. Lyndsay is a dynamic, outgoing person who works hard to achieve the tasks at hand; however, she at times is not confident of her abilities, and some times has difficulty presenting even nice deliverables in a positive manner. Rick accomplishes tasks that are assigned to him, but lacks the skills to research an open problem and find solutions for it. Judy has no prior IS project experience, and requires an extensive amount of coaching on how to accomplish tasks in an IS project. Bob and Zoya are very well organized, responsible team members who follow any given task until it is satisfactorily completed. Bob and Zoya are recent additions to the project team.

In terms of capabilities, Jeff is skilled in project management, system analysis, system design, database development, and client-server programming. Lyndsay is skilled in project management, system analysis, and systems documentation. Rick is very comfortable with database development and client-server programming. Bob has expertise in implementation, troubleshooting, and network design. Zoya has expertise in project documentation, database design, client-server, as well as Web programming. Judy is skilled at system analysis and design.

The project team from VCR is primarily composed of Marilynn and Cheryl. Marilynn understands the high-level overview of the VCR operations, while Cheryl knows in detail the inner workings of the current systems and paper-based processes at VCR.

Project Initiation

Early in the project cycle, Jeff and his project team met with Marilynn and others from VCR to initiate the project. The VCR team was not familiar with the System Development Life Cycle (SDLC) for constructing information systems (Dennis, 2002). Jeff and the project team explained the concepts behind SDLC and helped Marilynn create a system request (see Figure 2). Jeff forwarded a blank template of the system request to Marilynn, who then created a first draft. Jeff and Marilynn then sat together and refined the first draft into the system request document shown in Figure 2.

After the system request was developed, Lyndsay and Jeff conducted a feasibility study. The feasibility study focused on economic, technical, and organizational feasibility. Lyndsay and Jeff created extensive documentation to support the summary conclusions indicated.

View Image -   Figure 2

* Economic Feasibility: Based on the current available financial resources from the Volunteer Center, it has been determined that the proposed solution must be relatively inexpensive. Exact numbers were not available from the center; however, indications are that the Center can spend between $500 and $1,000 on this project. The Volunteer Center is in agreement that the value of this project greatly exceeds the allotted budget, but cannot support a larger budget at this time. Even with this budgetary constraint, the project team believed a solution can be obtained.

* Technical Feasibility: With the young technical skills of the project team consisting of senior MIS students, a certain degree of risk appears to be evident. This risk is born out of the uncertainty in the skill-sets of the team (Ward & Chapman, 2003). The project team, however, is working closely with the ITPC members who have significant experience in building large-scale information systems. The faculty resources will guide the student project team in all aspects of the project.

* Organizational Feasibility: An analysis of VCR staff indicates all end users are proficient with PCs. In addition, the VCR staff appears to be very open to accepting a new completely electronic system, as the current processes are highly inefficient.

Based on the above analysis, the project team concluded that the project meets the criteria for economic, technical, and organizational feasibility.

The Current System

Early in the system development process, the project team reviewed the current information systems at VCR. The VCR maintained and processed four general types of information: payroll, expenses, donors, and volunteer information. Agnes, the Finance Administrator, used a PC-based accounting application to process payroll and record expenses. Donors were recorded in a spreadsheet. Jeff and his team focused most of their time on the volunteer system. Information was manually gathered from each system to produce a variety of reports in preparation of grants and in fulfillment of state and national reporting requirements.

The VCR used terminology that was initially unfamiliar to the team. A station is a place where volunteers work by devoting their time and effort. Stations include local hospitals and schools where the volunteers work. A job refers to a specific activity that a volunteer performs at a specific station. Example jobs include driving seniors between a nursing home and a hospital or working at the reception desk at a blood-donation center. Placement is the process of matching volunteers, depending on their skills and interests, with specific jobs at stations.

Currently, VCR uses an electronic system for maintaining senior volunteers, 55 and older, and their activities under the Retired & Senior Volunteer Program (discussed below). Activities of all other volunteers (younger than 55 years) are maintained using paper processes. Jeff and his team documented the current business processes using UML documentation such as the use case diagram. For a discussion of UML, the reader is referred to Arrington (2001). In addition, Appendix A provides an introduction to UML.

Jeff McCoy, leader of the project team, created the following use-case diagram to illustrate the different activities performed by the current electronic system.

View Image -   Figure 3. Use Case Diagram for the Current Electronic System

The actors in the above use-case diagram include the following: 55-or-older volunteers, VCR-employees, station-coordinators. The current electronic system maintains information only on volunteers who are 55 or older. These volunteers fill out a paper application form to join VCR, indicate preferences on which station they would like to work, and respond to special-event mailings from VCR via phone or e-mail. In addition, volunteers can retire from VCR, and this activity is accomplished by phone or e-mail. VCR employees create volunteer records in the current electronic system for new volunteers who are 55 years or older. VCR employees may also update information on existing volunteers, and search for volunteers who might be interested in a specific job at a specific station. In addition, VCR employees may update volunteer activities including the number of hours spent by each volunteer in a job. Station coordinators communicate with VCR employees most often by phone, and they request volunteers for specific jobs at their stations. Station coordinators also communicate the number of hours spent by each volunteer at their stations in specific jobs by filling out a paper form. Most of these activities do not have any predetermined frequency and take place on-demand.

Note that the tasks performed by the volunteer and the station coordinator do not directly involve the current electronic system. However, the information obtained by performing these tasks is entered into the electronic system by the VCR employee.

The use case diagram on the next page was also created by Jeff. This diagram includes all processes not integrated with the current electronic system. Some of the processes indicated in this use-case diagram do not necessarily involve "paper." However, they use manual processes such as using the typewriter or maintaining documents and spreadsheets that are not integrated with the electronic system described in the previous section (Figure 4).

The actors in the above use-case diagram include the following: VCR-employee and the donor.

As part of the "Generate Mailings" use-case, VCR employees prepare word documents announcing opportunities to volunteers and mailing labels in Microsoft Word; they then mail them to volunteers. To accomplish the "Create Reports for Funding Agencies" use-case, VCR employees obtain information on the number of hours spent by volunteers on the electronic system, and type these hours on a report form that the funding agency provides. VCR employees track expenses in a PC-based financial system, while the donations to VCR and the donor information are maintained in a spreadsheet. Information on volunteers younger than 55 is also maintained in a spreadsheet.

Funding agencies are one source from which VCR gets its support, apart from donations by individual donors. Some of the funding agencies require reports on a regular basis. These reports should include the following pieces of information.

* Volunteer Name

* Station Name

* Station and Job Description

* Hours Worked for the Period

Some of the reports are indicated below.

* United Way Quarterly Report

* RSVP Homeland Security Report

* Wisconsin State Funding Report

View Image -   Figure 4: Use-Case Diagram for the Current Manual/Paper Processes (not integrated with the current electronic system)

From the above use-case diagram, it is clear that there is no comprehensive system at VCR that keeps track of the expenses, donations, and donors. In addition, volunteers who are younger than 55 are maintained in a spreadsheet.

Analysis of the Current System: Problems & Opportunities

Based on their analysis of the current system, Jeff and Lindsay developed a list of the following problems and opportunities for improvement.

* Problem: The Volunteer Center is using a hybrid paper and electronic system.

Opportunity: Combine into one unified electronic system.

* Problem: The current electronic system is on one personal computer that holds data only on retired and senior volunteers (those who are 55 and over). Any remaining volunteer categories, such as youth and adult (under 55), are handwritten and entered on an Excel spreadsheet on a separate personal computer.

Opportunity: Bring all volunteer data into one integrated system.

* Problem: The data is entered manually which can lead to input errors and dataintegrity issues. For example, the same station names are entered differently at different times.

Opportunity: Maintain consistent names and categories in the system, and minimize the user-input in the form of free text in the system.

* Problem: There is no support offered on the current electronic system. Questions about the operation of the RSVP system go unanswered.

Opportunity: For the new system, provide support by creating user manuals.

* Problem: Reports are manually compiled.

Opportunity: Improve the productivity of the VCR employees by generating reports required by different funding agencies electronically from the system.

* Problem: There are many fields of data required for reports that are currently not included in the system. Some of the fields that are not currently available in the existing system include person's ethnicity, driver's license number, actual number of hours for each volunteer, etc. A discussion with Marilynn revealed that there are at least 50 pieces of data not currently maintained by the system.

Opportunity: Deliver a system so that it includes all the data needed by VCR.

* Problem: Security on the system seems to be non-existent.

Opportunity: In the new system, provide security at the user level.

* Problem: The information cannot be shared with other users.

Opportunity: Design the new system so that it is at least a client-server system so that users get their data from a centralized location (see Allamraju, 2001; Chalasani & Baldwin, 2003).

* Problem: There is no automatic backing-up of data in the current system. In addition, data could be typed over or errors made without proper verification at the time of entry.

Opportunity: In the new system, arrive at procedures for backing up of data, and minimize the entry of free text by the users.

With these current processes in place, the Volunteer Center has struggled to perform two of its critical business functions. First, the Center has experienced difficulty in finding "best fit" volunteer candidates for stations requesting volunteer resources. As a result, a station requesting a volunteer may encounter situations where a volunteer's skills do not fully meet their needs. Secondly, the Center has encountered difficulty in accurately managing, tracking, and reporting volunteer resources using multiple systems. Because the Center relies on the volunteer resource reports to procure government funds, a consequence of inaccurate reporting is insufficient funding to the Center.

View Image -   Figure 5: Volunteer Center of Racine - Use Case Diagram

CASE DESCRIPTION

Jeff and the project team spent a considerable amount of time in the analysis and early design phases of the System Development Life Cycle (SDLC). During this process several standard documents were produced, including use cases, a data model, and a project schedule. In addition, the project team noted other requirements, such as budget requirements, that would impact the choice of alternatives and the ultimate success of the project (Barki, Rivard, & Talbot, 2001). The various tasks required to complete the analysis and early design phases were divided among group members. Once an initial draft of a document was created, Jeff and Lindsay reviewed and integrated the work.

System Requirements

Early on, all parties agreed that the standard way to document the requirements was via use-case diagrams, and by providing details of each use-case (Hoffer, 2002; Prowell & Poore, 2003). After numerous meetings with the VCR team, led by Marilynn, Jeff McCoy, with the help of the IS team, arrived at the following use-case diagram.

All processes, regardless of how they will be implemented, were documented as part of the use-case diagram (McConnell, 1998). There are four primary actors in this use-case diagram: Volunteer, VCR Employee, Station Coordinator, and the Donor. This use-case diagram shows the «includes» and «extends» relationships. For example, when a station coordinator reports hours, it triggers the "Update Volunteer Activity," and hence there is an «includes» relationship between the two activities. Similarly, updating information on a volunteer may cause a VCR employee to search for volunteer opportunities. Hence, there is an «extends» relationship between the "Update Volunteer" and "Search for Volunteer Opportunity" use-cases.

Different members of the IS team documented the details of each use-case (Booch, 1999; Krushten, 1999). For example, the "Join VCR" use-case, developed by Lindsay, is detailed in Table 1. It includes key aspects such as the stakeholders, relationships to other use-cases, normal flow of events, and alternate flows. This use-case has three different alternate flows which model three different business scenarios in which a volunteer may join VCR (including enrolling by telephone, finding an enrollment form on the Web, and enrolling at an external recruiting event).

Table 2 indicates the details of the use-case "Create Volunteer Records."

In addition to the use-cases, the project team documented the following high-level requirements for the VCR information system.

(R1) Need to maintain volunteers and their information

(R2) Need to maintain stations at which volunteers volunteer their time and the activities of the volunteers

View Image -   Table 1

(R3) Need to maintain information on the donors to the RVC and the donations

(R4) Need to generate reports for volunteer center management, and donors, which may include government agencies, private foundations

(R5) Need to maintain and track expenses and budget

(R6) Need to convert/transform current data into the new system, once the new system is built

In addition to the use-cases, the IS team developed a data model to highlight the data requirements of the system. The initial data model was developed by Judy. Part of the ER model (Baldwin & Paradice, 2000) is shown on the next page. The main entity in the ER model is the Person entity. Person has many attributes such as name and ethnicity. A person can be of multiple types - "Volunteer," "Donor," "Station Coordinator," and so forth. The type of a person is captured using the PersonType lookup table and PersonPersonType cross-reference table. This model is capable of maintaining multiple addresses, e-mail addresses, and phone numbers for a person. PersonPhone, PersonEmail, PersonAddress are separate entities that capture this data. Since most volunteers are retired and senior volunteers, it is possible that volunteers have some disability that restricts them from certain types of volunteer activities. PersonDisability captures this data, while PersonInterest captures the activities that a volunteer may be interested in (Figure 6).

View Image -   Table 2

The entities and the data fields contained in a few example entities are described in Table 3. Judy developed the initial version of the data dictionary (Hoffer, 2002). Jeff modified various entries to correspond to his view of the data requirements.

Special Requirements

Not-for-profit organizations frequently face challenges that may not be faced by for-profit organizations. These challenges most often stem from budgetary and time constraints. For the Volunteer Center of Racine, even though Marilynn and Cheryl were completely committed to the project, they are unable to secure even limited funding to implement the project. For example, purchasing high-end PCs that implement new software is not an option; instead, they depend on local companies to donate equipment such as PCs. In addition, due to budgetary constraints, their current server and PCs are connected by a wireless network. The wireless network itself is supported by Mike Daniels, another volunteer. However, the wireless network is very unreliable with the client PCs losing their connections to the server very often during the day. Thus far, Mike has not been able to spend enough time to come up with a solution to the network problem. Jeff and the project team are confident that they can implement a wired network for the VCR under a budget of $500. However, funding for this has not yet been secured. Such problems are routine in a non-profit organization, and cause dependencies that may affect the project schedules and project timelines significantly.

View Image -   Figure 6: A Partial ER Model for the VCR Database System
View Image -   Table 3

Another requirement for the project is that it should be completed by August so that Cheryl and others at the volunteer center can start using the system for numerous fall volunteer activities. In addition, implementing the new system in August will also facilitate creation of the year-end reports needed by the funding agencies using this new system.

Proposed Designs

Jeff and Rick arrived at four alternative solutions for the Volunteer Center Project. They presented these alternatives to the IS team, which conducted an analysis of the alternatives. Alternatives range from complete off-the-shelf packages to total custom developed system approaches. The identified alternatives and their analyses are presented below.

Alternative #1. Purchase Off-the-Shelf

This alternative would entail the purchase of commercially available off-the-shelf software that meets all the documented requirements. The product would then be used "as-is" with no additional configuring or modifications to meet the special needs of the business.

* Benefits: Complete system, reliable/proven system, customer support available

* Weaknesses: High cost, proprietary code that cannot be modified easily for future customization or modifications, inability to configure to meet users' needs

Alternative #2. Purchase Configurable

This alternative would entail the purchase of commercially available off-the-shelf software that could be further configured by the user/developer. The product would be modified to meet the special needs of the business.

* Benefits: Ability to configure as per requirements, large selection of vendors, availability of customer support

* Weaknesses: High cost, special skills needed to configure, limited customer support once configured

Alternative #3. Custom Develop

This alternative would entail the purchasing of no software by the Volunteer Center. All software will be built by the project team to meet the special needs of the business.

* Benefits: Low cost, ability to build to meet users' exact needs, standard programming languages can be used (Visual Basic, Java, etc.)

* Weaknesses: Special skills needed to build, special skills needed to support, undefined maintenance responsibilities

Alternative #4. Reengineer Existing System

This alternative would entail the reengineering of the existing system in place at the Volunteer Center. This alternative cannot be considered, as the existing system is a hybrid comprised of electronic and paper business processes. In addition, the existing electronic system uses proprietary code that is not accessible to the project team. A best attempt at reengineering would be to contact the software supplier and review current off-the-shelf offerings (the use of Alternative #1). This alternative was not considered further.

As the project team managed by Jeff pondered on the above alternatives, they needed to choose one of the above alternatives in a logical way (Goseva-Popstojanova, 2003). It appeared to Jeff that purchasing an off-the-shelf component (Alternative #1) will require at least $5,000, and may be as high as $15,000. Alternative #2 has similar costs for purchasing the software. In addition, some of these products require customers to sign a multi-year maintenance deal that can run into hundreds of dollars per year. On the other hand, a custom-developed solution (Alternative #3) will require a significant amount of time to be spent in system design and development. The VCR will not have to pay for this alternative, since this will be done by the IS project team on a pro bono basis.

Project Schedule & Remaining Tasks

In order to help determine the viability of the custom-development approach, Jeff and Lindsay decided to sketch a schedule for this alternative. Their high-level schedule is indicated in Table 4.

Even though the Waterfall method has been followed until the design phase, Jeff and the project team decided to use a phased approach that will implement the system in three different phases at the VCR site. The reason to use such a phased approach is to reduce the risk of implementation facing too many implementation problems, and also to incorporate user feedback into the system before the end of the project (Jorgensen 2004).

Approximately 50 screens need to be developed for the VCR information system. In addition, Microsoft SQL server software will be installed and used to maintain the data. The approximate division of effort among team members to accomplish these tasks is shown in Table 5.

View Image -   Table 4
View Image -   Table 5

CURRENT CHALLENGES/PROBLEMS FACING THE ORGANIZATION

The ITPC offices were quiet by the time Jeff began to fill in the project status report. The tone of the most recent meeting interfered with his ability to think. Jeff's drive for perfection created friction between him and some of his team members who felt belittled by his criticism of their work (Barki & Harwick, 2001). As an instance, when the data model and the data dictionary completed by Judy were substandard, Jeff spent a large amount of time modifying the models. Jeff felt that he needed to provide feedback and, if necessary, complete the task himself in order to obtain satisfactory results. He could not figure out why members of his team had problems with this approach (Radosevich, 1998).

In addition to the personnel issues, several other issues needed to be considered. Should the team recommend purchasing software or custom developing a solution? What risks face the project and how can the risks be mitigated (Ward & Chapman, 2003; Goseva-Popstojanova, 2003)? How might the risks affect the project schedule? Will the project be completed on time? Are there any omissions in the requirements specification? How should the team manage the project scope?

Jeff glanced at this watch, which now read 6:55. "Late movies are always good, fewer people in the theater," he thought.

References

REFERENCES

Allamaraju, S. et al. (2001). Professional Java Server Programming J2EE 1.3 Edition. Birmingham, UK: WROX Press.

Arrington, C.T. (2001). Enterprise Java with UML. Indianapolis, IN: OMG Press, John Wiley & Sons.

Baldwin, D. & Paradice, D. (2000). Application Development in Microsoft Access 2000. Cambridge, MA: Course Technology.

Barki, H. & Hartwick, J. (2001). Interpersonal conflict and its management in information systems development. MIS Quarterly, 25(2), 195-228.

Barki, H., Rivard, S. & Talbot, J. (2001). An integrative contingency model of software project risk management. Journal of Management Information Systems, 17(4), 37-39.

Booch, G., Rumbaugh, J. & Jacobson, I. (1999). The Unified Modeling Language User Guide. Reading, MA: Addision-Wesley-Longman.

Chalasani, S. & Baldwin, D. (2003). Software architectures for an extensible Web-based survey system. Proceedings of the 2003 IASTED International Conference on Software Engineering and Applications, Marina del Rey, CA.

Dennis, A. et al. (2002). Systems Analysis and Design: An Object Oriented Approach with UML. Indianapolis, IN: OMG Press, John Wiley & Sons.

Goseva-Popstojanova, K. et al. (2003). Architectural-level risk analysis using UML. IEEE Transactions on Software Engineering, 29(10), 946-960.

Hoffer, J.A. et al. (2002). Modern Systems Analysis & Design. Upper Saddle River, NJ: Prentice-Hall.

Hoffer, J.A. et al. (2002). Modern Database Management. Upper Saddle River, NJ: Prentice-Hall.

Jorgensen, M. (2004). Realism in assessment of effort estimation uncertainty: It matters how you ask. IEEE Transactions on Software Engineering, 30(4), 209-217.

Krushten, P. (1999). The Rational Unified Process: An Introduction. Reading, MA: Addision-Wesley-Longman.

McConnell, S. (1998). Software Project Survival Guide. Redmond, WA: Microsoft Press.

Prowell, S.J. & Poore, J.H. (2003). Foundations of sequence-based software specification. IEEE Transactions on Software Engineering, 29(5), 417-429.

Radosevich, L. (1998). Smells like team spirit. CIO Magazine, (October 1).

Ward, S. & Chapman, C. (2003). Transforming project risk management into project uncertainty management. International Journal of Project Management, 21(2).

Whitten, J.L. et al. (2004). Systems Analysis and Design Methods. New York: McGrawHill-Irwin.

AuthorAffiliation

Suresh Chalasani, Dirk Baldwin & Jayavel Souderpandian

University of Wisconsin - Parkside, USA

AuthorAffiliation

Suresh Chalasani is an associate professor of management information systems at the University of Wisconsin-Parkside. Professor Chalasani specializes in supply chain management systems, e-commerce systems, technologies for e-commerce systems, parallel computing, and bioinformatics applications. He is a member of IEEE and IASTED, and has published extensively in IEEE and journals and conferences in the area of information systems. Dr. Chalasani was a recipient of multiple research and instructional grants from the National Science Foundation and the University of Wisconsin System.

Dirk Baldwin is an associate professor of management information systems and department chair of business at the University of Wisconsin-Parkside. Professor Baldwin conducts research related to multiple view systems, decision support systems, and document management. He has published in journals such as the Journal of MIS and IEEE Transactions on System, Man, and Cybernetics. He has coauthored books on MS Access. Professor Baldwin is chair of the Information Technology Practice Center and was named Wisconsin Idea Fellow by the University of Wisconsin Board of Regents.

Jayavel Sounderpandian is professor of quantitative methods at the University of WisconsinParkside. He teaches project management, operations management, business statistics, and a few elective subjects. He has published in Operations Research, Interfaces, Abacus, Journal of Risk and Uncertainty, International Journal of Production Economics, and several others. He coauthored the book, Complete Business Statistics (McGraw-Hill/Irwin). He has won several awards for excellence in research and in teaching. He has 24 years of academic experience and seven years of industry experience. He is a consultant to many businesses in the region, and guides many students to do projects in those businesses.

View Image -   APPENDIX A
View Image -   APPENDIX A
View Image -   APPENDIX A
View Image -   APPENDIX A  APPENDIX B
View Image -   APPENDIX B

Subject: Data dictionaries; Information systems; Risk assessment; Systems design; Studies; Nonprofit organizations; Project management

Location: United States--US

Classification: 9190: United States; 5240: Software & systems; 9130: Experiment/theoretical treatment; 9540: Non-profit institutions

Publication title: Journal of Cases on Information Technology

Volume: 7

Issue: 4

Pages: 80-105

Number of pages: 26

Publication year: 2005

Publication date: Oct-Dec 2005

Year: 2005

Publisher: IGI Global

Place of publication: Hershey

Country of publication: United States

Publication subject: Business And Economics--Computer Applications

ISSN: 15487717

Source type: Reports

Language of publication: English

Document type: Business Case

Document feature: Diagrams Tables References

ProQuest document ID: 198657567

Document URL: http://search.proquest.com/docview/198657567?accountid=38610

Copyright: Copyright Idea Group Inc. Oct-Dec 2005

Last updated: 2011-07-21

Database: ABI/INFORM Complete

Document 6 of 100

Balanced Scorecard: A Tool to Improve IS Department Planning and Evaluation

Author: Simon, Steven John

ProQuest document link

Abstract:

The Balanced Scorecard (BSC) methodology has the fundamental premise that the evaluation of a firm should not be confined to a traditional financial evaluation but should be supplemented with measures concerning the organization's customers, internal processes, and the ability to innovate and grow. The technique while growing in use has seen low levels of adoption in IS departments. This work explores the BSC as a means to improve IS department planning and evaluation while tightly linking the department to the overall goals and objectives of the organization. The method provides a matrix to incorporate intangible measures into the planning and evaluation process. BSC concepts are illustrated through a case study. [PUBLICATION ABSTRACT]

Full text:

Headnote

ABSTRACT

The Balanced Scorecard (BSC) methodology has the fundamental premise that the evaluation of a firm should not be confined to a traditional financial evaluation but should be supplemented with measures concerning the organization's customers, internal processes, and the ability to innovate and grow. The technique while growing in use has seen low levels of adoption in IS departments. This work explores the BSC as a means to improve IS department planning and evaluation while tightly linking the department to the overall goals and objectives of the organization. The method provides a matrix to incorporate intangible measures into the planning and evaluation process. BSC concepts are illustrated through a case study.

Keywords: Balanced scorecard, IS planning, intangible costs, ROI, project evaluation

INTRODUCTION

The evaluation of the Information Technology (IT) or Information Systems (IS) functions and investments in a corporation remains the subject of many academic and business discussions. Investments in IT continue to grow while business managers worry that the benefits and value of these investments might not be as high as initially planned (Mair 2002). In order to be able to evaluate IT/IS investments, many methods and techniques have been suggested over the years. Traditional methods focus on financial measures that have long been known. The "return on investment" (ROI) - the ratio of average annual net benefits of a project to the hi vested amount of money and the "payback period" (PB) - the period of time that indicates how long an investor will have to wait for the project to repay its initial investment are just a couple of examples.

These types of measures limit themselves to the financial benefits and do not incorporate the value of IT/IS for the corporation. Corporations have begun to adopt techniques that augment the traditional financial measures with intangibles or soft benefits to assess the value of their IT systems. IT must generate value for the company; it must be a component of the business strategy and contribute to achieve the company's goals while improving measures of efficiency and effectiveness. These measures seek to align IT and organizational strategy, the Balanced Scorecard (BSC) is one such measure. The BSC methodology, developed by Kaplan and Norton (1992) has the fundamental premise that the evaluation of a firm should not be confined to a traditional financial evaluation but should be supplemented with measures concerning the organization's customers, internal processes, and the ability to innovate and grow. Results achieved within these additional dimensions should assure future financial results and drive the organization towards its strategic objectives while keeping all dimensions in balance. The issue for companies is how to measure their performance in both tangible and intangible terms.

This paper illustrates the use of the Balanced Scorecard methodology as a means to guide and provide measurement for the reorganization as well as ongoing planning, evaluation and management of the IS department. Extending the BSC, a situational specific matrix is developed providing the organization with direct vision, objectives, and tangible and intangible measures of outcomes. The paper is organized as follows. The first section reviews the shortcomings of current financially driven business measurements. The next section details the development and use of the Balanced Scorecard methodology including the introduction of strategy maps - the BSC's latest evolution. Next the methodology and case are introduced. The case highlights the development of the department's BSC matrix while focusing on the Customer Perspective. A discussion of the case's results and suggestions for future research close the study.

BUSINESS MEASUREMENT

In today's business environment, managing the factors that drive business value has become significant. This is especially critical for information system departments and projects since many metrics are difficult to measure using traditional schemes. Although standard financial measures are the primary factors used to determine total value, they are insufficient for capturing all the critical elements of business worth (Martinsons et al 1999). Thus, it is crucial to establish non-financial measurements of business performance to enhance traditional measures. Performance measurement can provide refined knowledge into the cause-and-effect relationships between operating events and financial results. Such knowledge depends on measures that expand the traditional financial metrics to encompass non-financial elements.

There are many kinds of value and traditional measures such as return on investment (ROI) (Lucas 1999). Studies (Kaplan and Norton 1992, Martinsons et al 1999, Mair 2002, Murphy and Simon 2002, Gary 2003) demonstrate that reliance on financial measures alone is insufficient for managing complex and everchanging business environments. Driven by competition and globalization, organizations are more customer-focused, striving to benefit from their intellectual capital and knowledge-based intangible assets. The higher an intangible asset's strategic readiness and the more it is aligned with the company's strategy, the faster it can be converted into something tangible like earnings (Gary 2003).

An intangible asset, also referred to as intellectual asset, intellectual capital, intellectual property or knowledge capital, is a non-monetary asset without physical substance that is used in the production or supply of goods or services (Murphy and Simon 2002). Intangible assets include copyrights, patents, intellectual property, goodwill, brands, trademarks, ideas and relationships, with the list expanding to include elements like creativity, innovation, professionalism, loyalty, and satisfaction. The IABC Research Foundation's research team has recognized and organized intangible assets, in terms of goods and competencies, in three categories that correlate with the corporate bottom line (Gillis 2003). These categories include Human capital which refers to the experiences and expertise of people who produce knowledge; relational capital, referring to the connectivity and exchange process to produce knowledge; and structural capital, which refers to the organizational infrastructure that allows connectivity of knowledge to take place.

Schiemann and Lingle (2000) claim companies that use a balance set of strategic measures have proven to outperform both strategically and financially those competitors that have not used similar methodologies. It is critical for today's enterprises to focus on strategic capabilities and customer expectations as well as financial indicators (Schiemann and Lingle 2000). A BSC strategy is not only important for an enterprise as a whole. It is critical for management to understand that is essential to align the performance measurement of individuals, teams, business units, and the whole organization (Pollard and Buckle 2000). According to David P. Norton (one of the original co-authors), president of the Balanced Scorecard Collaborative in Lincoln, Mass., alignment with strategy is what creates value for the tangible and intangible assets of a firm (Armitage 2003).

A study by the Cap Gemini Ernst & Young Center for Business Innovation (Low 2004) assessed the portfolio of intangible assets for 200 of the largest public U.S. companies. The study assigns scores to the companies based on how well they manage their intangible assets and confirms that higher scores lead to stronger financial performance. Examples include Citigroup and the insurance company American International Group, which scored near the top of financial services companies in the original research in 1999; their stocks returned 8% and 2% a year since then. In contrast, Bank One and insurer Aon had low scores in 1999 and have had returns of-5% and -12%. Citi and AIG posted net income up 27% and 9% annualized over the past three years. Bank One and Aon were down 5% and 28% (Badenhausen 2002). The issue for companies is how to measure their performance in terms of both tangible and intangible terms.

BALANCED SCORECARD METHODOLOGY

The Balanced Scorecard (BSC) provides a model that translates an organization's vision and strategy into specific strategically aligned objectives, monitored through a coherent set of performance indicators (Kaplan and Norton 1992). Created in the early 1990's, the BSC methodology includes the study, analysis, and metric development of four distinctive dimensions of the organization: finances, customers, learning and growth, and internal business processes. The method places emphasis on capturing the meaning of qualitative and quantitative information while creating a portfolio of measures linking business strategy, operational objectives, and organizational development. Martinsons et al (1999) suggest that the Balanced Scorecard can be the foundation for the strategic management of information systems in organizations.

The BSC is a holistic and evolutionary approach to business development, avoiding the traditional methodology of short-term focus on financial results alone while taking a long range view of the organization. It focuses on the value of services and products provided to customers; therefore BSC has a customer-centric approach. This methodology is a performance measurement system providing a framework to keep an organization competitive within its market place and the tools for a mission-driven, results-oriented and future-directed enterprise. BSC helps managers and individuals be prepared for constant change, helps them seek the best-valued opportunities, and allows them to have an effective and efficient interface with their customers (Kaplan and Norton 1992).

BSC is adaptable to diverse industry sectors and organizational sizes, making it an effective tool across business contexts and environments and as a result is successfully used at hundreds of corporations and government agencies to enhance strategic planning and monitor organizational performance.1 Studies have linked the success of the BSC to the performance of maintenance systems in industrial settings (Tsang et al 1999), knowledge-based organizations (Moore et al 2001), performance measures (Banker et al 2004, Neely et al 2000), communications strategies (Malina and Selto 2001), human resources management (HR Focus 2003), process measurement and design (Sink and Smith 1999), hospitality operations (Denton and White 2000), health care (Auger and Roy 2004, Li and Dalton 2003, Zelman et al 2003, Pineno 2002, Oliveria 2001, Pink et al 2001), and information systems management (Van Der Zee and De Jong 1999, Martinsons et al 1999, Mair 2002). All organizations must perform control and monitoring in today's operations mainly because they will affect tomorrow's development and business results. The BSC is not just a record of the results obtained, but also a prediction of expected results (Wyatt 2004), evolving into a business vision and strategy. Strategy can be viewed as a set of "if-then" hypotheses. If certain strategic activities are performed, expected financial results can occur. Knowing how the strategy is functioning and the degree of its effectiveness is critical for a company's success. The framework of the BSC is ideal for the analysis of cause-and-effect relationships and how they integrate and affect the company as a whole.

The BSC is balanced between the organization's long and short-term objectives and the reciprocal relationship among the four main dimensions: finance, customers, internal processes and learning and growth. Detailed explanation of these dimensions is covered in the next section. The scorecard balances the outcomes the organization wants to achieve (typically in the financial and customer dimensions) and the drivers of these outcomes (typically in the internal processes and learning and growth dimension).

During the development of the BSC, Kaplan and Norton demonstrated an awareness of the underlying principles of business process redesign (BPR) and the transition of businesses into the information age (Martinsons et al 1999). The BSC aims at changing the organization's "as-is" into its "to-be" by placing emphasis on strategy and vision. It establishes goals, not rules, while assuming that people will adopt and enforce whatever behaviors and actions are necessary to achieve those goals. The measures are designed to shift employees and management toward an overall vision. In the continuously changing economic environment, BSC proves flexible, targeting a set of goals and providing both a map with metrics to attain those goals and measuring tools and processes to interpret the effectiveness of the strategy the company has chosen. Figure 1 portrays generic BSC perspectives and their relationships.

View Image -   Figure 1: Generic BSC Perspective Relationships  Adapted from Martinsons et al (1999)

Evolution of the Balanced Scorecard Methodology

Since their inception in 1992, the use of scorecards has been slowly spreading. Meta Group (Van Decker 2002) indicates that about 45% of the Fortune 100 companies use the BSC methodology, an increase of 11% over 2001. This section discusses the evolution of the BSC methodology.

First generation Balanced Scorecard: The Balanced Scorecard was initially described as a simple 2 × 2 to performance measurement. In addition to financial measures, managers were encouraged to look at metrics drawn from three other "perspectives" of the business: Learning and Growth; Internal Business Process; and Customers, chosen to represent the major stakeholders in a business. The definition of what comprised a Balanced Scorecard was sparse, and focused on the high level structure of the device. Simple 'causality' between the four perspectives was illustrated, but not used for specific purpose. Kaplan and Norton's original focus was on the selection and reporting of a limited number of measures in each of the four perspectives. Their work suggested use of questions relating to the vision and goals of the organization to help in the selection of measures to be used, and encouraged the consideration of 'typical' areas of interest in this process. The original work made no specific observations concerning how the Balanced Scorecard might improve the performance of organizations; the implication is that the provision of accessible relevant measurement data itself will trigger improved organizational performance (Armitage 2003).

Second generation Balanced Scorecard - Strategic Objectives and Linkages: The practical difficulties associated with the design of first generation Balanced Scorecards are significant, in part because the definition of a Balanced Scorecard was initially vague, allowing for considerable interpretation. Two significant areas of concern were filtering - the process of choosing specific measures to report, and clustering - deciding how to group measures into 'perspectives'.

The most significant early improvement resulted from the need to change the process that yielded appropriate key measures of performance in each perspective. A solution was the introduction of the concept of 'strategic objectives'. Initially these were represented as short sentences attached to the four perspectives, used to capture the essence of the organization's strategy material to each of the areas. Measures were selected reflecting achievement of these strategic objectives. Another key development in the second generation concerned causality. Beyond simply highlighting causal links between perspectives, there was an attempt to indicate linkages between the measures themselves. Measure-based linkages provided a richer model of causality than before, but presented conceptual problems: the use of measures encouraged attempts to 'prove' the causality between measures using various forms of analysis.

Kaplan and Norton recognized this second generation as an evolution from an improved measurement system to a core management system. Maintaining the focus that the Balanced Scorecard was intended to support the management of strategic implementation, Kaplan and Norton (2004) further described this development of the Balanced Scorecard as the central element of a strategic management system. This increased awareness of the need to reflect differences in management agenda within differing parts of organizational structures, and created strategic alignment between management units by developing Balanced Scorecards as part of an overall plan at the Business Unit level.

Third Generation Balanced Scorecard - Strategy Maps: The third generation of the BSC methodology is based on a refinement of previous generation design and mechanisms, giving it better functionality and more strategic relevance. It includes four components; the first was directly inherited from the previous generation and the rest result from issues relating to target setting and the validation of strategic objective selection outlined above.

1. Destination statement: In order to make rational decisions about organizational activity and set targets for those activities, a company should develop a clear idea about what the organization is trying to achieve. A destination statement describes, ideally in some detail, what the organization is likely to look like at an agreed future date.

2. Strategic Objectives: The destination statement offers a clear and shared picture of an organization at some point in the future, but it does not provide a suitable focus for management attention between now-and-then. What needs to be done and achieved in the medium term for the organization to "reach" its destination on time is agreed upon in the form of objectives or priorities.

3. Strategy Map and perspectives: The chosen strategic objectives are spread across four zones or 'perspectives'. The first two perspectives contain objectives relating to the most important activities in terms of business processes, cycle time, productivity etc. and what needs to happen for these processes to be sustained and further developed in terms of people, product and process development.

4. Measures and Initiatives: Once objectives have been identified, measures can be constructed with the intention of supporting management's ability to monitor the organization's progress. Initiatives are special projects with a finite start and end date and are mapped to strategic objectives to give an indication of the projects or actions needed in order to realize those objectives.

Strategy maps are the most important aspect of the third generation BSC. Strategic maps provide a graphical representation of an organization's critical objectives and its relationships between the key performance indicators. The maps constitute a generic architecture for describing a strategy and help the organization visualize a cohesive, integrated, and systematic form. Beyond helping understand a strategy, a strategy map is the basis for enabling management to implement strategies quickly and effectively (Kaplan and Norton 2004). A strategy map can identify the gap between strategy implementation activities and the skills required to translate growth and profit strategies into action. It can become the basis through which an organization translates its strategies and objectives into tangible measures.

The BSC methodology uses strategic cause-and-effect linkage maps that describe how intangible assets are promoted and combined with other tangible and intangible assets to generate value and achieve the expected financial results. The creation of value for the shareholders must be guaranteed through a balance between growth and productivity. BSC develops a framework for describing strategy and puts together tangible and intangible assets in the organization's activities that create value. This combination creates propositions of change and incorporates systematic quality that will help the organization achieve financial results expected by shareholders (Kaplan and Norton 1992).

In today's economy, it is increasingly true that the most significant value lies in what investors cannot see. A growing number of companies now have rich portfolios of intangible assets such as brand names, software, franchise rights or research projects which are not included on their balance sheets. It is only very recently that those assets have been reflected in share prices. Gradually, the proliferation of high technology and service-sector companies has started to change the way investors calculate corporate worth. This is pushing companies to find ways to understand, manage, and capitalize on their intangible assets as well as integrate them into their overall business strategies (McMurdy 1999).

At the top of the strategy map (see Figure 2) is the financial perspective of the organization with both a growth strategy and a productivity strategy. This layer reflects how the organization will deliver value to its stakeholders (shareholders, clients, community and even the employees themselves). A growth strategy could include strategic objectives such as the increase of shareholder value, new sources of revenue from outstanding quality in products and services and an increase of customer value through improvements in those products and services. The productivity strategy could include objectives such as becoming the cost leader in a sector of the industry or achieving maximum efficiency in the utilization of existing assets.

View Image -   Figure 2: Generic BSC Strategy Map  (From internal Agilent documents)

The second layer of the strategy is the customer perspective. This layer reflects how the organization differentiates itself in the eyes of the customer (company's value proposition) and is a key component to the strategy map. It delineates the choices the company is making. For example, it describes the strategic position of a company as a product leader or a follower, the type of market the company wants to penetrate, or the market segment on which it wants to focus.

The third layer from the top is the internal process perspective, mainly driven by the customers or clients. It defines the internal processes required to deliver the company's value proposition. This layer should not be focused on single "silos" in the organization (finance, IT, human resources), but rather on how these silos can work as cross-functional teams to execute the strategy. This new perspective embodies the principles of business process redesign (BPR) which seeks to refocus the organization on cross-functional processes that drive business transactions.

The foundation that supports the strategy map is the organization's learn and growth perspective incorporating the elements of culture, technology and skills required to execute the strategy (internal process perspective). Much like financial sheets describe an organization's health, the BSC and strategy map describe and measure an organization's strategic health and its prospect of growth in the future (Miyake 2002). Advanced BSC applications allow management to drill down from a strategic top level to a forensic analysis of actual vs. target on the various supporting metrics as well as "what-if ' scenarios. Beyond drilling down and creating scenarios, the BSC methodology can also support the integration of the planning and budgeting process or the performance development and incentive processes.

View Image -   Table 1  Strategy Map Metrics

Strategy maps are a tool to enable the organization to meld strategy and vision via the four perspectives defined within BSC (see Table 1). Since all organizations are unique and their application of BSC is situational specific, the objective is to translate the strategy map from a high level abstract tool to a specific instrument through which the organization can plan, organize, implement, and evaluate its strategy in tangible and measurable means. This is perhaps the most difficult step in the use of BSC. Several studies have explored this task and have made practical recommendations. For instance, Pineno (2002) adapted the BSC to create an incremental model for the evaluation of health care management. While developing this quantitatively measurable approach, he recognized that even within an industry such as health care, there are still modifications required for particular situations. Along similar lines, Pink et al (2001) created a BSC inspired tool to measure performance indicators within the Canadian health care system. Their measure has been repeatedly used to evaluate utilization and outcomes, satisfaction, system integration, and financial performance. Kanji (2002) and Kanji and Moura E Sa (2001, 2002) adapted the BSC into a Business Scorecard. The work created a more general measure and validated it using structural equation modeling. In information systems' studies, Martinsons et al (1999) linked the BSC with strategic management of information systems and recommended measures for the BSC perspectives. Interestingly, all these studies indicate the difficulty in converting the strategy maps into a tangible measure to integrate vision, objectives, and measures. The latter sections of this paper explore one company's conversion of its high level strategy map to a tactical and implementable BSC matrix within an information technology context.

METHODOLOGY

The case study methodology was employed for this study. One advantage of the case method is the opportunity for a holistic and impartial view of the situation (Gummesson 1991). This aspect appealed to the author since the BSC was much broader in scope than pervious measurements used by Agilent and allowed the researcher to focus on both qualitative and quantitative methods. A case study examines a management situation in the natural environment in which the phenomenon occurs (Yin 1984) and has been used in a variety of key IS studies since the 1980s (Markus 1981, Benbasat et al 1987). In this study, the researcher was a "guest" of the organization and did not participate in the change that was occurring. Traditionally, case studies have replied on qualitative methods of data gathering, specifically interviews and unobtrusive observation (Bonoma 1985). To insure the reliability of the data gathered for this study, the researcher conducted interviews with members of the organization, observed the organization, and replied on secondary sources of data from internal organization reports and documents. The multiple schemes of data collection helped provide a more complete picture of the organization and their BSC initiative. It should be carefully noted that despite the best efforts of researchers using the case method, results reflect the context and environment of the organization under study and observations are the researcher's interpretation of those events.

Data collection for the study took place over the course of several months with the researcher interfacing directly with managers of Agilent's IT department. At the inception of the study the project was approximately 75% complete being well into the third year. As stated above, the primary vehicles for data collection included unstructured and structured interviews with managers and review of internal corporate documents. Since some of the information provided to the researcher was considered sensitive by the organization, the reporting of details from that material will be limited.

CASE STUDY - THE BSC MATRIX

Agilent Technologies - a "spin-off" of the Hewlett-Packard Company - has a history of innovation and leadership in the communications, electronics, semiconductor, test and measurement, life sciences and chemical analysis industries. Agilent Technologies Inc. is a global, diversified technology company focusing on growth markets in communications, electronics, life sciences and chemical analysis. The company operates four businesses - test and measurement, automated test, semiconductor products, and life sciences and chemical analysis - all supported by a central research group, Agilent Laboratories. Its businesses excel in applying measurement technologies to develop products that sense, analyze, display and communicate data. Agilent's customers include many of the world's leading high-technology firms. These customers rely on Agilent's products and services to make them more profitable and competitive, from research and development through manufacturing, installation and maintenance. Agilent enables its customers to speed their time to market and achieve volume production and high-quality precision manufacturing (Agilent Technologies 2005).

As a result of the 1999 spin-off, Agilent faced the need to completely restructure its information systems strategy for changing economic conditions and a new business environment. The initial objective was to understand the value of IT services within the overall business objectives and strategies. This was approached from a process and system perspective and separated from particular hardware and software assets. This first crucial step was designed to link the activities of IT and compute costs of tangible and intangible IT assets for productivity analysis, profitability analysis, trade-offs, decision making and to measure the overall IT value in the business strategy. This information would become the core data for Agilent IT's measurement system. Given their experience with the spin-off and interaction with customers, corporate and IT managers understood that traditional and historic measures of performance would prove insufficient to access IT's overall worth. The BSC method had been successfully used by other parts of Agilent, e.g. Agilent Labs, and was adopted as a means to guide IT's reorganization.

The Agilent IT organization faced multiple challenges in order to separate the technology infrastructures of the two companies, including telecommunication services and enterprise applications. The IT department lost buying and negotiation power from most of its vendors and suppliers as orders and volume commitments decreased substantially, while the costs of maintaining the IT infrastructure worldwide increased. As a result, Agilent needed to determine the direct impact of the IT services on the success of the business with regard to the contribution to efficiency, effectiveness and innovation.

The decision was made to use the Business Scorecard (BSC) as a framework to outline and measure the success of the strategic alignment. As indicated in previous studies of the BSC, a crucial step was the conversion of the generic BSC model to a tangible and specific measure for this situation. To bridge this gap - using inputs from corporate, IT, and Agilent Labs managers - Agilent developed a situational specific BSC Matrix. This matrix decomposed the perspectives/dimensions of the BSC into key areas - vision, goals (key success factors), strategies, challenges, and critical measures. This matrix allowed Agilent's IS department to analyze the components of each dimension as they related to the organization's overall goals and objectives; plus, it provided the department with a tool to understand the interrelationships of the perspectives and the synergies they created. A copy of the BSC matrix is found in Table 2. In the interest of insuring a realistic project and to assist in project management, a three year timetable was developed to establish goals and milestones.

The IS department's BSC matrix (see Table 2) was developed to guide the department's reorganization. An examination of the matrix illustrates that the horizontal axis is derived from perspectives found in the strategic maps developed by Kaplan and Norton during the BSC's third iteration. These four perspectives represent the organization's overarching objectives that in the case of Agilent, bind the IS department to the firm's strategic plans. The items on the vertical axis present the IS department's critical factors which were designed to illustrate to the organization how each of the four perspectives will be instituted and implemented. It should be noted that the department's BSC matrix is a high level blueprint with supporting matrixes, reports, and tables providing more granularity. Senior management, when developing the department's matrix, envisioned it as a means to quickly share the plan with the organization as a whole and to convey to the department's members a guide for realignment while providing a blueprint to guide the project and create goals, objectives, and critical measures.

The driving objective for these senior managers was to create an IS department that was closely aligned with the corporate "vision" of a more agile, customer oriented organization. To accomplish this objective, managers realized that alignment required coordination with all IS department customers. Therefore, every effort was made to include "customers" in the process with internal customer input shaping an IT strategy that was "weaved into the fabric" of the corporate strategy. A key concept derived from both corporate and external customers was that of value for the service delivered. Value is interpreted as more than just delivery of product and service for a competitive price (also deemed important) with elements measurable in tangible and intangible terms. This concept prompted managers to consider the development of a "relationship" with customers which in turn provided the department with insights from the customer's business as well as IT perspectives (a more holistic view). Additionally, customers offered insights into the organization and composition of the teams Agilent employed. Their suggestions led to an agile department with common elements across teams and projects impacting the internal business and learning perspectives.

View Image -   Table 2: IT Department's BSC Matrix

The vertical axis is composed of vision, goals, strategies, and critical measures. The specific factors were identified from Aglient's past BSC initiatives and adapted by IS senior managers and department teams. Vision provides the primary deliverable (corporate terminology) for each perspective at the end of the project's three year course. It is critical to note that these deliverables were not created in isolation within the IS department or within the boundaries of the company. Customers, both internal and external, were queried by senior management, project leads, and analysts to obtain input so the reorganized department would be more responsive and cost effective. Senior department managers were clear in their guidance as representatives sought to figure out "ways to work for both business and IT while delivering more for less without delay." Some BSC projects have weighted the factors of the matrix as indicated by Kanji (2002). Many of these projects were designed to produce a static end-state such as the performance measures of hospitals (Auger and Roy 2004), general personal performance measures (Kanji 2002), and measures of R&D effectiveness (Li and Dalton 2003). The Agilent project elected to treat each factor with equal weight since their project was geared to realignment of a department and was viewed as opened-ended. This, in the opinion of corporate managers, provided the organization the opportunity for the "adjustment" of measures and the ability to continue incremental change efforts.

The matrix in its end state provided the department with the blueprint or road map to accomplish their prime objective. Its development and implementation illustrates a potential shortcoming of Agilent's IS department's BSC project. To accomplish the tasks described above the IS department created teams based on the BSC perspectives across the top of the matrix. These teams were tasked with researching the historical actions of the department, interacting with customers, and producing the information found in each perspective's cell (along with supporting documentation). The problem with this approach is that the teams were operating as independent entities with minimal overlap. Some managers indicated that this was done with purposeful intent since they viewed the BSC perspectives as semi-autonomous. Others indicated that by having the teams work independently they increased the probability of unique outcomes giving the department more options to choose.

This approach appears to be somewhat shortsighted and contrary to the BSC philosophy, although it should be noted that the BSC process is highly adaptable to specific situations. As stated in earlier sections, the BSC method aims at changing the organization by placing emphasis on vision and strategy (hence their inclusion in the vertical axis items). This is also the basis for the cause-and-effect linkage of the strategic map which provided the factors for the horizontal axis. The semi-autonomous teams produced what management described as a "rich variety" of potential options and solutions and it was a widely held opinion that the choices would have been limited had the teams been integrated. While this thinking has merit, it is more likely that the scope of the potential solutions would have been narrowed and the quality and implement ability of the solutions increased if the teams were integrated. The rationale for this viewpoint is that by parsing the effort by perspective, the teams were working within silos focusing on a single area as opposed to the prime vision of the department and organization. From experience with process redesign, organizations understand that cross functional teams working across organizational boundaries produce superior results.

An examination of the BSC perspectives may assist in understanding this rationale. A better and typical approach would be to start the examination with the customer perspective. The reason is that Agilent sought to realign the IS department more closely with corporate strategy and to reorganize it into a more customer oriented entity. Customers provided both direction for the type of projects that will be conducted and inputs on the internal business and financial perspectives. Once the customer perspective is examined and the departmental factor cells (vertical axis) completed, the internal business perspective could be tackled. How a department is organized and what critical measures are used are a direct result of customer needs and the types of projects undertaken. A misalignment between the customer and internal business perspectives can lead to the failure to fulfill customer expectations. Once the internal business perspective has been developed, the department can then focus on the development of the innovation and learning elements, which determine the skills mix required, how to obtain those skills, compensation schemes, and right sizing. From the previous work, the department can then determine the best way to deliver the best service for the least cost while providing value to their customers while maximizing revenues and profits. The semi-autonomous orientation of the teams resulted in excellent information that guided the successful realignment, although it is likely that an integrated approach would have been more appropriate.

Customer Perspective Development

This section investigates the process and events that led to the development of the Customer Perspective of the IS Department's BSC Matrix. While the focus is the Customer Perspective, this section will also examine how the information obtained during this endeavor contributed to the development of the other three perspectives. As with most reorganization or realignment projects, the IS department performed an analysis to determine their current strengths and weakness and map their "as-is" state. An internal investigation of this type helps determine the point of origin on the path to reorganization. The investigation began with a survey of the skills of all IS department members. Once the skills inventory was completed a series of interviews was conducted with a random sample of the department. Questions focused on the perceived strengths and weaknesses of the department, levels of satisfaction amongst the workers, type of work they felt most rewarding, various compensations schemes, their perception of past project success, and especially how the project teams functioned. The interviews were conducted by people outside the department and in most cases outside the organization. Information was consolidated with all comments held confidential. The results showed that most interviewees were overall satisfied with their employment with the skills inventory indicating that employees were receiving regular training to maintain their skills although an individual's skills were narrowly focused leaving them little room for applications outside their specific area or advancement (a comment echoed during interviews).

The next phase of the analysis performed similar investigations with the department's customers. As explained in previous sections, the department realized it supported two types of "customers" (internal and external). The investigation began with internal customers using a series of questionnaires seeking inputs on topics such as quality, value, and satisfaction with product and service delivered, experience working with the IS department, soft/people skills of department members, etc. The surveys were targeted at mid-level managers who were asked to seek input from their subordinates and peers before completing the forms. Internal customers were not surprised by the surveys as they had experienced internal surveys before. Once the survey data was analyzed, semi-structured interviews were conducted to provide an indepth understanding of the information and help determine how the IS department could more effectively support the other functional areas.

A similar process was conducted with the department's external customers. Management indicated that customers were quite surprised by the survey since many of them had never seen this type of interest. As with the internal customers, the department sent senior project managers to discuss the findings of the surveys with customers (using semi-structured interviews) to obtain finer granularity of information and determine how Agilent could better support and fulfill their expectations. The information gathered from customers allowed the department to development their "as-is" picture and begin to map and plan their reorganization.

The information derived from the surveys and interviews found that both internal and external customers were satisfied with the quality of work provided. The department was lauded for its attention to detail when providing service and especially in the development and delivery of software with both types of customers commenting on the on-time fulfillment of projects. Despite the perceived levels of satisfaction, external customers sought more from Agilent. The interview notes revealed that these customers felt that there were elements missing, in fact the Agilent teams functioned in the role of traditional contractors. They came into their client's business, performed the function they were hired to do (mostly in isolation), and then left. The customers implied that this was a major drawback in continued business with Agilent with companies indicating they wanted a business partner as opposed to the traditional consult. Additional comments included lack of direct interaction with the team members (customer managers dealt mainly with the project lead), lack of immediate and direct feedback, and lack of understanding of their business resulting in sub-optimized solutions. It became apparent to IS department managers that despite their level of superior project performance, to achieve a position of competitive advantage in the marketplace, their interaction with external customers would have to change from a role of contractor to that of business partner. This realization was a contributing factor in the creation of the department's new vision discussed below.

Once information collection and analysis was complete, senior management (including managers from other functional areas within Agilent) and the Customer Perspective team created the department's new Customer Perspective Vision found in Table 2. The new vision statement was profoundly different from previous department ideas in that it sought to align the delivery of information systems more closely with corporate strategy and stated the desire to improve the customer experience. Alignment with corporate strategy was viewed by management as the key obstacle, especially for the external customers. Clearly, internal customers were part of the same Agilent organization and conscience of it or not the organization held a shared strategy. External customers each had a different strategy along with unique goals and objectives. To accomplish this task the department would have to change their method and benchmarks of how they conducted business. That was the next task of the Customer Perspective team.

View Image -   Table 3: Key Customer Success Factors derived from semi-structured interviews

Armed with the new vision statement and seeking greater insights into customer desires, the customer perspective team created two questionnaires (one for internal and one for external customers) designed to guide interviews and collection specific information. While similar, the internal customer questions sought insights on core services; the external customer questions focused on aligning strategy, understanding business objectives, and better delivery of service. The teams interviewed across a variety of management levels at major customer locations sharing the new vision and seeking input on how they could fulfill objectives. Once the data was analyzed from each customer, it was integrated into a composite picture leading to the key elements listed in Table 3 which contributed to the development of the information in the strategy and key success factors cells in the BSC Matrix (Table 2). Key elements provided by most customers included supporting change to provide the customer competitive advantage, integration of business and technical project aspects, improving the support of team members while enhancing communications, develop new models for delivering project elements, and creating architecture standards across project boundaries and tied to processes. Interestingly, many of the key elements listed above were outside the domain of the customer perspective. An examination of the BSC Matrix finds that most of the key elements overlap into the internal business and innovation perspectives. This is a reason why a cross perspective approach might have delivered more optimal solutions.

The new vision statement supported by information gathered from customers indicated that the first task of the department's reorganization was to determine how the project teams could better serve the expectations of the external customers. Comments indicated a requirement for teams to focus on the integration with business strategy as well as IT functions. This was different from current project methods which placed teams in a customer's business to perform specific tasks, e.g., develop and implement a system, write code, or assist with short term needs. Current practices focused on the technical skills of department members, placed them on projects for short periods, and measured their performance in quality of work performed and billable hours. To broaden the functions of teams and change from a technically-driven contract model to a strategically-oriented model required a change in the structure of the team itself, integration of new team members or expanding the skills of the current staff, and assigning teams to businesses for longer periods while modifying the compensation structure. Many of these tasks were the purview of the internal process and innovation perspective teams. As a result, members of the customer perspective team shared the interview data with those team members and made recommendations based on their progress. This reorientation of the team/department structure had to be conducted with changes in the delivery of products and services while not compromising the reputation of delivering project on-time and on-budget.

The first task in conjunction with the reorganization was to investigate the new skills requirement, which the team did in conjunction with the innovation perspective team developing the new skill base, performance, and compensation measures. As indicated by the inventory, team members were skilled in technical areas with fewer employees possessing system analysis or business process redesign skills. Hence, two choices were available to management, either hire or develop the skills. A combination of the two was chosen, with several people acquired as solution architects - managers skilled in both IT and business process management with the training to interact with customers and translate their desires into tangible systems - and developing the business process skills of existing members. This was accomplished through classroom and on-line interactive training as well as "internships" with other functional areas within Agilent. It should be noted that the vast majority of the department welcomed the training and viewed this as an opportunity to expand their marketability. Those who were not interested in this career progression were retained in their traditional technically-driven roles.

During skill-base training, the customer and innovation perspective teams developed different models of project team design. At one extreme was a model that placed a permanent team with fixed members with a customer's organization. At the other was the continuation of the "contracting" model. Working with members of the Innovation perspective team and project managers from key external customers, the Customer perspective team developed a hybrid team structure. This new concept placed permanent project teams with customers - using long term contracts - while rotating onto the project team, "subject matter experts" to accomplish technically driven tasks. The fixed team members held a variety of skills including those desired by customers including business analysts, system analysts, project managers as well as technical leads. These individuals were responsible for working directly with their client counterparts and sought to understand the client's business operations, organizational structure, and gather insights into company strategy so that an information technology solution was more adequately aligned with corporate objectives. These individuals were also responsible for the maintenance of the project and most importantly the flow of communication between the client organization and Agilent's IS department. As a result, a new set of communication metrics was developed which is discussed in the measurement section below. Additionally, a new performance-base evaluation and compensation scheme was developed which extended beyond traditional measures of on-time and on-budget performance.

Integral to the success of the reorganization was the ability to measure progress. In the past the department benchmarked itself against quality of work, fulfillment of contract, and time and budget constraints while evaluating performance and compensation on those metrics. Senior management as well as customers was not interested in abandoning those metrics but felt that supplemental criteria were required. Therefore, additional metrics were developed to address this requirement which was applied to the project and its permanent project team members. The "technical experts" were still evaluated based on their specific contributions to a project. The first metric created was a monitor of customer relationship management. An instrument was developed by both the customer perspective team and the key clients from the semistructured interviews discussed in previous sections. While the actual form was not shared with the researcher, it was described as a measure of the involvement of project team members in the understanding of business processes, the development of system to match the business strategy, focused on the flow of communication between the project team members and their clients, and measured the team's performance in satisfying customer expectations including the management of change. Since communication was deemed so important by all the parties, weekly meetings were scheduled to review progress on the project, discuss issues, and identify potential opportunities to enhance the project while insuring a match with organization strategy. As a result of these meetings, management indicated that the team members achieved high levels of understanding of client's requirements and saw changes to the project as a means of continuous improvement while in the past changes as been viewed as an annoyance. The weekly meeting became very popular with some clients as reported by one project manager and was attended by the client's senior management who wished to provide input to project design and suggest changes. The notes from this and other meetings were maintained as part of the project's documentation so that future teams might benefit from the dynamics.

Customer satisfaction was another critical measure sought by the IS department. In the past, the department sought input at the completion of each project using a proprietary instrument that measured the quality of work, perception of the fulfillment of the contract, and overall happiness with Agilent. Measurement of customer satisfaction shifted to a quarterly event with the instrument refined to reflect the new priorities of the client and the project team. Completed by client project leads the quarterly satisfaction report was discussed with client senior management as well as the project team leads. The report was them summarized and reviewed with the Agilent IS department senior management who maintained a running metric of individual and consolidated customer satisfaction. In addition to the customer satisfaction metric, the project team members were rated by the client's project team semi-annually. This performance review examined the individual's part in the progress of the project as well as the management skills of the individual including working as a team member, communication skills, leadership, etc. This performance review was shared with each individual and then forwarded to Agilent and retained as part of the individual's annual evaluation. Annually, Agilent senior management met with the client's senior management to evaluate the goal of match the project to the business's strategy. This meeting set the stage for the annual review of the project teams and the progress they made while setting goals for the coming year.

Collectively, the measures described above provided the department with a gauge to determine if they were meeting the goals and key success factors developed for the BSC Matrix. Additionally, the measures contributed directly to the development of the new evaluation criteria that was created and implemented by the innovation perspective team. The BSC Matrix and the department's reorganization were deemed highly successful by Agilent. Based on the initial indicators customers had much higher levels of satisfaction with the ongoing project work and the team organization. Additionally, Agilent's employees appeared to like the new team structures, change of work style, and the evaluation and performance review system. Management adopted "strategic thinking" as it was termed by one manager with the theory of success as doing many things well, doing many things at the same time, all within a tightly coupled organization. The realigned IS department was viewed as a partner by both its internal and external customer and its reputation for delivering on-time and on-budget was enhanced by the changes. Projects benefited from the changes as common elements from one project were transferred and employees readily shared information as a result of the process. This led to a decrease in expenses and time improving quality while decreasing costs.

DISCUSSION

The BSC method used by Agilent is portrayed as successful and effective but the company's experience is not without drawbacks and limitations. Four barriers to effective BSC implementation include (Kaplan and Norton 1996): 1) visions and strategies are not actionable, 2) strategies are not linked to department and individuals goals, 3) strategies are not linked to long and short term resource allocation, and 4) feedback is tactical not strategic. The managers at Agilent were cognizant of these issues since the organization had pervious experience using the method. Their development of the BSC matrix was critical in overcoming the majority of the barriers although problems were manifest during implementation. For instance the organization found that despite the effort to integrate overall strategies with individuals and project teams, people were focused on accomplishing the tasks at hand and in some cases missed the connection to the corporate "big picture." One would assume that the most apparent solution to this situation would be to publish the BSC matrix and advertise the objectives. This was done via the company's Intranet site and meetings but given the duration of the reorganization the "message was lost in the clutter of daily activity" as stated by one manager. A recommendation to remedy this issue for companies considering the BSC method would be two fold. First, reduce the scope of the project into parts with shorter timeframes while attempting to keep the goals and objectives in the minds of managers and employees. The second would be to improve feedback and flow of information vertically throughout the organization.

The issue of communication flow is mentioned as another potential barrier. Kaplan and Norton (1996) indicate that feedback is tactical and not strategic. Few will argue that it is human nature to focus on issues that are of immediate concern. Not surprisingly, many reward systems (Agilent's included) are oriented in that manner. This was expressed in the human capital survey conducted by the organization. As a result, the structure of work and rewards is undergoing revision. Additionally, organizations should consider that information is political. The members of the Agilent organization had just been spun-off from their parent company HP. The individuals in the organization were under pressure to improve their metrics on performance measures while those measures themselves were being retooled (a point of confusion as reported by a number of employees). Off the record interviews indicated that some managers and employees were reluctant to "swim up stream" when asked for feedback regarding the applicability of the plan and its metrics. Like other techniques, the use of the BSC should be open and transparent with senior management informing lower management and employees of their desires and objectives.

As stated above, the organization was undergoing a reorganization and change management effort at the time of this project. As with any change management effort the ramifications on the organization are arduous at best. Perhaps the most difficult aspect of the BSC effort in the opinion of the participants (derived from interviews) was the conversion of the performance measures from traditional financial measures to the board measures which added intangible factors. This combined with the complexity and duration of the BSC driven reorganization compounded the perceived difficulty of the project. One advantage recognized by Aligent and other companies using BSC (Bank One, The Mayo Clinc, etc) is the flexibility to conform the method and its metrics to organization specific situations. While viewed as a strength, this flexibility can also be viewed as a potential weakness. Organizations must be careful to insure that the tailored BSC matrix incorporates strategic goals along with tangible and intangible measures. Additionally, the matrix and its outcomes must be understandable and reachable to the organization's members. Agilent clearly had an advantage in this aspect since the organization had prior experience with BSC. Organizations new to this method might have difficulty establishing a viable matrix and developing and implementing its components.

CAVEATS AND SUGGESTIONS FOR FURTHER RESEARCH

As with most case methods, the researcher was an unobtrusive observer in this process, meaning that he took no part in the change management and offer no suggestions to the organization until the end of the study. While data collection used multiple techniques, the most widely used methods of collection were interview and company documents. The researcher readily admits that all members of the organization were not interviewed and that organization documents and figures were taken at face value. Although every effort was taken to insure a random sample of interviewees and interview notes were compared for validity, it is possible that the sample was bias in favor of the BSC method. Additionally, it should be noted that with the case study method the results reflect the interpretation of the researcher.

This study should be considered exploratory. This and previous studies illustrate that the Balanced Scorecard is an effective and successful method for guiding reorganization and ongoing monitoring of an organization and its parts. Since this research was concluded before the BSC guided reorganization was complete, future research studies should reexamine Agilent to determine the long term benefits to the organization. Since the metrics for success were detailed in the BSC matrix and other organization documents, a quantitative study to compare those projections with actual results over the long term is in order. A study of this nature would assist in the validation of the method and could be conducted with both tangible and intangibles measures. This quantitative study could be extended to other organizations (in other industries) to further validate the method. The study could additionally query an organization's customers, since many BSC projects are externally focused, to see if the customers themselves have an improved perception of the organization, its practices, and products. Perhaps a more interesting study would be to return to companies highlighted in case studies on BSC and re-interview managers and employees exploring the impact on the organization some time (perhaps years) after project fruition. Since many organization change projects take many years to manifest lasting results, these studies would provide insights to the shortcomings of BSC and make suggestions for improvement.

CONCLUSION

The case study illustrated above demonstrates how the Balanced Scorecard can be used to create a matrix that incorporates both tangible and intangible measures leading to overall success. This matrix transformed general corporate goals and objectives - found in the corporate BSC strategy map - into situational and departmental specific metrics used to guide and measure organizational change. Agilent used the BSC as a means to link the overall corporate strategy with that of the IS department. This holistic view provided guidance to the IS department as it was developing its own strategy. More importantly, the linking of corporate and IS strategy allowed the department to change from its former, computer (departmental) centric organization to a more customer driven orientation.

To accomplish this reorientation, the strategy maps found within the BSC were translated into the BSC matrix. Unique to the BSC technique, the matrix converted the relationships found in the strategy maps to tangible guidelines that the IS department could utilize. This matrix integrated previously disparate elements of the corporate strategy into a tool which guided the reorientation process and established critical goals, strategies, and most importantly a mix of tangible and intangible measures. Explicit in the creation of the BSC matrix is the knowledge that the perspectives/dimensions which embody the matrix are interrelated. There is similarity with the ideals used during business process redesign, since both techniques (BSC and BPR) are process driven and seek to produce a holistic view of the organization, and its goals and strategies, while aligning elements of the organization to tangible measures.

This study demonstrates that the Balanced Scorecard is a viable tool that can be used by IS departments as a means to align with corporate strategy and manage projects. As was discovered in previous research, the technique is quite flexible; however the author believes that since all organizations and projects are unique, the tools illustrated above will need to be adapted to each specific instance. This does not decrease the validity or the generalizability of the technique. Since its application is in the real-world, variables are different for each instance and as is done in system implementations, packages are modified to meet specific needs. The integration of traditional tangible measures with non-traditional intangibles could prove a breakthrough for a variety of IT organizations across industries. As this example has demonstrated, there are clear synergies to the integration of the BSC method.

Acknowledgement

I wish to thank Manuel Basurto who provided material, connection, and permission to Agilent.

Footnote

1 Examples of companies that are successfully using the BSC methodology in their strategic planning include: Mobil NA Marketing and Refining, Shell Services, AT&T Canada, Hewlett Packard, Agilent Technologies, Bank of Tokyo, CIGNA Property and Casualty Division, Zeneca Ag Products, Nova Scotia Power, ABB Switzerland, Hilton Hotels, Sears, UPS, Wells Fargo Online Financial Services, Wendy's International, Coca Cola Company, etc. Government and non-profit sectors include the US Government, the UK Government, United Way, Duke's Children's Hospital, etc. (see http://www.balancedscorecard.org)

References

REFERENCES

1. _____. (2005) Agilent Technologies Fact Book. March 2005.

2. _____. (2003). "The Balanced Scorecard: One Approach to HR Metrics," HR Focus, 80(10), S2-S3.

3. Adam, A. (2002) "The Substantial Issue Of Intangibles" Business Week Online, http://www.businessweek.com/bwdaily/dnflash/aug2002/nf20020819_9681.htm

4. Agilent Technologies. (2003) "Agilent History Timeline" http://www.agilent.com/about/newsroom/facts/history.html

5. Armitage, H. (2003) "Mapping Mavens" CMA Management, May 2003.

6. Auger, N. and Roy, D.A. (2004). "The Balanced Scorecard," Canadian Journal of Public Health, 95(3), 233-234.

7. Badenhausen, K. (2002) "Asset Assessment" Forbes, 170(9), 326-328

8. Banker, R.D., Chang, H., and Pizzini, M.J. (2004). "The Balanced Scorecard: Judgmental Effects of Performance Measures Linked to Strategy," The Accounting Review, 79(1), 1-23.

9. Benbasat, I, Goldstein, D.K., and Mead, M. (1987). "The case Research Strategy in Studies of Information Systems," MIS Quarterly, 368-386.

10. Bonoma, T.V. (1985). "Case Research in Marketing: Opportunities, Problems, and a Process," Journal of Marketing Research, 22, 199-208.

11. Denton, G.A. and White, B. (2000). "Implementing A Balanced-Scorecard Approach to Managing Hotel Operations," Cornell Hotel and Restaurant Administration Quarterly, 41(1), 94-107.

12. Gary, L. (2003) "Tying Your People Strategy To The Bottom Line" Harvard Management Update, August 3, 2003.

13. Gillis, T. (2003) "Connecting Intangible Assets To The Bottom Line" Communication World 20(4), 10-11.

14. Gummesson, E. Qualitative Methods in Management Research. Sage Publications, Newburry Park, CA. 1991.

15. Hasan, H. and Tibbits, H. (2000). "Strategic Management of Electronic Commerce: An Adaptation of the Balanced Scorecard," Internet Research, 10(5), 439-445.

16. Kanji, G.K. (2002). "Performance Measurement System," Total Quality Management, 13(5), 715-728.

17. Kanji, G.K. and Moura E Sa, P. (2001). "Kanji's Business Scorecard," Total Quality Management, 12(7), 898-905.

18. Kanji, G.K. and Moura E Sa, P. (2002). "Kanji's Business Scorecard," Total Quality Management, 13(1), 13-27.

19. Kaplan, R.S. and Norton, D.P. (1992) "The Balanced Scorecard: Measures That Drive Performance" Harvard Business Review, 70(1), 71-80.

20. Kaplan, R.S. and Norton, D.P. Translating Strategy into Action: the Balanced Scorecard. Boston:Harvard Business School Press. (1996).

21. Kaplan, R.S. and Norton, D.P. (2004). "Measuring the Strategic Readiness of Intangible Assets," Harvard Business Review, 82(2).

22. Lawton, R. (2002). "Balance Your Balanced Scorecard," Quality Progress, 35(3), 66-71.

23. Li, G. and Dalton, D. (2003). "Balanced Scorecard for R&D," Pharmaceutical Executive, 23(10), 84-90.

24. Low, J. (2004). "The Invisible Advantage," Cap Gemini Research, http://www.capgemini.com/adaptive/media/invisibleadvantage.pdf

25. Lucas, H.C. (1999) "Information Technology And The Productivity Paradox" Oxford University Press.

26. Mair, S. (2002). "A Balance Scorecard for a Small Software Group," IEEE Software, 19(6), 21-27.

27. Malina, M.A. and Selto, F.H, (2001). "Communicating and Controlling Strategy," Journal of Management Accounting Research, 13, 47-90.

28. Markus, M.L. (1981). "Implementation Politics: Top Management Support and User Involvement, " Communications of the ACM, 26(6), 203-215.

29. Martinsons, M. Davison, R., and Tse, D. (1999). "The Balanced Scorecard: A Foundation For Strategic Management Of Information Systems," Decision Support Systems, (25), 71-88.

30. McMurdy, D. (1999) "Sizing Up The Unseen" Maclean's 112(27), 36-38.

31. Miyake, D. (2002) "Beyond The Numbers" Intelligent Enterprise, July 26, 2002.

32. Moore, C., Rowe, B.J., and Widener, S.K. (2001). "HCS" Designing a Balanced Scorecard in a Knowledge-Based Firm," Issues in Accounting Education, 16(4), 569-601.

33. Murphy, K. E and Simon, S. J. (2002). "Intangible Benefits Valuation In Erp Projects" Info Systems Journal, (12), 301-320

34. Neely, A., Mills, J., Platts, K., and Richards, H. (2000). "Performance Measurement System Design: Developing and Testing A Process-Based Approach," International Journal of Operations & Production Management, 20(10), 1119-1135.

35. Oliva, T. And Day, D. (1987). "Selecting Competitive Tactics: Try A Strategy Map" Sloan Management Review 28(3)

36. Oliveira, J. (2001). "The Balanced Scorecard: An Integrative Approach to Performance Management," Healthcare Financial Management, 55(5), 42-46.

37. Overby, S. (2003). "The Hidden Cost of Offshore Outsourcing," CIO, September 1, 2003.

38. Pineno, C.J. (2002). "The Balanced Scorecard: An Incremental Approach Model To Health Care Management," Journal Of Health Care Financial Management, 28(4), 69-80.

39. Pink, G.H., Mckillop, I., Schraa, E.G., Preyra, C., Montgomery, C., and Baker, G.R. (2001). "Creating A Balanced Scorecard For A Hospital System," Journal Of Health Care Financial Management, 27(3), 1-20.

40. Pollard, D. and Buckle, R. (2000). "Multi Level Balanced Scorecards: Aligning Performance For Individuals, Teams, Business Units And Whole Organizations" Panorama Business Views. http://www.performancesoft.com/resources/articles/

41. Schiemann and Lingle. (2000). "Seven Greatest Myths Of Measurement" Panorama Business Views. http://www.performancesoft.com/resources/articles/

42. Sink, D.S. and Smith, G.L. (1999). "Reclaiming Process Measurement," IIE Solutions, 31(2), 41-46.

43. Swamy, Ramesh. (2000). "Strategic Performance Measurement In The New Millennium" CMA Management, 44-47.

44. Tsang, A.H., Jardine, A.K., and Kolodny, H. (1999). "Measuring Maintenance Performance: A Holistic Approach," International Journal of Operations & Production Management, 19(7), 691-714.

45. Van Decker, J. (2002). "Leveraging Balanced Scorecard Business Applications," Meta Group Research, http://www.metagroup.com.

46. Van Der Zee, J.T. and De Jong, B. (1999). "Alignment is Not Enough: Integrating Business and Information Technology Management with the Balanced Business Scorecard," Journal of Management Information Systems, 16(2), 137-156.

47. Violino, B. (2004). "Costly Surprises of Outsourcing," Computer World, February 9, 2004.

48. Wyatt, J. (2004). "Scorecards, Dashboards, and KPIs. Keys to Integrated Performance Measurement," Healthcare Financial Management, 58(2), 76-80.

49. Yin, R.K. Case Study Research, Design and Methods. Sage Publications, Beverly Hills, CA, 1984.

50. Zelman, W.N., Pink, G.H., and Matthias, C.B. (2003). "Use Of The Balance Scorecard In Health Care," Journal Of Health Care Financial Management, 19(4), 1-16.

AuthorAffiliation

Steven John Simon, Ph.D.

SJSimon Research/Office of Naval Research, U.S. Navy

sjsimon@sjsimonresearch.com

AuthorAffiliation

Steven John Simon is the Editor-in-Chief of the Journal of Information Science and Technology, He received his Ph.D. from the University of South Carolina, specializing in MIS and International Business. Before entering the doctoral program he spent eighteen years in the private sector in management/computer operations and was owner/operator of seven McDonalds franchises. His current research interests include medical information systems, enterprise information systems, supply chain management, electronic commerce in the international environment, and determinants of information system ROI. He has extensive ERP experience having work with organizations such as IBM and the Defense Logistics Agency on implementation projects. Dr Simon is also an officer in the United States Naval Reserve currently assigned as a technical liaison officer to the Office of Naval Research/Naval Research Labs. His past Navy assignments included serving as Director for Information Technology & Knowledge Management to the Commander of the United States Sixth Fleet, Information Resource Management Officer to the Commander of the Second Naval Construction Brigade, and the directorate of logistics for United States Atlantic Command. He has consulted and lectured extensively in Korea, Hong Kong, Malaysia, Singapore, and the People's Republic of China. He has previously published in journals such as Information Systems Research, Journal of Applied Psychology, Communications of the CAM, Database, European Journal of Information Systems, The Journal of Global Information Technology Management, The Journal of Global Information Management, Journal of Information Technology Cases and Applications, and The Information Resources Management Journal.

Subject: Balanced Scorecard; Return on investment; Project evaluation; Information systems; Electronics industry

Location: United States--US

Company / organization: Name: Agilent Technologies Inc; NAICS: 334515, 334516, 334519, 339112, 511210

Classification: 5240: Software & systems; 8650: Electrical & electronics industries; 9190: United States; 3100: Capital & debt management; 2310: Planning

Publication title: Journal of Information Technology Case and Application Research

Volume: 7

Issue: 4

Pages: 7-29

Number of pages: 23

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Ivy League Publishing

Place of publication: Marietta

Country of publication: United States

Publication subject: Computers--Data Base Management, Computers

Source type: Scholarly Journals

Language of publication: English

Document type: Feature, Business Case

Document feature: Diagrams References Tables

ProQuest document ID: 214896587

Document URL: http://search.proquest.com/docview/214896587?accountid=38610

Copyright: Copyright Ivy League Publishing 2005

Last updated: 2011-09-01

Database: ABI/INFORM Complete

Document 7 of 100

THE DEVELOPMENT OF A DATA MART SYSTEM AT A PUBLIC INSTITUTION

Author: Nakatani, Kazuo; Ta-Tao Chuang

ProQuest document link

Abstract:

This paper presents a case in which the College of Business (COB) at a state university in the southern United Sates has implemented an information system (IS) with a data mart. The system has been used to efficiently and effectively manage faculty resources, to control daily operations, and to institute the AACSB International accreditation process with a record-speed. The paper focuses on describing successful factors and issues specifically related to the project in the context of public organizations and higher education. [PUBLICATION ABSTRACT]

Full text:

Headnote

ABSTRACT

This paper presents a case in which the College of Business (COB) at a state university in the southern United Sates has implemented an information system (IS) with a data mart. The system has been used to efficiently and effectively manage faculty resources, to control daily operations, and to institute the AACSB International accreditation process with a record-speed. The paper focuses on describing successful factors and issues specifically related to the project in the context of public organizations and higher education.

Keywords: Data mart, data warehouse, resource management, public sector, higher education, systems development, case study

INTRODUCTION

In today's rapidly changing business environment, the importance of information technology (IT) cannot be overemphasized. IT has been widely employed in the form of transaction processing systems, managerial support systems and inter-organizational systems to support strategic and operational activities in various aspects of firms. Due to keen competition, for-profit companies fiercely adopt IT as a competitive weapon (Porter & Millar, 1985) or to create collaborative advantage (Chuang & Nakatani, 2004; Ferreira & Blonkvist, 2002). Although the public sector is no exception, the development of information systems (IS) in public organizations appears to be more challenging because of tight budget (Kleist, Williams, & Peace, 2004) and the bureaucratic model in most public organizations (Thong, Yap, & Seah, 2000). Furthermore, unique needs of particular sub-units of public organizations are seldom met because public organizations often use enterprise resource planning (ERP) systems in the market to serve the common needs of those organizations.

The lack of support for unique needs for certain sub-units is particularly true in higher educations. Even though the call for systems tailored to the needs of individual higher education institutions had been made two decades ago (Bloomfield & Updegrove, 1981), most ERP systems for higher education fail in this regard. For example, SCT Banner is an ERP system that has been broadly adopted by higher education and that serves general needs of administration in campus well. Yet, it does not provide functions for monitoring and assessing the quality of curricula and faculty to comply standards established by accreditation bodies (e.g., AACSB International). Consequently, although higher education institutions, as information-intense organizations, are presumably adopting IT in their various facets of operations, the reality is short of expectation, as Guan, Nunez and Welsh (2002) said, "despite the availability of powerful computers, advanced network and communication infrastructure, university decision makers, including planning and budget administrators, still lack access to the critical information necessary for informed decision making" (p. 168).

Guan, Nunez, and Welsh (2002) argued that higher education institutions needed to re-examine the use of IS due to the need for better control over internal operations and the demand for greater accountability from external agencies. They indicated that the lack of data accessibility made information scattered in the university unavailable to decision makers in a timely fashion at a sub-unit level. Thus, they suggested that higher education institutions adopt an integrated approach to organizing scattered data so administrators could make decisions based on facts.

This article presents a case of how a sub-unit of a public university with limited resources developed a resource planning support system with a data mart for information sharing and decision support. Also, the case discusses the symbolic implications of the system when the subject organization sought for accreditation. The system presented in this article was recommended by the AACSB International Peer Review Team as an exceptional proactive management tool. The AACSB International Accreditation Website based on this system was recognized by the Business Reference and Services Section of the American Library Association.

The objective of the article is to provide answers to the following questions:

1. What factors contribute to the success of developing a faculty resource planning system with a data mart at a unit of higher education?

2. What issues need to be addressed for successful application development in the context of higher education?

3. What is the symbolic significance and implication of the system?

Due to the complexity of those issues, a detailed contextual analysis of critical events occurring during the development process was deemed necessary to reveal the intricacy of the case. Thus, the case study method (Yin, 1984) was adopted as the research method. By following the method, we conducted a thorough literature review on information system development in the areas of public sector and higher education in order to determine the direction of data collection. The data was collected from the following sources: system documents, users, developers, project managers, and meeting minutes. The findings of previous studies are organized as a contextual framework in which events and issues identified from collected data are evaluated, assessed, and interpreted. Because the project lasted for a relatively long period of time (about four years), in order to provide a better perspective, we primarily identified main events following milestones throughout the process. Specifically, we assessed the events along three stages: project planning and management, project execution, and project evaluation.

The rest of the article is organized as follow: The next section reviews the use of IT at the public sector in general and at higher education in particular. The presentation of systems development follows. Then, critical issues and successful factors in the project are identified. The last section presents implications and limitations of the study, and suggestions for future research.

LITERATURE REVIEW

Issues of Information Systems Development in the Public Sector

The public sector usually encounters more difficulty in deploying IS than the private sector because of differences between them (Bozeman & Bretschneider, 1986; Thong et al., 2000; Margetts & Willcokcs, 1994; Bretschneider, 1990; Cluadle, Gorr & Newcomer, 1991; Hoff, 1992). The public sector and the private sector differ in three categories (Rainey, Backoff & Levine, 1976): (1) environmental factors; (2) organization-environment transactions; and (3) internal structures and processes. Extending from these three categories, Thong et al. (2000) drew several lessons of the deployment of IT in the public sector: (1) public organizations are highly resistant to change; (2) publicity and public pressure are powerful ways to draw full attention of staff; (3) public organizations lack available performance benchmark; (4) approvals from top-management are crucial; and (5) it is difficult to quantify improvement and thus a pilot site implementation is critical to demonstrate the improvement. Cluadle et al. (1991) further elaborated the differences identified by Rainey et al. (1976): (1) the private sector tends to treat IS as proprietary assets while the public sector treats it as shared assets; (2) information requirements are more difficult to identify and unstable due to multiple, intangible, and conflicting goals; and (3) political disruption makes long-term planning difficult.

Bozeman and Bretschneider (1986) proposed an integrated framework for public management information systems (PMIS) research and ten guidelines for planning, developing and evaluating PMIS. Interesting guidelines include:

* The effectiveness of PMIS should be measured using not just economic efficiency, but also political efficiency and policy mission.

* PMIS planning should be incremental/contingent and consider the needs for extra organizational horizontal and vertical linkages.

* PMIS requires a protracted period of testing and prototype development because of the pressures for accountability and the visibility.

Similarly, Hoff (1992) claimed that the result-oriented criteria rather than the traditional economic cost-benefit criteria should be used when the effectiveness of the PMIS is evaluated.

Based on the framework (Bozeman & Bretschneider, 1986), Bretschneider (1990) empirically tested the environmental differences between the public sector and private sector in PMIS. His findings include: (1) the public sector has more interdependence with other organizations such as executive or legislative agencies through control mechanisms such as budgeting and rules, especially on personnel and procurement; (2) the public sector takes longer time to complete the same task than the private sector due to high level of interdependence and accountability; (3) the public sector uses formal planning, which takes care of a higher level of interdependence, more often, but uses steering committees, which deal with prioritization of projects within an organization, less often than the private sector does.

Likewise, Cats-Baril and Thompson (1995) proposed a framework that addressed the needs of managing large-scale IT projects in the public sector and identified lessons learned from a case study: (1) make sure the project is strategically aligned; (2) modular approach; (3) leadership; impossible to succeed without it; and (4) politics.

Nidumolu, Goodman, Voge and Danowits (1996) suggested that adequate trainings on developers and users as well as an innovation champion were critical for the success of implementing IT in the public sector. They found that the political/symbolic perspective and social information processing perspective explained more of the project outcomes than did the functional perspective. Kraemer, Danzinger, Dunkle and King (1993) investigated public organizations and found managers at the public sector were satisfied with the usefulness of IS the most when they used support staff to mediate their IS environment. Thus, they suggested that system design should focus as much on those intermediaries as on the managers themselves.

Margetts and Willcokcs (1994) examined case studies and found that the public organizations might experience all kinds of risks private companies did but the extents of the risks could be worsen by political environments. They summarized the mostly commonly cited differences between the public and private sectors: (1) separation of policy making and administration; (2) no bottom line decision making; (3) large scale; (4) lack of homeostatic control; and (5) problems of accountability. They also identified outsourcing to the private sector might create new accountability problems.

Issues of Information Systems Development at Higher Education

The majority of extant literature of IT-related research in the context of higher education has been focused on distance learning and IT-enabled courses (e.g. Renig, Briggs, & Nunamaker, 1998; Money, 1996; Leidner & Jarvenpaa, 1995; Alavi, Wheeler, & Valacich, 1995; Piccoli, Ahmad, & Ives, 2001). In the realm of administrative use of IT in higher education, not much research, except Guan, Nunez, and Welsh (2002), has been done on data-driven decision support, although many studies had investigated the effectiveness of model-driven decision support. Most of the studies explored the feasibility of developing systems using quantitative models to solve specific problems in budgeting (Soyibo & Lee, 1986; Schroeder, 1974; Franz, Lee, & Van Horn, 1981), scheduling (Cox & Jesse, 1981; Foulds & Johnson, 2000), and project prioritization (Dutta & Burgess, 2003). According to Guan, Nunez, and Welsh (2002), the reasons for the development of data-driven information systems are: (1) administrators at all levels need improved data management strategies to support resource management and strategic planning; (2) faculty and administrators need information that can assist the recruitment and retention of students; and (3) external agencies, such as government and accrediting agencies, need information about the performance of institutions on a variety of indicators. Furthermore, they identified several issues that colleges and universities need to address in order to develop a system that would meet the needs of institutions: (1) complexities of the organization; (2) vast number of stakeholders and appraisers; (3) competitive market place; and (4) resource limitations. They suggested the use of data warehousing to integrate data in a consistent manner so administrators could make fact-based decisions.

Lawson (2003) found that higher education spent about five billions in ERP systems and in IT infrastructure that were mainly used to support financial, human resource and student service transactions. A survey cited by him indicated that there was a lag of six to eighteen months before the benefits of the ERP implementations were perceived. Meanwhile, Fowler and Gilfillan (2003) proposed a three-dimensional project management framework of ERP implementation at higher education and guidelines as a set of questions.

The literature review shows that public higher education institutions generally face several dilemmas: Due to high dependence on external stakeholders, they need a better approach to keep track of their activities and achievements to meet the demands from those stakeholders. On the other hand, issues like tight budget, bureaucratic structure, resistance to changes, and others inhibit their abilities to develop custom information systems to support the unique needs of their sub-units. Consequently, the development of IS for a sub-unit at higher education may require extra care due to its unique characteristics.

By summarizing the existing literature review regarding the IS development and implementation at public organizations, we created a framework of critical factors that might inhibit the successful development of IS for a sub-unit of a public organization (Table 1).

The framework will be used as a context for evaluating and assessing the development of an information system with a data mart in the College of Business at a state university.

View Image -   Table 1. Factors Inhibiting IS Development for a Sub-Unit of Public Organization.

FACULTY RESOURCE PLANNING SYSTEM DEVELOPEMNT

This section discusses the background of the university, the College of Business (COB) and development initiatives first. Then, the system development process is described.

Background

The subject university opened its door to the public in 1997 as the tenth state university in Florida. Envisioned as a university for the 21st century, the university was determined to become an IT-enabled organization by using IT in all areas of its operations. Between 1996 and 1998, the university invested a significant amount in IT infrastructure. In addition to a centralized operating organization - Administrative Computing, the University Technology Committee (UTC) was appointed by the President to develop and to ensure the implementation of a strategic IT plan and policies. The Faculty Senate created a Technology Advisory Committee to address technology issues of importance to faculty. Education and training programs were regularly offered to faculty and staff to advance their skills.

The COB is one of the five main units (colleges) at the university. The COB has about forty-five full-time faculty, ten full-time staff, and two part-time IT staff. The dean along with the faculty had a vision that the COB would be an international leader in innovative ways of integrating technology into business education and was dedicated to providing technologically progressive programs to its students. The goal of the COB was to provide high quality education at the undergraduate and graduate levels. As a measure of program quality, the dean set the college on a path towards attaining AACSB International accreditation by the end of the 2002-2003 academic year.

As such, the AACSB International accreditation standards (Ramey, 1993) dictated the COB's planning and resource allocations. Recently approved AACSB International standards (in April 2003) for annual report submission and the trend of facts-oriented strategic planning process made the COB aware of the need for investment in keeping track of outcomes of its activities and operations. In 1998, the COB deemed necessary to develop a Faculty Resources Planning Database (FRPD) and to create a web site called AACSB International Accreditation Website as a centralized place to access accreditation policies and standards.

Development Process

The COB considered and evaluated three alternatives to acquire needed functions. First alternative was to use the iWebfolio component in SCT Banner, which had been the major administrative information system in the subject university. However, this option was abandoned due to the following reasons: (1) high cost, (2) low priority in the Administrative Computing plan; (3) the need for consensus among all colleges; and (4) lack of several functions for certain requirements. The second option was outsourcing. There were several application service providers in the market exclusively designed for the purpose of AACSB International accreditation, such as the Dean's Associate by Octagram Inc. (2000) (http://www.octagram.com/) and the SEDONA system by Woodruff Consulting (2002) (https://www.sedona.bz/). However, the COB decided not to pursue this option because of high cost, uncertainty about the future of outsourcers, fear of loss of controls, and accountability issue. Finally, the COB determined to develop the system in house. This would come with several advantages: First, the college can ensure that the functions would meet its needs. Second, the college maintains control over the location, access to, and maintenance of database. Third, in case problems arise, resident experts are available to fix the problems.

Faculty Resource Planning Database (FRPD) Development: As indicated earlier, the COB aimed to obtain the AACSB accreditation as a measure of program quality by the end of 2002 - 2003 academic year. With this in mind, the FRPD project was initiated with two objectives: It would be an internal management tool and a showcase to external entities, such as AACSB Accreditation delegates. In order to achieve the objectives, the COB selected several measurements for its performance monitoring. An early attempt was to build a system with spreadsheet and word processing software because of their ubiquity and faculty's familiarity with them. However, it immediately became clear that the system was not flexible or scalable enough and it deemed necessary to develop the system with database. Because of the limitation in resources and not quite clear requirements at the beginning, the project adopted an iterative, incremental approach, starting with limited critical functions.

Due to the strategic role of the project in obtaining AACSB International accreditation, the Associate Dean acted as a champion of the development effort. The development team consisted of a faculty member and his graduate students. The department chairs and several members of the faculty and staff were also involved in the requirement analysis. The systems analysis and design (SA&D) was done as part of course requirements of a graduate SA&D course. The project started in August 1999 and released the first version of the FRPD in July 2000. The first version of the system, which was based on Microsoft Access, was installed on the university local area network (LAN).

Data needed for the system came from three sources: First, the course-related data was exported from the university's SCT Banner Student. The data was cleaned by a COB staff to ensure the integrity of the data before the database was populated. Second, data not available in Banner, but in existing reports, such as faculty's annual performance reports, were manually entered into the database. Third, data that was not in a formal document, but existed in various formats, were also manually entered into the database. The system was capable of generating various periodical reports and of exporting selected data into software tools with which faculty or staff was familiar. Periodical reports included those for internal administrative purposes and for compliance to the AACSB International accreditation standards. In 2001, FRPD was presented to the College's AACSB International Candidacy Advisor who visited the COB for the initial evaluation. The advisor valued the flexibility of the FRPD report generator and its usefulness. This validated externally the success of the system, motivating further development of FRPD.

The use of FRPD v. 1 stimulated the need for more functions, which, as well as the suggestions from the AACSB Candidacy Advisor, were incorporated into the second version. There were several enhancements. The first was the expansion of the database to include detailed records of faculty's publications and service records, which were imported from faculty vitae and from spreadsheets, respectively. In order to verify the imported data and input new publication and service data as they occurred, a reporting Active Server Page (ASP) website was created with an integrated website development tool, Macromedia Dreamweaver UltraDev. Second, this version supported the production of the self-evaluation report and additional information as requested by AACSB International. Third, the feature of self-maintenance was added so that the faculty or staff could add, delete and change their own data. Fourth, the capability of search was enhanced and the capability of on-line analytical process was added to the system so the user could not only view summarized course-related information and performance report, but also drill-down to see detailed data. Fifth, the access scope was clearly defined according to the user's job description. For example, the department chair had access to the data of faculty members in his/her department, the dean had authority over the whole system, and the faculty only had access to his/her records. With the database, chairs and Dean's Office could review faculty performance in real-time. During this period of time, the Dean of the COB promoted the system at the university as well as at AACSB International conferences and its usefulness was recognized. At this point, the COB gained informal approvals of further development of the system from all major stakeholders as part of mission-critical activities.

The addition of more functions and increasing volume of data quickly showed that the existing version was not sufficiently responsive and that the data processing activities could be streamlined further. Thus, by the end of 2002, version 3 of FRPD was migrated to Microsoft SQL Server 2000 with ASP technology. The migration was done as part of course requirements of a graduate database course. The system was hosted on a server using Secure Socket Layer encryption. There were several enhancements. The first was that web-based data entry, which enabled a faculty member to view, add, change, and delete his/her own data with a universal interface. The second was expanding the types of data that was collected. For example, from 2002 on, faculty's annual professional development plan, semester faculty activity reports, performance reports and other digitized supporting documents (e.g., acceptance letter of an article, letters of recognition) were stored in the system. Third, the increased scalability came with the use of enterpriselevel database engine, which made the system truly multiple-user system. This version was presented to the AACSB Peer Review Visiting Team and the team acknowledged the FRPD as exceptional management tools for the COB. Later, the system was also presented to a visitor from AACSB International, who was responsible for AACSB data management and he recognized the usefulness of the system.

Further refinement of the system is currently undertaken. One of major enhancements was a desktop application for report generation for Dean's Office that had a secured connection to the university LAN to respond to the concern with security. Second, course assessment detailed data and new reporting functions such as average class sizes and course evaluation were added. Third, under development is to use XML to upload the course data from the SCT Banner system. Figure 1 shows the structure of FRPD version 4 and its data mart. The data model, inputs and outputs are included in Appendix A and B.

Accreditation Website Development: Because of the importance of compliance to AACSB Accreditation standards, the COB created a web site as a central repository for maintaining accreditation-related records based on the system described above. The site contains seven sections of the AACSB International Standards. Several standards are regarding the faculty's performance, which is supported with the data generated from FPRD system using the flexible search/filter/aggregation features. This capability had been recognized by the Business Reference and Services Section of the American Library Association.

Figure 2 summarized the time-line of AACSB accreditation process and FRPD development process.

View Image -   Figure 1. Version 4 of FRPD.  Figure 2: Time-line of Accreditation and System Development

ANALAYSIS OF CASE

As a pubic institute, the COB faced many issues as others do when developing FRPD. This section examines those issues under the framework developed at the end of the Literature Review section.

Issues in Project Planning and Management

The lack of consistent, stable planning and controlling due to political disruption has been recognized as a critical issue for public institutions (Cluadle et al., 1991; Margetts & Willcokcs, 1994). One such disruption is the turnover of top administration at the organization-level or at the sub-unit level. Because a long-term planning by the IT/IS administration often heavily relies on visions and support of top policy makers, such a turnover at higher education can cause significant changes in resource allocation and priority in IS investment. At the subject university, the President and the Provost were changed once respectively during the period of the system development. Additionally, at the first three years, the COB did experience growth pains, such as the high turnover rate of faculty, re-structure of administration, and shift in the background of students. The Associate Dean of the COB was changed once. However, the COB's strategic goal of obtaining AACSB International accreditation had always been the priority and the development of the system was closely tied to the objective. Twice a year, at least, the goal and the importance of the FRPD were stressed by the Dean and the Associate Dean at college meetings. As shown in Figure 2, the AACSB Accreditation timeline directly corresponded to the development of FRPD. The timeline worked as an overall plan for the FRPD development. Without the goal and timeline on which every member of COB faculty and staff agreed, sustaining the development effort could have been difficult, if not impossible. In general, it may be rare that a public organization has this kind of clear goals and timeline. At higher education, accreditation and re-accreditation from external agencies are critical to its existence and must be done periodically. Thus, the COB successfully leveraged the goal and timeline for obtaining the accreditation status to sustain a consistent and stable long-term plan regardless who the policy maker was. In fact, the recognitions received from regular visits of AACSB International Accreditation delegates became an important motivator for the success of the system.

In addition, public organizations may face a higher pressure from external agencies in terms of budgeting and regulations (Bretschneider, 1990; Guan, Nunez, & Welsh, 2002). Along with the accountability issue identified by Bozeman and Bretschneider (1986) and Margetts and Willcokcs (1994), the pressure might induce the policy maker to centralize the data processing activity for the sake of security. The use of ERP is one way to address the concern. As a result, while the subject university had invested a significant amount in IT and deployed the SCT Banner system, the unique need of the COB was not properly met.

Meanwhile, the COB faced regulations from external agencies regarding the locally stored information and its security. To address this issue, the development team intentionally excluded private and sensitive information such as social security numbers, non-public course evaluation data, student information, and others from its data mart. Some sensitive data, such as grades, were only stored in an aggregated format (e.g. grade distributions). This policy made it easy for the COB to obtain data from different sources; otherwise, the data owners would have been reluctant to give the COB the data. Additionally, even though the data stored hi the data mart is available to the public, access to the system is protected with passwords. Later, the entire system, database and website, were deployed as an intranet system to enhance the security of data. A Virtual Private Network (VPN) was utilized to provide an access from the outside of the campus.

The wide use of formal planning in public organizations (Bretschneider, 1990) is another factor that may delay the IS development for a sub-unit in two possible scenarios. First, a request from a sub-unit tends to receive a low priority at the organization-level. Second, if a request from a sub-unit is not included, its addition is difficult and time-consuming because agreements from other sub-units are often necessary. The subject university created a formal plan in which the priority of IS projects was established and resources for those projects had been allocated accordingly. Because the FRPD project was not part of the plan, the university could hardly allocate resources to it. With a limited COB's IT personnel and tight budget, the rigidity of formal planning made the issue of resource limitations, which will be discussed next, even more critical. Reflecting the FRPD project, the development team believed that the COB should have used the importance of AACSB International accreditation to the COB and the university as leverage and submitted a request for the inclusion of the project in the university plan when the plan was being drafted or even later.

Another factor that affects the successful development of IS for a sub-unit is resource limitation (Guan, Nunez, & Welsh, 2002). Most of IT resources at higher education are used for organization-wide administration and for supporting instructions. Faced with the tight budget, the COB needed to adopt an innovative approach to developing FRPD. FRPD was developed as part of course works and as a professor's service. Graduate students majoring in Computer Information Systems (MSCIS) were recruited to determine the design specification under the supervision of a faculty member. The specification was reviewed and validated by the Associate Dean of the COB and his staff who were in charge of AACSB accreditation process, as well as department chairs. Then, the faculty member and his graduate assistant with qualified programming skills developed the system as part of independent studies and summer assistantships. The concern with the quality of student's work was eased by the approach of iterative, incremental revisions. In addition, the system was thoroughly tested by the instructor, students, and local IT professionals annually. A release-based, incremental development approach helped the faculty member to divide the system requirements into manageable pieces and allow thorough testing to assure the quality of students work. The faculty member learned that student groups could produce a production system with careful planning, thorough testing, and requiring high quality work. Students were also happy with working on the real project, and the instructor had an in-house system to motivate students. The students were also motivated by the fact that they were helping their school to achieve a major accomplishment, AACSB International accreditation at a record-speed. However, the success of the particular project does not mean that a sub-unit at higher education should use students or faculty members as a source of IT personnel. Ideally, the sub-unit needs to develop a long-term plan and allocate sufficient budget for developing mission-critical systems. Nevertheless, as an educational unit, a sub-unit of higher education can use faculty and students as resources and make their experiences as excellent learning opportunities.

Issues in Project Execution

The slow pace of task completion is another issue that public organizations need to face (Bretschneider, 1990). In order to overcome the inertia caused by the sluggish, the timeline developed for AACSB International accreditation (Figure 2) guided the development of FRPD well. The academic calendar, of course, helped managing the project on time because many parts of FRPD were developed as course work. The use of release-based, incremental development approach nicely fit the circumstance.

IS development projects of public organizations tend to be large-scale (Margetts & Willcokcs, 1994) and information requirements are difficult to determine because of multiple, intangible, and conflicting goals (Cluadle et al., 1991). Yet, the difficulty was lessened to the minimum level by deriving the major requirements from the AACSB accreditation standards and progressively identifying additional requirements. Furthermore, the high level of clarity of the goal reduced the likelihood of conflicts between departments. Another issue regarding the requirement determination was the involvement of the information processing intermediaries for the Dean and the Associate Dean in the analysis and design of the system. This significantly increased the intermediaries' acceptance of the system and assured that the output of the system met the information need of administrators and also eased the anxiety of staffs concern with the elimination of jobs accompanying computerization.

One issue frequently faced by public institutions is employees' resistance to change (Thong et al., 2000). An IS project might be taken as a burden by the faulty and staff. For example, some faculty members initially felt that data entry was not their primary responsibility. To reduce the resistance, tangible benefits of the system, such as reduction in time to collect and package same documents several times for different occasions (e.g. accreditation, annual reporting and others), were demonstrated to faculty members at college meetings. Overall, this issue was insignificant in this FRPD project. This could be attributed to the technology-oriented culture of the university. Staff members were accustomed to computerize manual processes and thus this did not create a fear of loss of jobs. Indeed, the staff of the university's computing units was very supportive. The establishment of such organizational culture as continuous effort is critical for successful IS development.

Issues in Project Evaluation

The recognition of the project achievement is critical to the successful deployment of IS. It was indicated that lack of available performance benchmark and proper ROI evaluation measures (Hoff, 1992; Thong et al., 2000), as well as no bottom line decision making style (Margetts & Willcokcs, 1994), were major issues for public institutions. It makes the evaluation of IS effectiveness and thus justification for budgeting relatively difficult. In the case, the FRPD system was regularly presented to the COB faculty and accreditation delegates. Even though the COB didn't quantify the effectiveness of FRPD, frequent recognitions by external agencies such as AACSB International and the Business Reference and Services Section of the American Library Association were used as the measurement for success. Furthermore, recognitions from external agencies became an important motivator for continuous refinements and solidified the support from the administrators. The most important measurement of the project achievement was that the critical role of FRPD in the process of the COB's accreditation process. With well-documented records provided by FRPD, the COB was accredited at a record-speed.

Additionally, accountability (Bozeman & Bretschneider, 1986; Margetts & Willcokcs, 1994) was one of main concerns from the beginning of the development effort for the FRPD project. A high level of accountability was taken care of by the data cleaning process conducted by the COB staff before loading the data to the data mart. Then, each faculty member was asked to verify the uploaded data. As part of the system development, a faculty committee that consisted of Accounting faculty members and a Microsoft Certified Systems Engineer at Administrative Computing were involved in ensuring the inclusion of standards and procedures for the data security and accountability. The backup and recovery procedures were also formalized by this committee.

Finally, it is very important to secure the faculty's willingness to keep their records accurate and up-to-date. In order to motivate the effort to keep record current, benefits of the FRPD system must be perceivable and recognized by the faculty. Specifically, the development team directed its energy to two directions: userfriendly design and frequent demonstrations of the system through face-to-face communications. The design features of FRPD included the use of web-based interface, versatile output formats and minimal effort of data entry. The use of the universal interface, web browsers, enabled a faculty member to update his or her record at any convenient time and anywhere. Additionally, faculty members were able to review their personal data as needed, and made corrections if necessary. The data once entered into the system can be extracted from the system and organized in the format of the faculty member's choice. This reduced the faculty time and effort in the data-reporting phase and freed up time to perform other production related tasks. The design objective of minimal data entry effort is achieved by importing as many data as possible from the Banner so that the faculty only needs to enter data about their current activities. Furthermore, the Dean's Office conducted faculty annual review mainly through the reports generated from the system. The above features/benefits were conveyed to the faculty through frequent meetings and demonstrations.

IMPLICATIONS, LIMITATIONS AND FUTURE RESEARCH

In this section, we first discuss the implication of success factors and issues specifically related to a public organization. Then, limitations of the study and future research direction are presented.

Implications

Table 2 summarizes how the COB addressed the issues identified in the framework (Table 1). The table also shows lessons learned especially when COB did not handle the issues appropriately.

View Image -   Table 2: Implications from FRPD Development Effort

Limitations

The development effort analyzed in this study was one successful case at a unit of higher education. The implications cannot be blindly generalized and the application of them must be done with care. The university had unique characteristics such as highly technology-orientation and flexibility that the founding faculty envisioned as critical features of university of the 21st century. The university was also experiencing a rapid growth and budget-cuts under economic downtime. This motivated the COB to adopt innovative approach to the development of the system. At the same time, the COB had a specific goal that all faculty and staff members agreed upon, which was AACSB International accreditation at a record-speed. Therefore, established universities that do not have similar conditions, cultures or characteristics may experience difficulty to handle the issues the article discussed. However, we believe that those implications we found can be important lessons for other units at higher education that are facing similar needs and issues.

Conclusion

Higher education is charged with the mission of educating the professionals of next generation. The excellence of operations in higher education directly impacts the success/failure of the mission. While the education of use of information technology has been an important component in curricula at most universities, the unique characteristics of public higher education make the implementation of the system more difficult than in the private sector. This article presents a case in which the subject college with limited resources successfully developed a data mart-based information system. Although public institutions face unique constraints, such as higher level of accountability and dependence on external entities, this case shows that the champion of an IS project could take advantage of the constraints and use them as motivational factors. This case also demonstrates several learned lessons that could be borrowed by institutions in similar contexts to develop systems that would modernize their operations and decisionmaking in the information age.

References

REFERENCES

1. Alavi, M., Wheeler, B. C., and Valacich, J. S., "Using IT to Reengineer Business Education: An Exploratory Investigation of Collaborative Telelearning," MIS Quarterly, 19(3), 1995, pp. 293-312.

2. Bloomfield, S. D., Updegrove, D., "A. A Modeling System for Higher Education," Decision Sciences, 12(2), 1981, pp. 310-321.

3. Bozeman, B., and Bretschneider, S., Public Management Information Systems: Theory and Prescription. Public Administration Review. 46 (Special Issue), 1986, pp. 475-487.

4. Bretschneider, S., "Management Information Systems in Public and Private Organizations: An Empirical test." Public Administration Review, 50(5), 1990, pp. 536-545.

5. Cats-Baril, W., and Thompson, R., Managing Information Technology Projects in the Public Sector. Public Administration Review, 55(6), 1995, pp. 559-566.

6. Chuang, T.-T., and Nakatani, K. "Planning and Deployment of Collaborative Commerce: A Conceptual Framework and Empirical Evidences." International Journal of Electronic Business. 2(2), March/April 2004, pp. 157-173.

7. Cluadle, S. L., Gorr, W. L., and Newcomer, K. E., "Key Information Systems Management Issues for the Public sector." MIS Quarterly, 15(2), 1991, pp. 171-188.

8. Cox, J. F. and Jesse, Jr., R. R., "An Application of Material Requirements Planning to Higher Education." Decision Sciences, 12(2), 1981, pp. 240-260.

9. Dutta, R., and Burgess, T. F., "Prioritizing Information Systems Projects in Higher Education." Campus-Wide Information Systems, 20(4), 2003, pp. 152-158.

10. Ferreira, J. and Blonkvist, B., Directions in Collaborative Commerce: Managing the Extended Enterprise, Delloite Research, www.dc.com/research, 2002

11. Foulds, L. R., and Johnson, D. G., "SlotManager: a microcomputer-based decision support system for university timetabling," Decision Support System, (27)4, 2000, pp. 367-381.

12. Fowler, A., and Gilfillan, M. "A Framework for Stakeholder Integration in Higher Education Information Systems Projects," Technology Analysis and Strategic Management, 15(4), 2003, pp.467-489.

13. Franz, L. S., Lee, S. M., Van Horn, J. C., An Adaptive Decision Support System for Academic Resource Planning. Decision Sciences, 12(2), 1981, pp. 276-293.

14. Guan, J., Nunez, W., and Welsh, J. F., "Institutional Strategy and Information Support: the Role of Data Warehousing in Higher Education," Campus-Wide Information Systems, 19(5), 2002, pp. 168-174.

15. Hoff, J., "Evaluation of Information Technology in Private and Public Sector Contexts," Information and the Public sector, 2(4), 1992, pp. 307-328.

16. Kleist, V. F., Williams, L., and Peace, A. G., "A Performance Evaluation Framework for a Public University Knowledge Management System." Journal of Computer Information Systems, 44(3), 2004, pp. 9-16.

17. Kraemer, K. L., Danzinger, J. N., Dunkle, D. K., and King, J. L., The Usefulness of Computer-based Information to Public Managers. MIS Quarterly, 17(2), 1993, pp. 129 - 148,

18. Leidner D. E. and . Jarvenpaa, L., "The Use of Information Technology to Enhance Management School Education: A Theoretical View." MIS Quarterly, 19(3), 1995, pp. 265-291.

19. Lawson, John D. (2003). "Putting Another "E" in ERP?" EDUCAUSE, 38(2), pp. 56 - 57.

20. Margetts, H., and Willcocks, L., "Informatization in Public Sector Organizations: Distinctive or Common Risks?" Informatization and the Public Sector, 3(1), 1994, pp. 1-19.

21. Money, W. H., "Applying Group Support Systems to Classroom Settings: A Social Cognitive Learning Theory Explanation." Journal of Management Information Systems, 12(3), 1996, pp. 65 - 80.

22. Nidumolu, S. R, Goodman, S. E., and Vogel, D. R., and Danowitz, A. K., Information Technology for Local Administration Support: The Governorates Project in Egypt. MIS Quarterly, 20(2), 1996, pp. 197 - 224.

23. Octagram Inc, The Dean's Associate. http://www.octagram.com/, 2000.

24. Piccoli, G., Ahmad, R., and Ives, B., "Web-Based Virtual Learning Environments: A Research Framework and a Preliminary Assessment of Effectiveness in Basic IT Skills Training." MIS Quarterly, (25)4, 2001, pp. 401-426.

25. Porter, M., E. and Millar, V. E., "How Information Gives You Competitive Advantage," Harvard Business Review, 63(4), 1985, pp. 149-160.

26. Rainey, H.G., Backoff, R.W., and Levine, C.H., "Comparing Public and Private Organizations." Public Administration Review, 36(2), 1976, pp. 233-244.

27. Ramey, G. W., "Dr. Don Parker speaks on: The changing face of AACSB accreditation: Implication for Facultys," Journal of Organizational Change Management, 6(1), 1993, pp. 41-46.

28. Reinig, B. A., Briggs, R. O., and Nunamaker, J., "Flaming in the Electronic Classroom." Journal of Management Information Systems, 14(3), 1998, pp. 45 - 60.

29. Schroeder, R. G., "Resource Planning In University Management by Goal Programming." Operations Research, 22(4), 1974, p. 700.

30. Soyibo, A., and Lee, S. M., "A Multiobjective Planning Model for University Resource Allocation." European Journal of Operational Research, 27(2), 1986, pp. 168-178.

31. Thong, J. Y..L., Yap, C. S., and Seah, K. L., Business Process Reengineering in the Public Sector: The Case of the Housing Development Board in Singapore. Journal of Management Information Systems, 17(1), 2000, pp.245-270.

32. Woodruff Consulting, SEDONA System brochure, http://www.sedonasystems.info/facts/images/brochure.pdf, 2002.

33. Yin, R. K. Case study research: Design and methods, Newbury Park, CA: Sage, 1984.

AuthorAffiliation

Kazuo Nakatani

College of Business, Florida Gulf Coast University

knakatan@fgcu.edu

Ta-Tao Chuang

School of Business Administration, Gonzaga University

chuang@gonzaqa.edu

AuthorAffiliation

Kazuo Nakatani is an associate professor of Computer Information Systems at Florida Gulf Coast University, Fort Myers, FL. He received a Ph.D. in Management Information Systems from Texas Tech University. His research interests include strategic use of information technologies/systems and collaborative commerce.

Ta-Tao Chuang, an associate professor of Management Information Systems at Gonzaga University, Spokane, WA, received his Ph.D. in MIS from Texas Tech University. His research interests include applications and impacts of collaborative technology, group support systems, electronic business, decision support systems and management of organizational interdependence.

View Image -   APPENDIX A
View Image -   APPENDIX A
View Image -   APPENDIX A
View Image -   APPENDIX B
View Image -   APPENDIX B
View Image -   APPENDIX B
View Image -   APPENDIX B
View Image -   APPENDIX B
View Image -   APPENDIX B

Subject: Data warehouses; Resource management; Public sector; Higher education; Systems development; Information systems

Location: United States--US

Company / organization: Name: Association to Advance Collegiate Schools of Business; NAICS: 813910

Classification: 9550: Public sector; 5240: Software & systems; 8306: Schools and educational services; 9190: United States

Publication title: Journal of Information Technology Case and Application Research

Volume: 7

Issue: 4

Pages: 30-52

Number of pages: 23

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Ivy League Publishing

Place of publication: Marietta

Country of publication: United States

Publication subject: Computers--Data Base Management, Computers

Source type: Scholarly Journals

Language of publication: English

Document type: Feature, Business Case

Document feature: Diagrams References Illustrations

ProQuest document ID: 214891543

Document URL: http://search.proquest.com/docview/214891543?accountid=38610

Copyright: Copyright Ivy League Publishing 2005

Last updated: 2011-09-01

Database: ABI/INFORM Complete

Document 8 of 100

The Case of Implementing a CRM System at Indigo

Author: Pliskin, Nava; Ben-Zion, Ronnie

ProQuest document link

Abstract:

Automation of Customer Relationship Management (CRM) is among the most prevalent Information Technology (IT) implementations in recent years. This paper describes the case of a low-budget CRM implementation at The Indigo Division of HP, a leading innovator in the digital printing press industry. Indigo avoided a big-bang all-at-once implementation of the Siebel CRM solution, rolling the CRM application out in phases while reaping immediately apparent benefits. Indigo managed to adopt best-practice processes and out-of-the-box functionality, keeping customization of the CRM application to an absolute minimum, while mobilizing users to embrace the CRM application. The phased out-of-the-box approach was associated with minimum effort, leading to maximum business returns, early management sponsorship, and smooth upgrades. [PUBLICATION ABSTRACT]

Full text:

Headnote

Abstract

Automation of Customer Relationship Management (CRM) is among the most prevalent Information Technology (IT) implementations in recent years. This paper describes the case of a low-budget CRM implementation at The Indigo Division of HP, a leading innovator in the digital printing press industry. Indigo avoided a big-bang all-at-once implementation of the Siebel CRM solution, rolling the CRM application out in phases while reaping immediately apparent benefits. Indigo managed to adopt best-practice processes and out-of-the-box functionality, keeping customization of the CRM application to an absolute minimum, while mobilizing users to embrace the CRM application. The phased out-of-the-box approach was associated with minimum effort, leading to maximum business returns, early management sponsorship, and smooth upgrades.

Keywords: Customer Relationship Management (CRM), Sales Force Automation (SFA), implementation strategy, implementation project, phased implementation, upgrade project, out-of-the-box functionality, best-practice processes.

INTRODUCTION

Before Year 2000, companies spent considerable effort on Enterprise Resource Planning (ERP) systems for automating back-office functions as finance, manufacturing, distribution, human resource management. Since the turn of the century, however, many businesses are looking to leverage Information Technology (IT), in general, and Customer Relationship Management (CRM) systems, in particular, for automating front-office functions as sales, marketing, and customer-service processes (Butler, 2001). In the absence of consensus about the definition of CRM, this case study focused is on automation of the sales force, the most prevalent function in mid-size CRM Implementations (Younker et al., 2004).

As organizations are facing increasingly stronger competitive market pressures, there is a growing need to deploy CRM systems for improving sales effectiveness, expanding distribution channels, raising sales productivity, and increasing revenues. However, some CRM computing initiatives have failed to yield enough business value to justify the invested effort (Boslet, 2001; Conner, 2000). Based on past ERP implementations that spun out of control, grew out of scale, and consumed more cash, time and human capital than anticipated, it is possible to draw the following valuable lessons (Sweat, 1999):

* More user involvement is better than less involvement

* Short implementation projects are better than drawn-out projects

* Light customization is better than heavy customization

* A tight focus is better than a wide-reach focus.

This teaching case study, about implementation of the Siebel CRM solution at the Indigo Division of HP, a leading innovator in the digital printing press industry, aims at substantiating these lessons in the CRM context rather than at introducing new theories, as do research case studies. The next section is devoted to an overview of Indigo, the implementing company, and the third section describes the business and IT challenges faced by Indigo prior to the CRM implementation. Following the fourth section, which describes the case facts, the final section contains concluding remarks for practitioners.

COMPANY BACKGROUND

Founded in 1977 and acquired by the Hewlett-Packard (HP) Company in March 2002, Indigo operates as the Indigo Digital Press Division within HP. The CRM implementation described in this case study took place in years 1998 - 2001, prior to Indigo's acquisition by HP, and the overview included in this section reflects the situation then. Indigo is a global company: its headquarters are in the Netherlands ("Indigo Europe"), its R&D and manufacturing facilities in Israel ("Indigo Israel"), it has a subsidiary in the US ("Indigo America"), its sales offices in North America and Europe employ 150 sales representatives in charge of direct sales, and it has a network of distributors (see Figure 1).

View Image -   Figure 1: Indigo's Distribution Channels in 1998-2001

Indigo was first in market to introduce a top-quality digital printing press and remains a leading innovator in the digital printing industry. Indigo's Digital Offset Color technology combines the quality of ink-based offset printing and the performance advantages of electronic imaging. The printing presses that Indigo produces vary in speed, number of colors, print quality, and other features. In addition to these products, Indigo markets proprietary ink, thus providing solutions for commercial print shops. Indigo also sells industrial applications like packaging, plastic cards and labels. Indigo sells to customers in over 40 countries, including commercial printers, quick-printers, in-plants, packaging plants, and labels printers.

View Image -   Figure 2: Sales force organization chart for North America in 1998-2001

As seen in the sales-force organization chart depicted in Figure 2 above, the commercial-printing market includes four geographic regions: East, South, Central, and West, but management of the industrial-printing market is for the entire North America. Smaller geographical areas in every commercial branch typically employ one area manager for every 3 to 5 sales representatives. Most of the sales representatives work out of their home office, covering a well-defined geographic region and spending most of their time on the road. The sales-force organization for Europe has a similar structure, with the commercial market divided by country (e.g. Italy, France, Germany, and UK) and the industrial market managed centrally for the entire Europe. As can be seen in Table 1, while Indigo's revenue figures have grown steadily since 1994, except for a slowdown in the mid 1990s, the number of employees has grown back to where it was in 1994 when revenues were lower.

View Image -   Table 1: Indigo's Revenue and Employee Figures in 1998-2001

CUSTOMER RELATIONSHIP MANAGEMENT BEFORE 1998

To support its manufacturing, logistics, and supply chain operations, Indigo successfully implemented QAD MFG/Pro ERP application in Israel, in 1991, and in the Netherlands and in the US subsidiary, in 1994. This application, however, was not capable of supporting the sales and marketing functions.

In 1998, Indigo's management became concerned with the effectiveness and productivity of its sales force and faced a number of business challenges (see Figure 3). First, it sometimes took more than 12 months to close a sale. It was impossible to shorten the very long sales cycle and close sales faster, in the absence of a capability to analyze the sales process and identify its bottlenecks. Second, being remote from the geographically spread out sales force, sales managers needed a clear-visibility capability regarding whether subordinates spent their time wisely and focused on the right prospects. Third, the productivity of sales representatives was not high enough. To increase productivity, Indigo needed to provide its sales force with relevant data and tools to help them focus on selling the product, rather than spending time on gathering information from the main office. Fourth, due to Indigo's expansion into new markets, a relatively high number of new recruits joined the sales force, and their training and orientation took as long as several months. Indigo needed the capability to transfer account history and information about leads to new sales representatives as quickly as possible. Fifth, Sales representatives maintained their forecasts on spreadsheets, hand-written notes, and sometimes even on the back of envelopes. Their managers collected these forecasts by phone or e-mail, compiled them into a consolidated list, and communicated to higher levels of management. As a result, keeping track of sales and leads and accurately forecasting sales was extremely difficult and Indigo needed a capability to generate accurate sales forecasts quickly.

These business challenges, led top management to conclude that Indigo needed an automated tool to increase its sales-force effectiveness and productivity, streamline marketing and sales processes and, improve tracking of new leads. In 1996, Indigo made a considerable investment in implementing a Sales Force Automation (SFA) system based on Lotus Notes aimed at supporting the Sales and Customer Support organizations in North America and Europe. This CRM implementation attempt failed unfortunately, due to extensive customization, lack of senior management support, and technical difficulties, and Indigo was left without an effective CRM solution.

View Image -   Figure 3: Business challenges

CASE DESCRIPTION

Decision Making Leading to the CRM Implementation

By early 1998, top management at Indigo recognized the immediate need to try again and implement a CRM system. At the time, the CRM market was still shaping up and even the CRM term itself was not yet rooted. Gartner Group's strategic analysis report denoted this market as Technology-Enabled Selling, describing it as "immature, fragmented and unstable" (Close et al., 1997). The main players in the CRM market in 1998 were Clarify (acquired later by Amdocs), Vantive (acquired later by PeopleSoft and recently by Oracle) and Siebel (acquired recently by Oracle). In June 1998, the CFO had charged the IT Department with leading the implementation of a CRM system at Indigo. This meant engaging in accelerated evaluation and implementation processes in order to meet an aggressive deadline for CRM rollout.

For the evaluation processes, Indigo formed a small vendor-selection task force to select the optimal CRM solution. This task force began its mission by considering the Lotus-Notes application, which was the least expensive option since Indigo already paid for the software purchased two years earlier but still needed heavy customization to fit Indigo's needs. Other than the Lotus-Notes application, the vendor-selection task force became aware that market studies from Gartner group and Forrester Research rated Siebel not only to be the undisputed market leader but also to be financially stronger than its competitors. In addition, the task force found Siebel to have, relative to its competitors, comparable software license costs, stronger support for sales functions and a richer user interface. Moreover, given the past failure to implement a CRM system that required customization, the task force viewed the good fit between the Siebel application and Indigo's needs to be another significant relative advantage. In a quick evaluation process, which included demonstrations of both Siebel and Lotus-Notes solutions, the task force recommended Siebel because of its full-blown functionality, out of the box, and its intuitive user interface.

The next step, in July 1998, was to form a steering committee, which included senior managers from the Sales, Marketing and the IT Departments (see Figure 4). In addition, the Director of Marketing in Europe became the project leader and the second author of this paper became the IT project manager and IT analyst for the CRM application. Two marketing professionals, one in the US and another in Europe, took charge of the help-desk and training activities at their respective locations and Indigo hired a database administrator to administer the CRM database. Finally, a Technical Account Manager from Siebel helped the team with the deployment of Siebel's Rapid Application Deployment (RAD) methodology. At the request of senior management, the IT Department made a commitment to complete the CRM implementation project within 3 to 6 months and under $100,000 (not including license costs). Indigo America's president insisted on keeping the CRM system simple and his message to the project team was "Take us from Boston (MA) to Providence (RI) - not to the moon and back." Project team members highly valued top-management sponsorship and involvement in the CRM implementation in the matter project scope and simplicity as well as in other matters that required top-management attention and interference.

The project team kept the Siebel application simple and easy to use not only because of top-management guidance but also because they attributed the failure to implement the Lotus-Notes application to the fact that sales representatives found it too complex and confusing,. By keeping the current CRM application simple and easy, they were hoping to achieve results fast and, to gain user buy-in. They also aspired to effectively manage change, even for users who seemed unhappy to share information, were not computer savvy, or could not foresee the CRM benefits (Agnew, 2000). To keep the implementation project within the budget and time limits and to reduce implementation risk, the project team opted for out-of-the-box functionality and minimized customization. By minimizing customization, they also hoped to increase manageability of maintenance and to lower future investment in upgrades. The project team considered a big-bang implementation approach, launching all application modules at once, too risky and preferred a phased approach. By deciding to phase the implementation project, which seemed less daunting and more manageable, they were hoping to generate good will among business executives. According to Palvia, et al. (1991) as well as Eisenfeld and Zrimsek (2004), combining a phased approach with low complexity of scope is safer in most cases.

View Image -   Figure 4: Project Team Structure

The project team also decided to contain the implementation risk by rolling out the system by region, in North America first and, only if successful, in Europe, thus building in a key checkpoint to assess the project status before making further investments in software licenses. Another important decision taken prior to the implementation project was to involve users in all implementation phases by constantly consulting with sales representatives and managers and making sure that the system was meeting their needs. By involving users in all deployment phases and by making them feel that their feedback was important for the system to answer their needs, the project team was hoping to gain users' buy-in. Finally, the project team decided also that the objective of training would be to educate sales representatives about the importance of the system to the organization and not only about how to use the system.

The CRM Implementation Project at Indigo

In July 1998, following the short decision-making process described above, the CRM implementation project began, using Siebel's Rapid Application Deployment (RAD) methodology. The first RAD task was to scope the project in order to focus on the main issues. Scoping meant listing only three objectives: 1) deploying a closed-loop sales process, 2) increasing sales-force productivity, and 3) producing reliable sales forecasts. In retrospect, this was a crucial step since these three objectives served as the basis for decision making later on.

Given the decision not to fit the software to support existing sales processes at Indigo, it was necessary to include in the design phase process re-engineering and standardizing on common sales processes worldwide. Although the sales processes in Europe and US were very similar, the VP Sales in US and VP Sales in Europe were unable to reach agreement on a common set of sales stages until Indigo America's president intervened and the VPs reached an agreement on a common sales process worldwide. Another challenge during the system design phase was to uniformly define sales by postal zip codes rather than let each branch define its territories differently, with some territories defined until then by cities, some by counties, and some by major routes and highways. Part of the system design effort was to convert existing definitions of each territory to definitions by postal zip codes.

Application construction and development started in August 1998, with the objective of making the application easy to use, eliminating features and fields not required by Indigo's sales processes from screens and consolidating some of the views. In parallel, adaptation of the user manual and the training materials to Indigo's sales processes began. Upon completion of the development, a pilot run began in October 1998 with a group of six sales representatives and their manager in the US. The pilot went well with only minor modifications were required.

By the end of October 1998, the training materials were ready in English and translation into different languages commenced. The month of October 1998 was also devoted to developing data migration processes for importing accounts, contacts, and activities from different data sources. This process revealed many duplicate accounts and contacts and led to employment of the DataFlux data quality tool to identify and filter out duplicate records.

In November 1998, the project team began rolling out the system to production in a phased manner, every week to a different sales branch in North America. The first rollout step was to map the branch territories and organizational structure. The second step was to import data from different sources. The third was to install client software on user laptops. The fourth step was user training and support. The phased rollout allowed dealing with a small user group at a time, giving individual attention to every sales representative, to make sure that each becomes a successful user and an avid CRM supporter. A pilot in Europe started around the same time, with the objective of making sure that the system met all the needs for the European organization. Despite the very good feedback from the pilot team and Indigo Europe's management, due to the holiday season in December 1998 and January 1999, the rollout to production in Europe began in February 1999, thus completing the rollout worldwide within 9 months. Table 2 displays the implementation costs.

View Image -   Table 2: Project Costs

After the application was up and running, some branch managers were reluctant to use the new CRM system themselves and failed to motivate the sales representatives under their supervision to use it. To overcome these signs of resistance, the Chief Operations Officer sent a clear message to the entire sales organization, stating that: "if it is not in (the) Siebel (database), it does not exist" and demanded submission of CRM-generated sales reports. Middle management, at the same time, adjusted and expanded company policies and procedures to motivate the sales force to use the system. For example, a newly instituted procedure within Indigo required sales representative to enter key information for each prospect into the CRM database in order to get approval for a demo visit with that prospect.

The CRM upgrades at Indigo

For the sake of stability, cost savings, and user satisfaction, Indigo decided at the end of 1999 to avoid upgrading to the next version of Siebel and wait for the release of the next version. In November 2000, Indigo started the efforts toward upgrading to the new Siebel 2000 version. Part of this effort involved conducting a user satisfaction survey, asking sales representatives worldwide about things they liked and disliked about the CRM system (see survey results in Appendix A). Overall, the survey results not only showed that users were satisfied but also provided the upgrade team with a list of needed improvements. For example, streamlining processes, defining a single intuitive way to perform a task, and dealing with flaws in specific views and processes, minimizing data entry time by defaulting values, validating data entered before executing a transaction, and increasing processes automation. Satisfaction with the CRM application, led to many requests from different departments to integrate additional business processes into the upgraded system, such as a new functionality requested the Contract Administration department, to allow them to manage a customer order within the CRM application from the time that the it is signed until revenue is recognized. The decision to avoid customization during the initial CRM implementation paid off and the first upgrade project, to the Siebel 2000 version, was quick and straightforward.

The upgrade team scheduled the rollout of the first upgrade for January 2001, to coincide with the yearly sales kick-off meetings in Europe and in North America, which presented an opportunity for the upgrade team to interact with all the users in several ways. During these meetings, the upgrade team installed the new software version on all users' laptops and trained them with regard to the capabilities of the upgraded system. They also distributed a quick reference guide, which highlighted all the major changes between the old and new version. After these meetings, the upgrade team updated the original User Manual for Siebel and enhanced its contents. Following translation and publication, the new user manuals were ready for distribution to the entire sales organization.

The salespeople and the contract administration group received the upgraded version very well. Integrating the contract administration processes into the CRM system also benefited senior management since the sales contract information led ultimately to accurate sales pipeline reports. In parallel to the first CRM upgrade project, the IT Department worked on developing consolidated CRM reports from different data sources, including Siebel and MFG/Pro, to provide a 360-degree view of the customer. These reports show complete customer information - identity, behavior, and sales and service history - enabling Indigo to focus on the customer, analyze customer behavior, and identify different customer profiles. Thus, three years after the first rollout, the upgraded CRM system has become an integral part of the Indigo business processes. Figure 5 depicts the time line of the CRM implementation at Indigo from 1998 to 2001.

View Image -   Figure 5: Implementation time line in 1998-2001

In November 2002, Indigo began its second upgrade project to the new web-based Version 7.5. Due to significant changes in the architecture, database schema, business logic, and user interface, the upgrading process required considerable effort. Similar to the first upgrade, Indigo integrated additional business processes into the upgraded system - this time, focusing on the customer support processes which take place prior to installation of the digital press. As opposed to the first upgrade, however, it was impossible to train the salespeople face to face, and therefore the upgrade team ran several web-training sessions from remote. At first, the salespeople resisted the June 2003 roll out of the second upgrade, mainly since they found the new web-based user interface somewhat confusing and slowing their work. Following additional training sessions offered to clarify key points of confusion and to educate users about the advantages of the new version, salespeople overcame the initial confusion and quickly returned to the same activity levels as prior to the upgrade.

CONCLUDING REMARKS

Despite more intense competition, Indigo continues to maintain its leadership in the Digital Printing Press market. As revealed in Table 1 above, the revenues of Indigo grew substantially since the CRM first rollout in 1998 and continued to grow after HP acquired Indigo in 2001. While it is difficult to establish a cause-effect relationship, it is plausible that the CRM system may have contributed to this growth since it does provide many benefits to Indigo. First, one central database contains real-time data about customers and prospects which is shared across the entire organization and consumes fewer resources than a distributed one. Second, sales productivity has increased since sales representatives can now find all the information they need in one database and can spend most of their time selling while their managers can better manage them due to improved communication. The Sales Effectiveness Benchmark, which defines a recommended benchmark for each type of activity (e.g., eight cold-calls per week) and allows analysis of weekly activities of sales representatives against the benchmarks, has been one of the new processes implemented within the CRM solution that contributed to sales-force productivity. Now, managers can monitor and control activities of sales representatives and performance determines compensation. Creation of special views and reports within the CRM application to support the SPIN sales methodology, which Indigo implemented to improve the performance of the sales organization, has also increased sales-force productivity by allowing better understanding prospects' needs.

Another benefit of the CRM application pertains to information availability and data quality. Managers find value in accessing up-to-date reports on the web from any place in the world at any time. Informative sales reports are available for senior management, including the sales pipeline reports and the sales forecast reports, which show a consolidated view of worldwide sales and offer drill-down capability by country, branch, and even opportunity level. After sending the entire accounts database to a Dun &Bradstreet (D&B) service bureau to match Indigo's accounts with the D&B database and provide company profile information, there was a significant improvement in data quality to the satisfaction of the sales representatives. Maintaining this data-quality level required enhancing every new lead with the D&B information. To this end, Indigo had licensed iMarket, a D&B product, which allows Indigo to qualify new leads quickly and augment the leads data with up-to-date D&B information. Sales representatives have been excited with improved leads quality and became confident with the quality of data in the CRM database overall. In May 1999, not long after the CRM application went live, its positive effect on lead distribution became apparent during the Drupa trade show, the most important event in the Printing industry held every four years in Germany. By participation in this show, Indigo aims at producing new leads. Having an effective CRM system helped to distribute the new leads quickly and effectively to the field and then track the leads progress. The CRM system can automatically alert the sales representative if handling of a lead is not timely, ensuring that no leads fall through the cracks. Finally, the CRM system allows tracking leads by their lead source, and helps analyzing the ROI on different marketing campaigns.

More than six years of successful CRM implementation at Indigo, it is possible to summarize in Figure 6 the key takeaways for practitioners, as already explained above within the case history.

View Image -   Figure 6: Key Lessons Learned from the CRM implementation at Indigo
References

REFERENCES

1. Agnew, M., (2000) "CRM Tools Offer Sales-Force Solutions," Information Week, August 21, 2000, http://www.informationweek.com/800/sfa.htm.

2. Boslet, M. (2001) "CRM: The Promise, the Peril, the Eye-Popping Price," The Industry Standard, August 6-13, 2001, pp. 61-65.

3. Butler, S., (2001) "CRM Report," eMarketer, www.emarketer.com.

4. Close W., Golterman J., Sondergaard P., Scherberger K., Block, (1997) "Technology-Enabled Selling Vendor Selection: Making Decisions in an Uncertain Market", Gartner Group, April 1997, R-900-108

5. Conner, D., (2000) "Managing The Human Aspects of CRM Projects: Installation vs Realization," ODR.

6. Eisenfeld, B., Zrimsek B., (2004) "Critical Success Factors for Implementing CRM", Gartner Research, June. TG-23-0316.

7. Palvia, S., Mallach, E., Palvia, P., (1991) "Strategies for Converting from One IT Environment to Another," Journal of Systems Management, Oct 1991, Vol. 42, No. 10, pp. 23-27.

8. Sweat, J., (1999) "Learning Curve: Savvy companies apply the painful lessons learned from implementing enterprise resource planning software to next-generation applications", InformationWeek, August 2, 1999

9. Younker E., Close W., Eisenfeld B., (2004) "Management Update: Six Trends in Midsize Business CRM Implementations", Gartner Research, June. G00121623

AuthorAffiliation

Nava Pliskin

Ben Gurion University of the Negev

PliskinN@BGUmail.BGU.ac.il

Ronnie Ben-Zion

Hewlett-Packard Company

Ronnie.Ben-Zion@HP.com

AuthorAffiliation

Nava Pliskin is full professor at the Department of Industrial Engineering and Management Ben-Gurion University in Israel and is in charge of the Information Systems (IS) programs. Previously she was a Thomas Henry Carroll Ford Foundation Visiting Associate Professor at the Harvard Business School. She earned her Ph.D. and S.M. degrees from Harvard University. Her research, focused on longitudinal analysis of IS implementations and impacts at the global, national, organizational, and individual levels, has been published in such journals as IEEE Transactions on Engineering Management, ACM Transactions on Information Systems, The Information Society, Communications of the ACM, Decision Support Systems, Information & Management, and Database.

Ronnie Ben-Zion is the Business IS Manager at the Indigo Digital Press Division of Hewlett-Packard Company, where he is responsible for the design, development, and implementation of the Siebel CRM system and the Customer portal website worldwide. He earned his MBA degree from Boston University and his B.Sc. in Industrial Engineering and Management from Ben-Gurion University.

View Image -   Appendix A
View Image -   Appendix A
View Image -   Appendix A
View Image -   Appendix A

Subject: Customer relationship management; Salesforce automation; Best practice; Printing machinery; Divisions

Location: United States--US

Company / organization: Name: Hewlett-Packard Co; NAICS: 334111, 334119, 334611, 511210

Classification: 8670: Machinery industry; 5240: Software & systems; 9190: United States

Publication title: Journal of Information Technology Case and Application Research

Volume: 7

Issue: 4

Pages: 53-69

Number of pages: 17

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Ivy League Publishing

Place of publication: Marietta

Country of publication: United States

Publication subject: Computers--Data Base Management, Computers

Source type: Scholarly Journals

Language of publication: English

Document type: Feature, Business Case

Document feature: Diagrams Tables References

ProQuest document ID: 214895155

Document URL: http://search.proquest.com/docview/214895155?accountid=38610

Copyright: Copyright Ivy League Publishing 2005

Last updated: 2011-09-01

Database: ABI/INFORM Complete

Document 9 of 100

A PROPOSED CURRENCY ARRANGEMENT FOR PALESTINE

Author: Armstrong, Vaughn S; Boyd, Cody G; Gardner, Norman D

ProQuest document link

Abstract:

This case deals with a country's currency regime, that is, its arrangements regarding the currency to be used in the country. The objective is to introduce students to the different currency arrangements that are possible and to the advantages and disadvantages of each, to provide them with additional experience researching international topics on the internet, and especially to the use of information available through the International Monetary Fund and the World Bank.

The case is appropriate for use in an international economics or international finance class. Some aspects, e.g., those that deal with managing currency value, may be of inter est to an advanced macroeconomics class. The case has a difficulty level of four, and should take one or two class hours for discussion. Students will require four to six hours of preparation time.

Full text:

CASE DESCRIPTION

This case deals with a country's currency regime, that is, its arrangements regarding the currency to be used in the country. The objective is to introduce students to the different currency arrangements that are possible and to the advantages and disadvantages of each, to provide them with additional experience researching international topics on the internet, and especially to the use of information available through the International Monetary Fund and the World Bank.

The case is appropriate for use in an international economics or international finance class. Some aspects, e.g., those that deal with managing currency value, may be of inter est to an advanced macroeconomics class. The case has a difficulty level of four, and should take one or two class hours for discussion. Students will require four to six hours of preparation time.

CASE SYNOPSIS

One decision a country must make regarding its economy is what type of currency regime it will adopt. That decision and the world's response to the stability or weakness of the country's currency can dramatically affect the lives of its citizens.

Countries have been relatively active in the last several years in changing and adjusting their currency regimes. Students are likely to be aware of some of those changes; e.g., the euro was introduced as a cash currency replacing the national currencies of twelve European countries, Ecuador and East Timor "dollarized", and Argentina abandoned its currency board, adopting a floating currency regime, all in 2002. Students may also know that China recently adjusted its dollar "peg", that Turkey revalued its lira (1 new Turkish lira = 1,000,000 old Turkish lira), or that the Gulf Cooperation Council countries (Bahrain, Kuwait, Oman, Qatar, Saudi Arabia, and the United Arab Emirates) plan to unify their currencies in the next few years. Although students may have heard of the "gold standard" and of floating exchange rates, they will not generally be familiar with the variety of exchange rate regimes that a country can choose from, nor with the factors that affect the decision.

This case presents those issues in the context of a future independent state of Palestine. As the formation of an independent Palestinian state appears to be only a matter of time, the question of an appropriate currency regime is one that will, in fact, be answered in the not too distant future. This case allows students to evaluate the same question that policy makers governing Palestine will consider.

AuthorAffiliation

Vaughn S. Armstrong, Utah Valley State College

armstrva@uvsc.edu

Cody G. Boyd, University of Illinois

cgboyd2@uiuc.edu

Norman D. Gardner, Utah Valley State College

Utah Valley State College

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 2

Pages: 1

Number of pages: 1

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192411608

Document URL: http://search.proquest.com/docview/192411608?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 10 of 100

THIS PIZZA PARLOR'S FOR SALE

Author: Beggs, Joyce M; Jernigan, I E; Calvasina, Gerald E

ProQuest document link

Abstract:

The primary subject matter of this case concerns the human complexities of deciding whether or not to purchase a small business. Secondary issues are: determining the value of a business, evaluating the pros and cons of small business ownership, romance in the workplace, interpersonal relations, ethics, and small business management. The case has a difficulty level of four. The case is designed to be taught in one class hour and is expected to require one hour of outside preparation by students.

Full text:

CASE DESCRIPTION

The primary subject matter of this case concerns the human complexities of deciding whether or not to purchase a small business. Secondary issues are: determining the value of a business, evaluating the pros and cons of small business ownership, romance in the workplace, interpersonal relations, ethics, and small business management. The case has a difficulty level of four. The case is designed to be taught in one class hour and is expected to require one hour of outside preparation by students.

CASE SYNOPSIS

Ann graduated from college with Bachelors of Business Administration Degree in General Management. She was also recently divorced and had a settlement check from the separation of the marriage assets. She returned home to care for her ailing father and started to work part time for Antonio's Pizza. She is at a crossroads in her life and must decide what to do with her newfound freedom and education. Working at Antonio's is like going back in time since she worked there as a teenager. As a teenager, Ann had a crush on the owner of the pizza parlor. The pizza parlor owner asks her if she would like to buy the business. She is excited about the possibilities and plots strategy for the new establishment. The decision focus of the case is whether Ann should or should not purchase Antonio's Pizza.

AuthorAffiliation

Joyce M. Beggs, The University of North Carolina at Charlotte

jbeggs@email.uncc.edu

I. E. Jernigan, III, The University of North Carolina at Charlotte

ejernign@email.uncc.edu

Gerald E. Calvasina, Southern Utah University

calvasina@suu.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 2

Pages: 3

Number of pages: 1

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192411570

Document URL: http://search.proquest.com/docview/192411570?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 11 of 100

WHAT NEXT FOR KROGER?

Author: Bertsch, Thomas

ProQuest document link

Abstract:

This case focuses on the goals and strategy needs of the nation's largest grocery store chain. The subject matter is appropriate for courses in retailing, marketing management, marketing strategy, and management problems. The case is suitable for junior and senior undergraduate students and has a difficulty level of 4/5. It can be used for a 75-minute class discussion session, a take-home exam, or as the basis for team oral and written presentations.

Full text:

CASE DESCRIPTION

This case focuses on the goals and strategy needs of the nation's largest grocery store chain. The subject matter is appropriate for courses in retailing, marketing management, marketing strategy, and management problems. The case is suitable for junior and senior undergraduate students and has a difficulty level of 4/5. It can be used for a 75-minute class discussion session, a take-home exam, or as the basis for team oral and written presentations.

CASE SYNOPSIS

The Kroger Company has retail stores in 35 states. Its retail activities focus primarily on supermarket customers, wide assortment of grocery products, moderate assortment of services, low prices, many locations, and savings-oriented promotions. Management wants the company to continue to be the largest supermarket chain in the nation. However, Wal-Mart has become the largest seller of groceries in the nation, based on dollar sales. The company is also under pressure from discount membership warehouse chains and traditional supermarket chains. Consequently, adjustments are needed in Kroger's strategy. Students are asked which changes should be made in Kroger's publics, products, places, prices, promotions, processes, and performances.

AuthorAffiliation

Thomas Bertsch, James Madison University

bertsctm@jmu.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 2

Pages: 5

Number of pages: 1

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192411631

Document URL: http://search.proquest.com/docview/192411631?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 12 of 100

ENTERPRISE NATIONAL BANK: A STUDY IN COST CONTROL

Author: Bexley, James

ProQuest document link

Abstract:

The primary subject matter of this case concerns cost control. Secondary issues involve considerations of bank profitability; In addition, decisions must be concerning goals for the bank and how they relate to peer organizations. The case has a difficulty level of three, appropriate for junior level students. It is designed to be taught in two and one-half to three hours and is expected to take from four to six hours of student preparation.

Full text:

CASE DESCRIPTION

The primary subject matter of this case concerns cost control. Secondary issues involve considerations of bank profitability; In addition, decisions must be concerning goals for the bank and how they relate to peer organizations. The case has a difficulty level of three, appropriate for junior level students. It is designed to be taught in two and one-half to three hours and is expected to take from four to six hours of student preparation.

AuthorAffiliation

James Bexley, Sam Houston State University

jbbexley@shsu.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 2

Pages: 7

Number of pages: 1

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192411732

Document URL: http://search.proquest.com/docview/192411732?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 13 of 100

RYANAIR (2005): SUCCESSFUL LOW COST LEADERSHIP

Author: Box, Thomas M; Byus, Kent

ProQuest document link

Abstract:

On Thursday, May 26, 2005 Ryanair Holdings, PLC (Ryanair) celebrated its 20th birthday in a central Dublin hotel with a birthday cake and a party. At the celebration, Ryanir's CEO - Michael O'Leary - confidently predicted that Ryanair would overtake British Airways by carrying 3.5 million passengers a month in 2005. He went on to say, "The very fact that a Mickey Mouse Irish airline can start in a field in Waterford 20 years ago, and in 20 years, overtake the world' s self-styled, self-proclaimed favourite airline is testament to the demand for low-airfare travel around Europe." (Business Ticker, 2005)

Full text:

Headnote

CASE DESCRIPTION

The primary subject matter of this case concerns strategic management in the airline industry in Europe. Secondary issues examined include international marketing, operations management and business ethics. The case has a difficulty level of four or five and the case is designed to be taught in one ninety minute class session. It is expected that students will need to devote three to four hours of outside preparation for the class discussion.

CASE SYNOPSIS

Ryanair is a twenty-year old international air carrier based in Dublin, Ireland. It is now the largest low cost airline in Great Britain and Europe and has modeled its operations (since 1991) on the very successful Southwest Airlines Low Cost Leadership model. Ryanair's CEO - Michael O'Leary - is an accountant by training, but a combative entrepreneur by inclination. He has angered trade unions, government officials and competitor s with his "bare knuckle" tactics but has achieved dramatic growth and profitability in the very competitive airline industry.

As of the end of the year 2004, Ryanair was flying 25 million passengers annually with a staff of less than 2500 personnel. Ryanair flies only Boeing 737s and is rapidly transitioning to the newest 737 models - the 737-800. Challenges to the airline at the end of 2004 included escalating fuel costs, intensity of competition and the sometimes less than favorable attitude of the regulatory bodies in Great Britain, Ireland and the EU.

INTRODUCTION

On Thursday, May 26, 2005 Ryanair Holdings, PLC (Ryanair) celebrated its 20th birthday in a central Dublin hotel with a birthday cake and a party. At the celebration, Ryanir's CEO - Michael O'Leary - confidently predicted that Ryanair would overtake British Airways by carrying 3.5 million passengers a month in 2005. He went on to say, "The very fact that a Mickey Mouse Irish airline can start in a field in Waterford 20 years ago, and in 20 years, overtake the world' s self-styled, self-proclaimed favourite airline is testament to the demand for low-airfare travel around Europe." (Business Ticker, 2005)

EARLY HISTORY OF RYANAIR

Ryanair was founded in July, 1985 by Cathal and Declan Ryan with the financial backing of their father, Tony Ryan. The elder Ryan had, for many years, been Aer Lingus' leasing manager and had gone on to found Guiness Peat Aviation which eventually became the largest aircraft leasing company in the world. Ryanair began operations with a staff of 25 and a single 15-seat Bandeirante turbo-prop flying between Waterford and London. In 1986 Ryanair received permission from the regulatory authorities to begin flying four flights a day on the Dublin-London route with two 46-seat BAE748 turbo-props. In doing so, they challenged the high cost monopoly of British Airways and Aer Lingus with fares that were set at half the prevailing fare of £209. Ryanair's strategy (initially) was to offer simple, low-cost fairs and exemplary customer service. In 1986 (the first full year of operations) they flew 82,000 passengers and began negotiations to acquire their first jet aircraft and additional routes.

During the later part of the 80s Ryanair continued to compete vigorously with British Airways and Aer Lingus while adding additional routes and j et aircraft. By the end of 1989 Ryanair had 6 BAC-111 jets and 3 ATR 42 turbos. In 1990 Ryanair suffered a £20 million loss and was forced to completely restructure. A new, brash CEO - Michael O'Leary - was brought in to manage the turnaround and the Ryan family invested an additional £10 million. O'Leary, at the suggestion of Tony Ryan, visited Southwest Airlines in Dallas, TX to learn the fundamentals of Low Cost Leadership in the airline industry. Southwest, of course, was by far the most profitable of the American carriers and their business model was quite different than the traditional flagship carriers.

Gulf War I (Desert Storm) broke out in Ianuary of 1991 and airline traffic around the world collapsed. Despite the decline in overall airline traffic, Ryanair made a profit of £293,000 for the year and carried 651,000 passengers with a total workforce of 477 people. In May 1991, Ryanair switched its London base from Luton Airport to Stansted Airport in Essex. By 1999, Ryanair had added a number of European destination, had switched the aircraft fleet to Boeing 737s and carried over 5 million passengers - profitably.

INTO THE 21st CENTURY

In Ianuary 2000, Ryanair introduced Europe's largest travel website - www.ryanair.com. Within three months the site was recording 50,000 bookings per week The web site also facilitated car and hotel rentals, rail services and travel insurance at low prices. In September, the first new base since 1991 was established at Glasgow Prestwick (Scotland) and three new Boeing 737-800s were stationed there. The base provided Scots customers direct flights to Paris, Frankfurt, Dublin and London. In 2000, Ryanair carried over 7 million passengers with a workforce at year end of 1,262 people. Ryanair had, by the end of 2000, formalized its business model to include:

* All Boeing aircraft (primarily 737-800s)

* No "free" amenities such as snacks and drinks.

* Non reclining seatbacks.

* Quick flight turnarounds - averaging 45 minutes.

* An in-flight magazine that was really a catalog for food, beverage and a multitude on duty free products - sold at a considerable profit by the cabin attendants.

* Minimum baggage allowances.

In 2001, Ryanair opened its first European base at Brussels' Charleroi Airport with five more new Boeing 737-800s. Service was provided from Charleroi to Dublin, London, Glasgow, Shannon, Venice, Paris and Carcassonne (France). The agreement at Charleroi was negotiated with airport authorities at a considerable savings in landing fees and gate charges in addition to subsidies for Ryanair. Despite the cost advantages, many predicted failure for Ryanair because the airport is located about 65 km the capital (Brussels). This, however, was not the case. In August, the airline carried more than 1 million passengers - more than the total passengers carried in the year 1993. The terrorist attack of September 11th marked a downturn in airline traffic around the world and an enormous upward spike in the cost of oil - leading to substantial increases in operating cost for all airlines. Ryanair carried over 9 Million passengers in 2001 with a staff of 1,477 at year end.

Frankfurt (Hahn) was selected as the second European base in 2002. It was necessary to prevail in the German courts to overturn Lufthansa's high price monopoly of German aviation and customers responded enthusiastically. During this year, Ryanair increased an order at Boeing from 45 to 125 737-800s with an option for an additional 125 aircraft. In 2003, Ryanair acquired Stansted-based Buzz Airlines from KLM and as a result of the acquisition, got access to an additional 1 1 French regional airports. By 2004, Ryanair was the largest low cost airline in Europe flying almost 25 Million passengers with a staff (at year end) of only 2,288.

RYANAIR'S VISION AND MISSION

Ryanair does not publish a formal vision or mission statement, but in accordance with Jack Welch's advice, "Strategy is simply finding the big aha and setting a broad direction. . ." Michael O'Leary's broad direction - communicated in public statements - is to simply continue to be the largest Low Cost Leader in the European airline industry and to carry 50 million passengers by 2009. Implementing this vision is a function of many individual tactics including an absolute dedication to low cost performance in every element of the value chain, quick gate turnarounds, nonunion operations, performance-based incentive compensation plans, standardization on one type of aircraft and flying (in most cases) to secondary airports which provides significant savings for Ryanair.

BUSINESS ETHICS

Despite its remarkable success, Ryanair and particularly Michael O'Leary have been criticized on a number of issues. One of the areas of concern is human resource management. Ryanair is a non-union operation based in Dublin, Ireland. Ireland, of course, is a strongly pro-union environment. Taoiseach (head of the Irish government) Bertie Ahern described O'Leary's orientation toward labor as "tooth and claw capitalism" during the baggage handler's strike at Dublin Airport in 1999. In addition, compensation for pilots and flight attendants is comprised partly of salary and partly based on efficiency issues such as number of flight segments flown and, for flight attendants, amount of revenue generated from sales of items in the in flight magazine.

O'Leary has been a harsh critic of government officials in Ireland and Europe. He is particularly disdainful of officials at Aer Lingus (www.aerlingus.com) - Ireland's publicly owned airline and officials at the airline authority (Aer Rianta). As a result of the fees imposed by the Irish government, Ryanair has actually reduced the number of flights in its home country over the last four years.

A recent criticism of Ryanair was its refusal to supply wheel chairs for disabled passengers at Stansted airport. The airline argued that this provision was the responsibility of the airport authority and that 87 of the 93 airports that they fly to provide wheelchairs for those requiring them. In 2004, a judge ruled that the responsibility should be shared by the airline and the airport owners.

Perhaps the most significant (potentially costly) criticism of Ryanair was the deal they negotiated for landing rights at Charleroi. In February, 2004, the European Commission ruled that 4 million of the 15 million in incentives paid to Ryanair constituted illegal state aid. In October, Ryanair agreed to put 4 million in an escrow account pending its appeal of the ruling.

OPERATIONS

In 2004, Ryanair achieved a number of important milestones. They launched two new European bases (Rome and Barcelona) and added 73 new routes bringing their total to 150 routes. They took delivery of 18 new Boeing 737-800s and acquired a competitor - Buzz Airlines from KLM. In July 2003, they carried a record number of passengers - 2 million -and for the year out carried British Airways in the UK/European market. At the end of the year they had 2300 employees and an industry leading 10,049 passengers per employee.

INDUSTRY COMPETITORS

Aer Lingus Group PIc (AL) is owned (85%) by the Irish government. They fly about 7 million passengers per year to 50 destinations in Ireland, the UK, the US and Europe. In 2004 they generated $1,236, 900,000 in revenues with 3,906 employees. AL began flight operations in 1936 with De Haviland biplane, flying between Dublin and Bristol, England. In 1958, AL bought Aerlinte Eireann and began Atlantic service to New York City. The airline grew rapidly until 1993 when revenues and profits eroded substantially. A restructuring plan was introduced and the Irish government invested an additional 222.2 million in equity. Following the financial crisis related to the September 11, 2001 terrorist attacks, AL implemented a survival plan which included a staff reduction of over 2,000 employees, a pay freeze and sales of non-essential assets. The airline also adopted a new lower fare strategy which has resulted in significant increases in revenue and profits.

British Airways Plc (BA) is a very large, full service airline based in Hammondsworth, England. It traces its history back to 1919 when its predecessor, Aircraft Transport and Travel, launched air service from London to Paris. Today, BA flies to 1 54 destinations in 75 countries with a fleet of 300 aircraft. In 1998, BA invested $25 million in a new, low cost airline subsidiary named Go. Go was headed by an American woman, Barbara Cassinni, and had an eventful five year history till it was sold (in 2003) to Stelios Haji-Ioannou, owner of easy let, for $375 million. Interestingly, the market cap of BA is slightly less than the market cap of Ryanair - a much smaller airline.

easyjet Plc (EI) is primarily owned by Stelios Haji-Ioannou and began operations in 1995 when Stelios - as he likes to be called - was 28 years old. EJ began as a low cost airline, although it does offer some amenities not offered by Ryanair. In 1998, Stelios founded easyGroup to extend the low cost concepts used at easylet. easyGroup is invested in hotels, car rentals, internet cafes, credit cards and is constantly exploring additional opportunities. EJ flies 100 Airbus aircraft to 70 destinations and expects to fly 30 million passengers in 2005 in Europe and the UK.

Other competitors include Sir Richard Branson's Virgin Express, Lufthansa (Germany's flagship airline), Air France and the 60, or so, small airlines in Europe that have been created since the EU deregulated the airline industry in 1998.

CONCLUSION

It was March 17, 2005 - the start ofthe four day national holiday honoring St. Patrick, Ireland's patron saint-and Michael O'Leary was stretched out on a couch watching an old rugby match being replayed on the telly. On a yellow legal pad, O'Leary had jotted down issues that needed consideration at Ryanair: fuel prices, expansion to Eastern Europe, his future at Ryanair and the regulatory battles with Irish politicians and the EU.

REFERENCES AVAILABLE UPON REQUEST

AuthorAffiliation

Thomas M. Box, Pittsburg State University

tbox@pittstate.edu

Kent Byus, Texas A&M University - Corpus Christi

kbyus@cob.tamucc.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 2

Pages: 9-13

Number of pages: 5

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192411748

Document URL: http://search.proquest.com/docview/192411748?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 14 of 100

START-UP CULTURE AT TOPS

Author: Brown, Steve; Brewer, Peggy; Tabibzadeh, Kambiz

ProQuest document link

Abstract:

Dave Davig, a co-owner of TOPS, had just hung up the phone and was wondering what he should do. He just received a disturbing phone call from his partner, Terry Coffman. It seems one of their company's best supervisors, Sarah, who had been dismissed a couple of weeks earlier has filed a complaint with the local employment security office claiming termination without just cause and is asking to be reinstated with back pay. Even more disturbing was a letter they had received from a professor at a local university at which both partners taught. The content of the letter explained that the terminated supervisor was a student at the university and had complained to her professor that she had treated unfairly. The professor taught industrial psychology and was sure that Sarah had been a subject of sexual discrimination. In addition, the professor was known to the partners as an activist in the feminist movement and was encouraging Sarah to go to the newspapers with her complaint and encouraging her to bring suit against TOPS.

Full text:

Headnote

CASE DESCRIPTION

The primary subject matter of this case concerns personnel issues in a start-up company. Secondary subject matter includes HRM policies and procedures, organization culture, sexual discrimination, leadership, and discipline. The case has difficulty level of three (junior level). The case is designed to be taught in one class hour and is expected to require three hours of preparation.

CASE SYNOPSIS

Recently, a fired supervisor is claiming sexual discrimination in her dismissal involving alcohol. During her off hours, the supervisor had entered the building where she worked after a drinking bout with her friends. The owners had recently asked the manager to develop a personnel manual to provide guidelines for all their personnel's behavior. The store employed most young people, and the owners were concerned about the work environment. The manager had tried to create a culture that promoted fun, a high level of job satisfaction and company performance. The owners without proper leadership, polices and procedures this kind of atmosphere could lead to inappropriate behavior and mistreatment of employees. The dismissal also raises questions of progressive discipline, management's right to discipline employees of the job, social responsibility, hiring practices, andan open work environment.

THE TERMINATION

Dave Davig, a co-owner of TOPS, had just hung up the phone and was wondering what he should do. He just received a disturbing phone call from his partner, Terry Coffman. It seems one of their company's best supervisors, Sarah, who had been dismissed a couple of weeks earlier has filed a complaint with the local employment security office claiming termination without just cause and is asking to be reinstated with back pay. Even more disturbing was a letter they had received from a professor at a local university at which both partners taught. The content of the letter explained that the terminated supervisor was a student at the university and had complained to her professor that she had treated unfairly. The professor taught industrial psychology and was sure that Sarah had been a subject of sexual discrimination. In addition, the professor was known to the partners as an activist in the feminist movement and was encouraging Sarah to go to the newspapers with her complaint and encouraging her to bring suit against TOPS.

THE START-UP

TOPS was a drive-through fast food restaurant that had opened just six months before the termination incident occurred. Dave, a Small Business Development Director, had been approached by the owner of a well-known franchise to evaluate his plan to start opening smaller versions of the fast food chain. The proposed restaurant chain, Checkers, would have a limited menu, be strictly drive through, and sell ninety-nine cent hamburgers. Shortly after helping evaluate the proposal, Dave was approached by Terry Coffman with a similar idea. Terry's son, Bob, worked for a local food distributor who processed hamburger patties and sold them to local chain restaurants. The food distributor had his pulse on trends in the market and was gearing up for a growth in the type of fast food concept Dave had recently evaluated.

Dave and Terry had been business partners before, and Terry thought they should look in to developing a chain of their own. Terry's son had the inside information on who was planning to open up this type of restaurant, where they would be located, and what it would cost to build and operate one because the company he was working for would be a primary supplier. Terry felt they could catch the trend in its infancy and use his son's position and knowledge to gain an edge over the other start-up firms. After five months of planning, they opened up their first restaurant in late summer right before school started.

Although not a new concept, restaurants of this type were becoming popular. Within a year, six different companies had opened up fifteen new stores in the greater metropolitan area of Nashville, Tennessee, and similar operations were beginning to spring up through the southeastern and mid-western regions. Three other entrepreneurs had opened similar restaurants before TOPS opened theirs. Dave and Terry felt confident the insight his son had gained from the other start-ups would give them a big edge in the design and operation of their own restaurant. After a slow first week, business pick up to point where they had to have help from the local police directing traffic in and out of the establishment at lunch time.

HIRING PRACTICES

In their first venture, Dave and Terry hired only college graduates and individuals having advanced degrees. These employees were expensive and did not live up to expectations. They then agreed to hire only applicants that had a high school education or less and to hire mangers who had experience in the restaurant industry. Terry ' s son Bob was hired as TOPS general manager. He had a high school degree and experience as former manager of a local Golden Corral. He brought his former assistant at the Golden Corral on board to help him with the supervision and the firm's start-up phase. This proved to be a big help as they organized, developed job descriptions, pay scales, recruited, filled positions and trained new employees.

Many of the people they hired had former restaurant experience, but not all. Some of the other people hired were friends of Bob's. Unlike the hiring shortages experienced by other companies in the fast food industry, TOPS did not have a problem in hiring qualified people. The first store was located in a college town, and there were always plenty of students looking for jobs. In the beginning, most of the supervisory positions went to Bob' s friends. Over time attrition took its toll on both supervisors and other employees. However, the turnover at TOPS was considerably less than that at other local restaurants.

CREATING A FUN ENVIRONMENT

When setting up the business, Bob took pains to see that the average pay was slightly higher than TOPS' competitors. However, he did not attribute the relatively low turnover to the pay scale. The differential was just not enough to make a major difference in job satisfaction. Bob felt the difference was due to the "fun" work environment that he and the other supervisors had created. In keeping with the fun environment, Bob asked the partners if it would be all right for the managers to sponsor a Christmas party for all ofthe employees and hand out bonuses to deserving employees for their contributions to the restaurant' s overwhelming successful start-up. The partners reluctantly agreed to allow the party to be held in the company's commissary as long as there was no drinking. They did not want to be held liable for any alcohol -related incidents that might result. However, the partners suspected that some of the employees were sneaking drinks at the party. They discussed their suspicions with Bob and vowed never to sponsor another company Christmas party.

Almost all employees, including the managers and supervisors, were in their early twenties or younger. Teams of workers were created for each shift. It was a hot, crowded, fast paced work environment, but the teamwork resulted in a fun place to work. So much fun, in fact, that the work relationships spun into personal off-the-j ob relationships. As might be expected from a young group of men and women working in close quarters, there was a lot of bantering and pranks being played on one another. For instance, one of the employees stuck a quarter pound hot dog in a drinking cup and covered it with a condom, to the delight of most ofthe employees working on that shift. After a brief investigation, it was discover to be the act ofthe company ' s youngest female employee. This caused enough concern to Dave and Terry that they cautioned Bob about the fact that someone might be offended by the behavior taking place at TOPS and encouraged Bob to develop a personnel manual outlining policies and guidelines for recruiting, hiring, training, compensating, evaluating, and disciplining employees.

Bob created a policy/personnel manual patterned after those of other restaurants using materials furnished by the partners and had the manual reviewed by an attorney specializing in employee relations. Over time, the manual proved helpful in handling all types of personnel issues. Like all businesses, TOPS had personnel problems from time to time. Employees were late for work, and the high school kids were notorious for not showing up for work when it conflicted with a big school event. The manual/handbook was always referred to when disciplining this type of behavior. It also provided guidelines for dealing with on-the-job behaviors such as employee theft and not following health department rules and policies, which are crucial in the restaurant business. Bob distributed a compact version ofthe employee handbook for each employee outlining company policies, what was expected from them, and guidelines for behavior at work.

BOB'S LEADERSHIP

Bob's personality, personal demeanor, and leadership style also contributed to the positive work environment enjoyed by TOPS' employees. Over time, he rewarded good performance and replaced vacancies in supervisory position with individuals who showed initiative, enthusiasm, and loyalty. He was easy going, patient, empathetic, and impartial. He had to fire one of his best friends, a restaurant supervisor and the son ofthe county's attorney general, because he came to work intoxicated. Bob also had a soft spot for people who needed a hand up. He hired a mentally challenged individual to prepare condiments, but had to let the employee go because he had trouble using sharp objects and severely cut himself. Bob testified as a character witness for one ofthe minority employees who was being tried for an accessory to a robbery at a local convenience store. Later, this employee broke into a TOPS restaurant and did over four hundred dollars worth of mischievous damage. Bob also took pity on an ex-convict who was having trouble finding work and hired him to clean the store at night only to have to fire him because ofthe lewd remarks he was making to some of the female employees.

Bob felt bad about terminating Sarah for her behavior. She was the company's most competent supervisor and was well liked by everyone in the company. It was spring and she had been taking advantage of the warm weather and happy hour at one of the campus hangouts. Unfortunately, Sarah decided to come by and see her friends at TOPS on her way back home froma drinking bout. She used her master key to let herself in the rear door of the store and created quite a disturbance as she joked with the work crew and fell against the soft drink machine. The shift supervisor helped Sarah up and steadied her as she helped her out the back door. All employees were aware that drinking on the job or coming to work intoxicated was grounds for dismissal. This was especially true for supervisors who were expected to set examples for other employees. Bob felt his decision was clear-cut; after all he already fired one of his best friends for showing up for work intoxicated.

AuthorAffiliation

Steve Brown, Eastern Kentucky University

Steve.brown@eku.edu

Peggy Brewer, Eastern Kentucky University

peggy.brewer@eku.edu

Kambiz Tabibzadeh, Eastern Kentucky University

kambiz.tabibzadeh(S)eku.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 2

Pages: 15-18

Number of pages: 4

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192411658

Document URL: http://search.proquest.com/docview/192411658?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 15 of 100

JEFF GILLUM'S NEW VENTURE

Author: Brown, Steve; Loy, Steve; Randles, Theodore

ProQuest document link

Abstract:

Jeff Gillum was facing his greatest challenge since opening Players Club ten months ago. Most ofthe students had left school for the summer, and his revenues were drying up. Cash flow had become critical. Payments for this month's supplies and rent were coming due, and he did not have enough cash to cover them nor did he know where the money was going to come from. Jeff had no leverage for borrowing money and had maxed out his credit cards. He was considering throwing in the towel and closing his business.

Full text:

Headnote

CASE DESCRIPTION

The primary subject matter in this case describes the start-up process. It outlines the components of a business plan, the use of sweat equity and boot strapping, and how to manage cash flow. The case has a difficulty level of three and four. The case is designed to be taught in one hour of class time and should take three hours to prepare.

CASE SYNOPSIS

Jeff Gillum always had a dream to open a blues bar. When attending college he was a star athlete and scholar. While taking classes at school he developed two business plans for other entrepreneurs. A t the end of his first year in grad school, he approached one of his professors with a plan to follow his dream. Only the plan did not project any profits. He was discouraged from pursuing the idea and urged to return to school. Within three months, Jeff with a lot of sweat equity and his entire savings of three thousand dollars, was on the verge of opening Players Club near the campus. The case takes the student through the process of developing a business plan only to discover that it might not work. It shows how shear determination and ingenuity can bring a dream to reality only to discover that cash flow can be an over riding problem for a new business. When the students leave campus for summer break, revenues dry up, and Jeff is faced with the possibility of a shattered dream.

JEFF'S DILEMMA

Jeff Gillum was facing his greatest challenge since opening Players Club ten months ago. Most ofthe students had left school for the summer, and his revenues were drying up. Cash flow had become critical. Payments for this month's supplies and rent were coming due, and he did not have enough cash to cover them nor did he know where the money was going to come from. Jeff had no leverage for borrowing money and had maxed out his credit cards. He was considering throwing in the towel and closing his business.

JEFF'S BACKGROUND

Jeff grew up in Hazard, Kentucky where he was an outstanding athlete. His mother was a teacher in the Hazard school system, and his father owned a construction business. Jeff entered Eastern Kentucky University on an athletic scholarship and majored in business administration. He did not need the scholarship because his parents were independently wealthy and his grandfather owned a coalmine. However, he was independent and determined to make it on his own. Jeff was well known throughout the campus community, succeeding both as an athlete and scholar. Jeff became the starting quarterback on the OVC championship football team and a pitcher on Eastern's baseball team. In addition, he carried B plus average in his management major.

During his junior year he took a small business management class under Dr. Eric Davig where he wrote a business plan and participated in a SBI consulting project. Jeff also took the capstone class under Dr. Davig where he completed another field study by developing a strategic plan for a mobile home park in Louisville where his father was directing a construction proj ect. Jeff became excited about the possibility of becoming the park manager and a partner of the park's current owner as well as implementing the expansion plan that he had designed. He found out later the park's owner had no real intention of bringing him in as the manager or partner.

Jeff was not sure what he was going to do when he graduated. He decided that he might like coaching and started graduate school at Eastern majoring in business education. While he was attending grad school, Jeff became Dr. Davig' s assistant and participated in a regional small business research project. To further supplement his income, he became a bartender at one of the local bars. At the end of his first year in graduate school, Jeff approached Dr. Davig with a business plan he had developed to open a bar of his own in Richmond, Kentucky. If he did, he would likely have to quit school.

THE BLUES BAR

His concept for the bar was structured around a music theme. Although he was from Hazard, Kentucky in the heart of bluegrass music country, Jeff detested it. What he really liked was j azz and blues, and explained to Dr. Davig that he had dreamed for the past several years to open a blues bar. Jeff did not have much money saved up and wanted to know if Dr. Davig would be interested in partnering with him. It was obvious that Jeff had done his research because the plan was well thought out. He had sought out advice from a local beer distributor, other bar owners, his attorney, and real estate dealers.

However, the financial projections did not show the bar making money. When Jeff projected his revenues for his plan, he stood in front of the site he planned to locate the bar and counted cars. He figured he could get one percent of them to stop and come into Players. He combined this with an estimate of the spillover from other bars he had observer when bartending to predict the number of patrons he might expect. He combined the average number of patrons with the average expenditure of patrons in downtown Richmond bars to estimate his weekly revenue. Dr. Davig declined the offer and encouraged Jeff to go back to the drawing board and rethink his plan before quitting school.

Bar competition in Richmond was fierce. The city had a reputation as the place where students throughout eastern Kentucky came to party. Eastern Kentucky University almost always appeared on Playboy's list of top party schools. Business boomed on Thursday, Friday and Saturday nights. In the downtown area alone there were already eight bars that catered to the college crowd. All of these bars were within walking distance of Eastern's campus. Some of these bars had been there for years while others were start-ups. The ownership and names of the established bars changed frequently.

Dr. Davig returned from summer break expecting to find Jeff back at school ready to finish his master's degree. Within a week of his return, he received a call from Jeff asking him to meet at Players Club. This was a surprise to Dr. Davig. He thought Jeff had probably given up on the idea of opening up a bar because he did not have enough money to get the business started and did not anticipate positive cash flows for several years.

When he arrived at Players, Dr. Davig found Jeff and his father finishing up a homemade bar made out of glass blocks and plywood. The interior of the entire building was under construction. It had been a former office building owned by a local attorney. The building was not situated among the other downtown bars but close enough to get spillover from the other establishments and far enough away to avoid some of the crowding and rowdy behavior experience in the three block area where most of them were located. It met the zoning requirements for bars and was situated between the college and the other bars.

Jeff explained that he had this location in mind when he developed his business plan, but it was obvious that monthly rent was prohibitive and a major cost driver in his financial projections. He felt the location and smaller size would set his bar apart and establish Players as a more up-scale bar. Players did not have any off street parking, but neither did any ofthe other bars. However, it was located across from a city parking lot for a local bank, attorney offices, and retail shops. Since this lot was not being used at night, it would be available for his customers. Jeff envisioned a mix of patrons. He felt a blues bar would attract both students and Richmond residents. Still, the location was not as up-scale as Jeff would have liked. There was an old rundown rental house next to Players and a small old abandoned house immediately behind it.

BOOTSTRAPPING

It occurred to Jeff that the owner was asking too much rent for the building so Jeff conducted a rental survey ofthe surrounding business. He found rent was substantially less than what was being asked for the office building. When Jeff presented this to the owner, he was impressed with Jeffs initiative and agreed to a much lower rate and offered Jeff an option to buy the building. It had set empty for almost a year, and the building's owner was eager to have it rented. In fact, he agreed to help pay for part the renovation if Jeff would do the work.

To further save money Jeff convinced his father to take a few weeks off and help him with the renovation and convinced a couple a college students to help with the promise of free beer when he opened. Most of the renovation materials were salvaged from his Dad's construction sites, and the rest were bought with his father's construction discount. Tables and chairs were an odd lot, pieced together from what he could borrow from family and friends. Plus, he used the furniture he had accumulated as a student at Eastern. This included pictures, lamps, a hi-fi system, televisions, and his living room suite. Jeff also entered into an alliance with a pool table and electronic game distributor because he did not have enough to buy them. Rather than lease them, he agreed to share profits with the distributor.

To cut cost even further, he did his own plumbing and wiring. Unfortunately, this backfired because the city inspectors would not pass his work, and it had to be torn out and redone by licensed plumbers and electricians basically depleting his start-up capital.

In all, Jeff was able to start his new venture on just three thousand dollars of his own money. Jeff opened up, the third week of fall semester. He was disappointed in the number of customers he was able to attract. As he expected, he got some spillover from the other bars and a few of the Richmond residents, including local business and professional people, who knew Jeff personally. Jeff offered discount coupons in the student newspaper, posted messages on Players' marquee, and offered dollar beer specials. However, most of his business came from word-of-mouth and the spillover. Business picked up very slowly providing just enough cash to get by. Other bars had both beer and liquor specials, live bands, and food. He had a grand opening during homecoming and had a party for a lot of his buddies that he played football with. After the grand opening, business began to improve.

Unfortunately, Jeff, he no longer had enough money to rent an apartment. It was OK because he had moved most of his household furnishing into Players anyway. Since opening he had been sleeping on his couch in the bar after it closed. Jeff did not mind because he was running the bar by himself. When he got up in the morning, he cleaned the place up, restocked, and completed his bookwork. He was bartender, bouncer, janitor, and d-jay. Jeff worked hard to differentiate his bar from the others in the downtown area by doing his best to keep an up-scale atmosphere by playing a good selection of music using his own CDS, keeping the place spotless, upgrading the décor whenever possible, and prohibiting swearing and horsing around. He dressed the part. Jeff always showed up in casual business attire. His business continued to pickup as the year progressed attracting a small but loyal customer base, which he knew by name. Eventually, even some of his customers started dressing in casual business attire when they came into the club.

THE SUMMER SEASON

By the end of spring semester, things were looking up for Jeff. Business was good. Through his contacts, Jeff discovered that a piece of property near the new interstate exchange in Richmond was available and could be developed into a three hundred lot mobile home park. He put together a business plan similar to the one he put together for the Louisville park and sold the idea to a financial backer, only to get aced out on the deal by some local business men who had better connections. This happened just before Eastern adjourned for the summer. Jeff was very disappointed because the deal would have made him wealthy overnight.

Once summer school started, business fell liquor licenses, and the full quota had already been allocated. Jeff was sure he could double or triple his revenue in a month's time if he could serve liquor by the drink. Unfortunately, the last time a liquor license to make ends meet, Jeff contracted to install lockers ar a local school. This was not what Jeff had envisioned. It was hard running Players by himself while holding down a fulltime job.

AuthorAffiliation

Steve Brown, Eastern Kentucky University

steve.brown@eku.edu

Steve Loy, Eastern Kentucky University

steve.loy@eku.edu

Theodore Randies, Eastern Kentucky University

Ted.randles@eku.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 2

Pages: 19-22

Number of pages: 4

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192411699

Document URL: http://search.proquest.com/docview/192411699?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 16 of 100

JAVA & HOLES: AN INSTRUCTIONAL CASE TO REVIEW FINANCIAL ACCOUNTING AND COST OF CAPITAL CONCEPTS

Author: Burns, Clare D; Moss, Gisele J; Moss, Jimmy D

ProQuest document link

Abstract:

The primary subject matter of this case concerns a review of earnings per share, ratio analysis, and cost of capital concepts. A secondary issue includes evaluation of alternative strategies within the constraints of debt covenants. The case was designed to use as a review of financial accounting concepts in a MBA managerial accounting course. However, the case has a difficulty level appropriate for seniors or first or second year graduate students. The case is designed as a review and should be completed entirely outside of class. Depending on financial background, students will require approximately ten to fifteen hours to complete the case.

Full text:

CASE DESCRIPTION

The primary subject matter of this case concerns a review of earnings per share, ratio analysis, and cost of capital concepts. A secondary issue includes evaluation of alternative strategies within the constraints of debt covenants. The case was designed to use as a review of financial accounting concepts in a MBA managerial accounting course. However, the case has a difficulty level appropriate for seniors or first or second year graduate students. The case is designed as a review and should be completed entirely outside of class. Depending on financial background, students will require approximately ten to fifteen hours to complete the case.

CASE SYNOPSIS

The case describes a setting in which a company is examining several strategies in an effort to increase earnings per share. Java and Holes is a fictionalized version of an actual company. Students assume the role of an employee assigned to evaluate the effectiveness of these strategies in meeting management's objective, while continuing to meet the provisions of the company's debt agreements. In this role, students are required to perform analytical procedures by calculating financial ratios and weighted average cost of capital as well as consider other financial implications of the strategies from a managerial accounting viewpoint.

Java & Holes (the Company) is a publicly-owned corporation specializing in retail sales of premium quality donuts and gourmet coffee. They operate 400 stores across the United States and are located primarily in Metropolitan areas. The established stores consists of company owned and franchised store locations. In addition to selling their product on-premises, the company markets their product off-premises to convenience, grocery and discount stores under branded and private labels. Over the past 3 years, the Company has focused their expansion efforts into major markets. Management believes they have currently exhausted this strategy.

Because of the recent focus of Americans on low carbohydrate diets, donut sales have been below anticipated levels over the last 3 quarters, resulting in lower than projected earnings. Benjamin Hayward, Chief Executive Officer, called a management meeting to discuss potential strategies to increase earnings per share (EPS) to the projected level of 2004 of .95 per share. After extensive discussion of plausible strategies, management narrowed their focus to three options for further consideration: opening mini-cafes, closing or selling stores, and a treasury share buyback program.

AuthorAffiliation

Clare D. Burns, Lamar University

clare.burns@lamar.edu

Gisèle J. Moss, Lamar University

gisele.moss@lamar.edu

Jimmy D. Moss, Lamar University

jimmy.moss@lamar.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 2

Pages: 23

Number of pages: 1

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192411576

Document URL: http://search.proquest.com/docview/192411576?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 17 of 100

THE CASE OF THE DIMINISHING BUDGET

Author: Carter, Cynthia; Jones, Beth H; Jones, Gary H

ProQuest document link

Abstract:

"Connie, I need you to respond to this letter", Joyce Johnson said with obvious concern in hervoice. "Our agency is doing quite well, but we can't take a hit like this. A5 or 10 percent budget decrease would be terrible! " She hoped her accountant Connie Davis could help her avert disaster. Connie reached for the letter and noted it was from Whitfall County Area Services Authority (400 Billable Road, Grace ND, zip 67890) and dated two weeks earlier, 1/08/05. She was not pleased with what she read, although she wasn't too surprised given the weak state of the economy.

Full text:

Headnote

CASE DESCRIPTION

This case is primarily a writing assignment. The subject matter deals with a company's budgeted costs, specifically, discretionary vs. committed costs. The case has a difficulty level appropriate for sophomores or juniors in a business writing class or cost accounting class. The case is designed more as a homework assignment than for in-class discussion; if used in class it would take one 1-hour class period and is expected to require two hours of outside preparation by students.

CASE SYNOPSIS

In this case a bookkeeper for a not-for-profit agency is required to analyze her organization's costs and write a letter to the governmental funding agency that is threatening a budget cut. The goal of the letter is to convince this governmental agency not to decrease its support for their programs. A suggested approach is to explain the four expense areas, what costs are/are not discretionary, what would have to be eliminated in order to cope with a decrease in revenue, etc. Students are told "Your goal is to sound like a willing team player while making every effort not to have your budget cut".

CASE BACKGROUND

"Connie, I need you to respond to this letter", Joyce Johnson said with obvious concern in hervoice. "Our agency is doing quite well, but we can't take a hit like this. A5 or 10 percent budget decrease would be terrible! " She hoped her accountant Connie Davis could help her avert disaster.

Connie reached for the letter and noted it was from Whitfall County Area Services Authority (400 Billable Road, Grace ND, zip 67890) and dated two weeks earlier, 1/08/05. She was not pleased with what she read, although she wasn't too surprised given the weak state of the economy. The letter read:

Dear Ms. Johnson;

I am sure that you are aware of the difficult financial situation facing our nation, our state, and Whitfall County. The budget shortfalls are affecting the Area Authority and, in turn, may affect you as a contracted provider with the Whitfall County Area Services Authority. The purpose of this letter is to ask for your assistance and understanding in facing our financial challenges.

It is a distinct possibility that Whitfall County Area Services Authority will have a constricted budget for fiscal year 2005, starting this July. As a partner with the Authority, it is likely that you will be impacted as well. To prepare for this possibility, I am asking you to prepare an impact statement for two possible scenarios:

(1) A 5% across the board rate reduction in your 2005 contract.

(2) A 10% across the board rate reduction in your 2005 contract.

Please consider the ways that your agency can continue to provide maximum service under these scenarios. I am asking for you to please consider any alternative resources that may be available to you and your agency as we face this difficult challenge ahead. You know and understand your operation and will be able to determine how to lessen the impact of these potential changes.

I would appreciate receiving your impact statement by the end ofthe month. This will allow me to review potential resources and service availability against the developing budget. My goal is to meet a maximum of service needs within our allotted budget, and I am prepared to ask your assistance in doing so. Please contact me if you have any suggestions or questions. I also plan to be at the March 6th Quarterly Provider Information Sharing Conference and present on the State Plan and current budget situation. I hope to see you there. Thank you.

With sincere regards,

John P. Marshall

Area Director

As company accountant for Community Support Services (P.O. Box 828, Cold Mountain ND, 67888), it is Connie's job to prepare payroll, pay bills, monitor receipts, record transactions and prepare financial statements. Another important aspect of her job is to prepare the budget. She was going to have to look closely at the 2005 budget to make a case against having their contract rates cut.

A "contract rate" is the amount paid to Community Support Services (CSS) by the Whitfall County Area Services Authority for services provided by CSS. The service CSS provides is to run community residences for mentally and physically disabled persons. These residences have varying levels of supervision and care. (In Level I living conditions clients have the most independence, in Level III a much higher level of care is required). The income to run the houses and other properties comes from Whitfall County Services Authority, Social Security, and Medicaid. CSS receives no private funding, grants or other types of income.

CSS pays four types of expenses: Client Living Expenses, Personnel Expenses, Operating Expenses, and Administrative Expenses. Because CSS is a non-profit organization, any excess in revenues over expenses is spent on improvements. One goal of CSS is to own rather than rent its properties, so when possible excess funds are put toward the purchase of properties or paying off debt on properties already owned.

Client Living Expenses include rent, utilities, telephone, water and sewer, maintenance, and equipment for the properties where clients live. This category also includes client mental health care, pharmaceutical drugs, an allowance, and activities. Activities would include client outings such as the annual vacation, 4th of July cookout, Valentines party, Thanksgiving and Christmas parties, movies, bowling, dining out, etc.

The Personnel Expenses category includes salaries and workers' compensation insurance for the direct care staff, one direct care staff manager, one program director, two residential coordinators, one driver and one full-time qualified mental health professional (QMHP). The direct care staff works with the clients under the oversight of the direct care staff manager. The staff manager's job is a big one, as there is 100% turnover ofthe direct care staff annually. The residential coordinators oversee all sites. This includes regular visits as well as spot visits to the facilities during all shifts, scheduling and supervising staff, planning client activities, as well as covering direct care shift as needed. Additionally, they compile payroll information, maintain client funds and account records, etc. The QMHP must be on staff to approve all documentation of services submitted to Medicaid for payment. This paperwork covers each property, each staff member, for each client on a daily basis. Also included in the personnel expenses category are wages paid while each worker attends state-required mandatory training and any mileage allowance paid to them for using their personal vehicles for client transportation. The last budget item is the amount paid for alternative family living. This situation occurs when a client is placed in a host family's home, like a foster home. The family is paid a daily rate by CSS as an independent contractor (as opposed to being paid as an employee, with benefits and taxes withheld).

The third category of costs is the Operating Expenses. Operating expenses are the liability insurance, state-required mandatory training costs (paid to vendors), and the costs of the four company vehicles used for transporting clients. CSS owns a Dodge Neon, Chevy Malibu, Chevy Cavalier, and Chevy Van and budgets their lease, insurance, gas, and maintenance costs.

The last category of expenses is Administrative Expenses. This category includes salaries and benefits of Connie, Joyce, one office assistant, the required annual audit, and the costs of the office lease, insurance, utilities, phone, etc. for the administrative office. In non-profit organizations a normal administrative fee runs about 17% of revenues and CSS is no exception.

As Connie looked over her budget, wondering how the cost cuts could affect it, she knew several of the costs on her budget were committed, i.e., not easily changed. First, one guideline she was going to use was not to cut salaries. The organization would operate with fewer people before it would cut salaries and benefits across the board. With that in mind, she examined the Administrative Expense area. There were no possible positions to cut, and moving into another location was not feasible at this time. Actually, their rent was very reasonable because they had occupied the same location for several years and their rent increases had not kept pace with the market, plus it included utilities. Other operating costs such telephone and the annual audit were reasonable and necessary.

Were there any discretionary costs in the Operating Expenses area? Certainly the liability insurance was necessary, as was the mandatory training. "Could we operate with fewer vehicles?" she wondered. No, the program needed those vehicles. Not only were all four vehicles being used to meet current program needs (19 clients at 1 1 sites plus periodic services), but a new site with one additional client would be added by March 1, 2005. More program expansion was planned in the near future. She felt they would be doing well to continue getting by with only four vehicles.

That left two areas: Personnel and Client Living Expenses. Could they operate with fewer personnel? The direct care staff was only hired as needed, and with the 100% turnover rate annually, all hiring was done on an as-needed basis. Connie did not see how they could survive with fewer workers unless they fired one of the two residential coordinators. This would allow for a 5% budget decrease. If both residential coordinators were dismissed, the 10% budget decrease would be achieved. Connie shuddered to think of their program director's workload if CSS lost even one of their supporting residential coordinators, let alone both! If anything, with the planned growth, she would like to be adding another residential coordinator. Clearly, that wasn't a possibility now. In the Client Living Expenses area, Connie felt there were few discretionary expenses other than activities and allowances. Cutting down on activities such as picnics, outings, holiday festivities, etc. would be possible but not desirable.

Community Support Services Consolidated Programs Budget is presented below:

Revenue Breakdown:

ASSIGNMENT

Your task is to write a two to three-page single space letter, in good form, to Mr. John P. Marshall at Whitfall County Area Services Authority from Community Support Services (under Chief Executive Officer Ms. Joyce Johnson's signature). Your letter should discuss how the potential 5% and 10% decreases in revenue will impact CSS' budget. You are not required to prepare proforma budgets; you may respond verbally. A suggested approach is to explain the four expense areas, what costs are/are not discretionary, what you would have to eliminate in order to cope with a decrease in revenue, etc. Your goal is to sound like a willing team player while making every effort not to have your budget cut.

AuthorAffiliation

Cynthia Carter, Community Support Services

ccl5036@earthlink.net

Beth H. Jones, Western Carolina University

bjones@email.wcu.edu

Gary H. Jones, Western Carolina University

gjones@email.wcu.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 2

Pages: 25-29

Number of pages: 5

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192412194

Document URL: http://search.proquest.com/docview/192412194?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 18 of 100

THE PROPOSED MERGER OF AMERICA WEST AND US AIRWAYS: WILL IT FLY?

Author: Cobb, Richard; Gooding, Carl; Parker, Jeffrey

ProQuest document link

Abstract:

Wide swings in financial performance have been the pattern for the airline industry since the late 1970s. Operating profit averaged only 1.9% during the 1980s and 3.2% during the 1990s while operating losses have averaged over $5 billion per year since 9/11 (The Airline Handbook). Many industry analysts conclude that the restructuring of airline networks and fleets based on cost must be the central theme for the industry's long-term strategy for survival (Kangis and O'Reilly, 2003). Given this changing environment, what critical merger issues need to be addressed for these two airlines to best achieve lower operating costs through merger?

Full text:

Headnote

CASE DESCRIPTION

This case discusses a proposed merger between two major airlines - America West and US Airways. The primary objective of this case is to address the critical issues required either to support or reject a merger strategy. The case would be appropriate for the senior or first year graduate level Strategic Management course, and the case should work well as a team project. The case is designed to be taught in 1 class hour and is expected to require 3 hours of outside preparation by students.

CASE SYNOPSIS

In April 2005, America West and US Airways made a public announcement concerning a proposed merger between the two carriers. The information needed to support or reject this proposal is available from company, industry, and governmental sources and generally indicates that although the proposed merger partners operate in the same industry, they have very different operating characteristics. This case challenges students to analyze the critical strategic issues which the proposed merger partners must address to consummate successfully a merger.

INTRODUCTION

Wide swings in financial performance have been the pattern for the airline industry since the late 1970s. Operating profit averaged only 1.9% during the 1980s and 3.2% during the 1990s while operating losses have averaged over $5 billion per year since 9/11 (The Airline Handbook). Many industry analysts conclude that the restructuring of airline networks and fleets based on cost must be the central theme for the industry's long-term strategy for survival (Kangis and O'Reilly, 2003). Given this changing environment, what critical merger issues need to be addressed for these two airlines to best achieve lower operating costs through merger?

OVERVIEW OF THE AIRLINE INDUSTRY

The low profitability of the airline industry during the modern era was not evident during the growth years following WWII. However, with route structures and ticket prices controlled by the Civil Aeronautics Board (CAB), the airline industry began to record poor financial results during the 1970s. This factor in combination with growing public dissatisfaction with airline service quality led to the passage of the Airline Deregulation Act in October of 1978. This act placed the industry under the control of the Department of Transportation (DOT), an entity focused primarily on issues of operating procedures and safety. In this newly deregulated environment, the number of certified air carriers grew from 37 to 100 between the years 1978 and 1984 (The Airline Handbook). Many of these new carriers entered the market using low-cost models.

During the 1980s, most established carriers chose not to adopt low-cost models. Instead, they chose to employ innovative marketing and operational strategies to differentiate their service, attract business travelers, and entered the 1990s with the top ten major carriers controlling 90% of the market (Das and Reisel, 1997).

As the measured growth of the industry began to stabilize during the 1990s, airline analysts began to consider life-cycle effects. The 13% growth rate in passenger traffic recorded during the 1970s slowed to a 6% annual growth rate during the 1980s and then down to a 4.0% rate during the 1990s. As the industry matured, yield began to decrease, and the rate of passenger growth became equal to the rate of economic growth. The effects of a mature market led the major airlines to employ more aggressive yield management techniques aimed at business travelers.

INDUSTRY FINANCIAL CRISIS

A major industry recessionary cycle began in 2000 as business travelers began to seek alternatives to the increasingly higher and higher fares charged by the major carriers. Also, the terrorist attacks of 9/11 lead to a reduction in all travel and accelerated the industries decline. By 2004, the effects of the industry's worst financial downturn in history left low-cost carriers controlling 20% of the U.S. market (Velocci, 2004). In this environment of dramatic industry change, both merger partners seek the reorganization needed to support a low-cost operating network. In an interview with the Associated Press, David Bonner, CEO of the Retirement System of Alabama, a major investor in US Airways, concluded that because they would complement each other geographically, a combined US Airways - America West would compete better against discount carriers (Flynn, 2005). The CEO of America West, Douglas Parker, said that "the merger will create the first nationwide full-service, low-cost airline" (Reed, 2005).

Company Profile - America West Airlines

America West entered airline service in August of 1983. Based in Phoenix, the carrier expanded rapidly and achieved major-airline status by 1990 when, with over 12,000 employees, it generated annual revenues exceeding $1 billion. To grow during the early 1990s, the company added service and entered into cooperative agreements with several other carriers. By 1999, the company grew revenues to over $2 billion (Table 1).

Under the terms of the merger proposal, America West would retain managerial control, and the merged companies would retain the name of US Airways. Still, many issues remained to be addressed by the management team, including the mixture of aircraft types, creditor requirements, government oversight requirements, stockholder acceptance, and employee representation (see Table 3 & 4) (www.americawest.com).

Company Profile: US Airways

In 1939, US Airways began airmail service as All American Aviation. The airmail carrier grew and in 1949 added passenger service using modern DC3 aircraft to serve Pennsylvania and the Ohio valley areas. All American became Allegheny Airlines in 1953 and continued a period of growth through mergers and acquisitions that would allow it to reach sixth largest in terms of passengers. In 1979, following passage of the 1978 Airline Deregulation Act, Allegheny changed its name to US Air. During the 1990s, revenues grew (see Table 2) as additional transatlantic routes and new Airbus aircraft were added. US Air officially changed its name to US Airways in 1997.

The terrorist attacks of 9/11 were especially hard on US Airways and its east coast market concentration, which included Washington and New York. The company filed for Chapter 11 bankruptcy protection on August 11, 2002 (www.usairways.com).

CONCLUSIONS

Combined, these carriers would be the fifth largest when measured in terms of revenue passenger miles. However, with record high debt and overcapacity, size alone does not guarantee success in an industry that is restructuring to compete more on the basis of lower operating costs and higher quality.

ASSIGNMENT

Use data or information available from company, industry, and government sources to answer the following questions.

Question 1. Evaluate the internal and external environment and analyze major obstacles to making this merger successful.

Question 2. An increase of $1/barrel increases the merged airline's costs by $36M. The merger model was based on $50/barrel. At $66/barrel, how much does this increase the merged company's fuel costs? What options does it have to offset this increase?

Question 3. Does the data presented in the case indicate any areas wherein the merged management team may be able to improve overall operating results? The team would accomplish these improvements by applying differing managerial practices to the larger portion of the merged company which was US Airways?

References

REFERENCES

Das, T.K. & W.D. Reisel (1997). Strategic Marketing Options in the U.S. Airline Industry. International Journal of Commerce and Management, 7(2), 84-98.

Flynn, S. (2005). US Airways, America West in Advanced Talks. Retrieved April 21, 2005, from http://www.washingtonpost.com/ac2/wp-dyn/A4806-2005Apr20?1a.

Kangis, P. & M.D. O'Reilly (2003). Strategies in a dynamic marketplace: A case study in the airline industry. Journal of Business Research, 56(2003), 105-111.

Reed, D. & B. De Lollis (2005, May 20). America West, US Airways merger goes for a tight fit. USA Today, B1.

The Airline Handbook-Online Version (2003). Air Transport Association. Retrieved March 3, 2003, from http://www.airlines.org/public/publications/display.asp?

Velocci, A.L. Jr. (2004). In the Eye of the Storm. Aviation Week & Space Technology, 160(9), 42-44.

AuthorAffiliation

Richard Cobb, Jacksonville State University

rcobb@jsu.edu

Carl Gooding, Jacksonville State University

cgooding@jsu.edu

Jeffrey Parker, Jacksonville State University

jparker@jsu.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 2

Pages: 31-36

Number of pages: 6

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192411679

Document URL: http://search.proquest.com/docview/192411679?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 19 of 100

ACCOUNTING FOR CAPITAL FORMATION: FINANCIAL ACCOUNTING AND INCOME TAX ISSUES OF RELATED PARTY LOANS AT UNREALISTIC INTEREST RATES

Author: Coffee, David; Lirely, Roger; Swanger, Susan

ProQuest document link

Abstract:

This case illustrates the need for accountants to look beyond the mere form of how transactions are structured and to search for their economic substance if they are to achieve the objective of presenting financial statements which have representational faithfulness. The student is confronted with ethical issues and financial reporting and tax issues and must make judgments based on research and sound professional reasoning. The case has a difficulty level of five and is appropriate for graduate level or strong intermediate students.

Full text:

CASE DESCRIPTION

This case illustrates the need for accountants to look beyond the mere form of how transactions are structured and to search for their economic substance if they are to achieve the objective of presenting financial statements which have representational faithfulness. The student is confronted with ethical issues and financial reporting and tax issues and must make judgments based on research and sound professional reasoning. The case has a difficulty level of five and is appropriate for graduate level or strong intermediate students.

CASE SYNOPSIS

Blackaddr Extreme is in the planning stages as a start-up company with two key assets: (1) a patent for a revolutionary break-through molding process which will make it possible to manufacture Whitewater kayaks out of a very light and strong composite material of carbon fiber and other lightweight fibers; and (2) the financial backing of Steve Bullock, an adventure capitalist with substantial resources and a track record of successful entrepreneurial endeavors. Steve Bullock is an experienced and successful investor, and has some creative, and, at least from Steve's perspective, innovative ideas about the capital formation of Blackadar Extreme. The student is placed in the role of Donald Faircloth, a Certified Public Accountant who is asked to give an opinion as a consultant, about the proper financial reporting of Steve's proposed unorthodox transactions and how the proposed transactions will impact income taxes. Students must research generally accepted accounting standards in the financial accounting literature and research the federal tax code. They must make professional judgments based on their findings and make ethical judgments in arriving at a proposed solution.

AuthorAffiliation

David Coffee, Western Carolina University

coffee@email.wcu.edu

Roger Lirely, Western Carolina University

lirely@email.wcu.edu

Susan Swanger, Western Carolina University

swanger@email.wcu.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 2

Pages: 37

Number of pages: 1

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192411604

Document URL: http://search.proquest.com/docview/192411604?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 20 of 100

ONE STEP FORWARD, TWO STEPS BACK?

Author: DeLaat, Jacqueline

ProQuest document link

Abstract:

Iin Xiaoqin reached for a sip of her herbal tea and tried to calm herself. Her life had built in a crescendo to a point of decision, and like many Chinese women, the reality of having the power to make serious life choices was both new and anxiety producing. So far, she reflected, her story had been a largely fortunate one.

Born to rural parents in the early years of the People's Republic, her initial expectations had been modest. She dutifully attended school, even into the second and third levels not usually completed by girls, especially in the rural, mountainous areas such as hers. Now, of course, things were different in China, with higher numbers of girls enrolled in school. In pre-primary education, 88 girls were enrolled for every 100 boys, in 1995; the ratio was 90 to 100 in early primary grades, but dropped to 66girls for each 100 boys in second level, with data unavailable for the third level, pre-college, training (United Nations, 1999). But in the I960' s the idea of girls pursuing education had still been unusual; Jin had encountered resistance and even censure in her small farm community, but because her parents had supported her aspirations she had continued. She knew their encouragement was in part due to the lack of a son, which would have made them far happier, and she did her best to compensate by achieving to the best of her abilities.

Completion of the third level, of course, usually meant admission to college, though the field of study and the institution of enrollment were traditionally selected by formal testing and procedures, rather than individual students and their families. In the 1970's, however, the "Cultural Revolution" had gripped China. The college admissions tests had been suspended between 1970 and 1976, leaving only two avenues into college: waiting until the exams would be given again (which did occur in 1978) or being selected for college as a "peasant scholar." Jin Xiaoqin fortunately fell into the latter category.

Full text:

Headnote

CASE DESCRIPTION

The primary subject matter of this case concerns career development and career choices of female professionals in contemporary China, with details from the post-Cultural Revolution (1970's) to the present. The case centers on the experience of a woman educated for diplomatic service and teaching, who at the end of the case is offered a choice of moving to a joint venture business. Major content relates to gender roles interacting with career choices. Secondary topics include changes in the structure of the Chinese economy, and relevant government policies related to marriage and family. Comparisons can be drawn between gender expectations and work-family issues in China compared to other cultures with which students are familiar. The case is appropriate for advanced first year students or sophomores and beyond. It is most useful for students of human resources, gender issues in the workplace, and comparative gender roles. It can be taught in approximately 2 1⁄2 hours of class time, with three hours of reading and writing by students outside of class.

CASE SYNOPSIS

A Chinese proverb states that for every step women take forward, they take two steps backward, in terms of advancement. In this case of the same title Jin, the central figure, advances through her education and the early career stages as a college professor-though her dream was to be a diplomat-while adjusting to marriage and parenthood against the backdrop of all the economic and social changes in the China of recent decades. The marriage and "one child" policies of the People's Republic of China are important influences on her choices. Her husband blithely pursues the original dream of both, diplomatic service. The case ends with an offer for Jin to move to a business joint venture which is anxious to procure her excellent English skills and her experience in the U.S.

BODY OF CASE

Iin Xiaoqin reached for a sip of her herbal tea and tried to calm herself. Her life had built in a crescendo to a point of decision, and like many Chinese women, the reality of having the power to make serious life choices was both new and anxiety producing. So far, she reflected, her story had been a largely fortunate one.

Born to rural parents in the early years of the People's Republic, her initial expectations had been modest. She dutifully attended school, even into the second and third levels not usually completed by girls, especially in the rural, mountainous areas such as hers. Now, of course, things were different in China, with higher numbers of girls enrolled in school. In pre-primary education, 88 girls were enrolled for every 100 boys, in 1995; the ratio was 90 to 100 in early primary grades, but dropped to 66girls for each 100 boys in second level, with data unavailable for the third level, pre-college, training (United Nations, 1999). But in the I960' s the idea of girls pursuing education had still been unusual; Jin had encountered resistance and even censure in her small farm community, but because her parents had supported her aspirations she had continued. She knew their encouragement was in part due to the lack of a son, which would have made them far happier, and she did her best to compensate by achieving to the best of her abilities.

Completion of the third level, of course, usually meant admission to college, though the field of study and the institution of enrollment were traditionally selected by formal testing and procedures, rather than individual students and their families. In the 1970's, however, the "Cultural Revolution" had gripped China. The college admissions tests had been suspended between 1970 and 1976, leaving only two avenues into college: waiting until the exams would be given again (which did occur in 1978) or being selected for college as a "peasant scholar." Jin Xiaoqin fortunately fell into the latter category.

Jin was at that time part of a farm cooperative, near the village of Caijiacun, about 200 miles from the capital of Jiangxi Province, her home community. (Later, in the 1990's, the youth of this community left it in massive numbers to pursue better opportunities in the cities in the east of China.) In the early 1970's, however, all remained at home, struggling to eek out a living in the broken farm village. Further, many urban youth were sent to rural areas such as Jiangxi Province, with the goal of increasing their understanding of the rural peasant's life. Jin's village friend, Cai Songquan, longed to move away from the area, but was not allowed to leave because he was an only son and the sole provider for aging parents. Some of her friends from the city did not really survive their rural experience with their educational motivation intact; rather they faded into relative obscurity, sometimes marrying and remaining in their transplanted or originally rural lives, or returning to the cities with less lofty aspirations, identifying more completely with the working masses of their country.

Jin counted herself lucky to return to her previous status as a student by being admitted to the foreign studies college in Beijing. There the key faculty and administrators determined that her major area should be English and another concentration in international relations. (The "worker-peasant scholars" of this period were given no choice in their areas of study.) Secretly, Jin hoped for a career in China's diplomatic core, but she realized that such ambitions must be subdued, and contained within the goals and positions established for her by the state. She entered into her college experience enthusiastically and gratefully, competing fiercely for grades and accomplishments that would enhance her future.

While in college Jin met and fell in love with Gong Liu, another student of international affairs with aspirations to government service. Gong was an outgoing and ambitious young man, though his academic achievements were not as compelling as Jin's. Upon graduation the two married and were both assigned to the Chinese Foreign Service. Jin was encouraged to accept a teaching position at the Foreign Affairs College, where excellent teachers, also members of the Foreign Service, taught future Foreign Service recruits. Educated workers had somewhat more choices in China by this time. Before economic reform in 1978, labor mobility, employment and wage levels in China were fully controlled by the government, and no one had a choice over the type of work undertaken. After 1978, however, the educated groups could choose the privately controlled enterprises, and even, as in Jin's case, have some choices if they were still in a government cadre of workers (Meng, 69). Jin was happy about her teaching opportunity because the teachers received far better housing assignments than did the rank-and-file diplomats while in Beijing. Jin had a small, heavily subsidized, basic apartment with private bath, while single diplomats were assigned to shared quarters.

Gong, who entered the diplomatic core at the same time, was aware that his housing was superior to that of his colleagues only because he was married to Jin. While enjoying the better accommodations and lifestyle, he felt diminished to have received this benefit through his wife. Even after the Revolution in the 1940' s, many Chinese retained their traditional views of gender roles, and Gong shared many of these opinions. Traditionally, Chinese men expected to be the major providers and to have their spouses and families dependent and grateful to them; women had no authority or say in the management of important family matters, nor should they participate as individuals in social, political and economic activities. Although increased access to education and employment outside the home had resulted in significant improvements in the status of Chinese women, particularly in the eastern urban centers, the traditional values and norms which had relegated women to an inferior position within the family and in society continued to prevail among many social groups in China (United Nations, 1998, p. 13). Clearly Jin's role as faculty at a respected institution was somewhat threatening to Gong, and some tension in the marriage resulted from her privileges.

Early in her faculty appointment, Jin also began study to obtain her Master's degree, really a necessity in order to fully secure her teaching position. Her status among faculty had originally been somewhat reduced by her never taking the college entrance exam. Receiving her Master's fully established her academic credibility among the faculty. Gong also enrolled in graduate studies. Iin completed her Master's degree first, another development that was not particularly pleasing to her husband.

Gong also began to receive assignments abroad. At first these were of limited duration, usually only a few months at a time. Shortly, however, he was assigned to a two-year posting in an embassy abroad. There was little question of Jin accompanying him, since families of diplomats below the rank of Counselor generally were expected to remain in China. Single men were welcomed in postings abroad, but unmarried women were not; it was believed that single women could too easily be compromised in an international setting. They could not have a normal social life, as rumors about them might jeopardize their reputations and thus harm the foreign policy undertakings of their embassy. They could also, it was felt, be subjected to blackmail. Additionally, it was common knowledge that women were also less hardy and less able to adjust to foreign cultures and the demands of living overseas. Thus, single and married men were greatly preferred for foreign postings. Service abroad was clearly "man's work," and Gong and Jin accepted that they would live apart much of the time. This was only to be expected. This common attitude also affected Jin's decision to stay in teaching, rather than pursuing her original dream of a Foreign Service career.

Jin meanwhile was doing well at her college. Women were a minority among the faculty in the early 1980's, since a small percentage of women completed the necessary education. Among members of the diplomatic core, however, teaching positions were highly desired by women who did qualify, because they appreciated the housing benefits and the greater flexibility of hours and assignments compared to those of mainstream diplomats.

Iin and Gong conceived a child, and their son, Yuan, was born in 1986. Because of the one child policy, the couple had strictly practiced birth control until deciding to conceive their child. (They were totally in tune with their generation on this matter, as 72% of Chinese females of childbearing age practiced modern birth control in 1983, and 83% didsoby 1990.) (United Nations, 1998, p. 23) The one child policy was strictly adhered to by anyone in government service, so the couple was grateful their child was a son. Legislation stipulated that urban couples should generally have only one child and violators face fines. As of the turn ofthe century, China reported that the one-child policy had been responsible for preventing 300 million births in the previous 20 years and is still essential to avoiding a population explosion and starvation (BBC). The policy began as an open letter issued by the Central Committee of the Chinese Communist Party 20 years ago and the population growth rate has declined since the policy began. As loyal government employees, there was no question that Jin and Gong would have only this child.

Jin was able to initially spend time with the infant, but shortly returned to her teaching. All four of Yuan's grandparents were happy to care for the child when his parents had work responsibilities. Often in China the lack of child care programs made working difficult for mothers, but this was more the case among the less educated groups. Jin was able to see Yuan after her teaching hours, and enjoyed somewhat more time with him than did some of her friends in office bound positions. Gong loved the boy but regarded planning and arranging for his care as his wife's responsibility. When he reached school age he was admitted to a public kindergarten, and he even had a nursery school available the year before kindergarten.

Jin left China when Yuan was one year old, to study for a year at Harvard University, in the Fletcher School of Law and Diplomacy, one of the highest ranked international relations programs in the United States. Graduate study in the United States was highly valued, for both the education itself and the greater understanding of westerners it provided. In the Chinese diplomatic core, such opportunities were very competitive and highly prized. While Jin was away, Yuan resided with his mother's parents, a common arrangement among Chinese assigned overseas.

In the United States Jin lectured some, and also collaborated with political scientists at the University. She grew in confidence, and in her competence in the English language. Upon her return, her English was rated at the highest level, a skill that usually would place her in important overseas work at Chinese embassies in western countries. However, Jin remained in her teaching post in order to keep the security and benefits it provided and avoid the stress and problems encountered by female Chinese diplomats seeking overseas postings. Jin also knew that if she sought overseas assignments, she and Gong would very likely be posted to different countries and not encouraged to take Yuan with either of them. While his grandparents would care for him whenever necessary, Jin did not want to be separated from her son on such a regular basis.

After another decade of teaching, however, Jin again had occasion to study in the United States, this time at the University of Virginia. She pursued graduate work in English and also taught in collaboration with faculty there. Again her skills and confidence increased, and she returned happy that she had taken the opportunity.

Jin found China much changed in the mid-1990s. Women accounted for 45% of the total workforce, and 40% of the total industrial labor force; about 22% of the members of the Chinese parliament were female, a higher percentage than in most countries of the region (United Nations, 1 999, p. 1 5 1 , 1 74). About 32% of all government employees were female by 1 994 (United Nations, 1998, p. 58). However, in the ministerial ranks of government, including the high-level foreign policy positions of most interest to Jin and Gong, less than 10% were female. Most of the women in the ministerial ranks (about 62%) were entrusted with social affairs, such as social services and welfare, health, education, and women's affairs; they were rare in the economic development field or in foreign policy and defense related positions (United Nations, 1998, p. 67).

Increased privatization had opened many opportunities for the educated class, as joint ventures between Chinese and western companies entered the economic scene and political and economic reforms allowed Chinese to make more professional choices on their own, to buy their own apartments, and for some fortunate ones to make substantial incomes they had only dreamed of previously. Women in urban areas were still better educated that in rural areas; in Beijing, 73% of working women now had a high school degree and 17% have a university education (Statistical Yearbook of China, 1998). However, despite progress, in the Chinese mainland organizations women are employed in 50% fewer professional jobs and about 11% of the managerial jobs in which men are employed (Honh, 1 995). By the mid- 1 990' s there was an abundant workforce and 73% of women 15 and older were economically active. Jin realized that in the rural areas most of these benefits were not yet realized, and that education was the reason for the new opportunities she saw. Even in the countryside, primary school dropout rates for girls had decreased to between 3 and 5%, an improvement, though because of the large population, still leaving a large number of uneducated women (United Nations, 1998, p. 39; Dowd, 1995).

Gong was increasingly spending his time abroad, and the couple grew apart. Shortly after lin' s return they formally separated, though neither seemed immediately motivated toward a divorce. Formal separation from her husband actually made little impact on lin' s life, since the couple had been often apart and both Jin and son Yuan were accustomed to this. Jin did realize, though, that China's new laws gave her certain formal rights, such as those found in the new marriage law of 2001 . The new law outlawed married people living with an opposite gender person not their spouse. Further, a man found guilty of divorcing his wife to live with his mistress can be sued by his former wife for financial compensation. This prompted many lawsuits. The Chinese Supreme Court ruled in 2002 that simply having affairs or keeping a concubine was NOT excluded by the new law, which narrowed the law' s application (China News Digest).) It remained to be seen if any of this might become relevant, should Jin and Gong decide to divorce.

Yuan, now a bright and self-sufficient teenager and level-three student, required less and less of Jin's time and energy. Her parents, however, were becoming elderly and increasingly dependent upon her, their only child, both financially and emotionally. No public support really existed that would ensure their care as they continued to age. Jin also felt increasing pressure to further develop her personal life and opportunities on her own, particularly after her separation from Gong. She became involved in a variety of community groups, and sought responsibility on the neighborhood council of her urban community. She was also part of a wider movement toward political participation among Chinese women at this time. In 2002, People 's Daily, a voice of the government, clearly called for more such efforts to push women's rights, stating: "More women should participate in the deliberation and administration of State affairs. More female cadres should be trained, selected and play a role at various levels. In this way women can better enjoy their political rights." (China Daily, May 14, 2002).

Challenging work in this capacity brought home the realization that she was stagnating a bit at the university. Her job was secure, yes, but also lacking in challenge. She had been easily promoted to the Associate Professor level and anticipated no difficulty in achieving the highest rank of Full Professor. As she had not served for more than a few weeks at embassies abroad, however, she could not aspire to policymaking or top administrative roles at her college all of which required actual Foreign Service experience abroad. Many of her college contemporaries were advancing and exploring new opportunities, some in the Foreign Service and others in the private j oint ventures that were thriving in the new economic structure. But women were still disadvantaged in China's Foreign Service. As of 2002 about 4000 staff members were included in the Foreign Ministry, among which about 1200 were female cadres, with 800 based in the ministry and only 400 on foreign posts. Of those assigned abroad, 45 held the rank of counselor or above; six of these were ambassadors, five counsels-general. (Sun Jing Li, 2003)

As she sat on her rooftop this sunny May morning, Jin considered the meeting she had had last week with a cousin who was part of the executive team of a new j oint venture in electronics with an American firm. The enterprise was expanding very rapidly, with more need for middle managers and technical staff competent in English. Xin Meng had called Jin and asked to meet to discuss hiring her as a Vice President for staff development. The salary would be triple her current one, and there would be frequent trips to the United States, which Jin always enjoyed. Still, she would need to give up her years of accrued seniority, her comfortable and subsidized housing, and most importantly her job security. Jin knew of many, such as her engineering friend Liu, who had ventured forth into the newly emerging private sector only to be unemployed and scrambling for an income a few years later, when economic developments or poor, inexperienced management of the new enterprises brought severe downturns or even collapse of the ventures. The western partners, of course, also suffered in these events but could absorb the losses far more easily than the new entrepreneurs within China itself. The political and legal systems, also, were just beginning to address many issues of a partially free market, and individual workers and companies were often at risk due to lack of a stable legal framework.

Thus, even in the new China, Jin realized there were hurdles professional women would encounter. (Shaffer et. al., 2000) The Chinese mainland has a long history of equal rights legislation; the first constitution (1954) provided women with equal rights with men in economic, cultural, social and family arenas. Insofar as this is more a statement of intent rather than a guarantee of rights (Pearson), several amendments, including the Law on Safeguarding the Rights and Interests of Women (1992) have been designed to further guarantee women's rights and promote equality with men. However, Jin knew that these amendments have been criticized for lack of penalties and general imprecision (Pearson). Indeed, despite legal protections, differential treatment of women and sexual harassment in the PRC still seemed widespread (Honh). Further, conditions are worse for women in the countryside, where 75% of Chinese women still resided in 2000. (Wu Qing, China Daily, May 14, 2002)

The recent economic reforms have stressed efficiency, and women have been discriminated against in terms of hiring, layoffs, and wage and pension systems (Summerfield; Zheng). Sexual harassment has increased, especially among rural women moving to urban areas and suffering exploitation and harassment (Iacka; Zhong). Movement from a planned, controlled economy to a market economy has also resulted in loss of administrative controls and protections, which have been replaced by personal wishes and rule of managers, the majority (89%) of whom are male (Honh). A study by the All-China Women's Federation Research Institute had shown that "Women' s mobility in their life-long career tends to be horizontal while men' s mobility is upward" (Zheng, p. 73). In layoffs, the proportion of laid-off female workers has been higher (59%) than that of male workers (Zhang and Zhao, cited in Cooke). This research also found that women were discriminated against in retirement, and often compelled to retire at an earlier age than men. Thus, Jin feared she might be more at risk, in terms of long-term security, in a private sector position. She could see that the new saying about women' s overall progress in China, "one step forward, two steps back," might apply to her.

All her life others had made most of the choices: her work in the countryside, her matriculation at a particular college, the choice of her fields of study, even her assignments to study in the United States, had primarily been dictates of her government. She recalled how, in college, she had dreamed of a diplomatic career which had never materialized for her; she knew that, had she been male, she would have pursued assignments with the Foreign Service abroad. Now, in the middle of her life, the new economic and political conditions in China presented her with a serious professional alternative, and a somewhat frightening choice. What should she do?

Sidebar
References

REFERENCES

BBC News, January 9, 2002. Concern at Chinese family planning law.

China Daily, May 11, 2002, p. 4. What They Are Saying: Protecting Women's Rights.

China Daily, May 14, 2002, p. 10. Rural women sample state affairs.

China News Digest, January 5, 2002. Changes in China's Marriage Law in 2001.

Cooke, Fang Lee (2001). Equal opportunity? The role of legislation and public policies in women's employment in China. Women in Management Review, 16 (7): 334-348.

Dowd, S. (1995). Women and the word: The silencing of the feminine. In J. Peters & A. Wolper (Eds.), Women's Rights/human rights (pp. 317-323). New York: Routledge.

Honh, Z. (1995). The testimony of women writers: The situation of women in China today. In I. Peters & A. Wolper (eds.), Women's rights/human rights (pp. 96-100).

Jacka, T. (1997). Women's work in rural China: Change and continuity in an era of reform. Cambridge, UK: Cambridge Univ. Press.

Louie, Kam (2002). Theorizing Chinese Masculinity: Society and Gender in China. Cambridge, UK: Cambridge University Press.

Meng, Xin (1998). Male-female wage determination and gender discrimination in china's rural industrial sector. Labour Economics, 5: 67-89.

Shaffer, Margaret A., Joplin, Janice R. W., Bell, Myrtle P., Lau, Theresa and Oguz, Ceyda. (2000). Disruptions to women's social identity: a comparative study of workplace stress experienced by women in three geographic regions. Journal of Occupational Health Psychology: Vol. 5, No. 4, 441-456.

Shaffer, M.A., Joplin, J.R.W., Bell, M.P., Lau, T. & Oguz, C.(2000). Gender discrimination and job-related outcomes: A cross-cultural comparison of working women in the United States and China. Journal of Vocational Behavior 57: 395-427.

Statistical Yearbook of China (1998).

Summerfield, G. (1994) Economic reform and the employment of Chinese women. Journal of Economic Issues, 28 (3): 715-732.

Sun Jing Li, staff, Foreign Affairs College (2003). Interview with author.

United Nations, Economic and Social Commission (1998). Women and Men in the ESCAP Region.

United Nations, Economic and Social Commission (1999). Statistics on Women in Asia and the Pacific, 1999.

Xin, F. (1995). The Chinese cultural system: Implications for cross-cultural management. SAM Advanced Management Journal, 60, 14-20.

Zhang, Heather Xiaoquan (1999). Female migration and urban labour markets in Tianjin. Development and Change, 30 (1): 21-41.

Zheng, X.-y. (1995) Zhong-guo nu xing ren kou wen it yu fa zhan (The problem of Chinese women population and its development). Beijing: Beijing Univ. Press.

Zhong, J. (1994) Zhong-guo xing sao rao xian xiang ji dui ce. (Sexual harassment of women in China and its coping strategies). Sichuan: Sichuan People.

AuthorAffiliation

Jacqueline DeLaat, Marietta College

delaatj@marietta.edu

Appendix

APPENDICES

Appendix A: Excerpts from Marriage Law of the People's Republic of China

Appendix B: Excerpts from the Population and Family Planning Law of the People's Republic of China

Appendix C: Discussion of China's Marriage Law from People's Daily, December 27, 2001

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 2

Pages: 39-45

Number of pages: 7

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192411652

Document URL: http://search.proquest.com/docview/192411652?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 21 of 100

RIVERSIDE COUNTRY CLUB, PRIVATE OR SEMI-PRIVATE: MUTUALLY EXCLUSIVE DECISION MAKING UNDER UNCERTAINTY

Author: Dow, Benjamin L; Newsom, Paul

ProQuest document link

Abstract:

Chris Johnson's purchase of Riverside Country Club in 2003 was the culmination of a longtime dream of one day owning a golf course. Mr. Johnson has been in the insurance business since graduating with a degree in marketing on a golf scholarship. Mr. Johnson is an accomplished golfer with statewide recognition, having won State Amateur Player of the Year awards on three different occasions. Now Johnson's time is split between the insurance agency and overseeing his investment in Riverside Country Club. Johnson' s decision to purchase Riverside for $2.4 million was reached only after a thorough valuation conducted by a local investment banking firm specializing in private company acquisitions. Two years into the purchase of Riverside, Johnson is considering a change in operating strategy. At present, Riverside is operating as a co-purpose semi-private club that generates revenues from both members (who pay a fixed monthly fee for unlimited golfing privileges) and the general public (who pay a daily per-use fee). Johnson's business plan at the time of purchase included the eventual conversion the club from a semi-private course to a private course as homesite development and interest in the club grew. Although his original forecast projected a five-year outlook for this conversion, higher than anticipated growth and profitability has now pushed up the potential timetable for conversion. However, Iohnson is uncertain as to whether an earlier change operating strategy will lead to an even greater return on investment or merely set back profitability over the next three years.

Full text:

Headnote

CASE DESCRIPTION

The primary subject matter of this case concerns the financial impact of a proposed change in business operating strategy. Secondary issues examined include financial modeling and sensitivity analysis of mutually exclusive decisions. The case requires students to have an introductory knowledge of accounting, finance, spreadsheet modeling, and general business issues, thus the case has a difficulty level of three (junior level) or higher. The case is designed to be taught in one three-hour class session and is expected to require 3-4 hours of preparation time from students.

CASE SYNOPSIS

This case describes the challenge s faced by Chris Johnson, owner of Riverside Country Club, concerning a proposed change in business strategy. Currently, Riverside Country Club operates as a co-purpose semi-private golf course that allows play by both members (who pay a fixed monthly fee) and the general public (who pay a daily fee). However, Johnson is evaluating whether a switch in operating strategy from a semi-private club to a private club might generate a higher return on investment. Moreover, there are two separate private membership proposals. One is a traditional private club membership where individuals pay a set monthly fee which covers unlimited golfing privileges, but does not include extra fees. The other private membership concept is an all-inclusive membership in which members pay a higher monthly fee but do not incur extra fees.

CASE BACKGROUND

Chris Johnson's purchase of Riverside Country Club in 2003 was the culmination of a longtime dream of one day owning a golf course. Mr. Johnson has been in the insurance business since graduating with a degree in marketing on a golf scholarship. Mr. Johnson is an accomplished golfer with statewide recognition, having won State Amateur Player of the Year awards on three different occasions. Now Johnson's time is split between the insurance agency and overseeing his investment in Riverside Country Club. Johnson' s decision to purchase Riverside for $2.4 million was reached only after a thorough valuation conducted by a local investment banking firm specializing in private company acquisitions.

Two years into the purchase of Riverside, Johnson is considering a change in operating strategy. At present, Riverside is operating as a co-purpose semi-private club that generates revenues from both members (who pay a fixed monthly fee for unlimited golfing privileges) and the general public (who pay a daily per-use fee). Johnson's business plan at the time of purchase included the eventual conversion the club from a semi-private course to a private course as homesite development and interest in the club grew. Although his original forecast projected a five-year outlook for this conversion, higher than anticipated growth and profitability has now pushed up the potential timetable for conversion. However, Iohnson is uncertain as to whether an earlier change operating strategy will lead to an even greater return on investment or merely set back profitability over the next three years.

GOLF INDUSTRY BACKGROUND

Prior to 1970, the golf market had two different types of courses- lower budget courses operated mainly by municipalities, and more upscale private country clubs. In the earlier 1970's a new trend known as "A Country Club for a Day" began to emerge as the title for newer upscale daily fee courses. These courses were open to the public and provided high quality design, maintenance and service. At present, most ofthe industry research is based on a three segment framework, which classifies courses as municipal, daily-fee, or private. In reality, the golf course market now contains many more market segments. These market segments are based on several interrelated factors with a focus on the type of customer served. For example, a private club may serve local residents in a certain income bracket, while a similar private club may be structured to serve corporate clients.

On the demand side, the total number of golfers in the United States has remained fairly flat over the last five years, but has increased from 10 years ago. In 1994, an estimated 23 million Americans were classified as golfers having played 421 million rounds of golf at approximately 1 1 thousand courses. By 2004, the number of American golfers has grown to 27.4 million and the number of rounds played increased to approximately 498 million. Ofthe 27.4 million total golfers in the US, 12.8 million are classified as core golfers (playing more that seven rounds per year) and 14.6 million are occasional golfers (playing one to seven rounds per year). The average core golfer plays 37 rounds per year.

From an operational viewpoint, golf course revenues are generated from five main sources: green fees, cart rentals, range ball fees, food and beverage sales, and pro shop sales. Most golf courses operate as either a public daily fee, semi-private, or private course. Daily fee courses are open to the general public and charge customers on a per use daily basis. For example, a customer playing a daily fee course might pay $30 for the green fee, $10 for use of a cart, $5 for a bucket of range balls to practice before playing the round, and $10 for a sandwich and drink. At a private course, play is restricted to members and guests. Members typically pay a fixed monthly fee for unlimited golfing privileges (green fees), but they continue to pay for cart fees, range ball fees, food and beverages, pro shop purchases, and guest fees. A new trend in private course operations includes an all-inclusive membership, in which members pay a higher monthly fee that includes unlimited golfing privileges, cart usage and range balls. A semi-private course allows play by both members and the general public, but usually affords special privileges to its members.

RIVERSIDE COUNTRY CLUB

Riverside Country Club opened in 1995 as a semi-private golf course located in Maumelle, Arkansas, a growing suburb located in the greater Little Rock metropolitan area. Riverside offers an 18-hole championship golf course spread out over 151 acres along the Arkansas River, complete practice facilities, a full-service snackbar with an ability to provide catering services, and a pro shop offering top quality merchandise. Riverside Country Club was originally built by Golf Corp LLC to take advantage ofthe surging popularity of golf that occurred during the early 1990's.

Since inception Riverside Country Club has continued to operate under a co-purpose semi-private operating strategy. Total revenues in 2004 were $1.31 million, of which member dues attributed $297,000, daily-use green fees attributed $578,000, cart fees attributed $200,000, pro shop sales attributed $106,000, food and beverage attributed $1 19,000 and range ball fees accounted for the remaining $10,000.

THE SITUATION

One rainy Friday afternoon, Chris Iohnson was reviewing the most recent financial records of Riverside Country Club when he began to entertain the thought of converting Riverside from a semi-private club to a private club. Although Riverside currently has 165 members and member dues accounted for almost $300,000 in revenues in 2004, non-member green fees had accounted for almost $600,000. Iohnson wondered how many actual new members it would take to increase profitability beyond what was currently generated.

Iohnson quickly realized that any decision to change Riverside's operating strategy would involve risk and should not be done hastily. He decided to call Brad Story, a financial consultant with ADA Management Services, and explain his idea. Story recommended that Johnson come in next week with last year's financial statements and detailed operating data as well as projected financial statements for 2005 under the current semi-private operations. Story would then create a financial model for both a traditional private membership and all-inclusive private membership to use as a comparison with the current semi-private operating structure. In addition, Story would perform a sensitivity analysis on the financial models to determine the risk involved in each proposed operating strategy.

Iohnson remarked that Riverside currently has 165 members who pay $150 per month, play an average of 45 rounds per year and in his estimate account for about 30% ofthe total rounds played. Under current operating forecasts for 2005, the total number of rounds to be played at Riverside is estimated at 25,000 (See Table One for a summary of 2005 projections). While daily fee rounds are projected to be 17,575, Johnson noted that weather and local competition might affect the actual number of daily fee rounds. Johnson estimates a margin of error of plus or minus 2,000 rounds.

A private membership operating strategy would eliminate the revenue uncertainty of daily fee rounds, but in turn would be almost completely dependant on membership revenue. Under a private membership operating structure, Johnson assumed that each member would continue to play an average of 45 rounds per year as well as pay for about 10 daily fee guest rounds per year at $25 per round. In addition, Riverside would continue to sponsor a number of corporate/charity outings each year and over the last three years Riverside has averaged 4,500 corporate/charity daily fee rounds at $25 per round from corporate/charity outings. Both member and daily fee rounds would be subject to an $8 cart fee, and Johnson continued to believe that 85% of rounds would utilize a cart. Pro shop sales, food and beverage sales, and range fee revenue would continue to be estimated on a per round basis. The cost estimates for the private membership would remain unchanged. Iohnson mentioned that his marketing research of other private clubs in the region would likely support a private membership monthly fee of $190 per month. At this rate, Johnson estimated he could attract 300 members and wondered what the effect on Riverside's cash flow would be compared with the current 2005 projections. However, Johnson realized that the actual number of members might fall somewhere between 250 and 350 and was concerned about how much risk was involved if fewer than expected members joined the club.

Johnson was also interested in a new trend in private membership that incorporated an all-inclusive membership strategy. An all-inclusive membership would work exactly like the traditional private membership except that members were charged one monthly fee for their golfing privileges, use of carts, and use of the golf range. Guest fees would increase to $35 per round, but guests would not be charged for cart usage or use of the range. Corporate/charity outing round fees would increase to $35 but there would be no charge for cart usage or use ofthe range. Iohnson estimated that members would average 1 0 guests per year and corporate charity daily fee rounds would remain at 4,500 per year. Johnson estimated that he could charge $250 a month for the all-inclusive membership and attract 265 members to this format, although anywhere from 215 to 315 members was possible.

Story recommended to Johnson that a mutually exclusive decision such as this be analyzed by comparing operating cash flows under the different proposals because the proposed changes resulted in an adjustment in operational strategy and did not include any changes in financial structure or capital improvements. Johnson was both familiar and comfortable with this approach and added that depreciation for 2005 was estimated at $125,000 and the marginal tax rate used by Riverside is 30%.

THE TASK

At the conclusion of the meeting, Story suggested Johnson come back at the end of next week. Story said he would put together a preliminary financial sensitivity study to help Johnson decide on the appropriate operating structure for Riverside. Story turned over a copy of his notes from his meeting with Johnson to a young associate and asked his associate to prepare a report containing the following information:

1) Calculate projected operating cash flow for Riverside remaining a semi-private club using the data provided in Table One.

2) Create a spreadsheet model for the semi-private plan that will allow for a sensitivity analysis of the operating cash flow to a change in the daily fee round inputs.

3) Calculate the operating cash flow for the semi-private plan using a:

a) low estimate of daily fee rounds = 15,575

b) base projection of daily fee rounds = 17,575

c) high estimate of daily fee rounds = 19,575

4) Modify the spreadsheet model to calculate operating cash flow for Riverside operating as a traditional private membership allowing for a sensitivity analysis of the operating cash flow to a change in the number of members.

5) Calculate the operating cash flow for the traditional private membership plan using a:

a) low estimate of 250 members

b) base projection of 300 members

c) high estimate of 350 members

6) Using the traditional private club model, calculate the breakeven number of members required in order the match the operating cash flow of the base projected semi-private operating strategy.

7) Modify the spreadsheet model to calculate operating cash flow for Riverside operating as an all-inclusive private membership allowing for a sensitivity analysis of the operating cash flow to a change in the number of members.

8) Calculate the operating cash flow for the all-inclusive private membership using a:

a) low estimate of 215 members

b) base projection of 265 members

c) high estimate of 315 members

9) Using the all-inclusive private club model, calculate the breakeven number of members required in order the match the operating cash flow of the base projected semi-private operating strategy.

10) Discuss the risk associated with each business operating strategy and prepare a recommendation for Johnson.

AuthorAffiliation

Benjamin L. Dow III, Southeast Missouri State University

bdow@semo.edu

Paul Newsom, Valparaiso University

paul.newsom@valpo.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 2

Pages: 47-51

Number of pages: 5

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192411594

Document URL: http://search.proquest.com/docview/192411594?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 22 of 100

BOGART'S MARINA

Author: Dye, Janet

ProQuest document link

Abstract:

BOGART'SBogart's is a local business catering to boaters. The business is split into four main areas - the marina, a deli/bar, a small convenience store, and boat repair services. The firm accepts cash, major credit cards, and personal checks on local banks as forms of payment.

The marina has 300 slips which are each rented for $1200 for the year. Due to a shortage of slips in the area, there is a waiting list for slips. To make the rental fee more manageable, renters can elect to pay an extra $50 handling fee and then pay $100 on a monthly basis rather than having to pay all $1200 at one time. All ofthe slips have electricity and water provided. Limited short-term moorage is also available for $20 per day. The short-term moorage is always full from May through September.

The marina also sells gasoline and diesel fuel to boaters.

The deli and bar are in the same building and sell each other's products. They offer limited menus of sandwiches and burgers and serve beer and soft drinks. The bar also features hard liquor. The Sam Spade Sandwich and the Bogie Hoagie are favorite menu items among local residents and the deli does a fairly heavy take-out business year round. The deli is smaller in square footage than the bar and intended to appeal more to families. The bar has several big screen televisions tuned to sports events and gets the majority of its customers off the boats. All ofthe food is prepared on site by Bogart's two cooks.

The convenience store is in a section of the building which holds the general administrative offices for Bogart' s. It sells an assortment of toiletries, fishing supplies, alcoholic beverages and food items to customers off the boats. It also has shower facilities and a Laundromat, both of which are popular with boaters. The general and administrative offices house the management, accounting, and maintenance staffs.

The boat repair shop is the fourth business area and is housed in a large building on the water. It's peak season runs from the spring, getting boats ready for launch, through the beginning of fall when many owners remove their boats to storage. Bogart's keeps their two chief boat mechanics on payroll all year to be assured of their services during the peak season. The co hires several additional mechanics to meet demand during the busy season.

Full text:

Headnote

CASE DESCRIPTION

The primary subject matter of this case concerns advanced managerial accounting. The case has a difficulty level of three, appropriate for the junior level, or five, appropriate for a first year graduate level. The case is designed to be taught in one or two class hours and is expected to require two hours of outside preparation by students.

CASE SYNOPSIS

This case is useful in the first class of managerial accounting at the junior or MBA level to assess and refresh student's knowledge of the various managerial accounting techniques: when they are appropriate and how the information from them might be utilized in management decisions. The student is put in the position of a manager who has just been hired to run the day-to-day operations of a small business with multiple product lines: boat moorage, convenience store, restaurant/bar, and boat repair. The new "manager" must determine what information to request from the staff and discuss how the items selected would be helpful.

BOGART'SBogart's is a local business catering to boaters. The business is split into four main areas - the marina, a deli/bar, a small convenience store, and boat repair services. The firm accepts cash, major credit cards, and personal checks on local banks as forms of payment.

The marina has 300 slips which are each rented for $1200 for the year. Due to a shortage of slips in the area, there is a waiting list for slips. To make the rental fee more manageable, renters can elect to pay an extra $50 handling fee and then pay $100 on a monthly basis rather than having to pay all $1200 at one time. All ofthe slips have electricity and water provided. Limited short-term moorage is also available for $20 per day. The short-term moorage is always full from May through September.

The marina also sells gasoline and diesel fuel to boaters.

The deli and bar are in the same building and sell each other's products. They offer limited menus of sandwiches and burgers and serve beer and soft drinks. The bar also features hard liquor. The Sam Spade Sandwich and the Bogie Hoagie are favorite menu items among local residents and the deli does a fairly heavy take-out business year round. The deli is smaller in square footage than the bar and intended to appeal more to families. The bar has several big screen televisions tuned to sports events and gets the majority of its customers off the boats. All ofthe food is prepared on site by Bogart's two cooks.

The convenience store is in a section of the building which holds the general administrative offices for Bogart' s. It sells an assortment of toiletries, fishing supplies, alcoholic beverages and food items to customers off the boats. It also has shower facilities and a Laundromat, both of which are popular with boaters. The general and administrative offices house the management, accounting, and maintenance staffs.

The boat repair shop is the fourth business area and is housed in a large building on the water. It's peak season runs from the spring, getting boats ready for launch, through the beginning of fall when many owners remove their boats to storage. Bogart's keeps their two chief boat mechanics on payroll all year to be assured of their services during the peak season. The co hires several additional mechanics to meet demand during the busy season.

REQUIRED

1. You have recently been hired as the new manager of Bogarts with just the general knowledge of the company listed above. What specific items of managerial accounting and general management control information would you request?

2. Explain how each item of information would be useful.

AuthorAffiliation

Janet Dye, University of Alaska Southeast

janet.dye@uas.alaska.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 2

Pages: 53-54

Number of pages: 2

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192411740

Document URL: http://search.proquest.com/docview/192411740?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 23 of 100

ELEVEN: A START-UP RESTAURANT CASE STUDY

Author: Goede, Bryan; Olson, Philip D; Olson, Jennifer J

ProQuest document link

Abstract:

The primary subject matter of this case concerns entrepreneurship. Secondary issues examined include human resource selection and training. The case has a difficulty level of four, appropriate for senior level. The case is designed to be taught in one class hour and is expected to require three hours of outside preparation by students.

Full text:

CASE DESCRIPTION

The primary subject matter of this case concerns entrepreneurship. Secondary issues examined include human resource selection and training. The case has a difficulty level of four, appropriate for senior level. The case is designed to be taught in one class hour and is expected to require three hours of outside preparation by students.

CASE SYNOPSIS

Eleven is a healthy fast food restaurant that was started by Terry Jones in 2002 in Pocatello, Idaho. Terry, 26 years old at the time of the start-up, had worked in the restaurant industry though out high school and college. In college, he obtained a business management degree. Before starting his business, Terry talked to advisors, including an accountant, insurance agent and several food vendors. He also formulated a business plan that was used to attract outside funding.

The business-level strategy Terry pursued for Eleven was to offer healthy fast food (primarily salads and sandwiches) to health conscious people who are a slave to a fast paced world. Although he wanted to target or cater to people of all ages, he predicted that much of the sales would come from the college students at Idaho State University because his business location was very close to campus.

Eleven's pre-start-up went quite smooth. Of course, some activities (e.g., remodeling his business location) took longer than originally expected to complete so he had to postpone the opening. Prior to opening, Terry interview ed and hired employees in an informal way, mainly based on his network of college friends. Several months after opening, however, he began to experience a growing number of employee problems. The increasing human resource problems he faced included turnover, absenteeism and training. Training was an issue because customers complained that menu items were not uniformly prepared from one day to the next day. The chief focus of the case study is on how Terry can correct these human resource issues.

AuthorAffiliation

Bryan Goede, University of Idaho

terry0011@hotmail.com

Philip D. Olson, Northwest Training Resources

polson@uidaho.edu

Jennifer J. Olson, Northwest Training Resources

jenn@uidaho.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 2

Pages: 55

Number of pages: 1

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192411758

Document URL: http://search.proquest.com/docview/192411758?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 24 of 100

ID PRO SYSTEMS: DISCIPLINING OFF DUTY BEHAVIOR

Author: Haggard, Carrol R; LaPoint, Patricia A

ProQuest document link

Abstract: None available.

Full text:

Headnote

CASE DESCRIPTION

The subject matter of this case is the role of management in employee discipline. The case can be used to explore the issues associated with the role of the supervisor in employee discipline for both on the job and off duty behavior. Since the case integrates material from Management (supervisor's response to disruptive employee behavior), Business Law (legality of termination), Human Resource Management (company personnel policies) and Organizational Behavior (employee discipline and conflict resolution) it could be used in any of these classes. The case has a difficulty level of two. The case can be presented in one to four class periods depending on the number of issues considered. Students can be expected to spend two to four hours of outside preparation to be fully prepared to discuss the case.

CASE SYNOPSIS

Despite the dot.com bust, parts of the computer industry are still hot. ID PRO SYSTEMS was a moderately successful, but little known computer software division until Identity theft became front page news. Its security department has brought some notoriety to ID PRO, as they won recognition for their early development of a spyware detection program. The security department is headed up by Eric Chambers. Eric is perceived as a talented programmer, at least by the regional vice president, who has given Eric rewards which are not shared by others. This has created a mild sense of both resentment and jealousy among other employees. This resentment is further fueled by a high turnover rate in the department and rumblings about Eric taking credit for the work of others. Within the division, some question the exact nature of Eric's contributions. The questions raise doubts about Eric's value to the department. These doubts are exacerbated by personal issues that some of the employees have with Eric due to his outspoken advocacy of his views and his combative argumentative style. These feeling were brought to a head Friday evening when Eric verbally attacked two women regarding their political views during a "happy hour" gathering of employees. Eric's attack was furious, loud and abusive and had to be stopped by the bouncer at the bar. Partly as a result of this behavior a group of employees is in your office demanding that you fire Eric immediately. As the group sits in your office, a number of issues run through your mind, including: Whether Eric's behavior warrants termination? And it if so, whether you have the authority to fire Eric for off the job behavior? And if you fire Eric will you be overruled by the vice president of the division? As Regional Products Group Director, you know that you must do something about this situation, but what?

OFF DUTY BEHAVIOR: A CASE OF DISCIPLINARY ACTION AT ID PRO SYSTEMS?

Despite the dot.com bust, parts ofthe computer industry are still hot. ID PRO SYSTEMS was a moderately successful, but little known computer software division of a conglomerate until Identity theft became front page news. The division has five functional departments- games, security, decision support applications, technical applications, and robotics (the most recent and cutting-edge product group). While all ofthe departments have contributed to the division, some in profits and others in terms of visibility, the most successful and profitable portion ofthe division has been the games department. While none of ID PRO's games have been blockbusters, they have done well enough to contribute to the division's profitability. However it is the security department which has brought some notoriety to ID PRO, as they won recognition within the industry for their early development of a Spyware detection program. Since the division foresees an impending boom in security software it changed the division's name from Computer Software Systems to ID PRO SYSTEMS to reflect the future strategic importance of this product group.

The security department is headed up by Eric Chambers. Eric is not your typical computer programmer. He holds a reputation as being a somewhat eccentric iconoclast, as evidenced by the fact that he has unkempt long hair and beard yet wears designer clothing. Eric is also somewhat of an enigma. He is a "health nut" and works out religiously. This fits in with his strong views on the environment, as he doesn't own a car, refuses mass transit and walks or rides a bicycle everywhere. While a proponent of recycling, he doesn't think twice about littering as he tosses banana peels and apple cores when moving around the city. While not religious, Eric is a strong believer in and activitist for the pro-life movement. Eric believes so strongly in the sanctity of life for all beings that he is a vegan. He takes his belief to the point that not only does he refuse to swat a fly or step on a bug, but also he refuses to wear mosquito spray.

Eric frequently shares his intently held views with anyone who will listen. One of those who listened is the Regional Director of Human Resources, Marian Wilcox. Eric had presented research demonstrating that healthy employees were cost effective employees as he pushed for a company supported health program. Partly as a result of Eric's efforts, employees were given time off to exercise. Many ofthe company's employees and especially those in the security department admired Eric for the results of his tenacious persistence in seeking the health program.

Eric is an extremely talented programmer. He led the team that produced the Spyware program which received recognition. Eric is perceived by ID PRO's vice president as being instrumental in writing the Spyware program. His team is working on the next generation of Spyware detection and destruction software. If they can be first to the market then ID PRO SYSTEMS has the potential to dominate the market and be recognized as an industry leader. Since ID PRO is staking a large part its future on computer and identity security, the vice president ofthe division thinks that Eric is an extremely valuable employee. Therefore, the vice president has given Eric certain perks/privileges which have not been shared with others in the division. This has created a mild sense of both resentment and jealousy among other employees.

Employees in the other departments of ID PRO respect and value what Eric and his group have accomplished. Eric's department consists of a group of the top young programmers and computer science interns. The department is viewed as being very capable and innovative, as evidenced by their award.

While the department has been successful, it has not been without controversy. The department has been plagued by turnover, as a number of very talented computer programmers in Eric's group have resigned and left the company to work for rival companies. Although high turnover rates are not uncommon for high tech companies, the rate of turnover in Eric's department is significantly above the average as compared to other departments in the division. Some employees of other departments view this as a result of Eric's combative management style combined with his outspoken advocacy of his views. Yet, those who have remained have an intense loyalty and allegiance to Eric. For them, Eric's management style and views are very compatible. In fact, several ofthe interns have adopted many of Eric's positions on issues. Some ofthe employees in other departments wonder whether Eric has actually developed a cult-like following especially with his interns.

There is also considerable speculation as to the actual extent of Eric's personal contribution to developing the Spyware detection program. In fact, several employees have openly questioned Eric's role in the success of the programming team. Specifically, they wonder as to how substantial was the role the interns had in conceptualizing and developing the program? Could a different team leader have produced the same result? Such questions have been fueled by comments made by programmers during exit interviews who have suggested that Eric may be taking the credit for the work of others. While there is growing speculation among the employees of the other departments, Eric's immediate supervisor, Clinton Shaw, Regional Products Group Director, dismisses such comments as jealously of Eric's success and envy over the rewards that he has received.

Some of these same employees also have personal issues with Eric, as not everyone gets along with Eric and his outspoken advocacy of his views. It is very common for Eric to get into arguments over his views at divisional gatherings. He is not at all shy about pushing his political views on others. In fact, Eric is perceived as actually thriving on his frequent arguments and debates concerning his political agendas. While some of the other employees recognize the strength of his beliefs/convictions and can respect his attempts at persuasion, others see him as, at a minimum, a nuisance while others are offended at this tactics. While there is disagreement over his positions, although some share Eric's views, there is near unanimity in opposition to Eric's approach. Eric seems to want to argue for the sake of argument, placing a high value on winning, no matter how insignificant the topic. Perhaps most frustrating is the attitude that Eric takes, "if you don't agree with me, you are wrong," and its attendant implication of "you are not as smart as I am."

As an example, recently in the break room, two of the employees were discussing the pronunciation choices of the disc jockey on the radio. Eric interjected himself into the discussion and proceeded to convert it into an argument over the importance of "correct" pronunciation. During his presentation, Eric went into long diatribes about this position. He would interrupt others, not allowing them to develop and explain their positions. Eric became loud and used profanity in advancing his position. As people left the break room, they were shaking their heads wondering what had just transpired.

Eric left with a smug look on his face content in another "victory" and in the triumph of his position.

Due to the success of Eric's department and his relationship with the division's vice president, many of the other employees tolerated Eric's argumentative behavior. Some even respect the fact that he is such an outspoken advocate for his beliefs. However, his behavior exceeded the limit during one of the recent Friday night outings. It is a frequent occurrence for employees to gather at a bar near the office to relax and socialize after a long week's work. This particular Friday, Eric joined the group. After a while, and a few drinks, the topic turned to the upcoming city election. What started as a discussion of various issues and positions quickly developed into a very heated argument when Eric got involved. Eric and two female employees became involved in a frenzied argument over the merits of the candidates' positions on potholes. Eric had had several drinks and was becoming very loud and obnoxious as he advanced his position. It was obvious to those there that the women, who weren't familiar with Eric and his argumentative style, were becoming uncomfortable. As Eric paused to take a breath in one of his diatribes, the women got up to go to the restroom. Eric followed them and was able to corner them in order to continue his tirade. He had them trapped in the narrow hallway leading to the women's restroom and wouldn't let them pass. He started yelling and screaming profanities as he berated the women. He called the women "idiots" for supporting their candidate, reducing the two women to tears. At this point the bouncer intervened and threw Eric out of the bar.

At 8:00, Monday morning a group of 14 employees are in your office. The group consisted of eight employees who had been at the bar Friday night, but not the two women Eric had cornered, three employees who had witnessed the incident in the break room and three interns from Eric's group. The group is demanding that you fire Eric immediately for his abusive behavior. As the group sits in your office, a number of issues run through your mind, including: Is this a group of jealous, envious employees who are trying to take advantage of a situation in order to get an outcome they desire? Whether Eric's behavior warrants termination? And if so, whether you have the authority to fire Eric for off the job behavior? And if you fire Eric will you be overruled by the vice president ofthe division? As Regional Products Group Director, you know that you must do something about this situation, but what?

COMPANY POLICY: OFF-DUTY BEHAVIOR

"Employee conduct during off duty hours is a reflection on the company's image. As such, we expect all of our employees to behave in a responsible manner outside their normal work hours. Failure to do so, may result in disciplinary action.

AuthorAffiliation

Carrol R. Haggard, Fort Hays State University

chaggardc@fhsu.edu

Patricia A. LaPoint, McMurry University

lapointp@mcmurryadm.mcm.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 2

Pages: 57-60

Number of pages: 4

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192411760

Document URL: http://search.proquest.com/docview/192411760?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 25 of 100

INTERLANDDATA WEB HOSTING: STRUCTURING THE ORGANIZATION FOR GROWTH

Author: Kargar, Javad

ProQuest document link

Abstract:

The two entrepreneurs responsible for InerlandData' s success were Mark Hamidi and Susan Hamidi, founder and Chief Technology Officer, and CEO/Director of Marketing, respectively. They have worked as a team since 1995, when Mark founded InterlandData. Initially, Mark operated the business on a part time basis from his home.

Through word of mouth and various search engines in the initial stages ofthe Internet boom, businesses requested services from InterlandData. By lune 1996, it had 100 customers and Mark had moved the business out of his basement into the company's first office. In 1998, the company became incorporated, and by lune 1999, it had reached a milestone of 1,000 customers. In the first quarter of 2004, the company had grown to a client base of more than 2500 in 42 countries, and the owners believed that the business was only operating at about 60 percent capacity.

Full text:

Headnote

CASE DESCRIPTION

The primary subject matter in this case is formulating strategic decisions that need to be made regarding a small entrepreneurial firm's future direction. The owners are a couple who are faced with the decision of whether or not to expand as well as with the challenges of obtaining the necessary financing, structuring the organization for growth, and allocating management time. This raises several issues and illustrates several lessons. In particular, management proposes potential changes, offering students the opportunity to critique their plans. Evaluated carefully, students should identify the critical success factors and whether and how these elements can be leveraged as they implement their expansion plans. The purpose of this case is to provide students with enough information about the business situation to be able to chart what course of action the company should take at a given point in time. This case has a difficulty level of four, appropriate for senior level. It is designed to be taught in two class hours and is expected to require four hours of outside preparation by students.

CASE SYNOPSIS

During the summer of 2004, the owners of InterlandData, Mark and Susan Hamidi, began to assess their current position within the Web hosting industry and their alternatives for expansion. After nine years in operation, the company had achieved a reasonably stable, yet not highly profitable financial footing. Both owners are experiencing considerable pressure to expand their organization. They believe that opportunities exist to franchise the operation, or grow by expansion. The case ends with the co-owners faced with making a strategic decision about the best way to expand and how to find both the managerial and financial resources to do so. An implicit question in the case involves the long-term viability of the business.

INTERNAL ENVIRONMENT

Brief History

The two entrepreneurs responsible for InerlandData' s success were Mark Hamidi and Susan Hamidi, founder and Chief Technology Officer, and CEO/Director of Marketing, respectively. They have worked as a team since 1995, when Mark founded InterlandData. Initially, Mark operated the business on a part time basis from his home.

Through word of mouth and various search engines in the initial stages ofthe Internet boom, businesses requested services from InterlandData. By lune 1996, it had 100 customers and Mark had moved the business out of his basement into the company's first office. In 1998, the company became incorporated, and by lune 1999, it had reached a milestone of 1,000 customers. In the first quarter of 2004, the company had grown to a client base of more than 2500 in 42 countries, and the owners believed that the business was only operating at about 60 percent capacity.

Management and Personnel

There were five employees at InterlandData including Susan and Mark Hamidi. Susan was President and CEO of the company. She joined the venture in 1996 and had previously worked as a Staff Accountant at a network-marketing firm for three years. Her managerial responsibility included direct supervision of two employees, Mary and Pam. Susan's primary goal was to increase the customer base in North Carolina in which the company operated. She worked diligently towards her goal by exhibiting at various trade shows and networking at local professional association meetings.

Mark had only one employee under his direct supervision, Bill, and hence identified his main weakness as his lack of desire and ability to manage people. Yet, Mark felt that his main strength was the ability to analyze and correct technical issues. He felt that one of his biggest accomplishments was the continued growth and profitability of the company despite the economic downturn. Mark a Masters in Computer Science from the University of London.

Mark and Susan owned 100 percent of the stock in the company. They had not set any long-range goals. The company had no written business plan, and the management team did not feel that a formal plan was necessary. "We have been too busy surviving to think about where we should be five years from now," says Mark. "But now that the company is on its feet, we're going to think about the future."

Products and Services

InterlandData's operations consisted of Web hosting, Web design, IT solutions and other Web services. Under Web hosting, the company offered both dedicated and virtual Web hosting packages. Dedicated plans started at $149 per month, while virtual plans ranged from $19 to $60 a month. A standard dedicated hosting package included generous amounts of bandwidth, several email accounts, user accounts, virtual hosts, large amount of disk space, a back-up server, SSL certificate, and 24/7 technical support. These features were relatively consistent among competitors in the hosting industry.

Unlike most of the Web hosting firms, InterlandData did not have an established fee for every feature or service. After a potential client noted where his/her interests lay, the company would begin negotiating procedures with the customer until an agreement was formed between them. The company was also able to offer e-commerce websites, which often included flash animations and database driven features.

With regard to IT solutions, the company offered the independent services of systems programming, computer cabling/networking, secure certificate installation and custom software development. These services like e-commerce services were charged on a project-by-project basis with factors such as time and intensity ofthe project being weighed. The same tactic was often utilized when providing Web design services.

Operations

InterlandData's office included a reception area, three offices and one room dedicated for servers and technical equipment. The company owned and operated the servers guaranteeing them with a 99.99% uptime.

The company's Data Center was outsourced to a local company. Although InterlandData had back up files, it was very difficult to switch the Data Center if the need should arise. The Data Center staff provided continuous observation through a closed circuit TV system to protect against unauthorized entry. The Network Operations Center was the central nervous system for the Data Center, and it included servers that were housed in a high-tech, locked cabinet with customer security at heart. Onsite diesel-powered generators were ready and waiting to prevent service interruption at the first sign of loss power. In the event of power disruption, the Automatic Transfer Switch would power the generators within seven seconds for continuous operations.

InterlandData's Customers

The customers served by InterlandData were both individual resellers and businesses around the world. Susan estimated that about 2,500 customers used the Web design and Web hosting services of the company in early 2004. In the USA, the largest customer concentrations were found in the states of Texas, North Carolina, California, New York, and Florida. They had only 216 customers in their own state of North Carolina. Of the USA' s customers, eighty percent were small businesses (less than 500 employees), fifteen percent were medium sized companies (between 500 and 1000 employees), and large businesses (over 1 000 employees) accounted for about five percent. In the foreign market, the larger customer bases were located in Germany, Australia, England, West Africa, Portugal, Sweden, and Thailand.

Marketing and Advertising

InterlandData's marketing objectives were to attract more users, to retain the business of current users, and to enhance the company's brand awareness. In 2002, the company's marketing and advertising budget was about $19,600, the majority of which was focused on growing the customer base. The company did not have much success with the use of dedicated sales staff in promoting the company's services. According to Susan, the resulting sales volume and the return on investment was not sufficient to support the costs of a sales position. In addition, Susan found print advertising too expensive for the company. She creatively arranged cheaper advertising in some high profile publications.

InterlandData's most effective means of attracting customers was through referrals from existing customers. One of the company's incentive programs was tied to the referral business segment. Some customers who referred others received free hosting services for a designated number of months, others received deep discounts on service charges, and still others received cash rebates. Historically about fifty five percent of the company ' s new sales had been a direct result of word of mouth.

Customer Service

InterlandData's management believed that attentive customer service was critical to retaining and expanding its customer base. Customer service representatives were available 24 hours a day, seven days a week to provide assistance via e-mail or phone. Although there was no on-site staff at the company's office twenty-four hours a day, the company had a system that received calls after business hours. Customers needing tech support would either email or call InterlandData. After business hours, the on call person who was designated according to rotation, would be responsible for checking the email messages from home and carrying the pager that indicated when the company had received telephone calls. Each server was checked every 2.5 minutes by an automated machine, and if there were a problem, the machine would page the person on duty.

Historical Financial Performance

Like many new ventures, InterlandData's first three years of operation were financially unstable, in part because their services were new to the market. Early marketing efforts generated positive publicity as well as numerous word-of-mouth referrals among clients. By the fourth year of operation, the financial picture had stabilized as a result of improving operations.

Historically, the business' growth had been financed through retained earnings, and a line of credit with Bank of America. In 2001, the company had its highest amount of long-term debt of $26,038. As of 2000, the company had no long-term debt. In general, the management did not like debt, but occasionally they drew cash on a credit line and paid it off within two weeks.

In particular, operating profits in year 2003 had declined. Further, even though total revenue had been growing in previous years, it became evident that its rate of growth had started to slow or remain at 28 percent. Mark and Susan wanted to reverse these trends and insure a strong position for their business in the future. The company had been making positive profits, and there still existed a lot of upside potential.

INDUSTRY AND COMPETITIVE ENVIRONMENT

The Web hosting industry was characterized by a wide variety of different types of providers, most of them small. In 2004, it was estimated that there were over 10,000 Web hosting providers worldwide. Providers ranged from One-Source Providers, to Application Services Providers and Managed Service Providers. Products and services from One-Source Providers included custom Web site design, custom programming, strategic consulting, marketing and promotion. Application Service Providers incurred the costs of building and maintaining applications and databases for their corporate clients. With Managed Service Providers, the clients had their own servers with full monitoring and maintenance services and around the clock technical support.

In 2004, the Web hosting market was highly competitive, in part because the market was saturated, supply remained greater than demand and there was a high degree of fragmentation. The existing players in the market in addition to pure Web hosting companies included Application Server Providers (ASP), Internet Service Providers (ISP), telecommunications companies, computer hardware suppliers and large information technology firms. Ofthe thousands of companies in the industry, some of the major players included Verio, AT&T, IBM, Sprint, Dell Host and Navasota. Although there were big names, there were no big profits within the industry. They intended to serve the market by achieving economies of scale in their operations.

Despite the declining trend in the Internet economy, which began during 200 1 and continued through the first quarter of 2004, the hosting industry continued to grow because businesses were increasingly using the Web for commercial activities. International Data Corporation, a leading market research firm, predicted that the Web industry revenues would increase from $5 billion in 2001 to over $19 billion in 2004.

Between 2001 and 2002, the largest threat to Web hosting providers was the poor state of the economy, which generated little consumer confidence in any business. The new trends in 2003 had included substantial price discounting, more standardization of Web hosting products and services and use of do-it-yourself software and books. The competition became more intense with the 2002 launch of small-business hosting providers such as Yahoo! with its "business-class Web hosting service" and AOL with its "AOL for Small Business" offering for small-office/home-office customers.

Outsourcing marketing functions and public relations of Web hosting providers were also developing trends in 2004. Marketing agencies could assist Web hosting firms with all components of marketing communications, from developing the marketing plan and strategy to actual execution of advertising plans or public relations. Advertising and marketing agencies could negotiate media-buying rate discounts of up to 40 percent on behalf of Web hosting clients. These volume discounts provided an economies-of-scale cost savings that even large Web hosting companies could not achieve on their own.

POSSIBLE GROWTH STRATEGIES

Susan and Mark believed that timely decision-making was critical to the long-term growth of the firm. Given the competitiveness of the Web hosting business, it was foreseeable that Web hosting would become as competitive in the future. Mark believed that the companies that provided low prices would eventually decline and go out of business due to the lack of qualified support staff. They felt they needed to make plans and could not afford to wait another year and adopt a "wait and see" attitude.

Mark and Susan were considering franchising the company's operations thinking that it would increase profits with minimal investment on their part. Another possible growth option was to grow via expansion, such as through branch offices, or through licensing of the concept. Still, another option was to pursue niche strategy through focusing on either one attractive industry globally or all small businesses in the state of North Carolina.

With all of these alternatives facing them, Mark and Susan knew they had to make some choices and begin planning InterlandData's future. With financial and managerial resources a primary concern in this decision, the question was which direction to choose and how to best plot a path toward a successful future. To Mark and Susan, none of the choices sounded all that great. Maybe there was something they were missing.

AuthorAffiliation

Javad Kargar, North Carolina Central University

jkargar@earthlink.net

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 2

Pages: 61-65

Number of pages: 5

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192411630

Document URL: http://search.proquest.com/docview/192411630?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 26 of 100

TRANSFORMATION AT BTR

Author: Kerr, Gerry

ProQuest document link

Abstract:

The primary subject matter of this case concerns the viability of the transformation being undertaken in a large, widely diversified company with a storied past. Secondary issues include assessing merger and/or acquisition partners and the ability to assess organizational "fit" with its environment, between its headquarters and businesses, and across the portfolio. The case has a difficulty of six (appropriate for the second-year graduate level). The case is designed to be taught in three class hours and is expected to require six hours of outside preparation by students.

Full text:

CASE DESCRIPTION

The primary subject matter of this case concerns the viability of the transformation being undertaken in a large, widely diversified company with a storied past. Secondary issues include assessing merger and/or acquisition partners and the ability to assess organizational "fit" with its environment, between its headquarters and businesses, and across the portfolio. The case has a difficulty of six (appropriate for the second-year graduate level). The case is designed to be taught in three class hours and is expected to require six hours of outside preparation by students.

CASE SYNOPSIS

The story of BTR spans exactly 200 years and includes some of the most prominent leaders in British industry. The decision to be made in the case is the direct result of a successful corporate strategy coming out of phase with the changes going on during the 1990's. New management attempts to refocus the firm, but the plan is not well formulated initially, requiring adjustment and a protracted period of implementation.

The case describes the recent history of BTR in two major phases. The short first section begins in 1965 and is marked by the application of a niche-oriented business acquisition policy. Management scanned the environment for wayward businesses that would respond to BTR's methods. Heavy reliance was placed on sound financial reporting and oversight, after a period of transformation.

By the end of 1995 - after exactly 30 years - BTR's performance had sharply deteriorated. Forces outside and inside the firm incite mammoth change in the company. Initially, BTR was to be an "international manufacturing and engineering company, "a more focused firm, better able to exploit relationships between the businesses. The depth and pace of the changes required were underestimated, however, and corporate management was forced to re-develop BTR the following year into a "leading global engineering company". But, the difficulties of the changes, and the complicating factors of BTR's decreased dividend and an over-extended warrant program, suggest that time and patience may have run out on the firm. At the end of the case, management is left to decide whether to finish implementing the current strategy or to seek partners for merger.

AuthorAffiliation

Gerry Kerr, University of Windsor

gkerr@uwindsor.ca

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 2

Pages: 67

Number of pages: 1

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192411617

Document URL: http://search.proquest.com/docview/192411617?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 27 of 100

STONEBRIDGE COUNTRY CLUB: CASH... IS THERE ENOUGH?

Author: Kunz, David; Dow, Benjamin L

ProQuest document link

Abstract:

Stonebridge Country Club opened in 1979 as part of a 450-acre residential real estate development in Abilene, Texas, a west Texas community located 190 miles from Dallas/Ft. Worth. Abilene, like many Texas cities, had benefited greatly from soaring oil prices during the late 1970's and early 1980's. In 1979, Abilene had a population of over 100,000 and only 36 holes of golf, one 18-hole private course at Abilene Country Club and one public 18-hole municipal course. Mike and Iosh Andrews, owners of LaMiss Inc., a 40,000 barrel-a-day refinery located in Louisiana on the Mississippi River, were the primary investors in Stonebridge. The Andrews brothers reasoned the time was right to build an additional private course in Abilene. San Angelo, a smaller city to the south of Abilene, already had five golf courses in 1979. In addition, Abilene Country Club was known more for its dining and social aspects rather than quality golf. The Andrews brothers had hoped the community would respond to a high quality, golf oriented country club. Initially, their assumptions proved correct and during its peak, Stonebridge attracted over 400 members. However, even as early as 1982, there were signs that the oil boom was nearing its end. The gradual decline of oil prices made it less and less profitable for many companies to continue operations in the oil patches of West Texas. By the late 1980's, LaMiss Inc. had ceased operations as giant competitors were refining 500,000 barrels of oil a day more economically.

Concurrently, Stonebridge's membership had steadily declined and the Andrews brothers eventually sold the club in 1990 to a local civic-minded philanthropist, Jane Nichols, who continued operating the club while Stonebridge members set about trying to increase membership to raise money and buy the club. Nichols realized if Stonebridge Country Club closed, the property values around the club might drop which would reduce school funding and limit growth during an already turbulent economic period.

Full text:

Headnote

CASE DESCRIPTION

The primary subject matter of this case concerns the development and use of a cash budget as a key component in a cash management system. The case requires students to have an introductory knowledge of accounting, finance and general business issues, thus the case has a difficulty level of three (junior level) or higher. The case is designed to be taught in one class session of approximately 1.25 hours and is expected to require 2-4 hours of preparation time from the students.

CASE SYNOPSIS

Paul Sparks, a successful pharmacist and avid golfer, recently sold his family run drug store and is negotiating with Golf Corp LLC to purchase Stonebridge Country Club. Stonebridge Country Club is a private golf course that Sparks has been a member of for the last 20 years. Sparks and Golf Corp LLC have tentatively agreed on a purchase price providing Sparks can arrange financing. Sparks has developed projected income statements, balance sheets and cash flow statements for the first four years of operation for his new company and approached a local commercial bank for a working capital loan and equipment financing. The bank expressed an interest in making the loans but requested Sparks include a cash budget for the first year of operation.

STONEBRIDGE COUNTRY CLUB BACKGROUND

Stonebridge Country Club opened in 1979 as part of a 450-acre residential real estate development in Abilene, Texas, a west Texas community located 190 miles from Dallas/Ft. Worth. Abilene, like many Texas cities, had benefited greatly from soaring oil prices during the late 1970's and early 1980's. In 1979, Abilene had a population of over 100,000 and only 36 holes of golf, one 18-hole private course at Abilene Country Club and one public 18-hole municipal course. Mike and Iosh Andrews, owners of LaMiss Inc., a 40,000 barrel-a-day refinery located in Louisiana on the Mississippi River, were the primary investors in Stonebridge. The Andrews brothers reasoned the time was right to build an additional private course in Abilene. San Angelo, a smaller city to the south of Abilene, already had five golf courses in 1979. In addition, Abilene Country Club was known more for its dining and social aspects rather than quality golf. The Andrews brothers had hoped the community would respond to a high quality, golf oriented country club. Initially, their assumptions proved correct and during its peak, Stonebridge attracted over 400 members. However, even as early as 1982, there were signs that the oil boom was nearing its end. The gradual decline of oil prices made it less and less profitable for many companies to continue operations in the oil patches of West Texas. By the late 1980's, LaMiss Inc. had ceased operations as giant competitors were refining 500,000 barrels of oil a day more economically.

Concurrently, Stonebridge's membership had steadily declined and the Andrews brothers eventually sold the club in 1990 to a local civic-minded philanthropist, Jane Nichols, who continued operating the club while Stonebridge members set about trying to increase membership to raise money and buy the club. Nichols realized if Stonebridge Country Club closed, the property values around the club might drop which would reduce school funding and limit growth during an already turbulent economic period.

Stonebridge members eventually arranged to purchased the club in 1993 from Nichols, but were not able to completely pay off the debt until 1999 when members, after several years of disagreement concerning the club's future, finally agreed to sell Stonebridge to Golf Corp LLC, a private company specializing in country clubs. According to a former member, "There were a lot of arguments about why membership was stagnant and who we should borrow more money from, and it appeared that there was really no other way out".

In January of 1999, Golf Corp LLC purchased the club and grounds, and invested over $1 million in renovations, repairs and remolding in order to boost membership. Golf Corp LLC was founded in 1991 with a strategy to acquire and manage golf courses in "demand driven" markets that provide opportunities for revenue growth and margin improvement through Golf Corp's integrated marketing and operational programs. The essence of Golf Corp's strategy is to "market" each course as a separate brand with well-defined customer segments, distinctive positioning, tailored "one-to-one" programs - and responsive tracking and follow-up. However, by 2004, Stonebridge was not expected to provide the return required by Golf Corp's investors and once again, Stonebridge Country Club was up for sale.

BUYERS BACKGROUND

Paul Sparks is sixty-one years old and recently sold the family run drug store he opened 30 years ago. Sparks graduated from the University of Texas' College of Pharmacy in 1965 and a few years later returned to Abilene to open Hillsdale Pharmacy. Mr. Sparks is an accomplished golfer with regional recognition, having won numerous local amateur tournaments over the past 20 years. Traditional retirement activities were not enough to completely satisfy Sparks and when the opportunity to purchase Stonebridge Country Club arose, he decided to pursue a lifelong dream of owning a golf course.

Sparks lived in the residential community adjacent to Stonebridge Country Club and had been a member of the club on and off over the last 20 years. Initially, Stonebridge was a fabulous golf facility with adequate dining, clubhouse and pool facilities, but the decline in oil prices led to a decline in membership and eventually a decline in capital improvement spending needed for maintenance and upkeep. Sparks had dropped his membership in 1992 and joined Abilene Country Club even though it was less conveniently located across town. Sparks, like many of his friends, had become increasingly frustrated by the deterioration of Stonebridge's golf course conditions over the years. Sparks decided to rejoin Stonebridge in 1999, when the club was sold to Golf Corp LLC, under the impression that Golf Corp LLC would have the financial resources to return the golf course to its previous splendor.

Reportedly, Golf Corp LLC had invested over $1 million in renovations and improvements, but in Sparks' opinion, course conditions remained adequate at best. Most of the revitalization efforts were targeted at the dining facilities, club house, and pool. Although membership numbers at Stonebridge had risen to around 200, up from 160 in 1999, the club was no where near the over 400 members seen during the oil boom years of the late 1970s and early 1980s.

GOLF INDUSTRY

Prior to 1970, the golf market had two different types of courses, lower budget courses operated mainly by municipalities, and more upscale private country clubs. In the earlier 1970's a new trend known as "A Country Club for a Day" began to emerge as the title for newer upscale daily fee courses. These courses were open to the public and provided high quality design, maintenance and service. At present, most of the industry research is based on a three segment framework, which classifies courses as municipal, daily-fee, or private. Table One provides a historical perspective on the number of golf facilities under each ofthe traditional market segments. Over the last 30 years, the golf course market has gradually emerged from a three segment market to one that contains many market segments.

In reality, the golf course market now contains many more market segments. These market segments are based on several interrelated factors with a focus on the type of customer served. For example, a private club may serve local residents in a certain income bracket, while a similar private club may be structured to serve corporate clients.

On the demand side, the total number of golfers in the United States has remained fairly flat over the last five years, but has increased from 10 years ago. In 1994, an estimated 23 million Americans were classified as golfers having played 421 million rounds of golf at approximately 11 thousand courses. By 2004, the number of American golfers has grown to 27.4 million and the number of rounds played increased to approximately 498 million. Ofthe 27.4 million total golfers in the US, 12.8 million are classified as core golfers (playing more that seven rounds per year) and 14.6 million are occasional golfers (playing one to seven rounds per year). The average core golfer plays 37 rounds per year (see Table Two for a year by year comparison of growth).

THE SITUATION

Sparks and Golf Corp LLC have tentatively agreed on a purchase price providing Sparks can arrange financing. During the negotiation process with Golf Corp LLC, Sparks was assisted by Rick Scott, an associate with Williams Ine; headquartered in Little Rock, Arkansas. Williams Inc. is one of the largest investment banking firms off of Wall Street and has a long historical record of assisting firms arrange financing for new ventures. Williams Ine maintains over 30 offices in key financial cities throughout the United States, including Dallas and Austin.

Sparks, with the help of Scott, developed projected income statements, balance sheets and cash flow statements for the first four years of operation for his new company and approached a local commercial bank for a revolving credit agreement of $200,000 and property and equipment mortgage loan of $1,200,000 (no principal payment is required until maturity). Sparks would invest $600,000 as equity. The projected income statement, balance sheet and cash flow statement for the first year of operation is provided in Tables Three, Four and Five. The bank has expressed an interest in providing the credit but asked Sparks to prepare a cash budget for the first year of operation to ensure the requested financing is adequate. Sparks was unsure how to begin and requested Scott's assistance. Scott stated that similar to preparing forecasted financial statements, they needed to prepare a list of operating assumptions.

THE TASK

Prepare answers to the following questions:

1) Construct a monthly cash budget for Stonebridge for the period Ianuary through December 2005. Assume that all cash flows occur on the 15th of each month. Is the requested $200,000 revolving credit agreement sufficient to meet the needs of Stonebridge during the year? Explain your answer.

2) The cash budget contains both cash inflow and cash outflows. Which do you feel are likely to be the most accurate? Explain your answer.

3) Scott thought it would be beneficial to prepare two additional cash budgets, one based on 75 new members and another with 125 members. Construct two additional monthly cash budgets using the different levels of new members and again assume that all cash flows occur on the 15th of each month. How do the different new membership numbers impact Stonebridge's cash needs? Will the $200,000 revolving credit agreement be sufficient? Explain your answer.

4) Without constructing a new cash budget, explain the impact on Stonebridge's cash requirements if the 100 new members are recruited but there is a three month delay when they join (e.g. expected January members don't actually join until April, February members join in May, etc.).

5) Why is depreciation expense not part of the cash budget?

6) The monthly cash budget prepared assumes that all cash flows occur on the 15th of each month. Suppose most of Stonebridge's outflows are at the beginning of the month, while its collections are toward the end of each month. How would this fact alter the cash budget?

7) Suppose the bank refused to grant the revolving credit agreement what options are available to the company?

8) Temporary excess cash can be invested in marketable securities. What are the characteristics of marketable securities? If excess cash is projected to be continuing rather than temporary, are marketable securities the appropriate investment? Explain your answer.

9) Once again assume all cash flows occur on the 15th of each month. How large of a revolving credit agreement would you recommend Sparks arrange with the bank? Defend your answer.

References

SUGGESTED REFERENCES

Brigham, Eugene F., and Phillip R. Davis, Intermediate Financial Management, 7th Edition, South-Western/Thompson Learning.

National Golf Foundation, www.ngf.org.

Society of Golf Appraisers, www.golfappraisers.com.

AuthorAffiliation

David Kunz, Southeast Missouri State University

dkunz@semo.edu

Benjamin L. Dow III, Southeast Missouri State University

bdow@semo.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 2

Pages: 69-72

Number of pages: 4

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192411775

Document URL: http://search.proquest.com/docview/192411775?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 28 of 100

WHITTAKER MEMORIAL HOSPITAL

Author: Makamson, Edwin L

ProQuest document link

Abstract:

The primary subject matter is strategy under adverse conditions for a small community hospital. The case examines operational, financial and market factors for strategy development. Issues of governance and stakeholder claims for a non-profit, community organization are also examined. As a student case analysis assignment the case is appropriate for an undergraduate capstone course in business policy presented in the context of strategy for non-profits, single business strategy, or governance topics, and for a senior or master's level course in health case management. While class presentation depends on the instructor's choice of scope of the subjects covered, a full discussion and analysis can be rendered within a 50 minute period. A student should anticipate a 2-3 hour commitment to complete the case questions.

Full text:

CASE DESCRIPTION

The primary subject matter is strategy under adverse conditions for a small community hospital. The case examines operational, financial and market factors for strategy development. Issues of governance and stakeholder claims for a non-profit, community organization are also examined. As a student case analysis assignment the case is appropriate for an undergraduate capstone course in business policy presented in the context of strategy for non-profits, single business strategy, or governance topics, and for a senior or master's level course in health case management. While class presentation depends on the instructor's choice of scope of the subjects covered, a full discussion and analysis can be rendered within a 50 minute period. A student should anticipate a 2-3 hour commitment to complete the case questions.

CASE SYNOPSIS

Whitaker Memorial Hospital is a small community hospital created to serve the health needs of the African American community in the early 1900's. The hospital has over time expanded but by the 1980's has experienced declining demand and growing financial problems which result in an attempt to reorganize under Chapter 11. The Hospital Director Dr. Bryant in 1995 has successfully led an attempt to save the hospital from a merger by contesting the authority of the sitting board and pledging to continue the hospital's operation as a community institution.

The case narrates in background the history of a unique American institution, the African American hospital, and traces through the case of Whitaker Memorial the complexities of surviving in a changed society. The case presents the hospital's difficulties with management, operations, and changed market conditions. As the original "community" ofthe East End has changed by 1995 the issues of "Who is the 'community' served by the hospital? " and "Who has a claim to govern the community hospital?" are raised and resolved in the narrative.

AuthorAffiliation

Edwin L. Makamson, Hampton University

edwin.makamson@hamptonu.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 2

Pages: 73

Number of pages: 1

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192411650

Document URL: http://search.proquest.com/docview/192411650?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 29 of 100

ZEIT SAIC: THE ENTREPRENEURIAL HISTORY OF A FAMILY BUSINESS IN ARGENTINA

Author: Marshall, Paul S; Balfhor, Christian

ProQuest document link

Abstract:

The muddy water of the Rio de la Plata slapped against the hull of the old British freighter as the city of Buenos Aires (BsAs.) came gradually into focus through the morning mist. The long and dangerous journey from Southampton was nearing its end. German U-boats prowled the Atlantic and would have liked nothing better than to send this or any English ship to the bottom. The year was 1940 and an eight-year-old boy, George Brown, his extended family and all of their limited physical possessions were aboard. They were about to begin a new life in what most would then agree was the greatest city in the richest country in the southern hemisphere. Even though their prospects appeared bright, Buenos Aires was a very foreign place. None of the Browns spoke Spanish; in fact, only the children were truly fluent in English. Six years prior the Browns, then known as the Brauns, left Germany ahead of Nazi oppression of the Jews. The Browns were not only smart to leave Germany early enough to assure their safety; they were smart enough to get a substantial sum of money converted to British pounds sterling and have it wired to Barclays Bank in London. Despite that money was frozen in the bank because of the war prohibitions, it acted as a guarantee for a big loan from a distant relative and provided the cushion necessary to re-establish themselves in their new home.

Full text:

Headnote

CASE DESCRIPTION

The primary subject matter of this case concerns developing an action plan to attempt to save an old line Argentine manufacturing and service firm in the face of a collapsing economy in Argentina and significant technological change making their main product obsolete. The primary focus is that of general management and as such encompasses most of the business disciplines, but stresses primarily finance, marketing and corporate strategy issues. Secondary issues include the role of preparing and analyzing financial statements to aid management decisions and an appreciation of international issues. The case has a difficulty level of four, and is positioned for use in an undergraduate senior level cap stone strategy and policy course. The case is designed to be taught in ten class hours and is expected to require about five hours of outside preparation by students.

CASE SYNOPSIS

This case follows the career of George Brown, particularly in relation to Zeit, S.A.I.C., his family's business. After an on and off early association with Zeit, George, late in his career, joined the Company permanently in 1990 as V.P. In 1998, against the objections of his family, he purchased full control of the Company. That year was momentous since it began a steep decline in the business fortunes of Zeit precipitated by both changing technology and the Argentine financial collapse. The setting for student recommendations is in the middle 2003, near the bottom of the Argentine depression.

ZEIT SAIC: THE ENTREPRENEURIAL HISTORY OF A FAMILY BUSINESS IN ARGENTINA

THE BEGINNING.

The muddy water of the Rio de la Plata slapped against the hull of the old British freighter as the city of Buenos Aires (BsAs.) came gradually into focus through the morning mist. The long and dangerous j ourney from Southampton was nearing its end. German U-boats prowled the Atlantic and would have liked nothing better than to send this or any English ship to the bottom. The year was 1940 and an eight-year-old boy, George Brown, his extended family and all of their limited physical possessions were aboard. They were about to begin a new life in what most would then agree was the greatest city in the richest country in the southern hemisphere. Even though their prospects appeared bright, Buenos Aires was a very foreign place. None of the Browns spoke Spanish; in fact, only the children were truly fluent in English. Six years prior the Browns, then known as the Brauns, left Germany ahead of Nazi oppression of the Jews. The Browns were not only smart to leave Germany early enough to assure their safety; they were smart enough to get a substantial sum of money converted to British pounds sterling and have it wired to Barclays Bank in London. Despite that money was frozen in the bank because of the war prohibitions, it acted as a guarantee for a big loan from a distant relative and provided the cushion necessary to re-establish themselves in their new home.

Argentina in 1940 was very different place both absolutely and relatively than it is in the early days of the third millennium. The country's population was only 15 million and ofthat 4.5 million were Portenos, versus 36 million and 11.3 million respectively in 2001 . Some would argue that Argentina had passed its peak position in relative wealth prior to their arrival. In the late 1920s it was estimated that GDP per capita was equal to that of France and not far behind the U.S. or the U.K. In 2001, the Argentine per capita GDP was 38%, 28% and 41% ofthat in France, the U.S. and the U.K. respectively. The Great Depression, still going strong in most of the world, had not been kind to any country, but the associated falling prices for commodities such as wheat and beef, particularly devastated the Argentine economy. Good prices and high demand had not yet returned. In 1940, Argentina produced little sophisticated manufactured goods. Yes, it was self sufficient in its simple needs such as pots and pans, soap and furniture, as well as fully competent to process its agricultural based exports. Most high technology manufactured products such as high-tension electrical cable, light bulbs, telephones and gas turbines were imported, up until the year before mostly from England; more recently from America. Furthermore the war, just really beginning in Europe, would both greatly increase the demand for Argentine foodstuffs, but perversely make its delivery to market almost impossible. The Brown family, since the early days of the 20th century, had an involvement in the German electrical fixtures and components manufacturing industry. The hope was that this expertise would be valuable in Argentina.

THE ZEIT SWEET TIME.

The protectionist environment existing all over the world in 1941 permitted the Brown family to discover a business opportunity in Buenos Aires. The production and distribution of technology based manufactured goods such as telephones and other electro-mechanical devices in an expanding and protected market was a niche crying out to be filled. In partnership with another family, the Weiss's, who immigrated at the end of the 19th century, the Brown' s bought 40% of Zeit stock. Despite the crisis of the Second World War, the Argentine domestic market was growing rapidly. Although The Browns were dealing with a new business culture, their commitment to hard work and their wise businessjudgment permitted them to improve their financial situation. In 1951, George's father bought an additional 10% of the stock, reaching 50% control of Zeit.

Other than three years spent in Germany in the mid-1950s working as an apprentice at Lichtlighter, a Hanover based manufacturer of time recorders, George had been educated in BsAs., married, raised a family and felt himself to be fully Argentine. Over time, George gained more experience in the family business, but as the youngest son of one of the partners he found it difficult sometimes to have his business ideas taken seriously by his father. In 1959 his expectations started to be fulfilled when the management offered him the possibility of running a new business as CEO of Roticator Co., a new affiliated company. At that point, Zeit management discovered a new market challenge through the development of a new product, the "Tele-Communicator". Their business technology was so innovative that it permitted customers to easily make external and internal calls on one single device for the first time. At Zeit this product line was usually referred to as the "intercom." In order to minimize risks Zeit decided to divide the company into two business units. They settled on a new corporation called Roticator with George the 27-year-old CEO. While Zeit continued offering their mechanical time recorder and other mechanical devices, this new product line set Roticator free to explore and experiment with new markets. Obviously, in order to preserve and nurture the new business, Zeit was prepared to give financial support in the early years. Fortunately, the business was a success from the beginning. In five years, Roticator became the clear market leader in a new growing market: business telecommunications. By helping their customers fulfill their needs in communications, Roticator conquered their competitors and dominated domestic market share. The business became so strong that Roticator was in a position to open branch offices all over the country. Within ten years, Roticator offered their services in most populous Argentine cities: Rosario, Cordoba, Santa Fe, Mendoza, Parana, Mar del Plata and La Plata.

The secrets of their success were based in two strategies: the rental equipment system and ultimate quality support maintenance. Through the former, the company was able to rent medium and small devices to their wide range of customers. Through rental systems, both parties got several benefits. The customers got updated equipment (though not as often as today) and excellent technical support without paying a heavy initial investment. Roticator received an increasing and steady cash flow and loyal customers. Literally, the latter strategy was a sine-qua-non condition for the success of the former. Without excellent technical support, nobody would ever have trusted Roticator as their strategic partner to propose and implement communications solutions.

Everything was almost perfect until the mid-1970s. By then the political and economic environment of Argentina had shifted outrageously. A violent political environment and growing economic instability created an inadequate framework for innovation and business success. At that time, George was really worried. He was afraid that the business would not be able to survive these joint threats. George was preoccupied not only with external threats, but also with their own company internal weaknesses. The Zeit shareholders were really delighted with the high dividends paid over the last ten years and they were not capable of suffering a reduction. Even though Roticator profits were "juicy", shareholders hardly recognized that the underlying technology was becoming old. In a market closed to imported goods, such as in Argentina over that period of time, sometimes seeing true world competitive reality was difficult. George was the only one who identified this as the major challenging problem for the future of Zeit.

During October 1978, George reached a tough conclusion about the required future direction of Zeit. He decided to force the issue and announced an ultimatum to the shareholder Board of Directors at their November meeting. Either Zeit would modify their short-term business focus and invest substantial funds into the R&D needed to update the product line, even if dividends had to be substantially reduced, or George would present his resignation. Unfortunately, the Board accepted his resignation. The major shareholders were unreceptive, particularly to the idea of reduced dividends. The intercom business was a great cash cow! Perhaps at that stage of their lives, the older generation viewed sure cash now as far superior to uncertain cash later.

GOING BACK TO THE BATTLEFIELD.

The convulsive situation in the 1980s demonstrated that George was "right on" about the problems facing Zeit. Since 1975, triple-digit annual inflation (an sometimes even higher) was the norm in Argentina, lasting until 1992. All the economic uncertainty (high inflation, huge interest rates, increasing governmental liabilities) adversely impacted the political and social order. Within this crisis environment, the enterprises and entrepreneurs were forced to modify their business practices. At this point, all their efforts and decisions were focused to survive the inflation not to serve the client needs. All companies' profits were made from financial operations, such as investing in junk and government bonds and other high-risk investments, not from the normal reality of making and selling products. Zeit was not an exception in this speculative game.

After some successful personal entrepreneurial activities during the 1980s, George returned to his first love: Zeit, and its time recorders and telecom equipment. At his return inl991, the Board was quite different. His father and the Weiss' were retired and his brother Jerome ran the business. As Commercial VP, George, now age 59, carefully analyzed the then current situation and discovered that the company was far away from its earlier operating margins. George inspired the preparation of a short-term plan in order to reach the break-even point. The first measure of the plan was to merge Roticator back into Zeit in order to reduce fixed costs and an unproductive organizational structure. Secondly, the plan initiated a profound downsizing process all over the company. Employment went from 142 to 91. At first, these initiatives were well accepted by the Board.

FACING THE CRUEL REALITY: ZEIT IN THE NINETIES.

In 1992, the macroeconomic environment was modified once again. The Argentine government stopped the high inflation and opened the market wide to all kind of imported capital and consumption goods. Zeit not only still had a substantially out-of-date technology (electromechanical vs. digital controls), but also their overheads were inefficiently high and costly. At this point, without high inflation, which they had learned to live with, and being thrown into a competitive market now opened to imported goods, George and the Board quickly realized the real dimension of the enterprise's crisis.

The telephone ringing on the morning of May 6, 1992 in the Zeit office on Calle Alsina was eventful. It was not just another customer notifying the Browns that their Zeit intercom system was no longer needed. This cancellation took the Zeit installed base of intercom systems to four digits from five. At their peak in 1987,Zeithad 12,348 systems in almost every Argentine business of any size and each generated an average monthly rental payment to Zeit of approximately $42*. In that year, intercom systems, first

All monetary values are translated into 2005 based U.S. constant dollar amounts.

introduced by Zeit (really, their Roticator subsidiary) made up 87% of revenue. From 1960 until 1990, cancellations were rare and the installed base continued to grow as the Zeit sales force successfully "beat the brush" for new customers. What was disturbing in the early 1990s was that other than the normal amount of bankruptcies, cancellations were mostly from their technically most sophisticated customers. They claimed that the Zeit systems were primitive and that much better and cheaper intercom communication systems were available from new Asian suppliers. The writing was on the wall! It was only a matter of time until the main product of Zeit, that product that sustained the Browns and allowed them to prosper financially, would be at the end of its product life cycle.

Even more disturbing, the electronics and telecommunications revolution that was just beginning to sweep the world in the early 1990s seemed ever accelerating. The Zeit installed base of intercom systems was melting away at an ever-increasing rate and the ability of the sales force to find new customers was falling even faster. Exhibit 1 shows the pattern of the annual lease revenue from the installed base of Zeit intercom systems over the years. Fortunately though, over time Zeit had added new products to their line. In 1956 they purchased the right to produce and sell the mechanical time recorder (AKA "time clock") system of Lichtlighter, Gmbh, of Hanover Germany. Over time Zeit refined and expanded its offerings of time recorders. Exhibit 1 also shows annual sales revenue related to time recorders over the same 1965-2002 period.

Under George's management as Commercial VP, performance of the Zeit time recorder business in the 1990s was good and getting better. Unfortunately, the intercom business continued its steep decline. Manufacturing of both time recorders and intercoms was sited in a Zeit owned 1200 square meter facility in suburban Bs. As. Most products were assembled from foreign imported electrical components and domestically produced mechanical parts. The success of the time recorder business could primarily be attributed to Zeit' contacts with thousands of Argentine businesses through the customer's use of Zeit intercoms. Of course, the 1989 withdrawal of their major foreign competitor, Bailey Controls of Boston, USA, certainly helped. Early versions of time recorders also provided auxiliary (and very profitable) sources of revenue such as proprietary paper time cards specially printed to accept time records. Overtime though, as time recorders became more electronic and particularly as data began to be processed by download to computers, this "gravy" declined in importance. Exhibit 2 shows details of time recorder, auxiliary businesses and the declining level of intercom rental operating margins over most of the 1990s.

DOUBLING THE BET: 100% of ZEIT AND A FIVE-BULLET STRATEGIC PLAN.

On the cool rainy evening of August 12, 1998 George sat in his favorite restaurant, Pedemonte, on Avenida de Mayo awaiting the arrival of Richard Brown, the eldest son of his brother Jerome. Over the past two years, Jerome, in declining health, had gradually withdrawn from the day-to-day management of Zeit, leaving George

(The remainder of this case along with Instructors' Notes is available on request. For a copy please send your e-mail address to: paul.s.marshall@widener.edu)

AuthorAffiliation

Paul S. Marshall, Widener University

paul.s.marshall@widener.edu

Christian Balfhor, Pontificia Universidad Católica Argentina

cbalfhor@uca.edu.ar

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 2

Pages: 75-79

Number of pages: 5

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192411636

Document URL: http://search.proquest.com/docview/192411636?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 30 of 100

MR. FAHAD AL BANNAI, VICE PRESIDENT AXIOM TELECOM

Author: McLaurin, J Reagan

ProQuest document link

Abstract:

Leaders make a difference in organizations. They can simply use their leadership skills and abilities to turn the organizations around. They are the ones who make things happen. When looking closely at the success of leading organizations, one usually observes the leadership process applied by upper-management personnel. Axiom Telecom has proved itself as the leading company in Telecom Products in both the wholesale and retail business in the United Arab Emirates (UAE). In order to understand the success story behind this flourishing company, an interview with Axiom Telecom's Vice President, Mr. Fahad Al Bannai, was conducted. This report provides a background overview about the company and presents a profile of one of the leaders behind the success of Axiom Telecom.

Full text:

INTRODUCTION

Leaders make a difference in organizations. They can simply use their leadership skills and abilities to turn the organizations around. They are the ones who make things happen. When looking closely at the success of leading organizations, one usually observes the leadership process applied by upper-management personnel. Axiom Telecom has proved itself as the leading company in Telecom Products in both the wholesale and retail business in the United Arab Emirates (UAE). In order to understand the success story behind this flourishing company, an interview with Axiom Telecom's Vice President, Mr. Fahad Al Bannai, was conducted. This report provides a background overview about the company and presents a profile of one of the leaders behind the success of Axiom Telecom.

INDUSTRY OVERVIEW

Before exploring the business Axiom Telecom operates in, it is essential to understand the industry in which the business runs in. Axiom Telecom's main products and services are related to telecommunication services and products provided by the telecommunication services companies and telecom devices manufacturers. The company is best known for the sale of leading brands of Mobile phones and wireless devices.

The mobile service in the UAE is probably the fastest growing telecom service provided by Etisalat (The local telecommunication company). The mobile phone penetration has been increasing rapidly for the past few years. It reached 86.8% (against the UAE population figure of 4 Millions) by the end of year 2004. The increase in the number of mobile subscribers demands for an increase in the number of wanted mobile devices. Also, the introduction of new mobile technologies such as 3G would require the availability of new types of mobile phones that supports such technologies. As a result, new opportunities are created for mobile devices retail stores.

The wireless related services have also showed an impressive growth during the past couple of years. The introduction of Wireless DSL and Wireless Cable services by the Internet Service Provider (eCompany) requested the retail businesses to offer Access Point devices and Wireless cards for sales. The popularity of GPRS and WAP services also allowed the telecom related companies such as Axiom Telecom to expand their creativity and innovation to offer services that are directed to GPRS and WAP customers.

COMPANY OVERVIEW

Axiom Telecom was established in 1997 as part of a UAE local corporation, Al Bannai Enterprises. Al Bannai Enterprises is a family owned group of companies that started operations in 1960, in Dubai. The Group has fourteen different business operations in a diversified marketplace.

Today, Axiom Telecom is a leading authorized distributor for many International recognized Brands of Mobile and Wireless devices such as Nokia, Sony Ericsson, Samsung, Motorola, i-Mate, Siemens, Palm and Thuraya. The company started its wholesales business in 1997. However, with a potential growth in Retail Market and the attractiveness of this industry, the company decided to invest in a retail business in 2001, after overcoming a number of obstacles. Recently, the company added another service to its line of business, a service that they call "Value Added Service".

Axiom Telecom specializes in wireless telecommunication products such as mobile phones, satellite handsets and wireless access devices and network cards. The firm has more than 40 outlet stores in prime retail locations such as major shopping malls and business centers as well as more than 65 accessory points in Emarat Service Stations across the UAE. Between the UAE and Saudi Arabia, Axiom Telecom has a little more than 650 employees.

COMPANY'S SERVICES

Axiom Telecom has divided its target market into four categories: Corporate, Distribution, Retail, and Value Added Services.

Corporate: Axiom's Corporate Division targets small, medium and large companies. The division bases its service on three main concepts: dedication, value for money and advanced Services (1-website). In order to capture a large portion of business clientele, the company offers them reasonable rates for a variety of business solutions. This strategy has been very effective in the retention of its business customers. The retention of business clientele is of prime importance as the revenue and profit generated from this target market is the highest.

Distribution: Axiom Telecom has built its brand name around quality and value added services. These qualities enabled the company to be the major distributor of mobile phones and accessories not only in UAE, but also in Pakistan and Jordan. The world leading mobile devices manufacturers trust Axiom Telecom to distribute their products in the countries where Axiom Telecom operates. Dawn Robson, i-Mate's General Manager has stated recently in a press release after declaring a strategic regional partnership with Axiom "We are looking forward to extending our existing relationship with Axiom and building relations between the two companies. Axiom us well known, trusted name and this is of ultimate importance as a distributor of i-mate devices as customers want to buy their devices from a reliable source with market experience and excellent after sales support." The company has also recently started its operation in Saudi Arabia, while studying to open operations in other countries in the Gulf and Middle East. The distribution division of Axiom Telecom is being operated through both direct and indirect channels. The company's obj ective is to maximize its market share through building a flow of communication and cooperation between the company and its dealers.

Retail : Since 200 1 when the management of Axiom Telecom envisioned the potential market growth in the retail business, the company started heavily investing into the retail business. With the managements' great achievement of breaking the monopoly contracts, which the UAE Local agents had with major mobile phone manufacturers, the company started adding different brands of mobile phones and accessories to its line of products. It started with Nokia Mobile phones, and then Sony Ericsson followed by Siemens, Motorola and others. Axiom Telecom was the first company to be an authorized dealer for multiple brands of mobile phones. It was also the major reason for influencing Nokia mobiles manufacturer to change the contents of its trade contract with Emirates Computers. The outcome ofthat pressure was that Axiom Telecom was awarded a Nokia mobile distribution contract for distributing, selling and repairing Nokia mobile phones and accessories.

Axiom's retail stores fall under two main categories: -

1. Grade "A" Stores - These are basically the full blown stores offering a wide array of services to the customers and are located mostly in shopping malls. The target customers of these stores are those who look for value added services and are not sensitive to devices' prices.

2. Kiosks - The kiosks offer a limited range of products and services and are operated through partnership arrangements with various supermarkets like Spinneys, Lulu Centers, Union Co-op etc. Despite the fact that these kiosks are small in size and limited in service provision, they play a vital role for the success of the firm and add a good amount of revenue to the organization. This is due to the fact that they are both cost-effective and target a higher penetration of customers than the Grade "A" stores. The target market for such kiosks is the middle to low-level customers who in a way are price sensitive. Besides these kiosks at major supermarkets, Axiom also sells mobile phone accessories, on consignment basis, across 65 Emarat Service Stations in the U.A.E.

Value Added Services: In a competitive industry and market, the best way to distinguish the company is through a high level of customer service and by offering services that are unique. The wireless technology itself has been booming in the past few years and it is predicted to keep growing in the following years especially with the introduction and implementation of new wireless technologies such as 3G, GPRS and WiMax.

The new designed mobile phone devices and other wireless technology devices support different value added services such as games, customized ring tones, Internet connection, Bluetooth and many more. Axiom Telecom introduced Axiom Plus, which is targeted at mobile users. Axiom Telecom offers mobile users with a wide range of new and exciting services such as wallpapers, picture messages, animated MMS, operator logo, and games. In addition to these services, which are primarily directed to mobile phone users, Axiom Telecom offers other value added services to its general customers. These services are:

Theft Insurance: a new (same model) phone is given to the customers who are a victim of a robbery.

Two Year Warranty : the first and the only retail business who offer a two year warranty on their products

Price Protection Guarantee: if the price of the product drops within 5 days of the purchase, a credit note that covers the difference will be given to the customer

Standby Phone : during the repair, a standby phone is given to the customers whose phones are covered with the Axiom Warranty.

In additional to these services, Axiom Telecom established a world class repair center which is the biggest repair center for mobile phones in the Middle East. The repair center is: equipped with the latest state-of-the-art servicing equipment, run by qualified and experienced Electrical and Computer engineers, and staffed with service employees who focus on customer satisfaction.

COMPANY'S PRODUCTS

Axiom Telecom is an authorized distributor of the following products/brands.

Mobile Phone and Accessories: Nokia, Samsung, Siemens, Sony Ericsson, Motorola, i-mate, and Thuraya

Wireless Devices: HP and Palm

Wireless Connectivity: Nokia, 3COM, and Anycom

Flash/Multimeda cards and readers: SimpleTech

Multimedia Devices: IVC and Kodak

AXIOM TELECOM MANAGEMENT

Axiom Telecom CEO: Mr. Faisal Al Bannai, currently 37 years old, holds a bachelors degree in Business from Boston University. He also has a Masters Degree in Business Administration, which he obtained from a university in London. Mr. Faisal Al Bannai founded Axiom Telecom LLC in 1997. He started Axiom Telecom as a wholesale business because the telecom products retail business was operated through certain authorized dealers who had valid contracts with telecom products manufacturers. Despite the fact that the company was generating profits in the wholesales business, Mr. Al Bannai envisioned a potential attractiveness in the retail business. He faced many obstacles during the planning stage of shifting the company from only a wholesales business to a wholesales plus a retail company. One major obstacle was the fact that the UAE Telecom products market was monopolized, and maj or brands of mobile manufacturers already had exclusive contracts with UAE Local agents. Mr. Al Bannai believed that in order to gain a good market share, he should be awarded distribution and sales contracts with dominant mobile manufacturers. Nokia mobiles at that time captured around 70% of the UAE mobile phone market share. Thus, Mr. Faisal Al Bannai tried to have a contract with Nokia to sell its products in the UAE. After several failing attempts, Axiom Telecom was given a challenge by the manufacturer of Nokia Mobiles. The challenge was that if Axiom Telecom could achieve the highest sales volume of Nokia 9210 Communicator, they would be awarded the contract. The challenge was accepted and it was met. Hence, the company was awarded the contract of selling Nokia mobiles in the UAE.

Mr. Faisal Al Bannai was also awarded Shaikh Mohammed Bin Rashid Al Maktoom prize for the lifetime achievement award for his outstanding success and accomplishment with Axiom Telecom.

Axiom Telecom Vice President: Mr. Fahad Al Bannai completed his Bachelor and Master degrees in Business Communication from Boston University. He joined Dubai Police force after his return from the United States in 1 997 while working part-time for Axiom Telecom. For the last three years of his employment with Dubai Police, he was the Financial and Economic Crime Section as the Head Assistant. While working for this section he developed his leadership skills. Working in the Financial and Economic section helped him to appreciate the essence of hard work and dedication. Late in 2004, Mr. Fahad Al Bannai decided to resign from his job at the Police force in order to join his brother, Faisal Al Bannai, in looking after the family business, which was quickly moving from one milestone to another.

INTERVIEW ASSESSMENT

Mr. Fahad Al Bannai identified a number of key characteristics that produce a successful leader who would be qualified to handle such demanding tasks that pertain to a higher level of management. The key factors specified by Mr. Fahad Al Bannai are stated below.

FOCUS: In the year 2000, the upper management of Axiom Telecom shifted its focus from wholesale business to a new line of businesses. The management drew a vision for the company, which stated that in order to survive and be profitable in such a competitive industry it was essential to grab the end customers' business. Therefore, the company approached the leading mobile phone manufacturers trying to have trade contracts with them. They kept trying till they succeeded in their aim in 2001 when they established three retail stores. Focusing on the need of the end-users, the company improved its services year by year. Today, Axiom operates approximately 230 retail stores in U.A.E. and Saudi Arabia. This is a monumental achievement on the part of the management of Axiom Telecom considering its humble beginnings. Mr. Fahad Al Bannai stated that he keeps his focus on Axiom Telecom's mission, vision, values and strategic goals. He, as a leader, does not get too involved with the method used to achieve the desired outcome. He, however, makes sure that the organization is being built in a capacity that allows it to reach the desired outcome. To further succeed, this capacity building need not be extremely rigid as to adopt structures, policies and processes; conversely, it should be flexible, creative and innovative.

AUTHENTICITY: Axiom Telecom's Vice President Mr. Fahad Al Bannai believes that "being yourself is an important characteristic of leaders. It enables them to project the same image to their followers and thus urges them to perform better and adopt innovative styles in performing their duties. Being an authentic person allows the followers and subordinates to know when and what is expected from their leaders. Understanding their leaders' expectation and performing to meet these expectations, promotes, builds and maintains the trust between the leaders and the followers. Mr. Fahad, Al Bannai mentioned that, in the very same day that the interview was conducted, he was at the Axiom Telecom branch in Deira City Centre joining his sales staff with their duties and tasks. Mr. Fahad's modest action enables the staff to feel close to the Vice President of the company they work for. His action also helps him understand and experience the problems that his sales staff may be going through. Fahad was "being himself' while interacting and dealing with both the staff members and customers. Fahad's attitude encourages the subordinates to speak up when having problems since they would feel that their leader would understand them. This enhances the morale of the employees and would make them feel that their leader is always backing them up.

COURAGE: Mr. Fahad Al Bannai believes that any fear should be overcome by having the courage to take risky and big steps. This quality is also evident in Fahad's brother, Mr. Faisal Al Bannai, Axiom Telecom's CEO, who was able to make a risky decision of entering into the retail market in 2001. Had Faisal not taken this opportunity due to not having enough courage for such a step, Axiom Telecom would not be in the position they are in now, a 4 billion-dirham company. When Fahad was asked where his source of inspiration and influence stems from, he mentioned it was from his elder brother, Mr. Faisal Al Bannai.

Courage is what it takes to witness a huge growth and to overcome challenges facing many organizations. A factor that also coincides with courage is the ability to take initiatives. A leader should have the courage and the bravery to be the first to present a certain idea or a concept to the market. An effective leader does not simply react to situations and try to remedy them, conversely, effective leaders always have a back up plan, which in times of need, they take the initiative to use instead of just following everyone else in the same direction.

Fahad admits that people make mistakes, but he thinks that as long as the person admits that he was wrong then there is no problem. He stated, "We are all humans, and mistakes are expected to happen, so long that they are admitted."

When asked about the motto in life that Mr. Fahad Al Bannai had followed, which enabled him to reach where they are today, he mentioned that he has always believed that life is full of opportunities. People just need to see them and grab them. He stated as a response to this question that his motto is "Grab opportunities. Don't be afraid to go into a certain area. If you believe in something, go ahead, but be ready to work hard for it day and night to achieve your goal." He has also given us an example of a simple opportunity that he envisioned and turned to be a successful business for the company. It was related to selling mobile phone accessories in Emarat Service Stations. It was a simple idea, yet it accounts for a significant portion of the company's profit.

EMPATHY: Fahad has an open door policy in his organization, specifically in his office. In fact, he encourages his employee to communicate with him and inform him of any problems they may experience. He does not even mind if his employees talk to him about different issues whether they are business related or not. His office door is always open as long as he is not extremely busy in an important meeting or so. He implied that he listens to his employees and he takes their suggestions into consideration. In fact, the suggestions are always studied and evaluated. He mentioned that a number of employees' suggestions were implemented after they were found to be beneficial to the organization. He believes that everyone is included in the loop and everyone should be given the chance to express him/herself

During the interview it was obvious that Fahad had a great belief in communication and the wonders it can lead to. He believes that through communication everything is possible. When asked how he influences others to make decisions that he wants, he replied "through communication"

TIMING: According to Mr. Al Bannai "timing is of the essence." Although he finds that all the other factors are important, timing is the most important because what differentiates leaders from non-leaders is knowing when to make critical decisions and when not to. Once this decision is made, all other factors are then considered. Fahad supposes that things shouldn't always be done immediately but one should be able to prioritize and get ones' team to prioritize as well.

In Fahad's opinion, another factor that adds to the list of factors mentioned above is that one should be passionate about what he/she does. Leaders should love what they do in order to be effective and good in what they do. They must feel that what they contribute to the organization plays a significant role in its success. They need to believe that their efforts and leadership styles are essential requirements that influence the employees' level of motivation, which in turn increases their satisfaction, and improves their performance.

PERSISTENCE: Fahad's opinion is that a person should not be disheartened by failure and instead should strive even harder to achieve their goals/ambitions. In its former years Axiom Telecom was mainly involved in the wholesale trade of mobile phones and despite their numerous efforts they were unable to enter into the retail market. This was primarily due to the existence of exclusive distribution rights, which prevented Axiom from entering into the retail market. Fahad mentioned in the interview that Axiom had to go and "bang on the doors of mobile phone manufacturers" for several years and then finally in 1998 they were offered the distribution rights for selling Nokia handsets in Pakistan. This was not exactly what Axiom was looking for at that time but nonetheless they were not disheartened and saw this as an opportunity to establish themselves and gain a foothold into the retail market. A few years later, the break that Axiom Telecom was looking for came when mobile phone giant, Nokia, decided to hold a competition for selling its 9210 Communicator model. Axiom ended up selling the most number of units and emerged as the clear winner. Subsequently Nokia offered Axiom distribution rights and the concept of exclusive distribution rights in the UAE market was scrapped.

HUMAN CAPITAL: Fahad attributes most of Axiom Telecom's success to the strength of its human capital, namely the employees. Therefore Axiom has a very thorough screening process before hiring for a job. During the interview when asked as to what were the qualities that Axiom looked for when hiring a person in a managerial or leadership position, Fahad responded by saying, "We look for 3 things: -

1 . He/she should be an expert in their field.

2. He/she should be a team player.

3. He/she should have people skills."

Fahad pointed out that he always consults his upper management staff before taking major decisions and encourages them to speak up and give him their valuable feedback. He mentioned that the company does not discriminate on the basis of gender and women occupy upper level managerial positions in the company, most notably the Head of the Export Department of its satellite phone division Thuraya.

Axiom also employs people of different nationalities from Britain, Australia, India, Pakistan, Philippines etc.

Axiom Telecom makes concerted efforts to develop its employees by offering numerous training programs and encouraging its employees to strive harder by providing them with promotions and other benefits.

Leadership style is the manner and approach of providing direction, implementing plans and motivating people. Three different styles of leadership exist, namely, authoritarian (autocratic), participative (democratic) and delegative (free reign). When Fahad was asked which leadership style more reflects the way he deals with his employees, he pointed to the Participative Power Style.

This type of style involves the leader and the employees together in the decision making process although the final decision is up to the person with the most authority, the leader. This leadership style is not a sign of weakness; in contrast it is a sign of strength that employees respect. The Participative style of leadership is used when the employees have some of the information and their leader has the other part of the information and when put together a better decision is made. Also, the participative style of leadership encourages the employees to feel that they are part of the team. It encourages them to take ownership of their project.

When Mr. Al Bannai was asked what motivation does he give employees to enable them to perform their certain duties with satisfaction, his response was that he motivates them financially and as mentioned earlier he tends to communicate with his employees and spend more time with them at their allocated branches. By motivating them financially, each employee has a basic salary but on top of that each sales person has a monthly sales target set for him/her. If the employee achieves his/her target (100% or above) he/she is entitled to a monthly commission related to the staff performance. Also, employees who achieve the yearly target are awarded a yearly bonus at the end of the year.

In Fahad's opinion the rewards of being a leader is that one gets to witness the achievements, or as he called it, "the fruits", that he/she worked hard to achieve. As for the penalties of being a leader, in a joking manner he mentioned the depression that comes from the handling of such a position. In his own words: "It is tough. You have to juggle things here and there. At some times it is so much pressure and it requires hard work."

Problem solving process: Problems are faced with rationality and a great deal of thinking at axiom. In case of problem, the first stage is to gather information from different sources and levels of the company to have a better understanding of the problem. Second, solutions and suggestions are discussed through a meeting with the related departments and stuff in order to arrive to the best possible solution. The decision is taken with the participation of the involved people to get a high quality decision with a higher better commitment.

By categorizing himself as a participative leader, Mr. Fahad "open door" policy engages him in behaviors that enhance his stuff fillings of personal worth and importance. Also, it helps him to achieve a higher goal accomplishment by such activities as scheduling, coordinating, planning, and providing the necessary resources to the right people.

Honesty and Integrity: Mr. Fahad believes that honesty is the key for a good communication between a leader and his stuff. Both good and bad news are communicated with a complete free environment at axiom. This open communication environment between the leader and his employees will save the company resources, because it is cheaper and more efficient to deal with problems and bad news today than in the future.

Axiom's Future Plans: Axiom plans to expand its operations to the following countries by the 1st Quarter of 2006: - Kuwait, Bahrain, Qatar, and Oman.

AuthorAffiliation

J. Reagan McLaurin, American University of Sharjah

jmclaurin@aus.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 2

Pages: 81-87

Number of pages: 7

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192411599

Document URL: http://search.proquest.com/docview/192411599?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 31 of 100

ADEL ALI, CEO, AIR ARABIA

Author: McLaurin, J Reagan

ProQuest document link

Abstract:

Though the global airline industry has been through its darkest hour since the turn of the new century, airlines in the Gulf have fared considerably well. However, one airline that caught the attention of one and all was Air Arabia - the first low cost airline in the Middle East. After drawing tremendous media attention for its pioneering way of promoting air travel, the airline carried over half a million passenger in a span of one year and also reached break even in the same period. The purpose of this study is to analyze the leadership philosophy of the person under whose helm this airline was conceived, developed and is being presently run-Adel Ali, CEO of Air Arabia.

Full text:

ABSTRACT

Though the global airline industry has been through its darkest hour since the turn of the new century, airlines in the Gulf have fared considerably well. However, one airline that caught the attention of one and all was Air Arabia - the first low cost airline in the Middle East. After drawing tremendous media attention for its pioneering way of promoting air travel, the airline carried over half a million passenger in a span of one year and also reached break even in the same period.

The purpose of this study is to analyze the leadership philosophy of the person under whose helm this airline was conceived, developed and is being presently run-Adel Ali, CEO of Air Arabia.

Ali's past record gives ample reasons to comment that he possesses "the right stuff" which, as per earlier studies, differentiates leaders from non leaders. Furthermore, having spent over 25 years in the airline industry in various parts of the world, Ali's leadership style also portrays a good mix of task and people orientation. His exposure to varied situations - e.g. war, organizational crisis, extreme deadlines, poor project management etc. - has only helped him to understand better the importance of being at the forefront, supporting one's associates, and taking bold steps which others may not dare to take.

Ali is undeniably a "people's person," being a strong believer in open communication, team work and empowerment. The factors that distinguish Ali are his unmatched passion, drive and determination to lead his followers towards immensely challenging goals - the strongest example being his success in launching an airline operation right from scratch in 6 months when the industry standard lingered around 1 1⁄2 years!

Truly an outstanding performer and a team player, Ali fosters an environment for able, ambitious, achievement oriented, hard working and passionate individuals to excel in.

AuthorAffiliation

J. Reagan McLaurin, American University of Sharjah

jmclaurin@aus.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 2

Pages: 89

Number of pages: 1

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192411589

Document URL: http://search.proquest.com/docview/192411589?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 32 of 100

MORE THAN JUST A SOFT DRINK

Author: Paul, April L; Gulbro, Robert D

ProQuest document link

Abstract:

Coca Cola was born in Atlanta May 8, 1886 when pharmacist, Dr. John Stith Pemberton produced the syrup for Coca Cola. He carried his formula to Jacob's pharmacy. There it was sampled and pronounced "excellent". It was placed on sale for five cents a glass as a soda fountain drink. The syrup was teamed with carbonated water to produce a drink that was immediately "Delicious and Refreshing" an idea that continues to echo today wherever Coca Coal is shared.

Dr. Pemberton' s partner and bookkeeper suggested the name and penned the famous trademark "Coca Cola" in his unique script. During the first year sales averaged a moderate nine drinks per day. Never realizing the potential and future impact that his product would have, Dr. Pemberton, gradually sold portions of his business to various partners and just prior to his death in 1888 he sold his remaining interest to Asa G. Chandler. Mr. Chandler bought additional rights and soon acquired complete control of Coca Cola.

Full text:

Headnote

CASE DESCRIPTION

The primary subject matter of this case concerns the Coca Cola Company and its decisions to change the formula in the 1980's. It also looks at the culture of the firm that led up to the change and its relationship with customers. It is appropriate for junior/senior level courses and could be covered in 60 to 90 minutes. Outside preparation by students would be 1-2 hours.

CASE SYNOPSIS

Coca Cola is one of the most recognized logos by both adults and children in the United States and abroad. For Coca Cola lovers everywhere a fateful day in 1985 will forever be remembered as a turning point for the product to which they had become so fiercely loyal. Coca-Cola in that year introduced New Coke, which was a bit like putting a miniskirt on the refurbished Stature of Liberty, or painting the White House red, or scribbling graffiti on a Norman Rockwell (Demott, 1985).

PROCEEDINGS

Coca Cola was bon in Atlanta May 8, 1886 when pharmacist, Dr. John Stith Pemberton produced the syrup for Coca Cola. He carried his formula to Jacob's pharmacy. There it was sampled and pronounced "excellent". It was placed on sale for five cents a glass as a soda fountain drink. The syrup was teamed with carbonated water to produce a drink that was immediately "Delicious and Refreshing" an idea that continues to echo today wherever Coca Coal is shared.

Dr. Pemberton' s partner and bookkeeper suggested the name and penned the famous trademark "Coca Cola" in his unique script. During the first year sales averaged a moderate nine drinks per day. Never realizing the potential and future impact that his product would have, Dr. Pemberton, gradually sold portions of his business to various partners and just prior to his death in 1888 he sold his remaining interest to Asa G. Chandler. Mr. Chandler bought additional rights and soon acquired complete control of Coca Cola. (Heritage/Chroniclebirth 1)

The time following the acquisition is referred to as the Chandler Era in the Coca Cola history. By 1892 Chandler had boosted sales of Coca Cola syrup nearly ten times. His complete focus was on the soft drink and in order to maintain the level required he sold his pharmaceutical business. The business continued to grow and prosper and in 1 894 other syrup manufacturing plants opened outside of Atlanta including plants in Dallas, Texas, Chicago, Illinois and Los Angeles, California. Three years after Coca Cola's incorporation Chandler had the pleasure of announcing in his annual report to the shareholders that Coca-Cola is now drunk in every state and territory in the United States. In 1894, in Vicksburg, Mississippi bottling machinery was installed and cases of Coca-Cola were sold to farms and lumber camps along the Mississippi River; this was the first time that Coca-Cola was bottled. The plants grew to over 1,000 over the next 20 years. Coca-Cola searched for the container that would best represent the genuine Coca-Cola drink. The bottle shape that we all have come to recognize Coca-Cola by was granted a trademark by the U. S. Patents Office in 1977. (Herritage/Chroniclethechandlerera 1) Chandler sold the Coca-Cola Company to an Atlanta banker named Ernest Woodruff for $25 million in 1919. Under Woodruffs leadership the Coca-Cola Company soared to commercial success. (Heritage/chroniclemannamedwoodruff 1)

Coke sales slowly began slipping over the next 15 years, Coca-Cola's preference was dipping and so was consumer awareness. The summer of 1985 would soon change the course that Coke was currently on. On April 23, 1985 Coke introduced New Coke, and took the biggest risk in consumer goods history (Heritage/cokelorenewcokeinclude 1). This change came after the same formula had been sold for 99 years. The changed was preceded by taste tests of more than 190,000 consumers in 25 different cities in both the U. S and Canada (Demott 2). Unfortunately these tests failed to take into account something that would make the success of the new formula fizzle under the critical eyes of the consumers. The tests didn't expect the consumers to so fiercely protest even Coca-Cola changing the unique taste that had been the landmark of the company. The public's outcry was heard all across America from the formation of protest groups such as the "Society for the Preservation of the Real Thing" and Old Cola Drinkers America (Heritage/cokelorenewcoke 2). Chairman and Chief Executive Officer Roberto Goizueta actually received a letter addressed to "Chief Dodo, The Coca-Cola Company"; he said the thing that most upset him was that the letter was delivered to him (Heritage/cokelorenewcoke). All at once all eyes were on Coca-Cola, realizing how important Coke was to them.

The experience taught everyone a lesson, what Coke didn't realize was who actually owned Coke, the consumers. By lune The Coca-Cola Company consumer hotline was receiving 1 ,500 calls per day compared with 400 calls prior to the introduction of New Coke. Everyone seemed to hold any Coke employee personally responsible for the change. (Heritage/cokelorenewcoke) On IuIy 11, 1985, a mere 79 days after the introduction of New Coke, Coca-Cola brought back the original. Two top executives at Coke pulled together to make the decision to bring back old Coke, giving it the name Coca-Cola Classic (Greenwald 3). Coca-Cola Classic was sold alongside Coca-Cola and had two different target markets and therefore two distinct advertising campaigns. The youthful market of New Coke encourages consumers to "Catch the Wave" while the more emotional more nostalgic market of Coke Classic is encouraged by the slogan "Red White and You" (Heritage/cokelorenewcoke 2).

Coke now recognizes that the test marketing was flawed. It didn't properly inform the consumer the consequences of their choice; choosing New Coke meant giving up the old favorite. Coke emerged stronger than ever and was fighting its fiercest competitor from both sides. It backed into the one of the most powerful strategic positions in the consumer marketplace; after all they can satisfy the die-hard Coke customers and the consumers who like the sweeter taste of New Coke (Greenwald, 6).

The future looked brighter than ever for Coke as it continued to take it products global and expanded in several directions. In 1990 Coca-Cola relaunched new Coke with a new name Coke II, and with its new look it sent another crushing blow to its rival Pepsi. Coke had become as much a part of America as apple pie and fire works on the 4th of IuIy. It will remain unfaultered by this decision and will continue to hold a strong place in the U. S soft drink industry as well as worldwide markets.

The decision to introduce the new formula was a non-programmable decision; it was a unique problem with no clear-cut criteria or adequate information other than the flawed survey data and the stagnant numbers in the industry. Coke was forced to take action and the executives felt the decision must be made rather quickly to maintain their stronghold; this led to a more behavioral type decision, it looked at how the consumer was responding to taste tests. (Daft, 444)

Coca-Cola's culture most resembles a clan culture. Everyone is working together to achieve the goals set by the executives (Daft, 358). Coke's strategy for interacting and maintaining an edge in the competitive market was driven by the consumers' lack of enthusiasm for soft drinks in general. Coke had to reenergize the population's interest in soft drink products (Daft, 50 and 134). Coke encouraged trying new and innovative ideas by sending the message that it is ok to take intelligent risks even if they don't work out as intended" (heritage/cokelorenewcoke 1). Goizueta urged employees to take intelligent risks in their jobs, saying it was critical to the company's success (heritage/cokelorenewcoke 2). The culture allows employees to take an active part in the processes that affect their daily work (Daft, 358). The fact that they are involved in the decision process and the implementation of the change helps to foster the change and improves the overall success rate of the change. Mr. Goizueta states that "Coke set out to change the dynamics of sugar colas in the United States, and we did exactly that -albeit not in the way we planned." (Heritage/cokelorenewcoke). He further states that the most significant result of the "New Coke" was that it sent an incredibly powerful signal. . . a signal that we really were ready to do whatever was necessary to build value for the owners of our business (Heritage/cokelorenewcoke). This lets the employee know that they are important and they matter. This will foster better employee confidence in themselves and in the organization they work for.

The decision to introduce New Coke utilized different dimensions of the decision models discussed in textbooks. It had an element of a trial and error model in that they did go back and renounce their decision, brought back Coke Classic and pulled New Coke from the shelves. This trial and error however did prove to be beneficial because it gave them more insight into their external environment and allowed them to see what the consumer expected. They gathered information from their consumers before making the decision and realized that more information should have been disclosed and gathered in order to make the most informed decision.

However; in keeping the consumer happy, the stock prices and profits increased and ultimately the stockholders were pleased. It also allowed for participative decision making because the decision to produce and sell Coke Classic was not made by one individual, it was a top down decision in that the individuals involved were two executives (Daft, 444). The requirements for a successful change appeared to be stacked in Coke' s favor. They had the need for a change because the market was becoming lethargic, and the results from the taste test indicated that the population in general would like the smoother, sweeter taste of New Coke. Another element required for a successful change is management support. Coke not only had management support they also had the support of the employees. They made the decision from the top but including involvement at all levels. They were prepared for resistance internally but didn't expect it to occur externally and with such force. They had a change agent who not only supported and believed in the decision but had the authority to make decisions during the process (Daft, 398).

Organizations looking to Coke as an example could take several lessons to heart. First be sure that the external environment is carefully monitored and that the entire story is passed on to the consumer. Conflicts with change are generally expected from the internal environment however, in this instance the greater conflict came from the consumers, not realizing the impact they had by choosing the taste of New Coke. They rejected the change and demanded that the original product be brought back. Organizations need to realize that even with all the technology that is available to organizations today the decisions are still made by humans and therefore are highly susceptible to human error. Other organizations could learn to expect the unexpected and when that occurs to bow out gracefully and recover as much as possible, all the while holding on to as much dignity as possible.

The events of the decision to market New Coke in 1985, which some hail as the marketing blunder of the century, with consumers hoarding the "old" Coke, and calls of protest by the thousands changed forever The Coca-Cola Company's thinking" (Heritage/cokelorenewcoke 1). The Coca-Cola Company was able to take what could have been a major failure and turned it into something positive for the organization. They proved to their employees and the public that they are a learning organization, which promotes communication and collaboration so everyone is engaged in identifying and solving problems, enabling the organization to experiment, improve and increase its capability (Daft, 28). It was able to move forward with new products and come out of the situation a better company because the public saw them in a different light. It also allowed them to teach a valuable lesson to their employees, one that will hopefully help to shape the future at Coca-Cola. It taught the employees that it is ok to make a decision that doesn't work out the way it was anticipated.

QUESTIONS

In class discussion the following questions could be addressed:

1 . How could a firm make a major change like this without adequate information?

2. Should a change of this magnitude only be made by a CEO?

3. What methods of information gathering should a firm use to stay abreast of its customers wants and needs?

4. What can a firm learn from these kinds of mistakes?

AuthorAffiliation

April L. Paul, Florida Institute of Technology

April.Paul@dynetics.com

Robert D. Gulbro, Athens State University

gulbror@athens.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 2

Pages: 91-94

Number of pages: 4

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192411634

Document URL: http://search.proquest.com/docview/192411634?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 33 of 100

COOKIE JAR RESERVES-THE CASE OF CALLAWAY GOLF COMPANY

Author: Reed, Brad; Rose-Green, Ena

ProQuest document link

Abstract:

Callaway Golf Company was founded by Ely Reeves Callaway Jr. Mr. Callaway came up with the idea of a stainless steel golf club taking its name from a World War I German cannon known for its long-distance capabilities. The club was known as the Big Bertha Driver. Callaway Golf also produces putters, balls and clubs. During 2002, Callaway Golf Company had a disagreement with the auditing firm of KPMG Peat Marwick over the accountingfor $17 million of warranty reserve costs. At issue was the reduction of Callaway Golf's warranty liability. Callaway Golf determined that the liability should be reduced by $17 million. Callaway's management believed that the reduction should be accomplished by an increase in the current's period's income of $17 million. KPMG agreed that there should be a $17 million reduction in the warranty liability but felt that the reduction of the liability should be treated as a cumulative error and corrected retroactively and additionally KPMG felt that the financial statements prior to 2002 should be restated. This case examines the accounting issues raised by the disagreement between Callaway Golf and its auditor and discusses the relevant sections of GAAP. Additonally, the case discusses the use of cookie jar reserves in accounting and recent SEC statements regarding such accounting.

Full text:

ABSTRACT

Callaway Golf Company was founded by Ely Reeves Callaway Jr. Mr. Callaway came up with the idea of a stainless steel golf club taking its name from a World War I German cannon known for its long-distance capabilities. The club was known as the Big Bertha Driver. Callaway Golf also produces putters, balls and clubs. During 2002, Callaway Golf Company had a disagreement with the auditing firm of KPMG Peat Marwick over the accountingfor $17 million of warranty reserve costs. At issue was the reduction of Callaway Golf's warranty liability. Callaway Golf determined that the liability should be reduced by $17 million. Callaway's management believed that the reduction should be accomplished by an increase in the current's period's income of $17 million. KPMG agreed that there should be a $17 million reduction in the warranty liability but felt that the reduction of the liability should be treated as a cumulative error and corrected retroactively and additionally KPMG felt that the financial statements prior to 2002 should be restated. This case examines the accounting issues raised by the disagreement between Callaway Golf and its auditor and discusses the relevant sections of GAAP. Additonally, the case discusses the use of cookie jar reserves in accounting and recent SEC statements regarding such accounting.

AuthorAffiliation

Brad Reed, Southern Illinois University Edwardsville

Ena Rose-Green, Southern Illinois University Edwardsville

brreed@siue.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 2

Pages: 95

Number of pages: 1

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192411697

Document URL: http://search.proquest.com/docview/192411697?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 34 of 100

GELATO NATURAL S.A.

Author: Smith, D K; Aimar, C; Davalli, A G; Barbero, R

ProQuest document link

Abstract:

Ariel Davalli is the Vice President of Gelato Natural S.A., a company which (at the time of the case) was selling Chungo (it 's high-quality homemade ice cream) from several locations in the northern suburbs of Buenos Aires, Argentina. Based on high demand for its products from individual consumers living in the northern suburbs, the company invested $2,000,000 U.S. dollars to significantly increase the capacity of its factory. This $2,000,000 expansion was funded by borrowing $750,000 U.S. dollars (the loan comes due in four years) and by shifting the local-currency equivalent of $1,250,000 of working capital into fixed assets. Unfortunately, just as the expanded factory started production, the economic environment in Argentina deteriorated significantly. In addition, the exchange rate of the peso with the U.S. dollar fell from 1-to-1 (at the time of the loan) to 3-to-1. Currently, demand for Chungo is stagnating, and the new factory is operating at only 30% of capacity.

Full text:

ABSTRACT

Ariel Davalli is the Vice President of Gelato Natural S.A., a company which (at the time of the case) was selling Chungo (it 's high-quality homemade ice cream) from several locations in the northern suburbs of Buenos Aires, Argentina. Based on high demand for its products from individual consumers living in the northern suburbs, the company invested $2,000,000 U.S. dollars to significantly increase the capacity of its factory. This $2,000,000 expansion was funded by borrowing $750,000 U.S. dollars (the loan comes due in four years) and by shifting the local-currency equivalent of $1,250,000 of working capital into fixed assets. Unfortunately, just as the expanded factory started production, the economic environment in Argentina deteriorated significantly. In addition, the exchange rate of the peso with the U.S. dollar fell from 1-to-1 (at the time of the loan) to 3-to-1. Currently, demand for Chungo is stagnating, and the new factory is operating at only 30% of capacity. Additional data and information in the case include:.

1. For Argentina: Historical overview, a sample of recent statistics from the World Bank, and (for benchmarking purposes), comparable statistics for the United States.

2. On the company: Historical overview, current performance, and numerous factors impacting that performance.

3. Characteristics of the company's current strategy, including descriptive information on the product line, characteristics of the distribution system, information on the promotion and pricing strategies the company is currently using, etc.

4. Characteristics of the current competitive situation.

6. Detailed data on the attitudes and behaviors of buyers of homemade ice cream in Argentina.

AuthorAffiliation

D.K. Smith, Southeast Missouri State University

dksmith@semo.edu

C. Aimar, University CAECE

A.G. Davalli, Gelato Natural S.A.

R. Barbero, University CAECE

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 2

Pages: 97

Number of pages: 1

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192411627

Document URL: http://search.proquest.com/docview/192411627?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 35 of 100

JONES' MARKETS, INC.

Author: Smith, D K

ProQuest document link

Abstract:

This case challenges students to review policies used by Jones' Markets Inc. to evaluate the performance of produce managers (that is, the individuals in charge of fresh fruits and/or vegetables) in its many supermarkets. In particular, students are asked to review the guidelines Jones' Markets uses to charge back against produce managers the costs of fresh fruits and vegetables which have spoiled. The case is appropriate for senior-level undergraduates as well as students in MBA and Executive Development programs. The case could be taught in a one hour and a half class session; if handled this way, it is likely to require at least a couple hours of preparation by students. Alternatively (because it is very short), the case could be distributed in class, prepared (on the spot) by the students, and then discussed (on the spot) by the class.

Full text:

CASE OVERVIEW

This case challenges students to review policies used by Jones' Markets Inc. to evaluate the performance of produce managers (that is, the individuals in charge of fresh fruits and/or vegetables) in its many supermarkets. In particular, students are asked to review the guidelines Jones' Markets uses to charge back against produce managers the costs of fresh fruits and vegetables which have spoiled. The case is appropriate for senior-level undergraduates as well as students in MBA and Executive Development programs. The case could be taught in a one hour and a half class session; if handled this way, it is likely to require at least a couple hours of preparation by students. Alternatively (because it is very short), the case could be distributed in class, prepared (on the spot) by the students, and then discussed (on the spot) by the class.

CASE SYNOPSIS

The case consists of an e-mail received by the author. In this e-mail, the produce manager from the Jones' Market in the author's home town describes the policies used to handle the charging back (against produce managers like him) of the costs of fresh fruits and vegetables which have spoiled and must be thrown away (that is, "pitched"). The produce manager then raises the question of whether the policies governing the charging back of spoiled fruits and vegetables are a "valid way of interpreting data to reduce shrink at the store level. " As it happens, the key issue raised by his question relates not so much to "shrink" but much more directly and importantly on the way Jones' Markets, Inc. evaluates the performance of its produce managers. There is very little data in this case; the data which is available consists of 1) A description of the policies Jones' Markets, Inc. currently uses to evaluate the performance of its produce managers; and 2) A few comments/questions regarding these policies which the product manager posed to the author.

AuthorAffiliation

D.K. Smith, Southeast Missouri State University

dksmith@semo.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 2

Pages: 99

Number of pages: 1

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192411783

Document URL: http://search.proquest.com/docview/192411783?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 36 of 100

REIT VALUATION: THE CASE OF DUKE REALTY CORPORATION

Author: Stotler, James

ProQuest document link

Abstract:

This case will require the student to value the equity of Duke Realty Corporation, (NYSE: DRE) and make a buy or sell recommendation as an independent analyst. The data given should be examined to determine whether or not the company's stock is valued above or below the market price in order for investors to make a buy or sell decision. The student must assess the real estate industry environment using Porter's five-force model of competitive strategy and the DuPont identity. Valuation techniques employed include the capital asset pricing model, the two-stage dividend-discount model, the P/E valuation approach, and the Gordon model. The student is placed in the role of an equity analyst and asked to prepare a buy or sell recommendation for Duke Realty Corporation (NYSE: DRE) stock. DRE is the a large office and industrial property owner and manager operating in the midwest and southeast. The student must assess the competitive environment of DRE using the DuPont identity and Porter's five force model of competitive strategy as well as estimate the value ofthe stock. All information in the case is publicly available.

Full text:

ABSTRACT

This case will require the student to value the equity of Duke Realty Corporation, (NYSE: DRE) and make a buy or sell recommendation as an independent analyst. The data given should be examined to determine whether or not the company's stock is valued above or below the market price in order for investors to make a buy or sell decision. The student must assess the real estate industry environment using Porter's five-force model of competitive strategy and the DuPont identity. Valuation techniques employed include the capital asset pricing model, the two-stage dividend-discount model, the P/E valuation approach, and the Gordon model.

The student is placed in the role of an equity analyst and asked to prepare a buy or sell recommendation for Duke Realty Corporation (NYSE: DRE) stock. DRE is the a large office and industrial property owner and manager operating in the midwest and southeast. The student must assess the competitive environment of DRE using the DuPont identity and Porter's five force model of competitive strategy as well as estimate the value ofthe stock. All information in the case is publicly available.

AuthorAffiliation

James Stotler, North Carolina Central University

IStotFin@aol.com

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 2

Pages: 103

Number of pages: 1

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192411765

Document URL: http://search.proquest.com/docview/192411765?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 37 of 100

VENDOR REBATE MANAGEMENT: KHF, INC.

Author: Stretcher, Robert; McLain, P Michael

ProQuest document link

Abstract:

The primary subject matter of this case concerns the notion of vendor rebates and their effect on the financial reports of the firm. The activities surrounding this particular situation are essentially "window dressing" efforts designed to meet profitability demands through creative accounting techniques. The case has a difficulty level appropriate for intermediate and advanced undergraduate accounting and finance courses. The case is designed to be taught in one class hour and is expected to require two hours of outside preparation by students.

Full text:

CASE DESCRIPTION

The primary subject matter of this case concerns the notion of vendor rebates and their effect on the financial reports of the firm. The activities surrounding this particular situation are essentially "window dressing" efforts designed to meet profitability demands through creative accounting techniques. The case has a difficulty level appropriate for intermediate and advanced undergraduate accounting and finance courses. The case is designed to be taught in one class hour and is expected to require two hours of outside preparation by students.

CASE SYNOPSIS

Jim Layton, controller for Kitty (Hawk Food), Inc. for the past five years, is faced with a demand from KHF's bank that KHF increase profitability from the prior years. If the profitability of KHF is not increased, the bank has indicated that it will withdraw line of credit funding for KHF's operations. Without the line of credit, KHF would face severe financial distress. While credit from other sources might become available, it would be at less desirable terms, partly because the firm's current band had forwarded the most favorable term several years prior, but also because the bank's withdrawal of funding would influence other creditors in future funding requests. Jim is approached by one of the firm's suppliers concerning vendor rebates, a scheme of questionable integrity, but one that could present more favorable financial results without the firm actually performing better.

AuthorAffiliation

Robert Stretcher, Sam Houston State University

rstretcher@shsu.edu

P. Michael McLain, Hampton University

mcklaipm@inteliport.com

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 2

Pages: 105

Number of pages: 1

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192411672

Document URL: http://search.proquest.com/docview/192411672?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 38 of 100

MONOCHROMATIC PERSONNEL SCANNING AT TECHMARK

Author: Switkin, Robert; Armandi, Barry; Sherman, Herbert

ProQuest document link

Abstract:

"Mike, I need you and Pat to come to my office immediately," said Iim Taylor, Senior Director of Employee Relations and EEOC, over the phone to Mike Arend, Senior Director ofthe Telesales Group of TechMark. "We have a serious problem regarding possible discrimination in your group."

Full text:

INTRODUCTION

"Mike, I need you and Pat to come to my office immediately," said Iim Taylor, Senior Director of Employee Relations and EEOC, over the phone to Mike Arend, Senior Director ofthe Telesales Group of TechMark. "We have a serious problem regarding possible discrimination in your group."

BACKGROUND OF TECHMARK

TechMark was a global, integrated provider of mobile computing, wireless networking and barcode scanning products sold to an array of customers in several core markets. TechMark' s products were used to amass, access and distribute information throughout an organization, thereby increasing efficiency and minimizing human error.

As TechMark' s sales and scope, both geographically and technically, continued to expand throughout the 1980s and early 1990s, it became clear that the company needed partnerships to adequately address the marketplace. While servicing large retail and government clients on a direct basis had always been the core business, TechMark did not have the headcount, software development, integration skills, or the geographic reach to penetrate new markets and develop new applications on its own.

Perhaps the most critical benefit of being a loyal TechMark partner was the receipt ofthe "golden nugget," i.e. a sales lead. Potential customers who contacted TechMark for a product or solution to a business problem (route accounting, inventory management, access control, etc) were directed to a partner for fulfillment.

THE TELESALES GROUP

In 1999 this investment in partner relationships was realized through the large expansion of the Telesales Group. The group was formed in 1994 by Mike Arend, with the assistance of Pat Hagen. Telesales was a polyglot, performing both customer service and marketing activities. Most ofthe staff was comprised of older women who had risen through TechMark' s ranks, often coming off of the manufacturing floor. In many ways their job was administrative: answering calls, sending out product literature and calling prospects culled from tradeshows, direct mailings and other corporate marketing efforts. To assist in this effort, a third-party call-center (ETI) was employed and did much ofthe outbound calling. In 1994 the annual quota was 4 million dollars. By 1999 it had grown to nearly $40 million and the workload, or growth expectations, showed no signs of diminishing.

THE NEW HIRE

Katherine Anderson was quite pleased she landed a job with TechMark. The job, as it was positioned to her by her recruiter, allowed her to learn many aspects of TechMark' s business, played a key role in directing sales activity, and prepared her to take an official management position within a two-year time frame. The job was phone-intensive, but Katherine was very sociable and thought that speaking with customers was interesting, if not fun.

When Katherine went to Pat with questions about her job or TechMark' s products, she was always referred to Gloria or one of the other older women for answers. As the other new hires - Tara, Rob, and Rhonda -joined the team, they were instructed to do the same.

PRODUCT TRAINING QUESTIONS

When Katherine asked Kerri how she managed to deflect calls requiring product knowledge she simply shrugged:

"I tell them that it's not my job to know, but that I can get them help. I either transfer them to tech support or get a partner to talk to them..."

Katherine replied, "I thought that tech support was only for customers who already purchased equipment, not présales....and aren't we supposed to send qualified prospects to business partners, and not people just fishing for information?"

Kerri shrugged, "I haven't gotten too many complaints yet ..... "

Unsatisfied, Katherine approached Pat.

Katherine: "Pat, I wanted to talk to you about something that keeps coming up - and the rest of the new hires are experiencing it too."

Pat: "What is it Katherine?"

Katherine: "I was wondering about getting some formal product training for us. Quarterly sales training is coming up for the field sales force. I was wondering if we could attend."

Pat: "Well, Telesales never has before. . .Besides, we need to have people on the phones. . ." Katherine: "But the customers are asking questions that we don't know the answers to. Sometimes I feel stupid that I can't answer questions about our own products."

Pat replied, "How you feel is your concern. We all know that you are not stupid. In your job, we find it is counterproductive to know too much about product... we diagnose, we don't prescribe ... ."

Soon, however, tech support was sending callers back to Telesales, as they were being told not to spend their time on pre-sales inquiries. One afternoon, after a particularly frustrating call, Katherine popped her head into Mike's office.

Katherine: "Mike, sorry to bother you...do you have a minute?"

Mike: "Sure, Katherine. When the door is open I am always available. You look concerned. . .is there a problem?

Katherine: "Well, the group and I feel that some product training will really help us do our jobs better. Callers are asking us questions about our products all the time, and we don't know how to answer them. Tech support is refusing to take any more présales calls and my partners are complaining about being used as a help desk."

Mike asked: "Product knowledge has never been that important before... has something changed?"

Katherine: "I think it' s always been important, only that the women in the group have tried to get bits and pieces on their own... besides, in the four months I've been here, the levels of inquiries keeps increasing....buyers are getting smarter...."

Mike: "Does Pat know about this?"

Katherine: "I talked to her twice but she doesn't think it's a problem."

Mike: "I'll see what I can do."

TELESALES INTERACTIONS

Through the remainder of 2000 Katherine continued to do well. She had consistently made her quota and received bonus pay at the end of each quarter. The group had continued to grow, with two new graduates joining the Telesales group. Though the NASDAQ had swooned, TechMark seemed secure in its core markets and all the talk in the hallways centered on expansion, growth and new opportunities.

Though required by HR, no formal performance reviews were done at year' s end. When she asked Gloria about this, Katherine was told: "Pat doesn't like doing those too much. In a couple of months HR may notice that no forms were filed. . .then Pat may have you do your own and she will sign them."

Katherine: "That's the way she does it every year?" "Yup" chirped Gladys.

AN INTERNATIONAL OPPORTUNITY FOR KATHERINE

Shortly after, Katherine was asked to take on responsibility for Mexico and Latin America, while transitioning her existing territory to the other team leaders. "It's going to be a lot of work, but Pat and I think that you are up to it, "Mike commented. "I think this is going to be an area of tremendous growth and we want you there to help drive it."

Katherine and Cathy stayed late nearly every evening for several weeks to handle the backlog. Rob and Tara worked diligently during the day as well, though they, like Pat and Kerri, were out the door by five.

Cathy sent several emails to Pat asking her to make sure that everyone was shouldering an equal share of the workload. Pat sent out a single missive asking that everybody pitch in. The situation improved temporarily but soon deteriorated. After returning from an unannounced and unscheduled 30-minute coffee break, Kerri found herself the target of Cathy's frustration. A shouting match ensued.

Upon hearing ofthe disturbance, Pat pulled Cathy aside and chastised her for her outburst in the workplace. When pressed about the personal phone calls, long lunches and unscheduled breaks taken by "certain members ofthe team," Pat's response "Work it out."

INITIAL DISCUSSION WITH HUMAN RESOURCES

From that point on, Katherine was certain that there was a definite undercurrent of hostility directed toward her. Uncertain as to its cause, she began to talk with Iim Taylor, in charge of employee relations and EEOC issues at TechMark. She did not want to lodge a formal complaint; she was simply looking for some advice and support. There were few black associates at TechMark and she started to feel quite isolated.

Over the next several months Katherine would find much cause. Among the incidents she noted: Others, generally Kerri, Tara and Pat, took extended lunches and coffee breaks. Katherine was cited the one time she returned 15 minutes late in the afternoon.

While others regularly had friends from other parts of the company sit in their cubes and chat, Katherine received an email from Pat informing her that she was not to be visited during the work day. On two occasions Katherine walked over to Tech Support or Product Management to ask a product question and was cited for leaving her desk without letting the other group members know where she was going. Pat would often pull Kerri and Tara into unscheduled meetings at the last minute with no explanation, rationale or advanced notice. This was perhaps most painful of all, as Katherine distinctly felt like an outsider, unable to contribute to the group or participate in steering its direction.

At Jim's urging Katherine scheduled a meeting to sit down and talk with Mike to solicit some feedback. She heard nothing but positives. When Katherine conveyed her impression that Pat did not like her, Mike told her to dismiss the notion out of hand.

"She thinks the world of you," Mike commented.

Later that week Pat pulled Katherine aside and complimented her on the work she was doing. "Is there anything I should be doing differently?" asked Katherine. "Nothing at all" Pat replied.

Yet the ill feelings seemed to linger and Katherine repeatedly documented instances of what she deemed unequal treatment and expectations. As her morale was fading, TechMark was going deeper into a tailspin. Executive management was being purged and the organization seemed directionless and drifting. With Mike on the road all the time and Pat effectively absent, Telesales seemed rudderless. Instead of feeling like a young manager Katherine was feeling more and more like an administrator - forced to handle unanswered customer service calls and send out marketing literature. The fact that others in the group were doing far less made her feel more and more resentful. She accessed a manager's report from the calling system that TechMark used. It showed that she had taken 3300 calls in the first reporting period of 2002; Kerri had scarcely taken 800.

Soon Katherine found herself soliciting Tony Sassone for a position reporting directly for him. While Tony was too mindful of corporate politics to actively poach her from Mike, he let her know that he was open to the change when "the time was right."

FEEDBACK TO THE TOP

As new management swept into power, a series of "all-hands meetings" was held. Their purpose was to introduce the new executives, address questions of strategic direction and, importantly, raise employee morale. TechMark Associates were once again encouraged to "take risks, challenge the status quo, and commit to personal and professional growth."

"Tell us how we are doing," CEO Gable exhorted, "and how we can do it better."

Katherine took his words to heart and sent emails directly to Gable; they also found their way to Bill Naughton and Al Tracy. In her missive she introduced herself, the Telesales Group, and made several suggestions for needed improvements. She neglected to copy Pat or Mike on any of her letters.

Surprisingly enough, Gable responded and asked Katherine to schedule a meeting to discuss Telesales. Surprised and pleased with the response, Katherine sent the CEO's reply to Mike. Pat was never copied. Later that day Pat was in Katherine' s cubicle with a printed copy of the email thread.

Pat snapped. "What are you trying to do?"

"Nothing at all. Gable asked for feedback and I thought I might have something to say that could really help out," Katherine replied, somewhat taken aback by the forcefulness of Pat's approach. "I thought this was a good thing."

Pat: "Now he wants a meeting! What do you plan to tell him?!?"

Katherine: "I just wanted to talk about what this group does and how we could do our jobs a little better - perhaps with a dedicated tech support resource to answer customer's presales questions."

Pat: "We've been doing just fine for all these years. What makes you think that you need to change it?"

Pat walked away, shaking her head "you're going to get us all fired...."

Katherine' s private meeting soon would include both Pat and Mike who insisted on crafting the agenda. Katherine did not openly object but was distraught and sought Gloria's council.

Katherine: "Why does this keep happening to me? Why does Pat hate me so much?

Gloria: "Hate you? She's terrified of you...."

THE LAST STRAW

Soon morale was on the rise, both within the company as a whole and inside the Telesales group in particular. Mike's job in distribution development was given to a new hire, and he was tasked with turning Telesales into a focused Inside Sales team. He would be given the resources to hire 20 new employees. Clearly, Katherine had every reason to believe that nearly three years of unflinching service would finally be rewarded.

To her dismay, when applicants for the new jobs were being brought in, Pat, Rob, Kerri and Tara were doing all of the interviews. She was not asked to do a single one. Disturbed, she approached Pat.

Katherine: "Pat, I could not help but notice that I was not being asked to interview any of the job applicants. Should I be worried?"

Pat: "Not at all" was the warm and reassuring reply. "You are our Latin American champion...These applicants are not bilingual."

Somewhat reassured, Katherine tried not to think about events at headquarters as she flew down to Brazil for a week long tour of territory operations. Coming back, she was shocked to learn that there would be no promotion. While Kerri, Tara and Rob had been promoted to supervisory status, she was still frozen in the same pay "zone." Where the three would be directly reporting to Mike, she was still under Pat.

Though she tried to bear up, she found herself so distraught that she had difficulty functioning. Getting no satisfaction from Pat and no audience with Mike, Katherine finally picked up the phone:

Later that afternoon, Mike was shocked to learn that both he and Pat had been implicated in a formal racial discrimination claim (discrimination against an African-American). Pat knew immediately who filed it.

AuthorAffiliation

Robert Switkin, Long Island University

Barry Armandi, SUNY-OId Westbury

Herbert Sherman, LIU-Southampton College

Armandi@attglobal.net

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 2

Pages: 107-111

Number of pages: 5

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192411717

Document URL: http://search.proquest.com/docview/192411717?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 39 of 100

FITNESS PRO: MANAGING A GROWING BUSINESS

Author: Tompkins, Lee; Kent, Russell; McDonald, Michael

ProQuest document link

Abstract:

The primary subject matter of this case concerns entrepreneurship. Secondary issues examined include operations, finances, marketing, distribution, warehousing, policies, procedures, and information systems. The case has a difficulty level of four. The case is designed to be taught in one and one-hour hours and is expected to require two hours of outside preparation by students.

Full text:

CASE DESCRIPTION

The primary subject matter of this case concerns entrepreneurship. Secondary issues examined include operations, finances, marketing, distribution, warehousing, policies, procedures, and information systems. The case has a difficulty level of four. The case is designed to be taught in one and one-hour hours and is expected to require two hours of outside preparation by students.

CASE SYNOPSIS

The case examines how a physical therapist started an exercise equipment and personal fitness business: Fitness Pro. Eventually, the sone takes over the business and moves it to the Hilton Head Island, South Carolina, and Savannah, Georgia, areas ofthe Southeast United States. As the business begins to grow, the founder's son looks for growth opportunities that fit his business model. He finds it in a similar business located in Tallahassee, Florida: Fitness Master. As these two businesses merge into one named Fitness Pro, they later start a new business in Jacksonville, Florida.

Within a few years, the business has three retail stores in Savannah, Tallahasee, and Jacksonville, and several outside who focus strictly on commercial accounts. With growth, however, comes growing pains. Major problems facing the two owners are what to do about rising shipping costs, warehousing, inventories, and financial control. The partners decide to bring in a more experienced partner to help them negotiate with their supplies. Also, the new partner is trying to help the business develop accounting and financial information systems.

The case ends with the three partners trying to develop a strategic plan for the future of the business.

Special thanks for research provided by Sharon Locklear, Ryan Martin, Rick Page, and Patrick Razuri, all of Georgia Southern University.

AuthorAffiliation

Lee Tompkins, Jr., Fitness Pro

Russell Kent, Georgia Southern University

Michael McDonald, Georgia Southern University

mmcdonal@georgiasouthern . edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 2

Pages: 113

Number of pages: 1

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192411800

Document URL: http://search.proquest.com/docview/192411800?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 40 of 100

RFID AT RODNEY STRONG VINEYARDS

Author: Atkin, Thomas

ProQuest document link

Abstract:

This case investigates a decision that a winery had to make concerning whether it should implement Radio Frequency Identification technology (RFID). The push for RFID implementation has been led by Wal-Mart and other large retailers. The winery management had to wrestle with economic issues as well as the possibility of losing an important customer.

The first issue to investigate was cost. RFID is a very expensive technology to implement. There are some savings to be achieved by using RFID but it may never pay for itself. John Leyden must spell out all of the costs in order to perform a breakeven analysis. Many companies performed this same type of analysis when Electronic Data Interchange was rolled out in the 1990's.

Secondly, John has to look at the actions of his competitors to see if and when they are going to adopt RFID. With any new technology, there is usually a tipping point where it becomes a necessity for remaining competitive.

Most important, however, he needs to assess the needs of his customers. There was a potential to lose sales if his customers viewed RFID as a requirement for obtaining futur e business. From a supply chain management perspective, protecting relationships with customers may be the most important issue.

Full text:

ABSTRACT

This case investigates a decision that a winery had to make concerning whether it should implement Radio Frequency Identification technology (RFID). The push for RFID implementation has been led by Wal-Mart and other large retailers. The winery management had to wrestle with economic issues as well as the possibility of losing an important customer.

The first issue to investigate was cost. RFID is a very expensive technology to implement. There are some savings to be achieved by using RFID but it may never pay for itself. John Leyden must spell out all of the costs in order to perform a breakeven analysis. Many companies performed this same type of analysis when Electronic Data Interchange was rolled out in the 1990's.

Secondly, John has to look at the actions of his competitors to see if and when they are going to adopt RFID. With any new technology, there is usually a tipping point where it becomes a necessity for remaining competitive.

Most important, however, he needs to assess the needs of his customers. There was a potential to lose sales if his customers viewed RFID as a requirement for obtaining futur e business. From a supply chain management perspective, protecting relationships with customers may be the most important issue.

CASE OBJECTIVES

This case is suitable for an undergraduate or MBA level Operations or Supply Chain Management class. It is designed to facilitate discussions about breakeven analysis, supply chain management, and technology adoption. Although this case is specifically about the wine business, the underlying concepts are general enough to fit most companies facing a technology decision. It provides and excellent example of a breakeven analysis as well as listening to the voice of the customer in a business-to-business relationship.

It will also make students aware of a dynamic new technology that may change the way business is transacted in the near future.

AuthorAffiliation

Thomas Atkin, Sonoma State University

tom.atkin@sonoma.com

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 2

Pages: 115

Number of pages: 1

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192411619

Document URL: http://search.proquest.com/docview/192411619?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 41 of 100

Social Construction of Information Technology Supporting Work

Author: Ramos, Isabel; Berry, Daniel M

ProQuest document link

Abstract:

In the beginning of 1999, the CIO of a Portuguese company in the automobile industry was debating with himself whether to abandon or to continue supporting the MIS his company had been using for years. This MIS had been supporting the company's production processes and the procurement of resources for these processes. However, in spite of the fact that the MS system had been deployed under the CIO's tight control, the CIO felt strong opposition to the use of this MIS system, opposition that was preventing the MIS system from being used to its full potential. Moreover, the CIO was at lost as to how to ensure greater compliance to his control and fuller use of the MIS system. Therefore, the CIO decided that he needed someone external to the company to help him understand the fundamental reasons, technical, social, or cultural, for the opposition to the MIS system. [PUBLICATION ABSTRACT]

Full text:

Headnote

EXECUTIVE SUMMARY

In the beginning of 1999, the CIO of a Portuguese company in the automobile industry was debating with himself whether to abandon or to continue supporting the MIS his company had been using for years. This MIS had been supporting the company's production processes and the procurement of resources for these processes. However, in spite of the fact that the MS system had been deployed under the CIO's tight control, the CIO felt strong opposition to the use of this MIS system, opposition that was preventing the MIS system from being used to its full potential. Moreover, the CIO was at lost as to how to ensure greater compliance to his control and fuller use of the MIS system. Therefore, the CIO decided that he needed someone external to the company to help him understand the fundamental reasons, technical, social, or cultural, for the opposition to the MIS system.

Keywords: business applications; case study; communications gap; enterprise IS; enterprise resource planning; IS impacts; IS problems; IS success; management information needs; organizational culture; social impacts; social issues of IT; top management; user attitudes; user behavior; user characteristics; user expectations; user satisfaction

THEORETICAL BASIS FOR THE STUDY

Innovative, organization-transforming software systems are introduced with the laudable goals of improving organizational efficiency and effectiveness, reducing costs, improving individual and group performance, and even enabling individuals to work to their potentials. However, it is very difficult to get these software systems to be used successfully and effectively (Lyytinen et al., 1998; Bergman et al., 2002). Some people in some organizations resist the changes. They resist using the systems, misuse them, or reject them. As a result, the goals are not achieved, intended changes are poorly implemented, and development budgets and schedules are not respected. Misguided decisions and evaluations and less than rational behaviour are often offered as the causes of these problems (Norman, 2002; Dhillon, 2004). Bergman, King, and Lyytinen (2002) observe (p. 168), "Indeed, policymakers will tend to see all problems as political, while engineers will tend to see the same problems as technical. Those on the policy side cannot see the technical implications of unresolved political issues, and those on the technical side are unaware that the political ecology is creating serious problems that will show up in the functional ecology." They go on to say (p. 169), "We believe that one source of opposition to explicit engagement of the political side of RE [Requirements Engineering] is the sense that politics is somehow in opposition to rationality. This is a misconception of the nature and role of politics. Political action embodies a vital form of rationality that is required to reach socially important decisions in conditions of incomplete information about the relationship between actions and outcomes."

The implementation of complex systems, such as enterprise resource planning (ERP) systems, are rarely preceded by considerations about:

* the system's degradation of the quality of the employees' work life, by reducing job security and by increasing stress and uncertainly in pursuing task and career interests (Parker and Wall, 1998, pp. 55-70; Davidson and Martinsons, 2002; Thatcher and Perrewé, 2002);

* the system's impact on the informal communication that is responsible for friendship, trust, feeling of belonging, and self-respect (Goguen, 1994; Snizek, 1995; Piccoli and Ives, 2003);

* the power imbalances the system will cause (Bergman et al., 2002; Dhillon, 2004); and

* the employees' loss of work and life meaning, which leads to depression and turnover (Parker and Wall, 1998, pp. 41-49; Bennett et al., 2003; Davison, 2002).

Recent work by Marina Krumbholz, Neil Maiden, et al. (2000) considers some of these issues after implementation of ERP systems. Specifically, this work investigates the impact on user acceptance of ERP-induced organizational transformation that results from a mismatch between the ERP system's actual and perceived functionalities and the users' requirements, including those motivated by their values and beliefs (Krumbholz et al., 2000; Krumbholz and Maiden, 2001).

This case study describes an on-site examination of one particular ERP-induced organization transformation. The prime champion of the ERP system in one company was surprised by the resistance to the system's use shown by the employees of the company. He ended up asking the help of the first author of this case study to understand the sources of this resistance and what to do about it. The present report is a distillation of the first author's final report to the champion and of her PhD dissertation (Ramos, 2000). The focus of the study is on understanding the technological, social, and cultural reasons of the employees' resistance against the ERP.

ORGANIZATIONAL BACKGROUND

The reader should consult the organizational charts shown in Figures 1 and 2 in Annex I as he or she is reading the following narrative. With the exception of the proper name Isabel, that of the first author, none of the proper names in the narrative, including of the company and of software products, is real. However, each proper name does refer to one real person, company, or product that participated in the events narrated.

One cold morning in February 1999, Pedro was talking with a friend, Sérgio, about Pedro's professional path as director of the Information Systems (IS) Department of ENGINECOMP, a Portuguese subsidiary of a Brazilian company in the automobile sector. Pedro was not able to decide what else could be done to ensure that MaPPAR, the information system that was currently supporting the management of production processes and the procurement of the associated resources, was used to its full potential.

Pedro had started working for ENGINECOMP at its very beginning in 1992, when the Brazilian company's administration decided to build a plant in Europe. They chose Portugal for its linguistic and cultural similarity, and for the relatively low salaries that would be paid to a young and educated workforce. See Annex II for details about the Portuguese automotive sector and about the company.

Rafael, the president of the Brazilian company, liked to have close control of the company and of all its branches. He felt especially comfortable with Pedro's past experience and thus hired Pedro. He also admired Pedro's creativity and close attention to details. Soon, Pedro earned the power to define the work processes, plant design, management practices, and the information systems that would support the work.

The building of the plant was finished in the beginning of 1993, and the plant was already manufacturing seven months later. It produced a small but essential component for the car engines. This component requires a high-quality production line, since even a small variance in the required measures implies that the product would not be accepted by the client.

The plant satisfactorily supplied several of the most important automobile builders in Europe. For each car model, the engineers of the plant, assisted by the client, designed the specific dimensions and shape of the product to be delivered each time it was ordered by the client. Simultaneously, the client and the plant administration negotiated the percentage of items that the client could cancel or add to an order already in production. This percentage was very important, since it helped the client to react quickly to a sudden drop or increase in the demand for that specific car model. For the plant, this variability added considerable difficulty to production planning, but the aggressive competitiveness of the automotive sector forced acceptance of these margins.

The raw material was shipped from Brazil, where the mines were located. The material was shipped by sea and arrived at ENGINECOMP three months later. This delay forced careful stock management and production planning.

Every time a new order arrived, ENGINECOMP's capability to produce the required product was carefully assessed. Following this assessment, the manufacture of the required product was planned to fit the delivery dates agreed upon with the client, and production orders were drafted and delivered to the plant. The production processes were designed in accordance with international norms and the best practices of the sector. These processes were regularly subjected to quality controls, in both external and internal audits.

Management of materials acquisition for the plant machinery was also an important task, since the plant could never stop or reduce its production from what was planned. Three employees of the Logistics Department were assigned to negotiate continually with actual or potential suppliers. These employees were responsible for keeping the materials at adequate stock levels.

Whenever ordered products were finished, they were packaged and were stacked in the warehouse for delivery. The finished goods were then delivered to their clients by ENGINECOMP's own trucks, by train, or by airplane.

Pedro decided that the complexity of all these activities required an integrated production management system. He convinced the Brazilian administration to buy a well-known and highly utilized off-the-shelf system, MaPPAR, to manage all the production processes and associated resources. See Annex III for details about MaPPAR. MaPPAR was configured and deployed under Pedro's tight control, with the assistance of the directors of several of ENGINECOMP's other departments, namely, Engineering, Quality Control, Finance, Logistics, and Warehousing.

Pedro told his friend, Sérgio, about all the difficulties and successes of the first two years. Pedro was really proud of his work and of his good decisions. ENGINECOMP was considered one of the best suppliers of its products in all of Europe and was supplying the most successful automobile manufacturers.

However, MaPPAR was never used to its full potential. In fact, resistance to MaPPAR's use seemed to grow steadily since its deployment. In parallel, Pedro's authority was being continually questioned despite his many past good decisions, his hard work, and his undeniable contributions to ENGINECOMP's success.

During 1998, a large fraction of ENGINECOMP's shares were sold to a German company. Now, the Brazilian company owned less than 40% of ENGINECOMP's shares and was thus losing control over what happened at ENGINECOMP. By the end of 1998, the only relics left of the Brazilian company's administration of ENGINECOMP were framed posters in the Brazilian Portuguese language encouraging employees' creativity and participation in decision making.

The new administrator, Fritz, distributed his control and support evenly over the directors of all departments that reported to him including the IS, Engineering, Quality Control, Finance, Logistics, and Warehousing departments. That is, Fritz treated Pedro for what Pedro really was, the director of the IS Department, one of many departments. Pedro resented this treatment, and he believed there was a close link between his loss of power and the growing opposition to the use of MaPPAR. He wanted to counter this opposition, but was having "difficulty reasoning unemotionally about the current situation and past events." Then, Sérgio told Pedro about a researcher who might be interested and able to help Pedro analyze the situation. The researcher was Isabel, who entered the scene in early March 1999.

SETTING THE STAGE

When Pedro first talked with Isabel, he told her about an important movement within ENGINECOMP against the use of MaPPAR to support production management. MaPPAR was very versatile and included modules that could support engineering tasks, order processing, production planning, assessment of production capabilities, production management, product shipment, management of stocks, accounts payable to suppliers, accounts receivable by clients, and finances and accounts management.

While MaPPAR was a very complete and powerful system, it was very poorly used. Employees ignored or resisted using much of MaPPAR's functionality, preferring to develop their own small systems and databases to manage only the information relevant to their daily tasks, and used the central MaPPAR database only as the source of data to feed their own small systems and databases.

Moreover, the employees of the plant were refusing to input timely data about the tasks they perform. They preferred to defer their inputting until the end of the week or the month, so they would not lose time during the days. Sometimes, one of the employees was freed by his colleagues from his normal duties in order to input his and his colleagues' data. The problem with this practice was that it became virtually impossible to track down the state of the orders in production.

Pedro and Isabel agreed that Isabel would do an on-site study of ENGINECOMP at work, in search of the fundamental reasons, technical, social, or cultural, for the opposition to MaPPAR and for the proliferation of small systems and databases. Isabel would study the work of two departments in ENGINECOMP: the Finance Department and the Logistics Department. They were the most influential departments of the company, since they performed essential activities for the company. The Finance Department did financial management, and the Logistics Department did customer service and production planning. Moreover, the employees of these two departments constituted a majority of MaPPAR's users.

CASE DESCRIPTION

Isabel spent five months at ENGINECOMP, observing and interviewing all the employees of the Finance and Logistics departments. Almost every day, Isabel spent several hours joining or observing employees performing their tasks with or without support from MaPPAR. She interviewed Carlos and Manuel, the directors of the departments. She also interviewed several middle managers responsible for key activities, including Fernando, Carlos's closest collaborator in the Finance Department, and Roberta, Eduardo, and Antonio, the managers of the Customer Service, Production Planning, and Purchasing divisions of the Logistics Department.

Isabel also observed and interviewed Pedro and his collaborators in the IS Department. She talked also a few times with the German leader, Fritz and she was present at events such as meetings and training programs. To learn more about MaPPAR, Isabel consulted the available manuals and technical documentation. She used a demonstration version of MaPPAR to test some of its functionality on her own.

Below is a department-by-department summary of Isabel's observations.

Finance Department

The Finance Department was responsible for all financial and accounting tasks of the company. Carlos, the director of the Finance Department, had sole directorial responsibility for the department. However, he delegated supervision of the accounting tasks to Fernando, a trusted employee with an accounting degree. Fernando had access to key information and knowledge for performing these accounting tasks. Fernando's access and knowledge, charisma, and core skills made him a privileged ally of Carlos, the director.

As mentioned, the coordination and control of the Finance Department activities were responsibilities of Carlos, the director, who kept and centralized all decision making. Carlos was a Brazilian sent to ENGENECOMP by the Brazilian company's administration. Fritz, the new German leader, was not very comfortable with Carlos's complete control of the Finance Department.

In the Finance Department, informal communication about work tasks was discouraged. Carlos's rule was that all communication must be well documented. The work in the department was organized into well-defined tasks connected by clearly defined processes, all of which determined the precise responsibilities of each employee. Employees only occasionally received professional training. The heavy workload left little time for such training. Moreover, Carlos believed that each employee must perform simple and repetitive tasks that can be learned by doing. The tasks were distributed among eight employees, each with limited autonomy. Carlos had his trusted assistant Fernando, with the accounting degree, supervise the daily routine.

Fernando was seen as a bright and ambitious young man. He was expected more to comply with rules and procedures than to make autonomous decisions. Fernando

worked hard to serve Carlos's interests, taking advantage of what he had learned in courses leading to his degree to further those interests. Fernando's actions and information were especially useful to Carlos, who as a Brazilian, was not as familiar with Portuguese accounting regulations as a Finance Department director should be.

It is I who signs the accounts, the financial reports, and the balance sheets. It is I who signs the fiscal statements. I am the officer responsible for the company's accounting. My accounting degree and my understanding of Portuguese law allow me to give invaluable assistance to the director. - Fernando

With the help of Fernando, Carlos asserted the strong leadership that Carlos believed was the guarantor of efficiency and motivation. Compliance with Carlos's leadership was the main criterion by which Carlos recruited employees for the Finance Department.

Interviewed Finance Department employees mentioned some competition for career advancement. Finance Department employees were rewarded for accurate completion of assigned tasks. Failure to comply with rules and procedures was punished. There was a predominant belief among the employees that autonomous and creative employees were dangerous in a finance department. This belief was supported by past events during which fraud was perpetrated. This belief was one of the most important sources of the motivation to use MaPPAR, which was seen as reinforcing established practices:

I am responsible for one area. So, I work in a well-defined set of tasks and my colleagues have clearly defined tasks as well. There is no confusion. The system requires that we are specialists in our tasks... hmm ..., and it assures that our director has access to what we do, so we are not blamed for the mistakes [errors and fraud] of others. - An Employee of the Finance Department

There was little variation in the daily routine of the Finance Department. All needed information was in MaPPAR's database, and that information was provided by the other departments of ENGINECOMP. Moreover, a significant part of the Finance Department's work was the production of regular reports and other more timely, but irregular information for the other departments. The other departments of ENGINECOMP exerted the most influence on the Finance Department and served as a buffer between the Finance Department and the company's clients and suppliers. However, the Finance Department did have some interaction with banks and other similar entities outside the company. Thus, as can be expected, the Finance Department's workload was very stable, with almost no surprises.

The Finance Department employees made heavy use of spreadsheets to produce the reports the department was required to produce for the other departments. The reasons offered for use of spreadsheets instead of MaPPAR included:

The [MaPPAR] system reports are not adequate for our management needs. They present too much data, in a lot of rows, many of which are not useful. It is better to search for the relevant data using query tools and then to export the data to our spreadsheets where we can treat the data in the way that suits our objectives. - Fernando

Despite that the use of spreadsheets was sanctioned for the production of only specific reports, the spreadsheets were being programmed to also perform some functions that the system provided.

There is no need to use the options provided in the menus of the [MaPPAR] system because we have other tools that do the same. - Another Employee of the Finance Department

Some Finance Department employees regretted the lack of training to use MaPPAR. At the time MaPPAR was installed, MaPPAR's implementers did train the Finance Department employees that were hired specifically to operate MaPPAR. However, these employees saw the training as too brief and too compressed; they simply could not absorb all the complex information about MaPPAR's functionality in such a short time. Hence, from the beginning, even the MaPPAR operating employees did not understand MaPPAR's full capabilities.

It was a one-shot training. I would not even call it training; it was more like a conversation with the technicians. - Still Another Employee of the Finance Department

After that initial training, employees that had used MaPPAR for a longer time were responsible for in-house MaPPAR training. Often these trainer employees guided the trainee employees through only the functionality actually being used. The trainers usually advised trainees to avoid other MaPPAR functionality, saying that it would be too complex, inadequate, or better implemented in the programmed spreadsheet.

All that I know about the system is the result of my efforts to use it. But we have too many tasks to perform. There is no time left to explore the system, which has too many complexities. And I say to my colleagues that they should not waste too much time experimenting if they are not sure of the usefulness of a menu's options. - Fernando

The Finance Department employees saw this in-house training as a burden. Moreover, Carlos did not encourage his employees to experiment with MaPPAR themselves.

The Finance Department's history included some catastrophic mistakes, and the department rumor mill still propagated stories about the stupid mistake that Employee A or Employee B had made.

To many Finance Department employees, the spreadsheet appeared much easier and less constraining than did MaPPAR.

All requests for required new or enhanced features for MaPPAR were sent to the IS Department for implementation. However, many times the IS Department's response was to deny a request because of the high costs of the new or enhanced feature. The IS Department did not want to have to make the same changes to every new version of MaPPAR that would come out in the future. When a required feature was refused by Pedro, the director of the IS Department, the requesters were able to easily find implementers among their colleagues, who had accepted the informal responsibility of programming the spreadsheets and databases.

In general, Finance Department employees acknowledged the importance of MaPPAR for their department, since MaPPAR's integrated modules automatically fed all the accounts. The institutional authority of the IS Department to define MaPPAR's IT support was well accepted.

Logistics Department

The work of the Logistics Department was distributed among three divisions: Purchasing, Customer Service, and Production Planning. Antonio, the manager of the Purchasing Division, Roberta, the manager of the Customer Service Division, and Eduardo, the manager of the Production Planning Division, each reported directly to Manuel, the director of the Logistics Department. Each of the three managers coordinated and controlled the tasks for which he was responsible. The three managers and one director participated jointly in defining the Logistics Department's goals and objectives and in decision making.

Professional training was being delivered to Logistics Department employees on a regular basis. However, each of the three managers believed that his skills were not being adequately used and rewarded. In particular, the Customer Service Division manager, Roberto, felt especially frustrated with this situation. Roberta was seen as a very dynamic man who learned his job quickly and tried to exceed what was expected from him. However, Roberto felt that MaPPAR was a significant barrier to his own career advancement. MaPPAR demanded too much specialization in specific tasks and made it difficult for one person to have a broad perspective of the business processes. Roberto believed that this broad perspective was central to providing effective customer service and to making good decisions.

Here [at ENGINECOMP], we are evaluated by our ability to solve problems. To be able to solve problems quickly, we need to know what is going on around here. But, the system is so unnecessarily complex, and it limits our ability to access relevant information. - Roberto

In fact, it was Roberto who took the initiative of programming the spreadsheets and databases that were being used by his colleagues throughout ENGINECOMP. He and two other employees in the Customer Service Division became the informal IS team of ENGINECOMP, always ready to implement new features adapted to the specific needs of their colleagues. Roberto's informal, can-do attitude, his enthusiasm in searching for solutions, and his courage to directly face senior managers provided him with the admiration of his colleagues, inside and outside the Logistics Department. Roberta proudly said,

"At this stage of my career, I am independent of the director of the department, I report directly to the administration [i.e., Fritz],"

There was a widespread belief among all ENGINECOMP's employees that the Logistics Department created the company's positive image among its customers and the general public. This belief was a source of negotiating power for the Logistics Department and especially for its emerging leader, Roberto.

Especially during the last three months, we ... When I joined the department, we contacted one client directly, and the others were contacted through our office in Hamburg. In fact, it was not a real department but an expedition unit. With the recent closing of the office in Hamburg, all the logistics service is provided by Portugal. Of course, this gave us much more importance inside the company. - Roberto

Roberto was the manager of one of the three divisions of the Logistics Department officially directed by Manuel. Manuel and the managers of the three divisions believed that the four of them should cooperate to achieve the department's goals. However, frequent internal conflicts emerged from the fights over the specific interests of the department's divisions. These conflicts emerged from the need to fight for scarce resources such as budget, human resources, and technology. The conflicts also arose from the conflicting influences on work practices exerted by Antonio, the Purchasing Division manager, and Roberto.

We 're working differently now. We have three autonomous divisions. We [managers of the divisions] are responsible for ensuring that our colleagues have what they need to perform their tasks. Hmmm ... Who coordinates our activities? Well, that is a difficult question. The department's director, I guess ... [laughter]. Well, I talk directly with the administration [Fritz]. - Roberto

The Logistics Department office space was designed as an open space into which any ENGINECOMP employee could enter to seek a problem solution or to demand a service. The Purchasing Division and the Production Planning Division managers often complained about deleterious effects and the pressure caused by the constant interruptions that the open space invited:

There is always pressure from the exterior of the department. This is a drawback of the clientsupplier policy that was adopted internally, this pressure to be continuously available in open space. We are constantly being interrupted! It is not possible to focus our attention on a single subject for long and to follow logical and correct reasoning. - António

Adding to this pressure were the variable and often unexpected requests and problems posed by suppliers, clients, and ENGINECOMP's production plant. For example, as mentioned, the quantities ordered by a costumer could be changed within an agreed upon percentage after the order was placed and production had started. Logistics Department employees saw flexibility of work practices and procedures, autonomy of decision, and informal communication channels and work relations as key factors to reduce the negative impacts of these sudden changes. Moreover, they saw MaPPAR as reducing their flexibility of action and making their work less interesting. Furthermore, MaPPAR was forcing them to comply with rules and procedures that reduced their ability to fulfill the needs of ENGINECOMP's plant and customers.

Some of these Logistics Department employees referred to MaPPAR as a "sacred cow'" that could not be questioned and that made them "slaves," requiring most of their time to input data without "receiving anything in return." These employees complained also of the poor quality of the MaPPAR reports. They had become highly suspicious of the data stored in the central database.

Because people won't be wasting their time to explore this and that. Why should they? When I want a report and this [MaPPAR] does not give me what I want ...! If only they [IS Department] made changes to the system! Meanwhile, someone [from the IS Department] decides not to make them. It is frustrating. - Eduardo

As in the Finance Department, the reports needed to support Logistics Department decisions were created in spreadsheets, using data obtained by querying the central MaPPAR database. This practice fostered a disconnection between the inputting of data and the production of reports to support decision making. The Logistics Department employees saw MaPPAR as too complex and too general to effectively support the details of the department's activities. Logistics Department employees agreed with Finance Department employees about the lack of MaPPAR use training and the burden caused by having to train new employees in the use of MaPPAR.

I find the system too confusing. It is a tool, since it is a standard in a lot of business areas. I think it does not really help the specific tasks of a specific company in a small country like ours. - António

Also, the Logistics Department employees decried the IS Department's lack of support and understanding. In response to this complaint, the Logistics Department developed what Roberto believed was a very effective strategy:

I have been doing [developing any needed functionality] by myself. When they [the IS department] do not want to make the [required] changes to the system, I develop the feature using the spreadsheets and databases. Nowadays, I do not even ask; I do by myself and help others with the programming. -Roberto

And he added:

The lack of support from the IS department is creating disinterest in the system. - Roberto

The removal of MaPPAR was seen as an important step to gain more control over the performed work. Employees wanted to be involved in (i) defining the work practices, (ii) decision making, (iii) monitoring the system usage, and (iv) defining what were good and bad usages.

This plant is six years old now. We have learned a lot. We want to be heard! We need a new system, but this time, we want to be involved! - Roberto

The IS Department

As mentioned, Pedro was the director of the IS department. He kept close at hand the responsibility to define the operational and management best practices and to ensure that the information systems were effectively supporting those practices.

Also mentioned, Pedro was very proud of his professional advancement and his contributions to the success of ENGINECOMP. He considered himself responsible for the formulation of creative solutions in both work practices and information systems. He considered that implementing these solutions was a task to be performed in collaboration with the affected departments. Pedro did not consider himself to be an IS technical expert. His closest collaborator was the person that knew the used systems in detail and would do all the programming, parameterization, and users' support. This collaborator, José, was a timid man with strong technical skills; he was very competent, but was hardly considered a leader of opinion and action.

He [José] is very competent. I trust all technical tasks to him - Pedro

José works hard. He always treats us right. The only thing is... Well, he is very silent [smiling]. - Roberto

José was well accepted by employees from the other departments. These other employees understood the difficulty José had in providing immediate support to all MaPPAR users. José's colleagues from the other departments found José easier to approach than Pedro and they preferred to talk with José first when a problem arose or when a change to MaPPAR was needed. However, these employees knew also that Jose's actions were constrained by IS Department policies and his manager Pedro. At one point, the managers of departments other than the IS Department were informally discussing the role of the IS Department. A clear line was emerging between those that supported Pedro's interventional attitude and those that supported Jose's helpful and cooperative attitude. Pedro was aware of this discussion but showed no resentment towards José.

I know that they [the other employees] would like to get rid of me [laughter]. I defend the company interests too much. Of course, some other people around here understand that I have dedicated my life to this company. This happens everywhere and is tough. I do not believe José could handle all this. - Pedro

Pedro saw José as a very good programmer that would never be able to carry out the negotiation and political battles inherent in Pedro's, the IS director's, job. Moreover, Pedro knew that José was oblivious to the discussion. Pedro understood this discussion as an expression of the growing resistance to his own actions. What Pedro really resented was that the German administration and Fritz, in particular, were listening to these dissenting voices more and more.

The Brazilian administration understood. They hired me for my competence, and they saw what I did. The new administrator does not know. - Pedro

CHALLENGES FACING THE ORGANIZATION

By the end of the Isabel's study, the company was undergoing important changes in its middle management structure. Carlos resigned when a new directorial opportunity was offered to him back home in Brazil.

Roberto was becoming a key player in the growing importance of the Logistics Department within ENGINECOMP and in the good image this department projected to the company's stakeholders. Manuel, the Logistics Department director, was losing control over departmental decisions and strategy definition.

The German parent company was using a different ERP system, SAP R/3, and was now weighing the cost-benefits tradeoffs between upgrading ENGINECOMP's MaPPAR to interface with the parent company's system and deploying SAP R/3 at ENGINECOMP. Roberto believed that SAP R/3 should be deployed at ENGINECOMP. Roberto believed also that ENGINECOMP's six-year use of some ERP system, albeit different from SAP R/3, gave ENGINECOMP's middle managers the technological knowledge to actively participate in the parameterization of SAP R/3. The Finance Department did not have any preference, and its director was concerned only with the costs of the new system. Pedro was against the deployment of SAP/R3 because of the high costs of process reengineering and user training.

Some were suspicious of the data stored in the central database. The reluctance to use MaPPAR and the lack of time and will to explore MaPPAR's full functionality resulted in data being entered late or not at all, with the usual deleterious effects. For example, it was not always possible to track a client's order when the client requested information about his or her order. There were also problems identifying what products and raw material were in stock.

The growing trend to use spreadsheet programming to get around the problems caused by MaPPAR or to implement functionality perceived as not available in MaPPAR was also reducing the data's quality. Often, results of outside data processing were not fed back into MaPPAR.

Important MaPPAR functions, such as requirements planning and capacity planning, were never utilized and were instead programmed outside MaPPAR, resulting in unnecessary maintenance costs, lack of control over planning and its results, and a severe risk of unreliable planning. Pedro's efforts to document (1) organizational processes and resources, (2) the decision to deploy MaPPAR, (3) the MaPPAR process, (4) MaPPAR's functionalities and upgrades, and (5) the IT structure of ENGINECOMP supported his conviction that there was no need to incur the high costs of switching to a different system, especially when the European economy, including its automotive sector, was slowing down. Pedro realized that prevailing with this view would require gaining allies within ENGINECOMP and gaining the explicit support of Fritz, a near impossibility. Pedro just did not know what else could be done to get people to see the importance of abandoning the small databases and in-house programming in favour of a fuller understanding and use of MaPPAR.

References

REFERENCES

Bergman, M.B., King, J.L., & Lyytinen, K. (2002). Large-scale requirements analysis revisited: The need for understanding the political ecology of requirements engineering. Requirements Engineering Journal, 7(3), 152-171.

Bennett, J., Stepina, L. P., & Boyle, R. J. (2003). Turnover of Information Technology workers: Examining empirically the influence of attitudes, job characteristics and external markets. Journal of Management Information Systems, 19(3), 231-250.

Bergman, M.B., King, J.L., & Lyytinen, K. (2002). Large-scale requirements analysis revisited: The need for understanding the political ecology of requirements engineering. Requirements Engineering Journal, 7(3), 152-171.

Davison, R. (2002). Cultural complications of ERP: Valuable lessons learned from implementation experiences in parts of the world with different cultural heritages. Communications of the ACM, 45(1), 107-111.

Davison, R. & Martinsons, M.G. (2002). Empowerment or enslavement? A case of process-based organisational change in Hong Kong. Information Technology & People, 15(1), 42-59.

Dhillon, G. (2004). Dimensions of power and IS implementation. Information & Management, 41(5), 635-644.

Goguen, J. A. (1994). Requirements engineering as the reconciliation of technical and social issues. In J. A. Goguen & M. Jirotka (Eds.), Requirements Engineering: Social and Technical Issues (pp. 165-199). London: Academic Press.

Krumbholz, M., Galliers, J., Coulianos, N., & Maiden, N.A.M. (2000). Implementing enterprise resource planning packages in different corporate and national cultures. Journal of Information Technology, 15, 267-279.

Krumbholz, M., & Maiden, N.A.M. (n.d.). The implementing of ERP packages in different organisational and national cultures. Information Systems Journal, 26(3), 185-204.

Lyytinen, K., Mathiassen, L., & Ropponen, J. (1998). Attention shaping and software risk: A categorical analysis of four classical risk management approaches. Information Systems Research, 9(3), 233-255

Norman, D. A. (2002). Emotion and design: Attractive things work better. Interactions, 9(4), 36-42.

Parker, S. & Wall, T. (1998). Job and Work Design: Organizing Work to Promote Well-Being and Effectiveness. Thousand Oaks, CA: Sage Publications.

Piccoli, G. & Ives, B. (2003). Trust and the unintended effects of behavior control in virtual teams. MS Quarterly, 27(3), 365-395.

Ramos, I.M.P. (2000). Aplicações das Tecnologias de Informaçõo que suportam as dimensões estrutural, social, político e simbólica do trabalho. PhD Dissertation. Departamento de Informática, Universidade do Minho, Guimarães, Portugal.

Snizek, W.E. (1995). Virtual offices: Some neglected considerations. Communications of the ACM, 38, 15-17

Thatcher, J. B. & Perrewé, P. L. (2002). An empirical examination of individual traits as antecedents to computer anxiety and computer self-efficacy. MS Quarterly, 26(4), 381-396.

AuthorAffiliation

Isabel Ramos, Universidade do Minho, Portugal Daniel M. Berry, University of Waterloo, Canada

AuthorAffiliation

Isabel Ramos earned her PhD in Information Technologies and Systems from the University of Minho (2001). She is currently an assistant professor in the Information Systems Department, University of Minho, Portugal. She leads a research group in knowledge management. She also conducts research in requirements engineering. She is an associate editor of the new International Journal of Technology and Human Interaction. Other research and teaching interests include organizational theory, sociology of knowledge, history of science, and research methodology. She has authored several scientific papers presented at international conferences and workshops, and published in conference and workshop proceedings and journals.

Daniel M. Berry earned his PhD in Computer Science from Brown University (1974). He was on the Faculty of the Computer Science Department at the University of California, Los Angeles (1972-1987). He was with the Computer Science Faculty at the Technion, Israel (1987-1999). From 1990 to 1994, he worked for half of each year at the Software Engineering Institute at Carnegie Mellon University (USA), where he was part of a group that built CMU's Master of Software Engineering program. During the 1998-1999 academic year, he visited the Computer Systems Group at the University of Waterloo in Waterloo, Ontario, Canada. In 1999, Dr. Berry moved to the School of Computer Science at the University of Waterloo. His current research interests are software engineering in general, and requirements engineering and electronic publishing. He has supervised 21 PhDs, numerous master s students, and has received a Voted Instructor Award in Computer Science at Technion. He has consulted extensively in industry. He has served as associate editor for two journals and has been a referee for numerous journals. He has chaired and participated on programming committees for many conferences and workshops. He has published extensively in refereed journals and contributed to many refereed conferences, symposia, and books.

View Image -   APPENDIX I
View Image -   APPENDIX II
View Image -   APPENDIX II

Subject: Case studies; MIS; Technological planning

Classification: 9110: Company specific; 5240: Software & systems; 2310: Planning

Publication title: Journal of Cases on Information Technology

Volume: 7

Issue: 3

Pages: 1-17

Number of pages: 17

Publication year: 2005

Publication date: Jul-Sep 2005

Year: 2005

Publisher: IGI Global

Place of publication: Hershey

Country of publication: United States

Publication subject: Business And Economics--Computer Applications

ISSN: 15487717

Source type: Reports

Language of publication: English

Document type: Business Case

Document feature: references charts tables

ProQuest document ID: 198720356

Document URL: http://search.proquest.com/docview/198720356?accountid=38610

Copyright: Copyright Idea Group Inc. Jul-Sep 2005

Last updated: 2011-07-21

Database: ABI/INFORM Complete

Document 42 of 100

Power Conflict, Commitment & the Development of Sales & Marketing IS/IT Infrastructures at Digital Devices, Inc.

Author: Butler, Tom

ProQuest document link

Abstract:

This article explores the political relationships, power asymmetries, and conflicts surrounding the development, deployment, and governance of IT-enabled sales and marketing information systems (IS) at Digital Devices, Inc. The study reports on the web of individual, group and institutional commitments and influences on the IS development and implementation processes in an organizational culture that promoted and supported user-led development. In particular, the article highlights the problems the company's IS function encountered in implementing its ad-hoc strategies and governance policies. It will be seen that the majority of these problems occurred because of the high levels of autonomy and budgetary independence of the IT-literate, engineering-oriented business 'communities-of-practice' that constituted Digital Devices. The case therefore provides rare insights into the reality of IS development and IT infrastructure deployment in organizations through its in-depth description of the positive and negative influences on these processes and their outcomes. [PUBLICATION ABSTRACT]

Full text:

Headnote

EXECUTIVE SUMMARY

This article explores the political relationships, power asymmetries, and conflicts surrounding the development, deployment, and governance of IT-enabled sales and marketing information systems (IS) at Digital Devices, Inc. The study reports on the web of individual, group and institutional commitments and influences on the IS development and implementation processes in an organizational culture that promoted and supported user-led development. In particular, the article highlights the problems the company's IS function encountered in implementing its ad-hoc strategies and governance policies. It will be seen that the majority of these problems occurred because of the high levels of autonomy and budgetary independence of the IT-literate, engineering-oriented business 'communities-of-practice' that constituted Digital Devices. The case therefore provides rare insights into the reality of IS development and IT infrastructure deployment in organizations through its in-depth description of the positive and negative influences on these processes and their outcomes.

Keywords: case study; IS control issues; marketing IS; strategic IS; user-developed systems

ORGANIZATIONAL BACKGROUND

Digital Devices, Inc. was founded in 1965 in Cambridge, Massachusetts, by Ray Stata and Matt Lorber. In 2003, the company was acknowledged as one of the leading designers and manufacturers of high-performance linear, mixed-signal and digital integrated circuits (ICs), which addressed a wide range of signal-processing applications in the electronics and related industries. Digital Devices is headquartered in Norwood, Massachusetts, and has a significant global presence in all major markets in the electronics industry. The company has numerous design, manufacturing and direct sales offices in over 18 countries and employs more than 7,200 people worldwide (Figure 1). The company's stock is traded on the New York Stock Exchange and is included in the Standard & Poor's 500 Index. Many of Digital's largest customers buy directly from the company, placing orders with its sales force worldwide; the remainder obtain their products through distributors or over the Internet. Just fewer than 50% of Digital's revenues come from customers in North America, while the balance came from customers in Western Europe and the Far East.

View Image -   Figure 1: Digital Devices Inc. Worldwide Design, Manufacturing and Sales Functions

Ray Stata, Digital's co-founder and longtime CEO, recognized the importance of fostering a culture of openness, where employees were empowered and encouraged to be innovative. This was reflected in the company's structure, which exhibited a high degree of process decentralization, especially in the allocation of capital and operational budgets, and, in particular, the locus of decision making. Figure 2 illustrates the company's structure: the core business functions are the 'product line' Computer Products Division, Communications Division, Standard Linear Products Division, Transportation and Industrial Products Division, and the Micromachined Products Division, which was taken over by Ray Stata when he stepped down as CEO. Shown directly beneath these are corporate business divisions that provided support for product line divisions. It is of significance that Human Resources and Finance Divisions aside, all support divisions were engineering oriented, even the World Wide Sales and Corporate Marketing and Planning Divisions. This engineering-oriented culture was to have profound implications for IS development and governance in several areas of the company's operations, as will be seen.

Since its inception, Digital Devices gained a reputation as an excellent employer, where employees were respected, well remunerated and benefited from lucrative stock options. Individual commitment to the organization was manifested in the low level of staff turnover and the lifelong employment of many senior employees and engineers. The vast majority of employees remained loyal to the company despite the large salaries and attractive bonuses on offer from competitors. Significant too was the low level of turnover in employees from areas like sales and marketing, which was comparatively high in other companies in the sector. In December of 1997, Fortune magazine selected Digital Devices as one of the top 100 companies to work for in America and, later, in 2000, Fortune named the company as one of America's most admired companies.

View Image -   Figure 2: Digital Devices Inc. Organizational Structure (as of 2000)

SETTING THE STAGE

The process of information systems development is akin to Shakespearean drama, with its various acts, scenes, plots, counterplots, characters, tragedies and uncertain outcomes. This section of the article sets the stage for the drama described by introducing the major players: (a) design engineers in the marketing sub-functions of the Standard Linear Product Division; (b) marketing managers/engineers and communication professionals from the Corporate Marketing Division; (c) Central Applications support engineers, and sales and field engineers from the Sales Division; (d) IS professionals from the IS function, which is a sub-unit within the Finance Division; and (e) IT professionals from external consultancy firms. Customer design engineers from Digital's customer base constituted the ultimate end-user/stakeholder group. In order to better understand the issues discussed herein, a short overview of the major actors in the drama of the development of sales and marketing and governance of IT infrastructures at Digital Devices, Inc. is first offered. Following the major sections on theory and research method, the main section of this article then describes the origins of the political tensions surrounding IS development and associated issues of governance. These subsections are followed by three that describe how the various 'actors' and their 'communities-of-practice' participated in the development and implementation of: (1) the sales and marketing component of the company's Intranet and (2) the Corporate Web-presence. The evidence adduced in describing these complex IS development 'dramas' facilitates an understanding of the roles that power, political conflict and commitment play in shaping both the development process and its product - these are discussed in the penultimate section. The case therefore provides a real-world example of the 'reality' of systems development in innovative organizations.

The IS Function

The company's IS function was located at corporate HQ in Norwood. Unlike senior executives in the sales or marketing divisions, the senior IS executive, the CIO, reported to the VP of Finance, the CFO (Figure 2). This is important, as most large organizations in the US had established relatively autonomous IS functions by the mid-1990s. Product line and support divisions at Digital Devices had IS managers and IT professionals dedicated to take care of their particular IS needs and IT infrastructure support. For example, the Sales and Corporate Marketing divisions had one IS team to take care of their Sales and Marketing IS requirements: however, in all cases report relationships of IS staff were to the CIO and thence to the CFO. The following overview of IS operations at Digital indicates the outcome of this structural arrangement.

In the early 1990s, Digital's IS were centralized and based around an IBM mainframe. In this scheme of things, the role of IS was to gather corporate data. Subsequently, Digital's major business systems were based around SAP-packages. The first SAP module was implemented in 1994. In that year, the IS function also decided to standardize the desktop platforms in use across the organization, in order to provide all users with a common suite of applications and lower the total cost of ownership. Although many end-users preferred the Apple Macintosh platform, the decision to go with the PC hinged on the paucity of business applications for the MAC. So, while there was some opposition to this strategy within the organization, Digital opted for Microsoft Windows-based PC platforms worldwide and rolled out Banyan-Vines Network Operating System on the local area network. The one exception to this strategy of standardization was the engineering community in the product line and R&D divisions, who used Sun UNIX workstations. At the end of 1998, there were about 4,000 Windows-based desktop PCs and approximately 2,000 Sun Unix workstations in Digital's IT infrastructure. It was considered by many that Digital had a state-of-art IT infrastructure, although others were of the opinion that the same could not be said of IS support for areas like sales and marketing.

Central Applications: The Nexus of Sales & Marketing Product Knowledge at Digital Devices, Inc.

Digital's Sales and Corporate Marketing Divisions together served a wide range of customers in the US electronics industry and played a pivotal role in servicing customer needs worldwide. It must be noted that while Corporate Marketing was concerned with the formulation of Digital's worldwide marketing strategies, each of the product line divisions had their own marketing sub-functions. The company's IT infrastructure and related IS - that is, its Internet e-commerce and e-Business application, corporate intranet systems, and emerging sales and marketing information systems - played a major role in helping the sales and marketing operations deal with the large number, and wide geographical dispersion, of Digital's products and customers.

Based in Wilmington, a suburb of Boston, the Sales Division's Central Applications function was the corporate nexus for all product-related knowledge at Digital Devices. It was through this function that sales and field engineers, in addition to product distributors, were trained and supported. It also had close functional relationships with the marketing engineers from the various product line divisions. This function also provided technical support via 1-800 toll-free lines direct to Digital's customers. Each day it accepted and processed about 200 technical support questions from customers, and recorded each and every call. Central Applications also advertised new products, mainly at technical seminars, and through this forum it reached about 10,000 design engineers every year. The function also provided a fax-back service to customers - here, customers faxed in a request for data sheets1 and these were automatically dispatched by fax in a matter of hours. Application engineers also used the information contained in the data sheets of over 2,000 new and established products to compile the company's short-form product catalogue and the related CD-ROM. This product data was also published on the company's Internet Web site, and later became the preferred method of access, thus replacing Fax-Back. One of Central Applications' key roles was in providing product support and technical information over the corporate intranet with its own Lotus Notes-based product and technical support application. Because of the need to better manage customer-related call tracking, customer contact, and product application problem-solving, this system evolved from a client/server platform into a web-based solution. Since its inception as a client/server system, this application, which consists of several separate but related databases, has been extended and ported to the corporate intranet via Lotus Notes Domino Server.

Why Engineering-Oriented Business 'Communities-of-Practice' Generally Held the Balance of Power in Shaping IS/IT Infrastructures

The majority of senior, middle and line managers at Digital Devices came from engineering backgrounds; as such, they shared common educational and professional interests. This shaped the various 'communities-of-practice' that existed within and between 'business' divisions and their functional sub-units. This is in contrast to staff from the company's administrative and IS functions, the vast majority of whom were not engineers. This had a significant impact on the formation of Digital's social matrix and the manner in which IT architectures were deployed and in how IS development was conducted. Two comments highlight this point graphically. The first comes from Standard Linear Products Division's (SLPD) Marketing Manager, who was an engineer and who was with the company for 26 years:

Part of it is the corporate culture within Digital, it has always been an engineering-run and an engineering-driven company, seldom in a time of contraction has the research and development budget been cut...all the guys come from the same universities, from the same professors and they all have been taught the same things.

The common background in electrical and electronic engineering provided social actors with a shared language that facilitated communication and learning across functional areas within the organization - however, there were obvious differences in objectives between engineering and non-engineering 'communities-of-practice' that led to a degree of institutional tension around IS development and the deployment and operation of IT infrastructures. Such differences were reflected in the way IT resources were employed. For example, while engineers in the product line divisions used the corporate LAN and WAN infrastructure, they were relatively independent in terms of the computer platforms and applications they used. The IS manager described it thus:

This federated decentralized approach to building Digital's IT infrastructure resulted from the way in which the company operated since its foundation, where the product divisions and the product lines at the various sites maintained their own IT budgets and tended to provide for their own IT needs.

The important point here is that of ownership and control of non-corporate applications rested exclusively with the end-user community, with the IS function acting in support roles only. On one hand, this engendered a local sense of community that helped reinforce each engineering 'community-of-practice.' On the other, this independence of corporate IS extended beyond engineers in the product divisions, as is evidenced in the Sales Division's Central Applications function, which was staffed by applications engineers who developed and operated a key element of the corporate intranet, with the blessing, but not with the support of the corporate IS function.

THEORY & PREVIOUS EMPIRICAL RESEARCH: COMMITMENT, POWER & POLITICS

Three separate but related theoretical perspectives are now briefly explored to help understand the case and associated analysis.

Institutionalized Commitment & Organizational Purpose

The role of 'commitment' in the design, development and implementation of IS has been elaborated on in several studies. In computer science, Winograd and Flores (1986) highlight the role of commitment in shaping the design of computer-based information systems, while Abrahamsson (2001) illustrates the role of commitment in the success of software process improvement initiatives. Sabherwal et al. (2003) highlight the role of commitment in successful information system development; however, theirs was one of several that focused on the dysfunctional escalation of commitment and its consequences. All this is indicative of the vital role of individual and organizational commitments in shaping the trajectory of the development process and its outcomes. This study draws on Selznick (1949, 1957), who illustrates that the process of institutionalism gives rise to, and shapes, the commitments of organizational actors and groupings. Selznick (1957) argues it is through commitment, enforced as it is by a complex web of factors and circumstances, and operating at all levels within an organization, that social actors influence organizational strategies and outcomes. Here, 'commitment' refers to the binding of individuals to particular behavioral acts in the pursuit of organizational objectives. Selznick identified the sources of organizational commitment viz. (a) commitments enforced by uniquely organizational imperatives; (b) commitments enforced by the social character of the personnel; (c) commitments enforced by institutionalization; (d) commitments enforced by the social and cultural environment; (e) commitments enforced by the centers of interest generated in the course of action. However, these commitments do not evolve spontaneously through the process of institutionalization, they are shaped by 'critical decisions' that reflect or constitute management policy: as Selznick illustrates, the visible hand of leadership influences the social and technological character of organizations. Thus, Selznick (1957) maintains that organizational, group, and individual commitments determine whether organizational resources, such as IT, are employed with maximum efficiency and whether organizational capabilities are developed to leverage such resources to attain competitive advantage.

Power & Politics

Power is another concept that has been used to help explain different preferences among stakeholders in IS development; as such, it provides a useful complement to commitment theory. Jasperson, Saunders, Butler, Croes and Zheng (2002) provide a comprehensive review of previous research on the subject which includes perspectives from the user participation literature (itself comprehensively reviewed by Cavaye, 1995). This short review therefore draws on this body of work as a convenient point of access to what is a comprehensive literature. The dominant view in the literature holds that participants in the development of IT infrastructures shape the socio-technical features of an IS through the exercise of power. User participation, for example, in systems development leads to the exercise of power by users to change development outcomes. So does the exercise of power by competing groups of managers. Thus, in line with the pluralist perspective, power may be defined in terms of users' abilities to influence the behavior of others to achieve specific objectives (Jasperson et al., 2002). Keen (1981) therefore argues that the development of an IS is a political process. In light of this, IS managers require organizational mechanisms to provide them with the necessary influence and resources to successfully develop an IS within the context of competition among political actors and groupings in an organization, who will possess divergent aims and commitments. While Markus (1983, p. 442) illustrates that "[w]hen the introduction of a computerized information system specifies a distribution of power which represents a loss to certain participants, these participants are likely to resist the system"; she also showed how the reverse also holds. Echoing Markus (1983), Kling and Iacono (1984) contend that in order to gain control over the development trajectory of an IS, key actors will engage in conflict-related activities such as domination, sabotage or compromise. The concepts of commitment and power therefore inform the readers' interpretations of the case in that they promote an understanding of the purposeful actions of actors in achieving IS development outcomes in terms of shaping process and influencing product.

RESEARCH METHOD

A qualitative, interpretive, case-based research strategy was adopted to conduct this study. This involved a single instrumental case study (Stake, 1995) that was undertaken to obtain an understanding of the circumstances surrounding the design, development and deployment IT-enabled information systems at Digital Devices Inc. Purposeful sampling was employed throughout (Patton, 1990). Research of Digital Devices, Inc. was conduced at three sites located in Limerick (Ireland), Wilmington (Boston, MA) and at the company's corporate headquarters in Norwood (MA) in mid-to-late 1998. Fourteen taped interviews were made with a cross-section of 'key informants' from business and IS 'communities-of-practice' - each interview was up to two hours in length. Additional data sources included documentary evidence and informal participant observation and discussion at the three sites. Elements of Selznick's (1949) theory of commitment and insights from the literature on 'power' were employed as 'seed categories' to interpret the interview transcripts and other documentary sources. Finally, the case report approach was used to write up the research findings.

CASE DESCRIPTION: DEVELOPMENT & GOVERNANCE OF IS & IT INFRASTRUCTURES AT DIGITAL DEVICES, INC.

The following case report is structured into four sections, each of which provides a different, but complementary, perspective on the issues surrounding the development of IS and governance of IT at Digital Devices, Inc. The first provides the context for the other three by describing the origins of the political tension between the IS function and some of the 'communities-of-practice' responsible for sales and marketing operations in the company. The second delineates the problems with IS governance, while the third and fourth sections then describe the factors that influenced the development, implementation and governance of two IS/IT architectures: the company intranet and the corporate Internet system. The events described in the case occurred between 1996 and 1999.

Political Tension Surrounding the Development of IT-Enabled IS

Previous sections have made reference to Digital's unique character and idiosyncratic business practices, which had a significant impact on the manner in which IS had been developed, operated and used in the company. The following comments provide insights into the kernel of the issues described in the case: the first comes from the IS manager for Sales and Marketing.

Traditionally the company has been based on a culture where autonomy has been promoted and creativeness of engineers encouraged in designing new products, getting into spaces where they need to be visionaries, an area that s where the real disconnection is, in the culture that's been built here. And also, if you think about the product line guys, they are all engineers -you know they are not known for their discipline. And most of the sales people are engineers, so you got a lot of these people running around and we have to instill some discipline, put some standards in here, so we say 'We need to slow you down because it s good for everyone.' I'm not sure that that s something that they would agree with it.

He was more specific when it came to describing the activities of one product support unit:

Take [the manager of Central Applications, he] has been very successful at developing systems to support what he needs to do. He and I joke about it all the time because we made a decision a couple of years ago not to use Lotus Notes, it just did not fit into our architecture, we went the Microsoft way, he's been very successful deploying small Lotus Notes applications for his group. I'm not going to come in with a hammer and say "You have got to get rid of that because it's against standards," it fits a niche. Fortunately, with the advent of the Internet, Lotus Notes and its Domino server is just another Internet server, as opposed to the whole infrastructure change, where we would have to deploy servers everywhere-it just plugs into the intranet. So we do have situations now where groups will go and implement their own technology for their own niche requirements as opposed to something for everybody.

Hence, business managers developed information systems out of their own budgets, and without IS input, through in-house development or by importing the required competencies from external consultants to aid in the development endeavor. This independence and autonomy, which enhanced creativity in product development, caused problems elsewhere in the organization, especially for the IS function, and it resulted in a certain degree of friction between IS and the business community. While there was ample evidence of amicable social interpersonal relationships between the respective 'communities-of-practice', that is, between those populated by engineers and IT professionals, professional relationships, on the other hand, appeared to be less than amicable. Take for example a comment made by the manager of the Central Applications function in the Sales Division:

In terms of IS...they introduced a SAP system for accounting and order processing, they maintain the system, but did not develop it; they are essentially system integrators and IT architects. One of the major issues with them is that our technical support needs are not being met. They have elaborate solutions for simple needs, and they impose restrictions on applications support. But because I have my own budget, I have instituted in own solution based around Lotus Notes: this is not a Corporate standard, so I am a mini-IS owner. An uneasy truce exists between myself, my department and the IS people in Norwood; essentially, what I have found is that their grand solutions are impractical.

That said, IS managers did not just ignore end-user development, as a formal protocol existed whereby independent units and sub-units could develop their own applications. If those applications complied with the corporate standards, and were of use to other organizational units, the IS function rolled them out across the organization, and subsequently supported them. This happened with an application developed by engineers in the Santa Clara facility - later, that system was rolled out by the IS function, as it had found favor with engineers in other divisions. The Central Applications Lotus Notes/Domino application, which could be accessed through an Internet browser over the intranet, gained acceptance at IS, as it did not interfere with corporate standards due to its use of a Web browser on the desktop: in any event, IS staff refused to support the underlying Lotus Notes Domino system.

Problems with IS Governance

In terms of IS governance and independence, engineering-oriented business managers across divisions at Digital were universally unhappy with the IS function being under the control of the Finance Division. For example, a senior marketing manager in the Standard Linear Products Division in Wilmington argued that:

There are no good reasons for having the IS function under finance, there are very good reasons for having it as a shared resource: because we are a decentralized company and because we have five different business units, and we can't have an IT function in every single business unit, and we do not want business units making decisions on expenditures that result in overlapping systems that don't talk to each other. It's the kind of [mess] that [the manager of Central Applications] is in right now, he is married to Lotus Notes - and Lotus Notes is a loser, I'm sorry. And is not supported in Digital at all, and any time something breaks and any time something hiccups in Lotus Notes, he has got to pay a contractor to fix it - and Lotus Notes doesn't talk to anything, and you cannot link it to the Internet, so you're screwed.

It is ironic that the marketing manager was in agreement with IS people in relation to Lotus Notes, while sharing the same opinion, more or less, as sales managers with regard to the IS function. IS managers were sensitive to such opinions, and in defense of the status quo one stated:

I know that reporting through to finance has always been an issue out there, but I think our CFO has a very good perspective and good vision on where IT fits in the whole organization, so I would say he's been a most positive force in driving us where we are today to the point where everyone has access to the same capabilities and functionality.

Notwithstanding this positive opinion, no formal IT strategy was ever articulated for the organization. Instead, this manager said:

I think we all walk around generally understanding what needs to be done. [The CFO] overcomes the problem of not having [a strategy] by communicating with a lot of people, he's very much in touch with all of the VPs, he communicates his plans and so forth.

Even so, the IS manager underlined the fact that Microsoft was the corporate desktop standard, although it was not written down anywhere, nor indeed was it codified that SAP was the first choice when it came to developing corporate applications. In addition, the IS managers interviewed considered the CFO to be really unique due to his passion for IT and his understanding of its benefits to the company. They also thought that few senior executives within Digital were as enthusiastic proponents or sponsors of IT as he. Nevertheless, the following statement from the IS Manager for Sales and Marketing is revealing, in that it may indicate where the fundamental cause of the frustration with the IS function existed:

I think there would be good agreement that there are areas, especially in Sales and Marketing, that he just does not understand-the soft stuff, customer relationship management [etc.] ... There is agreement that he is probably too removed from that side of the business, that he might say: "Well, wait a second, why are we spending money on that?" And well sometimes you know at the high level that many of the vice-presidents communicate when these initiatives are being discussed, but I think what he tends to fall back on is that if the vice president responsible is willing to fund it out of his own budget, and put his best people on it, then he would be willing to support [it].

While the IS function was not held in the highest regard by Sales and Marketing engineers, the reverse was also the case, as both Sales and Marketing (including the marketing sub-units in the product line divisions) tended to go it alone more often than other organizational units when it came to providing their own IT solutions. Nevertheless, IS was always the first port of call whenever new systems were planned in order to determine whether or not the IS function could deliver the desired solution. However, because of human resource limitations and skills shortages, the demand for corporate-wide systems, and attendant need to prioritize the systems to be developed, IS was not always in a position to deliver a particular solution.

The Other Side of the Governance Coin

The IS function ran into problems that were not of its own making in undertaking certain projects for business 'communities-of-practice'. For example, it had been badly burned in the past, with, for example, the original Opportunities, Strategies and Tactics (OST) System for Digital's sales team and, also, the organization's sales forecasting system - both of which were failures. Accordingly, the IS function tended to tread carefully so as not to get embroiled in change management problems and resultant system failures. Hence, they adopted a policy that required business areas to appoint a project leader who was highly competent in his field, and who would have top management support, as they did with the successful SAP Logistics and Order Fulfillment System. In this project, a senior manager from manufacturing acted as user project manager, and an IS project manager handled development. The problems that arose in the implementation of this system revolved around the significant change in the logistics process that would effectively eliminate all product distribution warehouses worldwide, save for those at the manufacturing site of origin. The new system allowed for a form of just-in-time manufacturing whereby products were to be shipped directly from the manufacturing site of origin direct to a customer once ordered. As the IS manager responsible outlined:

An IT guy could not make that type of business decision, and an IT guy could not get through political issues in Europe: like saying that we are going to close down that warehouse and make 30 people redundant. The business manager who did that had the support of the vice president of worldwide sales. And that is the struggle I alluded to before, but now we're in the space of systems where someone comes up with [a] great idea and says well I think we should do this, and I say fine, but who are you going to put into this to run it? And the response might be: "Well I don't really have any one that I am willing to give up at present." That is signal to me that the system is not that important.

Whereas change management problems were resolved when the SAP system was implemented, the new sales forecasting system was more problematic however, as problems of a cross-functional nature between the manufacturing and marketing functions, and a lack of buy-in on the marketing side, caused the system's implementation to fail. One of the major problems here was that Manufacturing and Corporate Marketing had separate sales forecasting needs. Furthermore, their existing approaches to forecasting, although separate, were pretty much dependent on each other. In any event, managers from manufacturing locations and the marketing groups participating in the development redesigned the forecasting processes and developed the system around the new processes. However, the system was never used to its full potential because business managers not involved in the design and development were reluctant to change fundamental forecasting processes. Thus, while the new system was implemented, the basic business processes involved in forecasting were never changed. The IS manager responsible for this development project stated that it became "a pass the buck issue" with both marketing and manufacturing. As a result of these implementation problems, responsibility for forecasting was removed from the marketing function, and the relevant planning activities were transferred and integrated into manufacturing processes and then ported back into marketing. Hence, the new planners effectively spanned both functions. The IS manager for Sales and Marketing summed up the situation thus:

It seems to me that everyone is always fascinated with new systems, and they believe that a particular solution is going to solve all their problems; and [whether the systems work or not] it all comes down to whether or not the organization is lined up - that the right people, with the right incentives, are in place, and that business managers have thought through what this is going to mean, and so on.

In response to the problems they were experiencing with the Sales and Marketing divisions, IS managers wanted to see a single vice president of Sales and Marketing so that there would be coherence, vision and leadership in the planning, development and implementation of Sales and Marketing Systems. The other side of this coin, however, was that such a move had the potential to reduce political infighting and, perhaps, act as a mechanism to impose corporate standards on highly innovative operations like Central Applications.

Building the Intranet the Digital Way

In 1996, the IS function put in place a strategy for the corporate intranet. Prior to this, islands of Web-based sites had appeared across the wide area network (WAN), and business and IS managers wished to tap into the potential for intra-organizational communication and learning that such systems offered. Essentially, business users were employing Web-based technologies to share their knowledge of products and customers with each other. In order to develop a strategy that would bring order to the chaos that then existed, the IS function benchmarked its proposed strategy with companies such as DEC, Hewlett Packard, Sun Microsystems and Silicon Graphics. The IS team observed two dominant approaches to implementing intranet technologies in these companies. First, they noted that Sun Microsystems and Silicon Graphics had adopted a laissez faire strategy and basically let staff do their own thing, whereby every workstation had the potential to become an intranet Web site. DEC and Hewlett Packard took a much more disciplined and rigorous approach by instituting a formal strategy that included the adoption of exacting standards, in conjunction with a corporate template that mandated a certain look and feel for each site. The IS function at Digital adopted a strategy that lay somewhere between the two reported.

In implementing this strategy, an umbrella intranet site was first established and the representatives of all the other sites were informed of the new policy. Essentially, this involved the observance of some basic guidelines that end-user developers had to follow - these guidelines merely set certain standards for the Web sites. No effort was made to tell users as to what they could or could not place on their sites, but nevertheless, certain policies had to be observed. The IS project manager responsible commented on this endeavor and maintained that it had "worked out pretty well, but there was some duplication of effort. For example, if I need a phone list of people, there are probably 10 of them out there now, and each one, apart from the corporate one, is maintained for people in a particular Web group." Nonetheless, in response to such issues, and to introduce more functionality and cross-site accessibility, a cross-functional intranet development steering group was established. This group was charged with two tasks-to develop standards and to develop generic tools like a search engine. The group had responsibility also for the formulation of a strategy to guide the direction of the Intranet and to determine what, if any, additional standards needed to be put in place. However, in keeping with the organizational culture, rigid structures were not put in place, nor were Web authors questioned in regards to what they were doing with their sites. Even so, some control was levied over the use of resources to prevent particular groups from monopolizing them and thereby preventing other voices from being heard.

Central Applications Leads the Way in Providing Intranet Support for Sales & Marketing

As indicated previously, Lotus Notes was not supported by the IS function, and because the Digital's CIO did not want Lotus Notes client software on corporate desktops, it seemed unlikely that the applications developed using Lotus Notes would be of general use to the people that needed them - the sales and field engineers. However, with the advent of the corporate intranet, and with the capability of Notes' Domino Web-server, the Central Applications product support system came into its own, and such was its success that the product divisions and the product lines looked to Central Applications to host new product information. The IT consultant at Central Applications described it thus:

When Internet technology and Web servers first became available and popular, a lot of people went out and set up their own intranet servers, and it was fun and games for a while. But they soon realized how much work it was to maintain their own sites and keep their information fresh...So what we have done is make it easy for people [by hosting their intranet sites], and the [Central Applications manager] feels that if we keep it easy for people, they will come.

In addition to hosting new product data for the product divisions, something that was pivotal in helping sales and field engineers to promote Digital's diverse product range, Central Applications also hosted intranet Web sites for the product lines, as many of them had neither the time nor the inclination to maintain their own sites. Application engineers supported and input most of the data into the Lotus Notes databases; for example, the sales bulletins, the product problem data, and so on. With the general accessibility of the Marketing Information Central Web site, it was hoped that much of the work of inputting new product status data would be taken over by the entities responsible for the original data such as the product lines and so on.

Creative Tension & Development of Digital's Corporate Web Presence

The success of user-led development of Digital's intranet systems had unintended consequences for the development of the company's Internet IS. Digital wished to implement a corporate Web site in order to execute its e-Business strategy, such as it was. External users consisted primarily of design engineers who were now provided with enhanced product search and select features in order to better meet their needs. The system would also provide a mechanism by which design engineers could order products or have samples sent to them. Internal users provided product descriptions and technical data for publication, on one hand, while customer preferences and future product needs (in terms of design and manufacture) could be obtained from customer interaction and used by sales and corporate/product line marketing functions. The IS function, which provided technical support for the initiative, did not see itself as leading the project, that responsibility rested firmly with the VP of Corporate Marketing. The appointment of a Webmaster was a pivotal factor in the success of the Web project. The Webmaster acted as a user project manager whose role was to provide leadership and guidance for the ongoing development, operation and use of Digital's Internet presence. Previously she was involved with the Computer Products Division (CPD) application support center at Norwood.

Enthusiastic as many of the management team were by the exciting new possibilities for customer contact and marketing new and existing products using the Internet, others were less enthused as they perceived that tried and tested methods of communicating with customers were to be discarded and replaced by indirect, impersonal technological mechanisms. Predictably, this led to friction between the various groups involved, particularly the sales and marketing functions. Take, for example, this admission by the Webmaster: "I know that the Web site will continue to be an emotional thing and not everyone will be happy." Nevertheless, elsewhere she admitted that the Web site was jointly developed with cross-functional teams from these constituencies, indicating that the difficulties mentioned were overcome - at least on a formality.

One of the major difficulties that arose in relation to the implementation of this Web-based IS centred on the manner in which product details were prepared for publication on the Web. In a move that paralleled the intranet policy at Central Applications, the Webmaster shifted the emphasis from authorship and ownership of all new product data to the product lines. The early successes in deploying what was a new technology led some senior managers to believe: (a) that traditional mechanisms of customer contact were now obsolete; (b) that existing business processes were under threat; (c) and that catalogs, CD-ROMs, and sales engineers were now of little value.

The perspectives of IS function managers on the issue of IT support for promoting product data to customers are summed up by a comment from the IS manager for the Internet project:

The [Central Applications Manager] does this on the intranet internally, [the Webmaster] is on the Internet site: I think maybe that there is some competition there, I don't think that is organizationally clear who is responsible for this-it just hasn 't been defined. I don't think Digital works like that, [Central Applications] have done this for a long time and now [the Webmaster] needs to do this externally. The choices are "I can use his stuff or I can do my own thing"; [The Central Applications Manager], I think, gets and maintains it himself, while [the Webmaster] has the product line people do it for her. [Central Applications are] facing field service engineers while [the Webmaster] is facing the customer.

Thus, the absence of an overarching policy on the management of the customer interface at Digital (one direct, the other via sales and field service engineers) led to competition and tension between two important organizational functions. However, this proved beneficial and led to optimal outcomes for customers and field service and sales engineers, as the Web team and Central Applications unit both wished to be perceived as the nexus of corporate knowledge. It must be said, however, that unequivocal top management support helped mitigate many of the problems mentioned and others that arose elsewhere in the organization regarding the new Internet IS, and thereby led to a successful development outcome.

CURRENT CHALLENGES/PROBLEMS FACING THE ORGANIZATION

This section describes the problems and challenges facing the organization in relation to IS development and governance of IT infrastructures, and, in particular, the issues confronting its IS function and engineering-oriented business 'communities-of-practice' in the Sales, Corporate Marketing, and Standard Linear Products divisions. The following challenges/problems are discussed with reference to the preceding case report.

Business users in engineering 'communities-of-practice' were committed to leveraging IT to transform core business processes and to be innovative in delivering products and services using IS. It is evident that they will continue to do this with or without the help of the IS function. Hence, in order achieve their objectives, they will exercise as much control over the development of IS and the governance of IT infrastructures as is possible. On the other hand, the IS function is committed to bringing order and professionalism to the mayhem caused by the organic and uncoordinated approach to IS development and IT infrastructure deployment by engineers from the business divisions. Factional interests will continue to exist as engineers in business 'communities-of-practice' form alliances with others to achieve their ends. However, if the IS function continues to operate from a relatively weaker power base, it will need to form potent alliances to obtain its goals. The challenges for the organization's leadership would be to maintain what is good in Digital Devices' culture, structure and processes, while transforming how the company deploys and governs IT infrastructures and develops and implements IS. These challenges are now detailed.

At the time this study ended, the company faced several major options in addressing what were its main problems: the marginalization of the company's IS function and the power asymmetries this created with the business community in terms of IS development and governance issues. The first option concerns the challenge of changing the company's structure for the purpose of establishing a new division based on the IS function. From IS managers' perspectives, the key challenge is to have the IS function emerge from beneath the wing of the Finance Division and become an autonomous organizational unit with a CIO of equal standing to the VPs of business divisions, as is the case with almost all large multinational organizations. The challenge for the IT-literate, engineering-oriented, business 'communities-of-practice' would be to gracefully cede control over the design, development, implementation and operation of IT infrastructures so that a uniform and aligned approach could be adopted in the provision and deployment of IS. This would involve a change in power relationships and commitments. Hence, the challenge for business and IS managers here would be to address the fallout in terms of the perceived loss of control by business managers over the design, development and evolution of the IS they depend on to conduct business.

An alternative to this option would be the challenge of creating a business-specific IS function within each division with direct reporting relationships to a senior business executive: for example, the IS Manger for the Standard Linear Product Division would report to, and receive budgetary resources from, a senior executive or the VP of that division. Overall strategy could then be formulated by a corporate IS function. Thus IS personnel could participate with business users as members of the same 'community-of-practice' and the culture of user-led development in the organization would not need radical change. The problem here is that if corporate IS remained under the umbrella of the Finance Division, then the CIO could not be said to be unbiased in terms of strategy formulation, the allocation of IS budgets and the prioritization of IS projects. Hence, the corporate IS, whatever its size, would need to be focused exclusively on strategy, but with a CIO that had VP status reporting directly to the CEO. This would enable the CIO and his IS executives to address, for the first time, the challenge of formulating an IS strategy that was aligned with business strategies and needs across the organization, thus IT-enabled support for business processes could be delivered more effectively and efficiently. Indeed, the absence of a coherent IS strategy throughout the 1990s was a significant problem for the company and its IS function.

Another problem highlighted by IS managers, and evident from the case, was the limitations on IS performance in its inability to deliver timely solutions to business due to a shortage of IS staff, especially those with competencies in particular areas such as Internet and intranet technologies. If recruiting new staff was going to be problematic, due to the high demand of IT professionals at the time, the challenge for IS managers would be to choose between outsourcing, consultancy or customizable-off-the-shelf software approaches, or implement hybrid solutions involving a mixture of all three. These could be integrated with the above options. However, there will remain the significant challenge in convincing an IT-literate business 'community-of-practice' that IS is best placed to do this, as many business managers, such as the Manager of Central Applications, are already contracting consultants, and so on. Whatever strategy is selected, there remains the challenge of confidence building in the business community in regard to the IS function, as IT-literate business managers already had a long-standing role in providing for their own IS needs.

If management at Digital Devices address the aforementioned challenges and solve related problems, there remain several issues to be addressed in the short term. As an IS manager pointed out, having a single IS unit serve the IS needs of both the Sales and Corporate Marketing divisions was causing problems. The challenge of senior management would be to merge the two divisions, as the existing structure lay at the root of many of the IS development-related problems being experienced by the IS function in providing joint solutions. Sales and marketing strategies could be then be aligned more effectively so that agreement could be reached on integrated IS applications. This was important given that a number of sales and marketing engineers were fearful of the company's radical change of strategy in planning to use Internet-based systems to replace established means of meeting customer needs. The challenge was to use the Internet as an additional sales and marketing tool, while not abandoning tried and tested business processes - only then could the 'doubters' be won over. Then there was the problem of business managers in the Sales and Marketing divisions thinking that they knew better than IS managers as to which IT platform was the best IT-based solution for their IS needs, as indicated in the case. Even if agreement was reached on a particular IS solution, change management problems tended to arise that could only be solved by business managers. For IS managers, the solution to these and other problems was to draft Project Charters that delineated the roles and responsibilities of all stakeholders and which would provide agreement to implement the agreed project outcomes. The challenge for the IS function is to have this introduced on a corporate-wide basis.

Several of the major issues facing Digital Devices related to matters of IT governance and adherence to standards. One such problem facing the organization will be resolving issues relating to the IS function's support for the Microsoft Windows platform and the engineering 'communities-of-practice' allegiance to UNIX-based systems. Take, for example, that Linux, the free Open Source Software operating system, now comes with a client suite of personal productivity tools (Open Office) and enterprise-wide system software utilities that rival Microsoft's offerings (Apache, MySQL, etc.). Then, there is the competition between Microsoft's .Net and Sun's Java 2 Enterprise Edition (J2EE) in the application development space. Interestingly, engineers in product line divisions were early adaptors of Java technologies and are committed to their use, as J2EE applications run on Windows, Mac and all UNIX variants, while .Net applications run on Windows only. Also, it will be interesting to see whether the company will continue with its insistence on Windows client and server operating systems in the face of the lower total cost of ownership (TCO) of Linux-based Open Office and server side utilities, especially given the range of UNIX-based competencies in the organizations.

Finally, while Digital's intranet strategy was an undoubted success, it had two obvious weaknesses. First, the heterogeneous nature of the Web and data servers meant that it would be more difficult for the IS function to quickly roll-out anti-virus and worm upgrades across different platforms (e.g., Microsoft's Internet Information Server (IIS), Lotus Domino, Apache, etc.). Thus, weak links could exist that would compromise the company's local and wide area networks (LANs and WANs) and cause data loss. The challenge here for the IS function would be to implement a strategy that migrated nonstandard servers to the corporate standard(s), and introduce automated anti-virus upgrades and other means to protect valuable corporate data repositories. Second, the case description of Digital Devices' intranet and Internet infrastructures indicates that the company's knowledge resources were not well integrated, in that there existed islands of knowledge stored in diverse data repositories - something that is in contravention of knowledge management practice. Problems of duplication of effort and data inconsistency aside, a major challenge for Digital's IS function is to protect this learning organization's most valuable resource, knowledge of its core business processes and products.

Footnote

ENDNOTES

1 The product data sheets contained detailed descriptions and specifications of products; it is therefore a vital component in making sales, as customers require this information to match products to their specific design needs.

References

REFERENCES

Abrahamsson, P. (2001). Rethinking the concept of commitment in software process improvement. Scandinavian Journal of Information Systems, 13, 69-98.

Butler T., & Fitzgerald, B. (2001). The relationship between user participation and the management of change surrounding the development of information systems: A European perspective. Journal of End User Computing, (Jan-March), 12-25.

Butler, T. (2003). An institutional perspective on developing and implementing intranet- and Internet-based IS. Information Systems Journal, 13(3), 209-232.

Cavaye, A. L. M. (1995). User participation in system development revisited. Information and Management, 28, 311-323.

Jasperson, J., Carte, T.A., Saunders, C.S., Butler, B.S., Croes, H.J., & Zheng, W. (2002). Review: Power and information technology research: A metatriangulation review. MS Quarterly, 26(4), 397-459.

Keen, P.G.W. (1981). Information systems and organizational change. Communications of the ACM, 24(1), 24-33.

Kling, R., & Iacono, S. (1984). The control of information systems after implementation. Communications of the ACM, 27(12), 1218-1226.

Markus, M.L. (1983). Power, politics, and MIS implementation, Communications of the ACM, 26(6), 430-444.

Patton, M.Q. (1990), Qualitative Evaluation and Research Methods. London: Sage.

Sabherwal, R., Sein, M. K., & Marakas, G. M. (2003). Escalating commitment to information system projects: Findings from two simulated experiments. Information and Management, 40(8), 781-798.

Selznick, P. (1949). TVA and the Grass Roots. Los Angeles: University of California Press.

Selznick, P. (1957). Leadership in Administration. New York: Harper and Row.

Stake, R.E. (1995). The Art of Case Study Research. Thousand Oaks, CA: Sage.

Winograd, T., & Flores, F. (1986). Understanding Computers and Cognition: A New Foundation for Design. Norwood, NJ: Ablex Publishing Corporation.

AuthorAffiliation

Tom Butler, University College Cork, Ireland

AuthorAffiliation

Tom Butler (tbutler@afis.ucc.ie) is a senior lecturer in Information Systems at University College Cork, Ireland. Before joining academia, Dr. Butler had an extensive career in the telecommunications industry. His research is primarily qualitative, interpretive and case-based in nature and has two related major streams: IT capabilities and the development and implementation of information systems in organizations; and knowledge management systems. Other research interests include hermeneutics, e-learning, educational informatics, IT education and the digital divide. Dr. Butler received his PhD from the National University of Ireland at UCC, where his doctoral research examined the role of IT competencies in building firm-specific IT resources in knowledge-intensive organizations.

Subject: Case studies; Marketing information systems; Power; Software engineering

Classification: 9110: Company specific; 5240: Software & systems; 7000: Marketing

Publication title: Journal of Cases on Information Technology

Volume: 7

Issue: 3

Pages: 18-36

Number of pages: 19

Publication year: 2005

Publication date: Jul-Sep 2005

Year: 2005

Publisher: IGI Global

Place of publication: Hershey

Country of publication: United States

Publication subject: Business And Economics--Computer Applications

ISSN: 15487717

Source type: Reports

Language of publication: English

Document type: Business Case

Document feature: maps charts references

ProQuest document ID: 198720534

Document URL: http://search.proquest.com/docview/198720534?accountid=38610

Copyright: Copyright Idea Group Inc. Jul-Sep 2005

Last updated: 2011-07-21

Database: ABI/INFORM Complete

Document 43 of 100

From Principles to Practice: Analyzing a Student Learning Outcomes Assessment System

Author: Drinka, Dennis; Voge, Kathleen; Minnie Yi-Miin Yen

ProQuest document link

Abstract:

The College of Business Administration (CBA) is part of a mid-sized urban university with a primary focus on teaching. It had recently decided to develop a process for defining student learning objectives and outcomes, measuring success in achieving these, and using the results of those measures for continuously improving the quality of student learning. Its aim was to design and develop a system which could automate data collection and streamline the processes of course effectiveness evaluation and course/curriculum enhancement. Even though many challenges still existed for the college, it nevertheless launched into a logical design of the Student Learning Outcome Assessment System (SLOAS). Alexis, the college's IT Manager, was assigned the responsibility for managing this project. She determined this system would be used for data collection and reporting in order to provide evidence that student learning outcomes were being achieved at the course, college, and potentially university levels. Amid the lack of internal development resources, insufficient IT support, constantly changing standards and policies, budget issues, and so forth. Alexis knew that she was faced with a challenging project. [PUBLICATION ABSTRACT]

Full text:

Headnote

EXECUTIVE SUMMARY

The College of Business Administration (CBA) is part of a mid-sized urban university with a primary focus on teaching. It had recently decided to develop a process for defining student learning objectives and outcomes, measuring success in achieving these, and using the results of those measures for continuously improving the quality of student learning. Its aim was to design and develop a system which could automate data collection and streamline the processes of course effectiveness evaluation and course/curriculum enhancement. Even though many challenges still existed for the college, it nevertheless launched into a logical design of the Student Learning Outcome Assessment System (SLOAS). Alexis, the college's IT Manager, was assigned the responsibility for managing this project. She determined this system would be used for data collection and reporting in order to provide evidence that student learning outcomes were being achieved at the course, college, and potentially university levels. Amid the lack of internal development resources, insufficient IT support, constantly changing standards and policies, budget issues, and so forth. Alexis knew that she was faced with a challenging project.

Keywords: case study; data modeling; database analysis and design; information system analysis; IS life cycle; IS management issues; IS project management; IS project development; IT resources management; organizational use of IS; prototype; rapid application development (RAD); student learning outcomes assessment; systems manager activities; user requirements analysis

BACKGROUND

The College of Business Administration (CBA) was housed within a public, mid-sized, urban university located in its state's largest city. The mission of the university was to promote scholarship, and excellence in teaching, research, creativity, and service. Working towards this mission, the college's faculty, administration, alumni, and community partners were dedicated to advancing the quality of learning and academic distinction of the university, while being actively engaged in using their talents and knowledge in service to their local and statewide communities. In recognition of their dedication and commitment to quality by AACSB International (Association to Advance Collegiate Schools of Business), the CBA was awarded its accreditation in 1995.

The CBA was composed of six academic departments: accounting, business administration, computer information systems (CIS), economics, logistics, and public administration. It offered associate and bachelor's degrees in each department, a certificate in logistics, a master's degree in business administration (MBA), a master's degree in public administration (MPA), and a Master's of Science (MS) in logistics and global supply chain management. The college was also the home of several research, outreach, and economic development centers. These centers focused on social and economic research, international business, small business administration, regional economic policy and development, and international business education. The CBA served the local, state, and global communities by training and educating the workforce, by promoting and inspiring excellence in public, private, and non-profit management and related business disciplines, by providing professional assistance and advice to these organizations, and by conducting basic, applied, and pedagogical research.

The CBA had more than 1,300 students of which approximately 15% were pursuing one of the two-year associate degrees or a certificate, 75% were pursuing four-year baccalaureate degrees, and 10% were in one of the three graduate degree programs. Nearly 50% of the student body was considered non-traditional, either working towards their degrees on a part-time basis, or attending classes solely for personal or professional development. Part-time students typically required six to seven years to complete a baccalaureate degree program.

In 1987, the university was included in a state government-mandated consolidation that resulted in the merger of the regional community colleges with the university. One result of this merger was the partitioning of faculty into two distinct categories: faculty members from the community colleges were categorized as bi-partite faculty whose job responsibilities would include teaching and service, while faculty members from the original university were classified as tri-partite faculty whose responsibilities, in addition to teaching and service, would also include research. Faculty members have since unionized, with bi-partite and tri-partite faculty members represented by separate unions. The CBA had 46 full-time faculty members of which 12 were bi-partite and 34 were tri-partite.

SETTING THE STAGE

The stated objectives of the college for its CBA baccalaureate program were as follows:

* to provide a broad-based business education;

* to prepare students for professional and managerial careers in regional, national and international job markets; and

* to foster lifelong learning.

The objectives of the CBA master's degree programs were similar, but also include a primary emphasis on preparing students for leadership roles in organizations.

The college would be undergoing review for reaffirmation of accreditation by the AASCB in January 2005. Beginning in September 2002, the college initiated its required self-study process phase for that review. It was recognized by the administration and faculty within the CBA that regular, continuous assessment of the quality of the education that it provided, and the quality of the learning of the students, was imperative to achieving the college's objectives and to it maintaining its accreditation status. Three distinct and independent review processes were being used to evaluate and manage educational quality and assurance of learning. The focuses of these separate processes were on teaching effectiveness, course effectiveness, and course and curriculum design.

Teaching effectiveness was evaluated through standardized student evaluation surveys that were designed by the University and administered at the University level. These surveys were used to determine students' perceptions of instructors, textbooks, and overall course value. The surveys were conducted in two parts. In one part, students rated predetermined factors concerning the course using a standard scale. For example, "I would recommend this instructor to other students" would be rated on a five-point scale from strongly disagree to strongly agree. In the second part of the survey, students were asked to supply written, open-ended responses to predetermined questions such as, "What did you like best about this course?" The two parts of the survey and a summary of the results were reviewed by the CBA Dean. His comments and suggestions, if any, were appended to the surveys and summary results for each course. The appended surveys were then forwarded to the appropriate department chair for review and more comments. Finally, all comments, summary results, and surveys were given to the individual faculty member. These surveys were significant - although not exclusive - documentation used for assessment of faculty teaching for purposes of annual reviews, promotion, and tenure. These surveys, while an indicator of teaching effectiveness, did not in any way attempt to address course objectives or student outcomes.

Course effectiveness, as measured by achievement of course objectives and student outcomes, was evaluated through a separate survey. Each course is required to have a Course Content Guide (CCG) that served as a general resource guiding the development of course syllabi. One of the requirements of each CCG was a statement of course objectives and student outcomes. The objectives were statements that reflected what the instructor of the course needed to accomplish if the course was to be considered successful. The outcomes defined, in a general sense, the knowledge, skills, and abilities the students should attain through participation in the course (Gardiner, Anderson & Cambridge, 1997). These objectives and outcomes became part of the course syllabi. At the end of each semester, the course effectiveness surveys were completed by students to evaluate how well the course objectives were achieved and how well students felt they achieved the defined student outcomes. This form of assessment was relatively new to the CBA, and its format varied from instructor to instructor and course to course, so its design and its usefulness as feedback were still evolving. A summary of results was prepared at the college and department levels. The results of these surveys were not used for purposes of faculty evaluation in annual review, promotion, or tenure decisions, and there was no formal process in place by which this information was being used to guide changes in course design.

Course and curriculum design review was conducted through the review of the Course Content Guides. Every course in the university was required to have a CCG, all were publicly available on the University's Web site and were often used for advising, for course shopping by students, for content evaluation by community organizations, or for evaluation of transfer credits by other universities. In addition to the objectives and outcomes included in the CCG documents, instructors also incorporated an outline of topics to be covered in the course and a bibliography of relevant books. These additional items were included to ensure that guidance for the development of course syllabi was provided. They were used to maintain consistency across multiple sections of a course, to control the quality of items that might be used to publicly represent the curriculum of the university, to ensure that adequate library and instructor resources were available for supporting the course, to minimize duplication and maximize consistency throughout the university system, and to ensure that curriculum changes were consistent with the University's overall objectives.

All curriculum change requests had to be initiated by a faculty member. The process began with the development of a CCG document using word-processing software. The document, in paper form, would then be approved in sequence by the appropriate department chair, a college-wide curriculum committee, the Dean, the University Curriculum Committee, the Faculty Senate, the Provost, and, in the case of program additions, the Board of Regents. All proposed changes to a CCG were distributed through a university-wide e-mail listserv in order to allow all university faculty an opportunity to comment on any proposed curriculum changes. Changes could be suggested at any stage during the review process, however the tracking of changes was not a formal process, and monitoring of the progress of a given curriculum action through the process was difficult.

The University Curriculum Committee (UCC) historically presented the most rigorous level of review. This committee provided guidelines on what content should be included in the document, and they provided examples of "good" formats, but there were no standard formats or templates. Included in the reviews by this committee were an examination of the consistency between - and completeness of - course objectives, student outcomes, and course topics, and the consistency between stated course expectations and the course level. One exception to the review process by the UCC were experimental courses which only required approval at the Dean's level, but which could only be taught for four semesters. Another exception were special topic courses that needed to be reviewed by the UCC in a generic format, but could be changed by an instructor as desired to accommodate a unique topic without undergoing additional UCC review.

There was no review of curriculum at the college or department level that was comparable to the level of review at the UCC. In addition, at no level was there a systematic review of learning objectives, peer observation, expert observation, or formal periodic assessment of the impact of instruction on student performance. Moreover, at no level of review was there an evaluation of courses with the purpose of evaluating and guiding instructional improvement, to reward the development of new courses, or to reward innovation in teaching and learning, nor was there any formal review of the consistency between the thoroughly reviewed CCGs' objectives and outcomes, and those included in the course syllabi.

CASE DESCRIPTION

Project Background & Initial System Analysis

Alexis was recently hired as an IT Manager for the CBA. She had been assigned the project of developing the Student Learning Outcomes Assessment System in May 2003. This was to be a highly visible project and, if developed and implemented successfully, it could help the college and possibly the university in a variety of ways including standardizing formats and providing version control of CCGs. The primary goals of the new system included:

1. Assure consistency between the college mission, the college-level program outcomes, and the individual course CCG learning objectives.

2. Allow comparison of actual student outcomes to desired student outcomes.

3. Provide continuous improvement in student learning through curriculum revision by providing reports on the outcomes assessment results.

4. Increase operating efficiency and maintenance of AACSB accreditation by assisting in the documenting and tracking of curriculum changes throughout the curriculum review process.

The stakeholders of the Student Learning Outcomes Assessment System (SLOAS) included many college and university-level personnel, CBA faculty, and any current or future students enrolled in CBA courses.

A new college-level Curriculum and Assessment Committee was established by the Dean in September of 2003. Members of this committee would be appointed annually, with representation from each of the CBA academic departments. This committee was responsible for oversight of the system and would be the primary and most direct system stakeholder. Alexis was designated as the Project Manager for the project, and she was responsible for ensuring that resources were identified and made available once the analysis and design phases were completed and development was ready to begin. Since the Curriculum and Assessment Committee membership could change from year to year, it was important to have someone like Alexis involved to ensure continuity on the project.

During the previous academic year (2002-2003), student course effectiveness surveys had been administered in most classes for the first time to begin capturing assessment data and as a test of potential survey designs and survey methods. At that time, no agreement had been reached concerning a college-level design, so departments and even individual instructors were allowed to design their own surveys.

In April 2003, two faculty members from the CIS department, Mike and Kevin, were invited to consult on the design of the assessment process by Ferdinand, the Associate Dean of Academic Affairs. Mike and Kevin accepted the responsibility of being the system analysts as well as the project designers for this process, and had already begun analysis work before the Curriculum and Assessment Committee (CAC) was formed. They had been asked to begin an analysis of the needed system and to build a prototype that would help in the capture, analysis, and reporting of the Course Effectiveness data that had, by then, already been gathered. As a result of his experience with the analysis and prototype, Kevin was eventually appointed as one of the CIS department representatives to the CAC when it was formed.

When Alexis was given responsibility for the project development the next month, her first step was to evaluate her resources. She learned that the University had an Information Technology Department that was responsible for communications, the information technology infrastructure, university-wide software licensing, security, and public use labs. However, the Information Technology staff within the CBA, Alexis learned, was relatively small, consisting of four full-time employees (Appendix 1) and many part-time student lab aides. It was responsible for all the needs of CBA students, faculty, and staff. The IT Department within the CBA operated independently of the University's IT staff, and there was minimal interaction between them. The college had its own network, over 275 workstations, three student computer labs, and six lab classrooms in addition to four network and database servers. The college IT staff was responsible for managing all aspects of IT in the college, from purchasing new equipment to maintaining records on software licenses. The part-time lab aides were available only to assist students in the labs and computer classrooms. There was no one on the staff that performed any development function with the exception of the Webmaster, who was responsible for maintaining the CBA Web site. Alexis realized that she would not be able to use any existing CBA staff for her project because of their lack of development expertise and because they were already overextended in their operational support. She also learned that the University IT staff, and potentially the system-wide IT staff, had the development capabilities she would require. However, the project could not be completed in time for the January 2005 AACSB review if she had to rely on these resources.

By the time Alexis got involved, Mike and Kevin had already drafted the original process of the Student Learning Outcomes Assessment System, with input and confirmation provided from the Curriculum and Assessment Committee and from the Associate Dean. The need to analyze the process had originally been identified early in the 2002-2003 academic year, just shortly after some Course Effectiveness Surveys had been administered by faculty and results were collected. At the time, Ferdinand already decided that student-reported self-efficacy data would be the most appropriate for these Course Effectiveness surveys, so Mike and Kevin developed a Microsoft® Access database to assist in the tracking of course-level learning objectives, faculty information, and the student self-efficacy Course Effectiveness survey responses. The data for the Spring 2003 semester surveys was captured and entered into the new database, and reports were generated for faculty and administration by the time they returned in August 2003.

Upon completion of this database, Mike and Kevin both realized it had the potential for tracking all of the college's information needed for teaching effectiveness, course effectiveness, and course and curriculum design. It could store course-level curriculum information, the student learning objectives, and the assessment results. They decided to modify the original database design and complete the logical design of the larger system which could ultimately include a Web-based user interface. It was at this point that they decided Alexis would need to be brought in to oversee the project.

Project Risks

Shortly after Alexis became involved, she received notice that the AACSB had announced and published new standards (AACSB International). These standards resulted in many significant reporting changes for the college, one of which had a direct impact on the measures of course effectiveness that Mike and Kevin had been working with. Upon their return at the beginning of the 2003-2004 academic year, there was still considerable uncertainty among the CBA faculty, and faculty throughout the country, about how to interpret the new standards and exactly what assessment data should now be collected. This uncertainty led directly to the formation of the Curriculum and Assessment Committee.

The CAC eventually reached the consensus that the new standards indicated that while student self-efficacy data was nice to have, that type of data was not a direct measure of the amount of learning that actually occurred in a course and so should not be the primary measure of course effectiveness. Therefore, the focus for Mike and Kevin and the CAC shifted to the collection of direct measurement of student outcomes that did measure effectiveness. Their challenge was now to determine the best methods for collecting the new student outcomes data. Given the new AACSB standards, almost everyone in the college agreed that it would be important to have faculty ownership over both the curriculum process and the development of any assessment tools that would be used in their courses.

While Kevin and Mike were reworking their analysis and their prototype, Alexis was identifying potential risks and issues that needed to be addressed. One of Alexis' concerns with the design and development of the system was integration of the data with the larger, university-wide system already in existence. Kevin and Mike had a good start on the design of a college-based system, but had not fully considered the broader uses of the data. Alexis also wondered how the system administration and on-going maintenance of the new system would be supported once the system was built, but felt that addressing that issue could be postponed because of larger overriding issues.

At that time, her primary concern was with the use - or more specifically the non-use - of the system once it was developed. The faculty members were already starting to show their discontent resulting from the original effort required for administering the original Course Effectiveness surveys that had now been discarded. She knew she needed to ensure that any new system processes that would be developed must be streamlined and have little workload impact on faculty. However, the faculty members' desires of wanting to own the process themselves, rather than allowing the administration to own it, was a barrier to being able to quickly finalize a design for a system that would be optimized for ease of use. She knew that design changes might never stop being requested if their decision making was done by a faculty committee and no one individual had the authority to freeze and approve the design.

To address these problems, Alexis decided she needed to review the basic principles of system development using a conventional System Development Life Cycle (SDLC) versus those of several other alternatives, such as Rapid Application Development (RAD), Joint Application Design (JAD), Object-Oriented Development (OOD), and so forth. She pulled out her collection of System Analysis and Design books and articles for help in determining the advantages and drawbacks of each approach and to review different project lifecycle approaches, such as waterfall, iterative, spiral, prototype, and design-to-tools (Berardi and Stucki, 2003; Cleland and Ireland, 2002; Hoffer, George, and Valacich, 2001; Kendall and Kendall, 2004; Kloppenborg and Petrick, 1999; McConnell, 1996; Valacich, George, and Hoffer, 2003; Whitten, Bentley and Dittman, 2004). She did not want to restrict the project to one specific approach without having a thorough knowledge of all the available resources she might have access to once the analysis and design phases were complete. Theoretically, Alexis knew that she could use a combination of the above proven methodologies depending on the needs and the available resources and skills faced by the CBA (Johnson, 2000; Mylopoulos, 1999; Wang, 1996).

After reviewing her texts, Alexis realized she had other problems. She decided to arrange a meeting with Kevin and Mike so they could brainstorm design ideas and risks. She started by expressing her concern to them that since no dedicated IT development function currently existed within the college, no standard development tools could be identified. The prototype that Mike and Kevin had developed utilized Microsoft® Access, but they all agreed that the new system should be designed using a client/server model for the database with a Web-enabled user interface. Kevin and Mike agreed with Alexis' assumption that the database design would have to be scalable to allow for both database growth and the expected continuous design changes - including possible university-wide data requirements.

Since it appeared that the learning outcomes assessments and curriculum reviews would continue to be in an iterative and on-going process of revision, the actual assessments used and the data collected would need to be able to take on a variety of forms over the years. For some stakeholders, the system would primarily be used as a data warehouse for both curriculum information and assessment results. However, Kevin pointed out that other members on the CAC had indicated that it would be desirable to keep historical data in the system so that at some point in the future, past students' learning assessment results could be compared with current results using data mining techniques. Mike and Alexis agreed that historical data would most likely need to be preserved.

Kevin then pointed out that one primary responsibility of the CAC was to provide oversight for a five-year curriculum review cycle. That is, each course would need to be reviewed, updated, and revised, if necessary, at least once every five years. The purpose for this review went beyond accreditation and assessment needs; these reviews would be conducted to ensure that the curriculum being delivered in the classroom was meeting current needs of both students and industry, and to ensure that all CCG document items, especially outcomes, objectives, and bibliographies, were up to date. While discussing this issue, Mike realized that even if the college implemented its own new curriculum review requirements, it would still need to satisfy the comprehensive review requirement of the UCC in order to obtain approval for changes. Therefore, it would be critical for the new system to aid in the university-level approval process, not hinder it.

Balancing Stakeholder Expectations

As Alexis began to understand all of the related curriculum process needs, she knew this project would be difficult, though not impossible, to manage. She continued to identify, document, and prioritize the risks. One primary element that was out of her control was getting the faculty to agree on the interpretation of the new accreditation standards and what assessment techniques would best provide evidence of student learning. She knew her experience was in IT, not curriculum development, so maintaining clear and open communication with her primary faculty stakeholders would be critical to the project's success. She determined that she would have to rely on the CAC to handle the interpretation of the new accreditation standards and resolve any faculty disagreements on assessment techniques, but would also have to press them to commit to some technique as soon as possible. In the meantime, she would focus her efforts on identifying resources to actually build and maintain the system.

Alexis recognized that different stakeholder perspectives, views, and values would also be considered a main challenge in this project. Given that this was an academic environment where freedom of ideas was cultivated and encouraged, differing perspectives were to be expected. She would need to balance individual perspectives with department and college goals, along with any imposed university-wide requirements. But she alone did not have the authority to approve the final design, nor was there anyone who did have that authority. This "freedom of ideas" dilemma was further complicated by the fact that she knew that if the system was to truly integrate with other campus-wide systems, she would need to be in communication with the University's IT group, perhaps the system-wide IT group, the UCC, and maybe even the Provost, the Faculty Senate, and the faculty unions.

As Alexis began to plan how to effectively manage the project, she documented the implementation issues she would eventually need to address. In a worst-case scenario, she would manage the development of a system that no one would end up using. This would be viewed as a huge waste of effort and resources; therefore, she knew that faculty would need to quickly see the benefits of the system in order to accept and utilize it. Additionally, with workloads already a potential point of contention for many faculty, any process developed and any assessment tools designed, would have to be simple to use, with an automated data collection process to minimize impact on faculty time. Finally, results would need to be made available in a timely and accessible manner.

Alexis knew that there were many individuals who had differing views concerning the potential appearance and operation of the resulting system; nevertheless, she felt confident that no one would disagree with the eventual benefits of the system. The ultimate business purposes of the system would have to be: (1) to effectively and efficiently track and maintain all course-level learning objectives for the college in a centralized data store to support the needed five-year curriculum review process, (2) to track either individual assessment data or summarized assessment data results, and (3) to provide a base of data that would assist in meeting the majority of on-going curriculum and/or assessment reporting needs.

While everyone would likely agree on the primary benefit of the system, the "how" to accomplish these, and the "what" to actually capture and store, would be more difficult to obtain agreement on. The usefulness of data, the validity of data, the question of whether private information (like student IDs) would be stored in the database, and so forth, were all issues that would eventually need to be addressed. She knew that she would be relying heavily on Mike and Kevin to complete a very thorough and comprehensive analysis of the information requirements, and she anxiously awaited their report.

Project Documentation

By the end of the fall semester of 2003, Mike and Kevin had made progress in their new analysis of the system and expanded it based on Alexis' concerns. They had documented the main processes and developed a preliminary design of the database that would collect and maintain the necessary data. They also had developed a Context-Level DFD (Data Flow Diagram) in order to help define the project scope, to manage faculty expectations, and to communicate requirements to both Alexis and the CAC (Appendix 2). The Context-Level DFD dramatically illustrated the large number of entities that would either provide input to or receive data from the system. The complexity of the system was apparent even at this beginning level. Even Alexis was surprised to see just how large the environment of the system was.

The large number of interactions and approval stages required by the CCG approval and maintenance process was finally documented (with the exception of the Faculty Senate, Provost, and/or Regents approvals) (Appendix 3). This further confirmed Alexis' understanding of the complexity of the system. While she was overwhelmed by the large number of approvals required, she understood that these were justified by the importance of maintaining and continuously reviewing the curriculum.

But even this documentation of the process was insufficient in identifying all of the inherent issues. First, after a CCG had been approved by the UCC, its status was never well-tracked. If a CCG moved to the UCC, then was returned to the CBA for editing, it was not easy to determine where in the process the CCG was, and whether suggested changes had actually been made. In some cases where there had been several editing cycles between the UCC and CBA, there had been instances where the final version of the document was not what was eventually published in the University Catalog. Tracking versions had always been a totally manual process, which invited errors. Mike and Kevin hoped that, eventually, a CCG version tracking module could be designed and implemented as a part of the new system. However, until the UCC established a standard format for all CCGs and moved toward an automated, rather than paper-based, submission process, such a tracking module seemed to be an unlikely enhancement in the near future. At a minimum, Mike and Kevin felt it might be postponed until a second version of the system.

Finally, with a preliminary design of the database completed (Appendix 4), the project designers had to establish new business processes for the entry and maintenance of system data. While they could identify processes, they were unsure as to whether the individual faculty members would actually complete them. How would faculty feel about having another job responsibility? While Mike and Kevin knew there were some who would readily accept and utilize the system as it was intended, if even one course was not kept up to date or assessment results not entered, the data validity and reliability would be at risk. Mike and Kevin considered suggesting to Alexis that once the system was developed, some individual in the College should be assigned the responsibility of all data entry and maintenance, so that faculty would not have to be involved in the initial user acceptance testing and so that the system could be implemented more quickly. Then, once the system was stable, data entry and maintenance functions could be decentralized on a department-by-department basis, gaining support and momentum along the way. To help Alexis understand the type of entry that might be required in the new system, they provided a sample of data that the primary database tables might contain (Appendix 5).

When the beginning of the Spring 2004 semester approached, Mike and Kevin provided Alexis with a status report. They told her that they felt confident they would have all of the remaining system designs completed and documented, including all input screens and the base set of reports, before the end of January. They would also make recommendations, based on input from the CAC and the Associate Dean, about the implementation approach that should be pursued. In addition, they would complete a brief analysis of what different development tools might be utilized. They both believed that the final database would be developed in Oracle®, but this might require housing the data on a university server rather than relying on a college server; the advantages and disadvantages of this option would have to be evaluated. In any case, at the end of January, the system had to be ready to move into the development phase.

CURRENT CHALLENGES/PROBLEMS FACING THE ORGANIZATION

Alexis reviewed the status report Mike and Kevin had prepared and realized she had only two months remaining to identify the development resources that would be necessary. She had a number of options to consider. However, at the moment, she wasn't sure which would be the most cost effective, efficient, or attainable. She knew she would need to carefully consider all practical design and development strategies currently available given the unique issues and current business environment of the CBA. As she began to carefully identify and categorize the most significant challenges currently facing the project, she identified two main groups of issues; organizational/environmental issues and IT management issues.

Organizational/Environmental Issues

The CBA, like other higher education institutions, was experiencing a paradigm shift from a teacher-centered "instruction paradigm" to a student-centered "learning paradigm" (Barr and Tagg, 1995). This new paradigm created opportunities that could contribute to continuous improvement in educational quality, and could help students develop learning skills and facilitate them in becoming "self-growers" (i.e., people who take ownership of and responsibility for their own educational growth) (Apple and Duncan-Hewitt, 1995). It would also entail the need for changes in the management and control of the curriculum and course design for the CBA.

This shift was the reason for increased interest in the assessment of learning outcomes as part of the Assurance of Learning process. Alexis and the CAC realized that this process was a dynamic process that would need continuous refinement and enhancement in both the curriculum and the assessment portions of the process. One of the challenges in adapting to the shift was the need to have faculty develop a consensus on the learning goals for each CBA degree. Faculty members in each of the different disciplines would then have to develop a consensus on learning goals for their programs, consistent with their degree goals. These revisions would have to be done before the course-level outcomes and the assessment measures could be developed. Designing and implementing the SLOAS would also be a dynamic process that would need continuous refinement and enhancement. However, if this system was well designed, it was likely to help formalize and simplify the entire process.

IT Management Issues

Because she was still relatively new in the CBA, Alexis was very nervous about the IT management challenges she was facing. As she was reviewing her notes, she noticed three main groupings of issues: Project Management, IT Resources, and IT Implementation.

Project Management

The Context-Level DFD clearly emphasized the large number of entities that would either provide input to or receive data from the system. Alexis quickly recognized how large the environment of the system was and how complicated the system would be. There were several management problems she had to face. Being able to plan and manage the progress of the project would be the key to its success. If the project was completed late, the college might not obtain reaccreditation. However, given the faculty members' desires of owning this process themselves, and with no one individual having the authority to freeze the design or approve the move into the development phase, any project schedule Alexis developed would be meaningless. She realized that the project would have to either be divided into several subprojects, or different versions would have to be developed in phases, with major functionality required for reaccreditation being in the first release.

Another concern Alexis faced was that since no dedicated IT development function currently existed in the college, there were no standard development tools that could be identified. Based on the requirements of the analysis, the SLOAS needed to have a client/server model for the database which would be scalable to allow for the growth and continuous design changes; have a user-friendly, Web-enabled user interface; and have the capability of being able to keep the historical data for future long-term evaluation and comparison. Regardless of whether the development would be carried on inhouse or use outside resources, the CBA had to be able to identify its preferred standard for development tools.

Additionally, she knew a thorough investigation of available packaged software would need to be initiated as soon as the requirements from Mike and Kevin's prototype had been documented. Though the CBA might incur higher initial costs if an off-the-shelf software package was identified, the longer-term savings and perhaps a reduction of development time were potential benefits that could not be overlooked.

IT Resources

Resources at both the state and university level were tightly constrained, and budgets were being cut. Like IT project managers in many other non-profit organizations, Alexis faced the difficulty of finding the financial and human resources needed for developing, implementing, and maintaining this system.

Alexis also began to realize that she would not be able to use any existing IT staff for her project because of their lack of development expertise and because they were already overextended in their operational support. She also learned that the university IT staff, and potentially the system-wide IT staff, had the capabilities she would require; however, the project could not be completed in time for the AACSB review if she relied on these resources, since system development for academic units was not a priority in their jobs.

CIS faculty, primarily Mike and Kevin, could be involved in the development and maintenance of the system, but their use would not be cost free. Their inclusion might require obtaining course releases for them since their job descriptions focus on teaching, research, and service. They were each on nine-month contracts; therefore extending their contracts over the summer would require additional funding. Their only commitment would be as a service activity through committee assignments. As a result, their participation on this project would be sporadic, especially throughout the summer months, so maintaining momentum on the project would be difficult.

However, Alexis did not want to forget about the prototype that Mike and Kevin had already developed. The prototype was being used to collect and summarize survey data. Though the original intentions had been for the prototype to be a "throwaway," she was beginning to wonder if could become more of an "evolutionary" prototype.

IT Implementation

One of Alexis' major concerns with the design and development of this system was the integration of the data with the larger, university-wide curriculum and enrollment systems already in existence. It was possible for SLOAS to source or download course and enrollment data from the campus-wide system; therefore, the data collected from and processed by the SLOAS would also need to be integrated into the campus-wide system for university-level learning outcome assessment purposes. However, integration raised other issues such as the inconsistencies between definitions of objectives and outcomes at the different levels. Alexis discovered that the university was accredited by one board while the college was accredited by another, and the data needed by each did not easily map from one onto the other. No student outcome system similar to SLOAS existed elsewhere in the university.

Another integration issue was that UCC had no standard CCG document format. This and other similar issues needed to be coordinated between the CBA, Alexis and outside parties such as other colleges, the system-wide IT group, and the UCC. An articulated policy that established the required standards for both business processes and data formats was essential for development of this system. Being the leaders in the development of this system would provide the CBA and Alexis the opportunity to play the leading role in implementing a larger, highly visible, university-wide system, though it would also provide them with many other significant challenges.

As Alexis reviewed and contemplated these issues, she wondered what the best development strategy would be. She knew she would need to be creative and resourceful if this project was to be a success.

References

REFERENCES

AACSB International, (n.d.). Accreditation Standards: Assurance of Learning Standards. Available from: http://www.aacsb.edu/resource_centers/assessment/standards.asp

Apple, D. K. & Duncan-Hewitt, W. (1995). A Primer for Process Education. Corvallis, OR: Pacific Crest Software.

Apple, D.K. et al. (1995). Foundations of Learning. Corvallis, OR: Pacific Crest Software.

Berardi, M. & Stucki, C. (2003). Audit and control, SAC: System development overview. ITAudit, 6, (February 1).

Barr, R.B. & Tagg, J. (1995). From teaching to learning: A new paradigm shift for undergraduate education, Change, (Nov/Dec), 12-25.

Cleland, D. I. & Ireland, L. R. (2002). Project Management: Strategic Design and Implementation (4th edition). New York: McGraw-Hill.

Gardiner, L. F., Anderson, C., & Cambridge, B. L. (1997). Editors, Learning through Assessment: A Resource Guide for Higher Education. Washington, DC: American Association for Higher Education (AAHE).

Hoffer, J. A., George, J., & Valacich, J. (2001). Modern Systems Analysis and Design (third edition). Prentice-Hall.

Johnson, R. A. (2000). The ups and downs of object-oriented systems development. Communications of the ACM, 43(10).

Kendall, K. E. & Kendall, J. E. (2004). System Analysis and Design (sixth edition). Prentice Hall.

Kloppenborg, T. J. & Petrick, J. A. (1999, June). Leadership in project life cycle and team character development. Project Management Journal, 30(2), 8-14.

McConnell, S. (1996). Rapid Development: Taming Wild Software Schedules. Microsoft Press.

Mylopoulos, J. (1999). From object-oriented to goal-oriented requirements analysis. Communications of the ACM, 42(1).

Valacich, J. S., George, J. F., & Hoffer, J. (2003). Essentials of System Analysis and Design (second edition). Prentice-Hall.

Wang, S. (1996). Two MIS analysis methods: An experimental comparison. Journal of Education for Business, 77(17).

Whitten, J. L., Bentley, L, & Dittman, K. C. (2004). System Analysis and Design Methods (6th edition). New York: McGraw-Hill.

AuthorAffiliation

Dennis Drinka, University of Alaska Anchorage, USA

Kathleen Voge, University of Alaska Anchorage, USA

Minnie Yi-Miin Yen, University of Alaska Anchorage, USA

AuthorAffiliation

Dennis Drinka is an assistant professor of Management Information Systems at the University of Alaska Anchorage. He received his BS in Finance from the University of Illinois Urbana-Champaign and his PhD in Management Science and Information Systems from the University of Texas at Austin. Among others, he has published in Decision Sciences, European Journal of Operational Research, and Applications of Management Sciences. His research interests are in the areas of decision support, mathematical modeling and innovative course design. He currently teaches Object Oriented Programming in .Net, Project Management, Web Development, and Systems Design, Development, and Implementation courses.

Kathleen Voge is an assistant professor of Management Information Systems at the University of Alaska Anchorage in the College of Business and Public and Public Policy. She received her BS in Operations Management along with her MBA in Information and Decision Sciences from the University of Minnesota's Carlson School of Management. Ms. Voge spent more than 15 years in industry, working in a variety of IT positions including programmer, senior business systems analyst, database administrator, and project lead before pursuing her full-time teaching career. She currently teaches systems analysis and general computing and tools-based courses.

Minnie Ti-Miin Yen is an associate professor of Management Information Systems in the Department of Computer Information Systems, University of Alaska Anchorage. She received her PhD in Management Information Systems from the University of Houston. Dr. Yen's work has appeared in IEEE Transactions on Software Engineering, Journal of Database Management, International Journal of Management, Human Factors in Information Systems, and a book chapter of Managing Business with Electronic Commerce: Issues and Trends. Her research interests focus on human-computer interaction, client-server database systems, e-commerce, and Web-based learning. She currently teaches courses in database management, client-server systems, object-oriented programming - Java, and C++.

View Image -   APPENDIX 1. CBA ORGANIZATION CHART
View Image -   APPENDIX 2. CONTEXT-LEVEL DATA FLOW DIAGRAM
View Image -   APPENDIX 3. DIAGRAM FOR CCG PROCESS
View Image -   APPENDIX 4. PRELIMINARY ERD
View Image -   APPENDIX 5. SAMPLE DATA

Subject: Educational evaluation; Case studies; Data collection; Colleges & universities

Classification: 8306: Schools and educational services; 9110: Company specific; 5240: Software & systems

Publication title: Journal of Cases on Information Technology

Volume: 7

Issue: 3

Pages: 37-56

Number of pages: 20

Publication year: 2005

Publication date: Jul-Sep 2005

Year: 2005

Publisher: IGI Global

Place of publication: Hershey

Country of publication: United States

Publication subject: Business And Economics--Computer Applications

ISSN: 15487717

Source type: Reports

Language of publication: English

Document type: Business Case

Document feature: references charts tables

ProQuest document ID: 198671218

Document URL: http://search.proquest.com/docview/198671218?accountid=38610

Copyright: Copyright Idea Group Inc. Jul-Sep 2005

Last updated: 2011-07-21

Database: ABI/INFORM Complete

Document 44 of 100

The Columbia Disaster: Culture, Communication & Change

Author: Guthrie, Ruth; Shayo, Conrad

ProQuest document link

Abstract:

The National Aeronautics and Space Administration (NASA) is a government organization, founded to explore space to better understand our own planet and the universe around us. Over NASA's history, there have been unprecedented successes: Apollo missions that put people into space and walking on the moon, the remarkable findings of the Hubble space telescope and the Space Shuttle Program, allowing astronauts to perform scientific experiments in orbit from a reusable space vehicle. NASA continues to be a source of national wonder and pride for the United States and the world. However, NASA has failures too. In February of 2002, the Space Shuttle Columbia disintegrated as it returned to Earth. This event occurred 16 years after the Space Shuttle Challenger exploded during take-off. As information was collected, investigators found that many of the problems uncovered during the Challenger investigation were also factors for Columbia. Underlying both disasters was the problem of relaying complex engineering information to management, in an environment driven by schedule and budget pressure. Once again, NASA is looking at ways to better manage space programs in an environment of limited resources. [PUBLICATION ABSTRACT]

Full text:

Headnote

EXECUTIVE SUMMARY

The National Aeronautics and Space Administration (NASA) is a government organization, founded to explore space to better understand our own planet and the universe around us. Over NASA's history, there have been unprecedented successes: Apollo missions that put people into space and walking on the moon, the remarkable findings of the Hubble space telescope and the Space Shuttle Program, allowing astronauts to perform scientific experiments in orbit from a reusable space vehicle. NASA continues to be a source of national wonder and pride for the United States and the world. However, NASA has failures too. In February of 2002, the Space Shuttle Columbia disintegrated as it returned to Earth. This event occurred 16 years after the Space Shuttle Challenger exploded during take-off. As information was collected, investigators found that many of the problems uncovered during the Challenger investigation were also factors for Columbia. Underlying both disasters was the problem of relaying complex engineering information to management, in an environment driven by schedule and budget pressure. Once again, NASA is looking at ways to better manage space programs in an environment of limited resources.

Keywords: Challenger disaster; communication center; detailed study; human resource management; internal auditing; International Space Station; knowledge base; NASA culture; national culture; non-profit organization; organizational change; organizational culture; organizational learning; organizational stress; partner firms; political perspective; priority setting; psychological climate; records management system; relevance of information; situational leadership; strategic alliances; test management system

ORGANIZATIONAL BACKGROUND

NASA was founded in 1958 to explore space. A year earlier, the Soviet Union beat the United States into space by launching Sputnik, the first satellite. In the United States, this was seen as an embarrassment, and the need for a space program was pressing. Only a few short months after the formation of NASA, the first American space missions were launched. In 1969, NASA's Apollo 11 mission put the first humans on the moon surface. NASA's space program has changed the way mankind views the Earth and helped bring about many important scientific findings that have resulted in numerous "spin-offs" in science, technology and commerce. After many other successful manned space flights, the Space Shuttle Program was initiated. The goal was to develop a reusable vehicle for frequent access to and from space. After nine years, the first shuttle, Columbia, was launched from Kennedy Space Center in 1981. Columbia was a remarkable success, though the promise of frequent access to space has never been realized. (Columbia flew 24 missions, the most of any shuttle in the fleet.) Today, NASA is renown for its discoveries and explorations in space - both manned and unmanned. NASA is truly a unique governmental agency with the lofty mission shown in Figure 1.

View Image -   Figure 1: NASA's Vision & Mission

In 1986, the world was shocked and saddened as the Challenger exploded during takeoff. Seven astronauts were dead along with the first civilian to ride the shuttle, Christy McAuliffe, an elementary school teacher. The Rogers Commission, formed by an executive order from President Reagan, found that design flaws contributed to the Challenger's explosion. During the investigation, it was revealed that NASA engineers and management knew about the problems with the O-rings and failed to act on the information that was available. The report was also critical of safety procedures and Space Shuttle Program management.

Sixteen years later, on February 1, 2003, the space shuttle Columbia disappeared. In the control room, contact was lost with the Columbia at 9:00 a.m. Minutes later, the Houston mission control room was locked down, as the team of ground support realized a disaster was occurring. By 2:05, President Bush addressed the public, "Columbia's lost; there are no survivors."

The Columbia had disintegrated when it reentered the Earth's atmosphere. Seven astronauts were dead, including the first Israeli astronaut and an Indian astronaut, who immigrated to the United States. The sadness of the national disaster deepened as pieces of the Columbia shuttle began to turn up in Texas and Louisiana.

A NASA internal investigation was conducted. In the wake of 9/11, theories of a terrorist attack surfaced and were quickly dispelled. The theory that a piece of foam may have damaged the wing was proposed. It was quickly dismissed too, as not being possible for the foam to cause such a catastrophic failure. As the pieces of Columbia were collected and the shuttle was reassembled, it was determined that a large piece of insulation foam broke off during launch, and hit Columbia's left wing at a velocity of 500 mph. On reentry, the heat was too great for the damaged shuttle, causing it to disintegrate. Disturbingly, the foam was discussed at NASA internal mission meetings, but only in passing.

An external review board of 10 people, led by Retired Admiral Hal Gehman, was appointed to investigate what happened at NASA that could have prevented the Columbia tragedy. In August of 2003, after conducting over 230 interviews with NASA personnel, from mechanics to astronauts, a 243-page report summarized the findings. Excerpts from the Columbia Accident Investigation Board (CAIB) report are highly critical of NASA management and the culture of the agency:

"Based on NASA's history of ignoring external recommendations, or making improvements that atrophy with time, the Board has no confidence that the space shuttle can be safely operated for more than a few years based solely on renewed post-accident vigilance. "

"Unless NASA takes strong action to change its management culture to enhance safety margins in shuttle operations, we have no confidence that other 'corrective actions' will improve the safety of shuttle operations. The changes we recommend will be difficult to accomplish - and they will be internally resisted. " (CAIB Report, Vol. 1, p. 13)

Changes that NASA has made include the removal of more than 12 people from upper management into different positions. At the onset of the disaster, several critics of NASA wanted to hold someone accountable for the management mistakes that led up to the disaster, including Sean O'Keefe, NASA's president. NASA now has the task of reviewing and deciding what to do with the external investigation report.

SETTING THE STAGE

The engineering for the Space Shuttle Program began development in the 1970s. The purpose was to develop a cheaper way to access space. Previously, any launch vehicle was destroyed when it entered the Earth's atmosphere. American astronauts would parachute into the ocean in a heat-protected capsule. The military would seek and meet the capsule in the ocean and recover the astronauts. (The Russian astronauts parachuted onto ground, a harder landing.) Rockets, life support, communication and other subsystems were lost when the mission concluded. Having a launch vehicle that flew from space to Earth had the potential to save money because these subsystems were reusable.

The space shuttle has three main components: the orbiter, the external fuel tanks and the rocket boosters. The orbiter is the main reusable component, carrying the astronauts and any payload and all the necessary support subsystems. The fuel tanks supply power to the orbiter's thrusters. The rocket boosters give the shuttle enough power to escape the earth's gravitational pull. Once the shuttle is near orbit, the rockets are discarded and fall to earth. The rockets are recovered for use in future shuttle missions. The external fuel tanks are also detached from the orbiter in space, but are not recovered. Over its history, the shuttle program has had several milestones (see Appendix A-1) including the first woman in space (Sally Ride who also participated in both Challenger and Columbia investigations), docking with the Russian Mir Space Station and the return to space of astronaut, now Senator John Glenn.

In 1986, after the Challenger exploded, an investigation of the disaster by the Rogers Commission identified technical deficiencies that led to the explosion - the O-rings between portions of the right solid rocket motor failed. Surprisingly, engineers were aware of the potential problem O-rings, though the decision to launch was still made.

There were systems used to track anomalies. However, as stated in the Roger's Report:

"NASA's system for tracking anomalies for Flight Readiness Reviews failed in that, despite a history of persistent O-ring erosion and blow-by, flight was still permitted. It failed again in the strange sequence of six consecutive launch constraint waivers prior to 51-L, permitting it to fly without any record of a waiver, or even of an explicit constraint. Tracking and continuing only anomalies that are Outside the data base' of prior flight allowed major problems to be removed from and lost by the reporting system. " (Roger's Commission, p. 148)

The Rogers Commission also found several organizational problems that led to the decision to launch Challenger under dangerous conditions.

A tremendous amount of planning takes place prior to a shuttle launch. In addition to planning the payload and planning for the scientific mission, several other activities take place. A delay in launching a shuttle disrupts the schedule for all the missions that follow. There are many stakeholders, including astronauts, NASA engineers and administrators, as well as engineers and managers form subcontracting organizations. During the Rogers Commission investigation, the structure of the organization was reported to be complex and non-inclusive of engineering and subcontractor viewpoints. An example of this is that Rockwell Inc. and Thiokol expressed reservations at the flight readiness meeting before the decision to launch. The report indicates in several instances that Marshall Space Center management pressured and influenced subcontractors to approve the launch decision, even though their support for launch was ambiguous at best.

The major findings of the Rogers Commission, with excerpts from their final report, were:

View Image -
View Image -

Recommendations made by the Rogers Commission were both technical and managerial. The technical recommendations included: (a) redesigning the rocket boosters, (b) upgrading the shuttle tires and breaks, and (c) retrofitting the shuttles to include escape systems.

Some of the managerial recommendations were:

* Create a strict risk-reduction program.

* Reorganize (decentralize) so that information is made available to all levels of management. Astronauts should be placed in NASA management positions so that their viewpoints are represented.

* All waivers to flight safety should be revoked and forbidden. All contractors need to agree to launch.

* Technical issues should be reviewed by independent government agencies, which report their analysis to NASA.

* The NASA Associate Administrator for Space Flight and the NASA Associate Administrator for Safety sponsor open reviews, encouraging NASA and contractor management, engineering and safety personnel to discuss concerns.

* Allowance be made for anonymous reporting of shuttle safety concerns.

In response, NASA implemented the recommendations of the Rogers Commission and adopted a more realistic launch schedule. However, over time, it is difficult to assess what changes were fully adopted.

Culture in Government Agencies

Throughout the discussions of NASA management, the topic of organizational culture is prevalent. "Every organization has a culture, that is, a persistent, patterned way of thinking about the central tasks of human relationships within an organization. Culture is to an organization what personality is to an individual. Like human culture generally, it is passed on from one generation to the next. It changes slowly if at all" (Wilson, 1989). Adoption of information systems or changes to processes created by introduction of information systems are frequently doomed because the organization's culture is unwilling to accept change.

NASA was formed to re-establish US dominance in space and science. Drawing from existing organizations and top research scientists, NASA became a high-performance organization (McCurd, 1993). In an amazingly short period of time, NASA was able to achieve the Apollo missions and become a source of national pride and prestige. The culture at the time, described by Vaughan (1996), was that of engineering. The very word 'engineer' implies that something is being created and tested in order that it be engineered again and improved. NASA's early culture of scientists and engineers relied on testing, research and rigorous methodology to find out what worked in achieving manned space flight. The culture believe strongly that an in-house technical ability was necessary, that people hired by NASA were the best and brightest in the world, and that risk and failure were part of doing business. Failure was tolerated because the view was that you cannot achieve success without innovation and experimentation. McCurd points out that high-performance cultures tend to be unstable and short lived.

As the organization grew, and the amount of work increased, the culture underwent a significant change, becoming more bureaucratic. Instead of keeping all work 'in-house', NASA began to use outside contractors to do research and development. The culture became more averse towards failure and innovation. Employees began to feel that their failures would not be tolerated. This was reflected in a NASA culture survey in 1988 (McCurdy, 1993) that showed employees were dissatisfied with the work going to outside contractors and were finding it difficult to get things done in a large bureaucracy. They felt that a loss of technical knowledge was occurring and that failure was no longer tolerated.

Information Systems Development for Government Agencies

In 1986, information systems used in organizational decision making were very different from the Web based, graphical systems we have today. Systems ran on a mainframe computer and were accessible to users through command-driven or primitive, menu-driven interfaces. Information systems were slow, not user-friendly and required training to learn how to operate. Commercial, mass-produced software (Commercial Off The Shelf (COTS)) was very minimal. If an agency like NASA wanted programs developed for them, it was customized software that was expensive and time consuming to create.

Today, software development methodologies offer prototyping and iterative design so that users can identify problems in the system before they are developed. In 1986, government agencies followed a strict software methodology (DoD-STD-2167A, 1995; see Appendix A-2) that defined all the software requirements at the beginning of the life cycle and then delivered a system, often years later, based upon written requirements, difficult for the user to visualize. Governmental systems development contracts were notorious for being overrun, late and not meeting the needs of the users. Further, systems developed for agencies like NASA might be high risk and require high reliability. To achieve high reliability and fault tolerance is very expensive. Today's methodologies using rapid application development, prototyping and iterative design make it cheaper to produce these systems. However, they are still expensive because of the effort involved in ensuring reliability.

CASE DESCRIPTION

Columbia's Final Mission

Columbia's final mission, STS-107, was to perform experiments related to physical, life and space sciences. The seven astronauts conducted more than 80 experiments while in orbit. This mission was an extended orbit, lasting 16 days. The crew was noted in the media because it had the first Israeli astronaut, Payload Specialist Ilan Ramon, quickly hailed as a national hero of Israel. See Appendix A-3 for a listing of Columbia's crew and the STS-107 Mission. The mission goals are available in Appendix A-4.

When Columbia launched on January 16, 2003, cameras caught images of insulation foam breaking loose from the fuel tank. Columbia entered its orbit over Earth without incident and conducted its 16-day mission. On February 1, 2003, while returning to Earth, Columbia lost communication with Johnson Space Center. After realizing that a disaster has occurred, Flight Director Leroy Cain order the communication center locked down and the contingency plan order is implemented.

As the news reports begin, people from Texas to California report seeing the shuttle break up as it entered the atmosphere. Minimal talk of rescue fades as President Bush addresses the nation, "The Columbia's lost. There are no survivors." People begin finding debris from the shuttle in Texas and Louisiana. NASA issues a warning that the debris might be hazardous and that people should report any finding to NASA, and not touch the debris. NASA's top administrator, Sean O'Keefe, vows to investigate what went wrong. The Columbia Accident Review Board (CAIB) is formed, chaired by retired Navy Admiral Harold Gehman, Jr. Members of the review board are listed in Appendix A-5.

The possibility of a terrorist strike is offered and quickly rejected by NASA. As more is discovered about the Columbia disaster, the foam debris that broke loose on take-off is mentioned. However, Shuttle Program Manager Ron Dittemore says this is highly unlikely. A few days later, he retracts these statements.

As the CAIB investigates, some surprising information about the NASA and the shuttle program comes to light.

* NASA had known about the foam debris-shedding problem for some time. However, since it had never caused a problem before, it became routinely ignored.

* NASA had the opportunity to obtain images of Columbia in orbit on the day of the disaster, but declined, feeling that this was unnecessary.

* Budget restrictions led to demoralizing attitudes on the shuttle safety program. For example, NASA inspectors were required by management to supply their own tools and were restricted from making spot checks.

* Lower level shuttle personnel felt that they could not raise issues of quality and safety without risk of being fired.

With this in mind, the CAIB conducted more than 230 interviews of shuttle personnel at every level. In their final report, they begin their analysis of organizational culture by revisiting the history of NASA and the Challenger disaster 16 years earlier. The shuttle program organizational chart is listed in the Appendix A-6.

The CAIB final report identifies three problem areas: physical flaws in design that led to the disaster, weaknesses in NASA's organization and other significant observations. The report indicates that technical explanations were not enough to explain the Columbia disaster and is critical of NASA management:

"In our view, the NASA organizational culture had as much to do with this accident as the foam. Organizational culture refers to the basic values, norms, beliefs, and practices that characterize the functioning of an institution. At the most basic level, organizational culture defines the assumptions that employees make as they carry out their work. It is a powerful force that can persist through reorganizations and the change of key personnel. It can be a positive or a negative force." (CAIB Final Report, Part II, p. 1)

A Matter of National Pride

When Sputnik, the first satellite in space, was launched by the Soviet Union in 1957, Americans were stunned. Their Soviet rivals had beaten them into space. NASA was formed a year later and in 1961 rallied the American people to be the first to the moon. This was an unimaginable, engineering feat, and in 1969 NASA succeeded when Neil Armstrong became the first person to walk on the moon. NASA's culture was defined through the spirit of exploration and achievement of the impossible. Those who witnessed the 1969 space walk clearly remember where they were and the awe inspired by the greatness of science and engineering achievement. Today, the shuttle program has made space flight seem common. Children do not remember a time when this was only a dream. Over time, the emphasis for space exploration has gone from achievement of the impossible to cost savings and streamlined operations. Figure 2 shows the NASA budget as a percentage of federal funding. A dramatic decline is evident in the early '70s. Figure 3 shows the relatively flat spending over recent years on the shuttle and international space station programs. The CAIB contends that the NASA culture clashes with the shuttle philosophy of cheaper, frequent access to space. The Board goes further to state that the Rogers Commission recommendations made after the Challenger disaster were never fully realized.

View Image -   Figure 2: NASA Budget as a Percentage of the Federal Budget from the CAIB Final Report  Figure 3: Space Shuttle Program Spending in Recent Years (in Millions of Dollars)

DELICATE BALANCE OF RISK, BUDGET & SCHEDULE IN SPACE EXPLORATION

Only three years after the Challenger disaster, NASA was viewed as being overly cautious and expensive in adhering to the Rogers Commission. NASA cut the budget on the shuttle program by 21% over a three year period (1991-1994). Interestingly, the White House formed a blue-ribbon committee in 1990 to investigate NASA spending. The recommendations of the Augustine Committee were that NASA was overwhelmingly under-funded and needed a budget increase of 10%, per year.

During this time, The White House appointed Daniel S. Goldin, a former aerospace industry executive, as director of NASA. Viewed as a change agent, his goal was "faster, better, cheaper," with the hopes that streamlining efforts in NASA would result in an eventual manned mission to Mars. Goldin made dramatic changes to NASA, following a Deming-like management philosophy, seeking a less bureaucratic, more empowered worker approach to NASA.

Goldin's greatest contribution to NASA was possibly the creation of the International Space Station. Sean O'Keefe replaced Goldin in 2001. At this time, the current debate was over privatization of NASA. The rationale was that privatizing portions of the shuttle program could save money and might facilitate more commercial uses of the shuttle. Parallel to this push was the effort to complete Node 2 of the International Space Station. The scheduled date, viewed widely as unrealistic, for deploying Node 2 of the International Space Station in February 2004 was programmed into a screen saver countdown and sent to all shuttle program managers.

The CAIB made several recommendations, including a redesign of the thermal tank protection subsystem to eliminate debris shedding and several other technical enhancements. They also expressed the need for obtaining better images of the shuttle, on-board and from external sources. The need to perform emergency repairs of the shuttle from space was identified, along with the need to return to the industry standard for foreign object debris, which had been waived for the shuttle.

The managerial recommendations were:

* Ease scheduling pressure to be consistent with resources.

* Expand Mission Management Team crew and vehicle safety contingencies.

* Establish independent Technical Engineering Authority that oversees technical standards, risk, waivers, and verifies launch readiness.

* Reorganize the Space Shuttle Integration Office so integration of all elements of the program is possible.

Chapter 7 of the CAIB is dedicated to the organizational causes of the Columbia disaster. Normal Accident theory was used to describe the culture of NAS A. Namely, in a complex, noisy organization, management actions can increase noise levels to a point where communication is ineffective. High Reliability Theory contends that organizations are closed systems where management is characterized by an emphasis on safety, redundant systems are seen as necessary, not costly and the organizational culture is reliability driven. The problems highlighted in the report were:

* A lack of commitment to a culture of safety: "... reactive, complacent and dominated by unjustified optimism."

* Lack of adequate communication: Specifically, managers in charge were resistant to new information indicating what they did not want to hear. Additionally, the databases in place to support decision and data dissemination processes were difficult to use.

* Oversimplification: Foam strikes had occurred over 22 years and were viewed as a maintenance issue, not a safety problem.

Similarities between the organizational culture of the Challenger and Columbia disasters are striking.

PROBLEMS WITH INFORMATION TECHNOLOGY

As with the Challenger disaster, Columbia also had communication problems related to information technology. During the Challenger disaster, it became apparent that several memos were written indicating the O-ring problem was seen by Thiokol and NASA engineers as being dangerous. The technical detail in the memos was considered difficult to understand and focused on technical detail over risk. Safety systems in place during the Challenger disaster were lax, allowing for waivers, and failing to track waivers and anomalies across flights. Several analyses of the Columbia disaster point to communication through PowerPoint and difficult-to-use databases as contributors to the problems with the shuttle safety program.

PowerPoint

Given the technical nature of the Columbia disaster and all the complexity, technical and cultural, related to the launch decisions, reports from the CAIB related to PowerPoint presentations were quite remarkable:

"As information gets passed up an organizational hierarchy, from people who do analysis to mid-level managers to high-level leadership, key explanations and supporting information is filtered out. In this context, it is easy to understand how a senior manager might read this PowerPoint slide and not realize that it addresses a life-threatening situation. "

"At many points during its investigation, the board was surprised to receive similar presentation slides from NASA officials in place of technical reports. The Board views the endemic use of PowerPoint briefing slides instead of technical papers as an illustration of the problematic methods of technical communication at NASA." (CAIB report, Vol. 1, p. 191)

It seems that overuse of PowerPoint briefings, in place of detailed analysis, made it difficult for meeting attendees to identify what the launch risks were for Columbia.

Edward Tufte, a highly prominent Yale professor and an expert in the visual display of data, gave a sample slide in the New York Times (Schwartz, 2003), showing how misleading and vague it was in conveying the risk of the foam strike. In his short book, The Cognitive Style of Power Point (Tufte, 2003) criticizing Power Point and its use in organizations, Tufte gives examples of the communication failures of NASA's presentation. For example, a slide title states, "Review of Test Data Indicates Conservatism for the tile Penetration." This could be construed to indicate no risk for foam tiles. However, the title applied to conservatism about the choice of models used for prediction. Only at the bottom of the slide, in a lower level bullet, is the important information related to the audience. Namely, "Flight condition is significantly outside the test database." Tufte goes further to say that the low resolution of the slide (presumably to condense information) and the use of condensed, non-specific phrasing adds to the ambiguity of the communication.

Note: In Visual Explanations (1997), Tufte did an analysis of the Challenger disaster, showing 13 view graphs prepared for management and faxed to NASA. The critique stated the charts were unconvincing and non-explicit in stating the impact of temperature on O-rings.

Information Systems Used to Support Safety

The CAIB findings indicated critical problems with the information systems used to support shuttle safety:

"The information systems supporting the shuttle - intended to be tools for decision making are extremely cumbersome and difficult to use at any level. While tools were in place to support safety decision making, the design and use was difficult, causing them to fall into disuse."

In 1981, the PC was invented. The operating system, Disk Operating System (DOS), was command line driven and difficult to use. Windows 1.0 was released in 1985, but was viewed as slow and still difficult to use. In 1990, Windows 3.0 was released and graphical user interfaces (GUIs) gained massive popularity. GUIs were easy to use because the user did not have to remember any command names or sequences to operate the computer. The desktop analogy interface was intuitive to experiences users already had. Home use of PCs was rapidly rising. Consequently, customized, expensive systems developed for governmental agencies seemed archaic. A GUI design for safety that was easier to use and interpret, and that did not allow users to bypass safety features, may have led to a more informed decision.

* Another system existed that was easier to use, but not required. "The Lessons Learned Information System database is a much simpler system to use, and it can assist with hazard identification and risk assessment. However, personnel familiar with the Lessons Learned Information System indicate that design engineers and mission assurance personnel use it only on an ad hoc basis, thereby limiting its utility."

Given a simple system was available, it was surprising that it was not organizational policy to use it. User training may be an issue here as well.

* The simulation tool called Crater (mentioned in the slide in the above section) was inadequate to analyze foam impact data.

* The CAIB also indicated that the decentralized manner with which the shuttle program operated could hide unsafe conditions, whereas a centralized way to handle safety issues would foster better communication and insight.

CURRENT CHALLENGES/PROBLEMS FACING THE ORGANIZATION

Can NASA Change?

Soon after the CAIB report was submitted, Brigadier General (and CAIB member) Duane Deal submitted a supplement to the CAIB report. Duane felt strongly that enough hadn't been said about preventing "The Next Accident." The language of the CAIB report was not strong enough in specific areas in its criticism of NASA management for letting schedules and budgets take precedence over safety. Brigadier Deal expressed strong reservations about NASA's ability to change:

"History shows that NASA often ignores strong recommendations; without a culture change, it is overly optimistic to believe NASA will tackle something relegated to an 'observation' when it has a record of ignoring recommendations."

Can NASA's Culture Be Transformed?

In the wake of the Columbia disaster, 12 top-level shuttle administrators and program managers were reassigned to different positions within NASA. In May of 2003, Former-Marine William Parsons replaced Dittemore. Previously, Parsons was the director of the Stennis Space Center and is viewed as a NASA insider with strong leadership skills. Over a transition period, Parsons continues to learn more about the shuttle program from the retiring Ron Dittemore.

Now he has the daunting task of changing NASA's culture. His first major assignment is to ensure that personnel at all levels feel comfortable voicing concerns about shuttle safety. In a recent quote to the Associated Press, Parsons claims, "None of this is too touchy-feely for me." He even went so far as to hire a colleague whose assignment among others is to critique his interactions with subordinates to ensure he is not intimidating.

Even so, NASA veterans are reluctant to adopt a more humanistic style of management. Will changes at the top level by Parsons be enough to successfully change NASA's culture?

Information Technology

In this case, what is missing, is quite informative. Information technology offers advantages of being distributed or centralized, accessible, user friendly and can track anomalies, extending human abilities to see trends that they might otherwise miss. Failing to use a tool that can help you is akin to burying one's head in the sand. Yet, we see it every day when users press the NEXT button or the OK button without reading the alert message on their personal computers. Designers have set up clever ways for technology to help us, but it seems like human nature to ignore that help. Ironically, many military systems are designed specifically with a 'man-in-the-loop' to avoid catastrophic errors. After the Challenger disaster, the structure of the shuttle program was changed so that astronauts were managers and present at decision-making meetings. A proper safety system that did not allow people, in-the-loop, to bypass anomalies would have served the Columbia shuttle better.

PowerPoint is part of business culture. At NASA, as with many organizations, PowerPoint presentations are interwoven with the structure and communication processes that support decision making. It is often said that "the devil is in the details." PowerPoint is not a tool that is made to support a great deal of detail. Detailed information on a slide becomes an eye-chart, impossible to read. Lengthy reports with a lot of detail can unintentionally hide information by failing to display it in a way that catches the readers attention and overloading them with massive amounts of detail. Is reliance on Power Point to communicate ideas making NASA incapable of distinguishing key factors for decision making?

NASA's Changing Goals

In January 2004, US President George Bush addressed the public, outlining the new plan for Space Exploration. In his speech, he gave three goals:

1. Complete the International Space Station. This will be the primary mission of the Space Shuttle. The Space Shuttle will be retired in 2010.

2. Develop and test a new spacecraft by 2008. This will be the replacement for the shuttle and it will operate to transfer astronauts to and from the space station. The spacecraft will also carry astronauts beyond the earth's orbit to 'other worlds.'

3. Return to the moon by 2020. Explore the moon robotically by no later than 2008.

President Bush also spoke about NASA's current $86 billion budget, vowing to reallocate $11 billion within the budget and to increase NASA's budget by $1 billion over the next five years.

Bush also expressed his support and confidence that Sean O'Keefe could usher NASA into a new age of space exploration. In light of the small increases in funding, one NASA watcher, Douglas Osheroff, a member of the CAIB and a Stanford University physics professor in an interview with the Seattle Times was skeptical about Bush's support for the future of the space program:

"If you give them a goal and you don't give them resources, I think the situation will get worse."

The question remains: How will O'Keefe find the resources to meet Bush's goals and assure NASA is an organization with a culture of safety?

Mars Rovers

In early 2004, NASA's Jet Propulsion Lab (JPL) in Pasadena, California, successfully landed two ruggedized rovers on Mars. The rovers, Spirit and Opportunity, are sending remarkable images of the Martian surface to Earth.

A poignant memorial, a plaque with the names of the seven, lost Columbia astronauts has been placed at Spirit's landing site. The site has been named the Columbia Memorial Station. Opportunity's landing site will be named for Challenger's final crew.

References

REFERENCES

Associated Press (2003). Columbia Investigator Wants More Changes. Retrieved January 29, 2004: http://www.foxnews.com/story/0,2933,95892,00.html

Associated Press (2003, Feb 1). Remains thought to be from Columbia Crew, NASA vows to find cause of shuttle disaster. Retrieved January 29, 2004: http://edition.cnn.com/2003/TECH/space/02/01/shuttle.columbia/

Associated Press (2003, Oct 12). Touchy Feely NASA-Effort. Retrieved January 29, 2004: http://www.wired.com/news/culture/0,1284,60798,00.html

Augustine Committee (1990, Dec). Report of the advisory committee on the future of the US space program. Retrieved January 29, 2004: http://www.hq.nasa.gov/office/pao/History/augustine/racfup1.htm

Borenstein, S. (2004, Jan 31). A year after Columbia, NASA's 'culture' reassessed. Retrieved January 29, 2004: http://seattletimes.nwsource.com/html/nationworld/2001847903_nasa31.html

CNN.com Milestones in Space Shuttle History (n.d.) Retrieved January 29, 2004: http://edition.cnn.conVinteracnVe/space/0010/timeline.pop.up/frameset.exclude.html

Columbia Accident Investigation Board (2003, Aug 26). Report of Columbia Accident Investigation Boar. Retrieved January 29, 2004: http://www.nasa.gov/columbia/home/CAIB_Vol1.html

Harwood, W. (2003, May 9). Parsons named Space Shuttle Program Manager. Retrieved January 29, 2004: http://spaceflightnow.com/shuttle/sts107/030509parsons/

Harwood, W. (2003, July 13). Shuttle Safely Team was Hamstrung. Retrieved January 29,2004: http://www.cbsnews.com/stories/2003/07/22/tech/printable564420.shtml

Deal, D. (2003, October). Supplement to the Report of the CAIB. Retrieved January 29, 2004: http://www.caib.us/news/report/pdf/vol2/part00a.pdf

McCurd, H. E. (1993). Inside NASA: High Technology and Organizational Change in the US Space Program. Baltimore, MD: Johns Hopkins University Press (pp. 159-174).

Mission control transcript of Columbia's final minutes. (n.d.). Retrieved January 29, 2004: http://datamanos2.com/columbia/transcript.html

NASA Budget Reports (1998-2003). Summary of the President's FY budget request for NASA. Retrieved January 29, 2004: http://www.nasa.gov/audience/formedia/features/MP_Budget_Previous.html

NASA Official Columbia Page, (n.d.) Retrieved January 29,2004: http://www.nasa.gov/columbia/home/index.html

Rogers Commission (1986, Feb 3). Report of the Presidential Commission on the Space Shuttle Challenger Accident. Retrieved January 29, 2004: http://science.ksc.nasa.gov/shuttle/missions/51-1/docs/rogers-commission/table-of-contents.html

Schwartz, J. (2003). The level of discourse continues to slide. The New York Times, September 2003.

Tufte, E. R. (1997). Visual explanations: Images and quantities, evidence and narrative. Graphics Press, 38-53.

Tufte, E. R. (2003). The cognitive style of PowerPoint. Graphics Press, 7-11.

Vaughan, D. (1996). The challenger launch decision: Risky technology, culture and deviance at NASA. University of Chicago Press, Chicago, pp. 77-119.

Wilson, J.Q. (1989). Bureaucracy: What Government Agencies Do and Why They Do It. Basic Books: New York.

AuthorAffiliation

Ruth Guthrie, California Polytechnic University, Pomona, USA

Conrad Shayo, California State University, San Bernardino, USA

AuthorAffiliation

Ruth Guthrie is a professor of Computer Information Systems at California Polytechnic University, Pomona. She has experience in systems engineering, software test and program management of space based IR sensor programs. She has a PhD from Claremont Graduate University, an MS in Statistics from the University of Southern California and a BA in Mathematics from Claremont McKenna College. Her research interests are user interface design and computer ethics. She has authored several papers in a variety of areas including two books on Web development. Currently, she is associate director for AACSB for the College of Business at Cal Poly and is involved in several Web development efforts using video embedded flash.

Conrad Shayo is a professor oflnformation Science at California State University San Bernardino. Over the last 23 years he has worked in various capacities as a university professor, consultant, and manager. He holds a Doctor of Philosophy and a Master of Science in information science from the Claremont Graduate University, formerly Claremont Graduate School. He also holds an MBA in Management Science from the University of Nairobi, Kenya, and a Bachelor of Commerce in Finance from the University of Dar-Es-Salaam, Tanzania. His research interests are in the areas of IT assimilation, performance measurement, distributed learning, end-user computing, organizational memory, instructional design, organizational learning assessment, reusable learning objects, IT strategy and "virtual societies."

View Image -   APPENDICES
View Image -   APPENDICES
View Image -   APPENDICES
View Image -   APPENDICES
View Image -   APPENDICES

Subject: Aircraft accidents & safety; Space shuttle; Case studies; Failure analysis

Location: United States, US

Company / organization: Name: National Aeronautics & Space Administration; NAICS: 927110; DUNS: 00-325-9074; Name: NASA; NAICS: 927110; DUNS: 00-325-9074

Classification: 8350: Transportation & travel industry; 5340: Safety management; 9190: United States; 9110: Company specific

Publication title: Journal of Cases on Information Technology

Volume: 7

Issue: 3

Pages: 57-76

Number of pages: 20

Publication year: 2005

Publication date: Jul-Sep 2005

Year: 2005

Publisher: IGI Global

Place of publication: Hershey

Country of publication: United States

Publication subject: Business And Economics--Computer Applications

ISSN: 15487717

Source type: Reports

Language of publication: English

Document type: Business Case

Document feature: tables graphs references charts

ProQuest document ID: 198671407

Document URL: http://search.proquest.com/docview/198671407?accountid=38610

Copyright: Copyright Idea Group Inc. Jul-Sep 2005

Last updated: 2011-07-21

Database: ABI/INFORM Complete

Document 45 of 100

LIBNET: A Case Study in Information Ownership & Tariff Incentives in a Collaborative Library Database

Author: Hooper, A S C

ProQuest document link

Abstract:

In any cooperative database the participants contribute their data for their own as well as the benefit of the other members, usually with incentives from the database administrators. A South African library network company (LIBNET) provided a networked service to participating libraries. Member benefits included conversion of their catalogues into machine-readable form, significantly reduced costs through cooperative cataloguing and more efficient interlibrary loans through a union catalogue of the holdings of the participant libraries. This case study explores some of the issues influencing tar iff determination in a cooperative database. Questions of data ownership and the provision of incentives for the uploading of data also raise legal and ethical issues. The case study provides a basis for exploring business strategy in collaborative database management. [PUBLICATION ABSTRACT]

Full text:

Headnote

EXECUTIVE SUMMARY

In any cooperative database the participants contribute their data for their own as well as the benefit of the other members, usually with incentives from the database administrators. A South African library network company (LIBNET) provided a networked service to participating libraries. Member benefits included conversion of their catalogues into machine-readable form, significantly reduced costs through cooperative cataloguing and more efficient interlibrary loans through a union catalogue of the holdings of the participant libraries. This case study explores some of the issues influencing tar iff determination in a cooperative database. Questions of data ownership and the provision of incentives for the uploading of data also raise legal and ethical issues. The case study provides a basis for exploring business strategy in collaborative database management.

Keywords: e-commerce managerial issues; e-commercepricing issues; e-commerce strategy; intellectual property rights; online collaboration; strategic alliances

ORGANIZATIONAL BACKGROUND

The Public Good Character of Information

Information is usually considered to be a public good (Braunstein, 1981; Spence, 1974). Certainly, that which falls outside the already established category of intellectual property is a public good, a shared resource that is enriched rather than diminished by policies that increase rather than decrease everyone's access to it (Ebbinghouse, 2004).

A pure public good is one that has two major characteristics - nonrivalous consumption and nonexcludability (West, 2000). Nonrivalous consumption means that the good or service is not diminished or depleted when consumed. If information is shared between two people, it is not diminished thereby, and both can have full use and benefit of it. Nonexcludability means that consumption of the good or service cannot be denied to people who have not paid for it. It is an important factor in controlling the spread of information by vendors wishing to market it, especially in an online environment where it can easily be downloaded and further distributed, processed or reused.

Information may have different value to different people with whom it is shared. Some consumers may be prepared to pay significantly more for a specific piece of information than others. And, of course, the time it is delivered can be an important factor in determining the value of information for a particular consumer. The manner in which information is provided plays a significant role in determining its characteristics as a public good. Printed information in book or journal form has physical characteristics that enable it to be priced and marketed as an artifact irrespective of the informational value of the contents to different consumers.

The implications of this are that, because it is difficult for a vendor of information to be reimbursed for the development and provision of the goods or services, or to control subsequent distribution, there is a reduced incentive for investing in the creation of the good. So, while there may be a demand for the information, no seller will offer it. Sometimes, public good providers create modified or less-efficient markets to generate the revenue that pays for the public good. Advertising revenue can be used to pay for public TV, Internet portals, search engines and other information products (West, 2000).

Alliance Forming for Information Provision

Because of the nature of information as a public good, very often it has fallen to governments to provide the good or service, either independently or in association with other providers. This concept is central to that of the knowledge economy in which the public good characteristic of information is used by governments to grow the competitiveness of the national economy through the development of knowledge and social capital. "E-Government is the use of information technology to deliver public services in a much more convenient, customer oriented, cost-effective, and altogether different and better way" (Holmes, 2001, p. 2). Increasingly, the way that governments make their services available is through online service provision, and, as such, they have become major players in the online database industry. "Digitising government can create a particularly lucrative new market" (Fountain, 2001, p. 5). By 1998, the electronic information services industry in the United States had become a $33.5 billion per annum market with an annual growth rate of 7.5% (Communications Industry Forecast, 2000). With so much at stake, it is hardly surprising that governments seek to benefit from their investment, or to control the process of data-ownership and the way that information is distributed or shared (Ebbinghouse, 2004).

By forming strategic alliances, individual organizations can increase their individual power with government and gain credibility, legitimacy and visibility. Many experts have regarded strategic alliances as the foundation for inter-organizational collaboration in the public and private sector, to reach new markets and technologies, to share risks and to gain complementary competencies. "When the knowledge base that supports an industry is hard to comprehend, still emerging and distributed across several organizations, then collaboration among firms, universities and national laboratories will reflect a strong and fundamental interest in access to knowledge rather than simply strategic calculation, resource sharing or transaction cost reduction" (Fountain, 2001, p. 75). In 1977, governments or not-for-profit agencies produced 78% of all databases, but by 1997 this percentage had dropped to 20% (West, 2000, p. 64).

The use of computers for the development of databases and catalogues was appreciated early in the evolution of business computing. ease of sorting, ease of searching and the fast generation of reports found applications in many organizations dealing with large product lines or customer bases. The use of structured formats for electronic data interchange (EDI) facilitated the deconstruction of the original data and its use in different forms and for different purposes. Along with bankers, supermarkets, motor and aircraft manufacturers, librarians were quick to recognize the value of using computers to provide greater operational efficiencies. In tight financial times, the cost of harnessing the large networked computers needed for library systems was beyond the budget and technical expertise of most academic libraries. Academic administrators and politicians turned to collaboration as a means of accomplishing their goals (Patrick, 1972; Kemp, 1996; Kopp, 1998).

Especially in the 1980s and 1990s, a rapid increase in the number and cost of books and journals, combined with severe constraints placed on library budgets - especially in academic libraries - became a worldwide phenomenon, further exacerbated in those countries with volatile currency units (Hooper, 1990). The consequences of these problems were obsolete equipment, untrained personnel, out-of-date collections (Martey, 2002) and the resultant imperative to downsize/right-size, together with political pressure to collaborate (Kopp, 1998). It became imperative to find ways of making the most efficient use of the resources available by reducing duplication of book and journal purchases, especially on a regional basis, and optimizing interlibrary loan traffic to ensure the most efficient and effective use of those materials already available within the country.

"Libraries are forming alliances for the purpose of identifying and addressing common needs arising from development in information technology, especially the growing importance of the Internet and the World Wide Web. " (Potter, 1997, p. 417)

This instinct to cooperate is part of the ethos of the library profession. The major driver of cooperative alliances among libraries has not been technology, except in so far as technology is an enabler of greater efficiency. Rather, the main drivers are economic considerations. These include sharing of resources, cooperative acquisitions, cooperative automation, shared cataloguing, and preservation and access (Gorman & Cullen, 2000; Hayes, 2003; Hooper, 1989).

The purchase of a book or journal requires the generation of data that is used not only for the order process, but forms the basis for subsequent entries. That data is structured according to author, title, publisher and other components, all of which might be required as the sort key in the generation of a report or for database search purposes. Collaborative data entry into a centralized networked database enables libraries to speed their order processes, make their catalogue entries more accurate and make more informed decisions about purchases, depending on the holdings of other libraries in the region. The same networked database could also form the central resource for cooperative catalogue development and the establishment of a regional or national union catalogue of library holdings, facilitating interlibrary loans and promoting networked communications among participant libraries.

The development of a centralized, networked database of the catalogue holdings of the major libraries in a region or in a country would provide operational efficiencies for participant organizations in the same way that banks, insurance companies and motor manufacturers promoted efficiencies through collaborative database development. Many of the problems associated with collaborative database development were the same - especially those relating to systems integration, data and content ownership, catalogue content management and the determination of tariffs for database use combined with incentives for participants to contribute their data. (Rayport & Jaworski, 2002, pp. 366-372). The reason for this is that, in collaborative databases, several information producers combine to generate the data for the online server/vendor to supply to the information consumer. These three players - producers, vendors and consumers - in the online information services market can have conflicting interests, especially when the information consumers are also the information providers and they establish the server/vendor for that purpose.

Inter-Organizational Systems & Library Consortia

Information technology has been used for many years to promote collaborative working opportunities, to share data and to control dispersed operations. The characteristics of inter-organizational systems (IOSs) that link numerous business partners have only recently been investigated because they form the basis for many electronic commerce business models. The reasons why organizations and businesses adopt IOS (or EDI as a prominent type of IOS) (Ahmad & Schroeder, 2001) show a marked similarity with those of libraries embarking on collaborative ventures. These include perceived benefits, external pressure including competitive pressure, and readiness in terms of financial resources and IT sophistication (lacovou et al., 1995; Chwelos et al., 2001) Competitive pressure has also been highlighted by Premkumar and Ramamurthy (1995), Crook and Kumar (1998), Bensaou and Venkatraman (1996), Morrell and Ezingard (2001) and Maingot and Quon (2001), while industry pressure was noted by Bensaou and Venkatraman (1996), lacovou et al. (1995), Chwelos et al. (2001). Efficiency and effectiveness also feature as key drivers (Morrell & Ezingard, 2001 ; Ahmad & Schroeder, 2001).

Like library consortia, IOSs also raise the incongruity between the need for collaboration while still needing to compete (Johnston & Gregor, 2000). Creating congruence among the partners can be a key uncertainty and risk reducing strategy (Angeles & Nath, 2001). To do this, a participative rather than an authoritarian management and decision-making style is desirable among partners (Angeles & Nath, 2001). Nevertheless, the competitive aspects of IOSs also need consideration. IOSs affect competition in three ways: they change the structure of the industry and alter the rules of competition, they create competitive advantages, and can create whole new businesses (Siau, 2003). Furthermore, academic administrators and politicians have turned to this form of collaboration as a means of accomplishing their goals (Siau, 2003), which are very often competitive.

The origins of many of today's e-commerce business models can be found in those business innovations that recognized the value of networked computers for obtaining greater efficiencies and promoting collaborative contributions. Many of the problems and issues that were found to have been intractable then remain problems in contemporary businesses. Solutions found to these problems in earlier models can often lead to insights and solutions in today's businesses.

The Foundation & Promise of LIBNET

The South African library system is the most comprehensive and sophisticated network of information resources on the continent of Africa. Although very flawed, it gave birth to an impressive collaborative venture that has survived through dramatic political, economic and technological developments. In 1979, a committee examining the possibility of establishing a national computerized catalogue in South Africa concluded, "The cost and resources needed to establish a national catalogue from scratch would be prohibitive" (Laing, 1997, p. 53). The committee, largely made up of senior librarians and academics, was aware that the rate of growth of publication titles would double every 25 years. While very dependant on the importation of scientific and technical information, a small country like South Africa, with so many other more pressing demands on its national resources, needed to make the most efficient use of funds spent on its national bibliographic development and control. It made sense, therefore, to develop a national online catalogue of the bibliographic holdings of the major research and public libraries.

No individual library could afford to fund the development of such a facility, not even the State Library. As a statutory organization falling under the Department of National Education, the State Library considered that its responsibilities, defined before the days of computerized catalogues and online databases, would have included the functions of a national online catalogue. Indeed, over the years it had been responsible for the compilation of the South African National Bibliography, the SANB. This serial publication provided the bibliographic details of all South African publications deposited by publishers in the various Legal Deposit Libraries. The State Library also maintained the South African Joint Catalogue of Monographs that recorded many of the acquisitions and holdings of the major libraries in the country in order to support interlibrary loan requests. The Joint Catalogue was terminated in 1976 and published on microfiche. From 1979 onwards it was decided to publish the bibliographic records of the Joint Catalogue on computer tape (Musiker, 1986, p. 152). Accordingly, the State Library had an important role to play in the development of LIBNET because several of the functions that had hitherto been the statutory responsibility of the State Library would be taken over by LIBNET and developed in electronic form.

After months of investigation and consultation, LIBNET was established as a section 21 (not-for-profit) utility company. The key enabler was a "pump-priming" grant from government and the 10-year subscription commitment made by the original members in the Memorandum of Agreement. There was some tentative enthusiasm about the direction in which library cooperation was going with the establishment of the fledgling company. Besides the State Library, the original members included universities, national and regional government departments, and municipalities that owned and ran the libraries intended to benefit from the collaborative venture. The subscribing libraries hoped that their expenditure on subscriptions and purchases would be offset by reduced numbers of acquisition and cataloguing staff, more efficient interlibrary loans transactions (with associated staff efficiencies) and more efficient information retrieval by consultant or reference staff. In addition it was hoped that the pressure on libraries to automate their management processes would be offset or delayed by participation in the LIBNET initiative. If nothing else, participation by members was a learning process that would facilitate subsequent decision making about library computerization - a way of putting their toes into the water without the pain of sudden and total immersion. And, of course, there were incentives to load their cataloguing data that would offset the cost of establishing their own computerized catalogues.

The original subscription commitment for 10 years made the member libraries shareholders in the company with the right to elect the Board of Directors at an Annual General Meeting of LIBNET. This was usually held, for convenience sake, at the annual conference of the South African Institute for Librarianship and Information Science. However, not all the directors were subject to election at the Annual General Meeting. Because of that library's important statutory responsibilities, the Director of the State Library was a permanent member of the Board of Directors. In addition, the interests of the government were represented on the Board of Directors by a person nominated by the Minister of National Education. The Managing Director of LIBNET was ex officio a member of the Board, while the members at the Annual General Meeting elected the rest of the directors. Largely they were drawn from the academic library sector, although an important component was the presence of senior businessmen who could bring their business and entrepreneurial acumen and expertise to bear on decisions before the Board.

SETTING THE STAGE

Internally, the staff of LIBNET consisted of two main groupings - those responsible for developing the technological base of LIBNET's operations and providing the networked services, and those responsible for marketing the products and services as well as growing the clientele and membership numbers. This latter activity had a very positive side effect in that it made the LIBNET staff very much part of the professional library community in South Africa, and in fact, helped to create a sense of unity and camaraderie among the members. This sense of participative ownership was essential to promote a constant flow of new cataloguing data of the highest possible quality being added to the database by all the subscribing libraries. It also provided LIBNET with the means to refine the services required by the members.

LIBNET's Technical Infrastructure

Initially LIBNET operated on the Washington Library Network software. Access protocols for LIBNET included an X.28 dial-up facility for IBM PCs; an X.25 packet switching as well as SNA and TCP/IP for dedicated data lines and point-to-point asynchronous communication with DEC VT-100 or compatible terminals. Any other data communications requirements were investigated to ensure as wide a range of access options for subscribers as possible (Laing, 1997, p. 54).

From the beginning the intention was to develop its own system using South African Machine Readable Cataloguing (SAMARC) records. The SAMARC format was based on the original MARC format developed by Henrietta Avram and her team in the Library of Congress in the 1960s and 1970s. It included some modifications made in the British UKMARC format as well as some idiosyncratic requirements to suit the multilingual South African situation. A great deal of time and effort went into developing the specifications and writing the software for LIBNET's new, home grown system until it was realized that it would not be as cost effective as originally intended. "Build or buy" decisions were very controversial at that stage, especially as the Open Systems Movement gained ground within the computer systems industry worldwide. Finally, in 1992, LIBNET rolled out their new system amidst some controversy. It was a turn-key system based on a library software package popular with university libraries in South Africa at the time. Running on a UNIX operating system, and therefore in line with current open-systems thinking, the system was accessible via X.28 dial-up facilities, via Telkom's dedicated data lines with X.25 packet switching, or with TCP/IP communications protocol on GOVNET, UNINET and other networks available in South Africa.

Databases available were originally based on the Washington Library Network database, supplemented by the Joint Catalogue of Monographs developed by the State Library from records sent to them by the major libraries in the country, particularly the main university, and public libraries and the legal deposit libraries. With the implementation of its new system in 1992, LIBNET made available to its members a new "bouquet" of databases. These included the South African Cooperative Library Database (SACD), the Index to South African Periodicals (ISAP), the Library of Congress Database (otherwise known as the National Union Catalog (NUC)), the British National Bibliography (BNB) and Whitakers Books In Print. The Union Catalogue of Theses and Dissertations developed by Potchefstroom University and the South African National Bibliography were also available on the LIBNET database.

Jan's Problem

Jan's problem was not trivial. Two months earlier he and his friend Sid had both been at a meeting of the Board of Directors of the national bibliographic service provider LIBNET. Jan represented the LIBNET Users Committee on the Board, while Sid had been elected by the members at an AGM and had served since then for a series of three-year terms. They had served together on the Board for several years and flew to Pretoria for Board meetings every two or three months. They were tall men, same age, same size, and archetypical representatives of the Boer and Brit elements of South African society. Yet the hostilities of the South African War were entirely absent in their dealings with one another. They were both university librarians of old and established research libraries. The good professional relationship they enjoyed started when Sid had been invited to serve as a professional advisor on the selection committee that recommended Jan's appointment. Since then they had consulted one another on matters of common concern, and served on professional committees and task forces. The trust and mutual confidence in each other's perspective and professional ability led to constructive decision making in various cooperative initiatives. They presumed that it was that trust and confidence that persuaded the LIBNET Board to task them to find a solution to the data-ownership and tariff problem.

The fact that LIBNET had been established as a cooperative venture with government seed-money meant that the customers were also the information providers. Instead of providing all the funding, the government wanted to play an enabling role such that LIBNET would in due course become self-sustaining as a non-profit organization. As the database administrator, LIBNET sold its networking and database services to its members, using the information they had provided as the database content. To ensure high standards of data entry, LIBNET ran nationwide training programs and established quality control mechanisms to monitor input. It was in the interests of all members to ensure accurate data capture, and so incentives needed to be built into the tariff structure to reward those members that participated in the process.

The calculation on which the annual tariffs were determined had been a matter of concern to the LIBNET Board for several years. The larger libraries that were founding members of LIBNET paid an annual subscription and a usage charge based on EEs (Enquiry Equivalents) used. The EE was based on the number of searches conducted on the database. Associate members, who were usually the smaller libraries and other bodies, did not pay an annual subscription, but paid a monthly terminal connection fee and a tariff per EE used which was almost twice the EE charge of the larger subscribing library members.

However, these tariff arrangements did not take account of intellectual property rights and data ownership. A great deal of original intellectual work went into the process of data capture of bibliographic records. The library catalogue of any large research library represents a major investment for the institution concerned. It is the intellectual property of the institution and as such could be sold or negotiated in the same way that other intellectual property could be negotiated. Many academic libraries continued to spend additional funds on catalogue conversion projects in order to capture their cataloguing data retrospectively. This expenditure enabled them more quickly to establish their own machine-readable catalogue for the needs of their domestic library systems. To upload that data to a national bibliographic service utility such as LIBNET did not draw them any royalty payments. They got no benefit from the initial expense of data capture other than greater bibliographic control of their own domestic collection. However, the enriched online catalogue was an important marketing consideration that could be used by LIBNET to attract new members. Like many other members, Jan and Sid considered that their extra expenditure gave them a greater stake in LIBNET, and they felt that their extra contribution to LIBNET's development and welfare was not being recognized or appreciated. And, of course, the higher percentage of their libraries' bibliographic records that were on the database, the more likelihood that other libraries would want to borrow books from them on interlibrary loan.

Meanwhile, almost as an encouragement for this viewpoint, the State Library continued to develop and market its Joint Catalogue of Monographs and South African National Bibliography. Was there not a way in which other libraries, in tough budgetary times, might not recoup some of their expenditure in similar ways? LIBNET paid royalties to those information providers like the British Library for the British National Bibliography, the Library of Congress for its National Union Catalog and the Washington Library Network for its database. If LIBNET was deriving a benefit from the contribution of libraries such as those directed by Jan and Sid, surely there could be some reconsideration of the tariff determination by LIBNET?

The two-hour flight back to Cape Town after that Board meeting in Pretoria had done little to ease the minds of Jan and Sid. Who were the information providers? Who owned the database? Who was paying for what services and should their institutions not be getting some form of royalty or compensation for the added contribution they were making? In addition, how could a tariff policy be set that allowed libraries to reduce budgetary uncertainty ahead of time when the tariff policy was based on an annual subscription as well as connect-time pricing and/or per-record charges? How could all this be done without damaging LIBNET and its financial viability, or were there other strategic options available to them?

The Boeing 737 wove its way through tall towers of cumulus, like huge, airborne cities. Through the late afternoon sky, the sun's rays struck the white bulbous towers from the west, creating deep shadows and slowly redecorating the thick, puffy clouds in gold and pink as the land below melted into shadow. Not much chance of the data ownership and tariff problems melting in the same way. Although it was a privilege to be able to see the world from a perspective that few creatures in all of Earth's history had ever seen, one way or another, that privilege would have to be paid for.

CASE DESCRIPTION

Jan leaned back in his chair and looked across his desk and out the window. On the wall to his right hung a painting of a typical farming scene in red and brown and ochre - one of the university's art treasures with which he had been burdened as curator. Below it, but closer to him was his computer, its monitor and keyboard, and his telephone - his links to the outside world. Evidence, if it was needed, of the increasing reliance of libraries on the growth of information and communications technologies to streamline and enhance business services in all areas of endeavor.

It was now two months since he and Sid had flown home from Pretoria, and the problem that the LIBNET Board had referred to them had in no way been resolved in the intervening weeks. Within a few minutes, Sid would be arriving for a meeting to explore and, if possible, resolve the issues involved in tariff determination and data ownership. As usual for his meetings with Sid, Jan had scheduled a lunch break for about 12.45 p.m. in the university's staff dining room. The caterer had agreed to prepare freshly caught grilled yellowtail and roast seasonal vegetables as the main course with a light sorbet and fresh fruit compote to finish off. And two bottles of Pinotage were ready to provide some consolation for the mental effort they expected to expend. He was looking forward to the rest of the day, and hoped that the business end would be completed before lunch started.

"Good to see you, my friend!" smiled Jan, as he and Sid shook hands. After a brief word with Anne, Jan's personal assistant, the two men went into the committee room with every intention of being undisturbed until they had resolved the problem. To set the scene Jan reviewed the background that had given rise to the situation. For 10 years, academic library directors had been laboring hard to ensure the purchasing levels of materials for their libraries. A combination of publishing price rises that had impacted on university and other libraries throughout the world, and the falling value of the South African currency unit on international currency markets had increased their journals budget by a factor of three, while the book budget remained unchanged. The total acquisitions budget had almost doubled over a period of five years. Despite this, the actual buying power of the money was reduced by 20% in terms of the numbers of both book purchases and journals subscriptions. The academics were in an uproar and the university administrators were demanding closer cooperation on a regional basis between the two university libraries. "More bang for the buck" and "You must work smarter, not harder" were the clichés that rang around the meetings of the library committees of both institutions.

"I tell you, Sid, the combination of publishing price rises and the falling value of the South African Rand on international currency markets has increased our journals budget by a factor of three, while our book budget remains unchanged. And we have fought to maintain that situation!" Jan complained. "Clearly, closer cooperation in purchasing policies and more ready access to the holdings of each other's libraries would assist in easing the problem. But to do that we will need to ensure full bibliographic control of the book and journal holdings of both our libraries. That is not a trivial matter-and it will be expensive," observed Jan.

"Our options are to do it either through LIBNET, or through some form of cooperative regional bibliographic database as we have been discussing with our colleagues," suggested Sid. Arising from their earlier meetings over many years, both Sid and Jan were under pressure to promote regional cooperation - and that pressure came in the form of financial incentives from outside benefactors willing to help fund the emergence of a new social structure now that the years of apartheid and social isolation were ended.

"But LIBNET has made an important contribution over the eight years of its existence. We signed on for 10 years. We are committed to it for another two years at least. It makes sense to support and use it. But regional cooperation is also important. We can incorporate the benefits that flow from our LIBNET membership for regional advantage," suggested Jan.

"That's true. But I have to conserve resources and watch carefully the percentage of my library's budget that goes to LIBNET. The larger libraries that make up the foundation members of LIBNET pay not only our annual subscriptions, but also for the use we make of the system beyond the calculated maximum. If we cut back on use in order to save money, we're cutting back on the benefits to be gained from our subscription," reasoned Sid. "The tariff structure locks us in. Part of the problem is trying to budget ahead of time for our needs. I can't anticipate the EE usage, the connect time, or even the annual subscription sufficiently far in advance to reflect them accurately when the budget goes to the University Council."

"Yeah! But both your library and mine still have a lot of retrospective cataloguing to do before we reap the real benefits of LIBNET. In fact there are holdings gaps for libraries throughout the country. We have started a project to convert our card-based catalogues to machine-readable form starting with heavily used materials. What are you doing?" asked Jan.

"We've contracted with a commercial company operating out of Australia," said Sid. "They sub-contract to staff in the Philippines, and send copies of our catalogue cards for data capture. It's not entirely satisfactory because it involves a lot of checking for completeness, but I must say, mostly the quality of the data-capture is good."

He looked out of the window trying to imagine a team of Philippino data-capturers making sense of the catalogue cards they were working with. "Look, you can't expect them to use their initiative to fix obvious errors. That's not what they are paid for - and anyway they may not even understand what they are keying in. But it still reflects the initial investment in creative cataloguing made by the university over the years. It would be great if we could recoup that expenditure by selling off our records to some other library. You're not interested, are you? I'll give you a special price?" smiled Sid. "After all, there must be a high percentage of overlap between your holdings and ours."

"No way, my friend. We are doing our retrospective conversion in-house, simply to save money. Can you imagine what my bosses would say if I bought catalogue records from you?" He grinned back. The traditional rivalry extended to professional matters as well. For both, retrospective conversion projects were an important cost factor and not without their detractors among the academic Luddites.

"The urgent need is to establish a credible computer-readable catalogue for the needs of our domestic systems faster and cheaper than would otherwise be possible. That will give us a basis for any regional cooperation as well. With both our bibliographic databases loaded, we would have an immensely valuable regional resource," mused Sid. "But when we upload it all to LIBNET, what are we going to get for our troubles? More interlibrary loan requests and a whole lot of extra work! Why can't we get some additional form of recognition and compensation? After all, LIBNET is here to help us, but the spin-off of our membership means additional expense and work for us."

"How come? What are you trying to say?" asked Jan.

"Look. Although there are incentives built into the LIBNET fee structure, to upload all our new data to the national database still costs us more. Is that extra contribution being recognized or appreciated? If the State Library and Potchefstroom University can own their data, and even sell it to others, why can't we? After all, our additional data contributes to LIBNET's enriched online catalogue. That's partly what makes LIBNET attractive to new members. Other libraries join and then start using the records we provide to reduce their own cataloguing costs. Some benefit from the data we have uploaded. Others use the same data to save themselves the cost of buying books. They demand those books on interlibrary loan. It doesn't seem right that our extra expenditure on retrospective catalogue conversion places us in a position of being additionally exploited by increased numbers of interlibrary loan requests! It's nonsense! There should be some sort of royalty built into the LIBNET tariff structure to compensate us for our contribution - not just to LIBNET, but to the country as a whole."

"Ja! I see what you mean. Actually, this thing has been brewing a long time," replied Jan, getting into the thrust of Sid's argument. "Let's look at it from another perspective. The State Library is statutorily charged with responsibility for the development of the South African National Bibliography, and the Director is therefore ex-officio a member of the LIBNET Board. He considers the records contributed by the State Library rightly belonged to the State Library. That includes the South African National Bibliography and the Index to South African Periodicals. Although they are all available through LIBNET, they belong to the State Library. On the other hand, the Executive Director of LIBNET would naturally want to protect his interests and would take the view that each subscribing library has a responsibility to load its bibliographic data onto LIBNET in terms of their Memorandum of Agreement - and the national interest. But the directors of the major research libraries, who like ourselves are also members of the Board, will consider that they should be getting some return on their investment, some compensation for the initiative they had taken to ensure that the national online catalogue will be completed faster to everyone's benefit. What is in it for us and them?"

"That's it. OK. Let's look at the major issues." Sid pulled out a document with his scribbled notes. That morning he had jotted several points down before driving over to Jan's library. These were the principles that he thought should drive any decisions about equity in this situation. "Let's take them one at a time as defendable issues or issues that may be of political or strategic importance to individual members of the Board." He read them out.

1. Each library owns the records that it has generated through its own creative efforts.

2. Each library also owns the records it has generated through paying for the data conversion process.

3. The State Library owns all records that it has contributed to the LIBNET database, even though many of those records were contributed by participating libraries sending in copies of their catalogue cards, or by legal deposit libraries contributing their acquisitions lists to the State Library.

4. Similarly, the Library of Congress owns the National Union Catalog that is accessible through LIBNET, and the British Library owns the British National Bibliography, also accessible through LIBNET.

5. LIBNET owns all databases that it has developed from the contributions made to it by subscribing libraries, or for which it has paid in agreement with the owners of other bibliographies.

6. Individual libraries have the right to decide whether or not to upload bibliographic data to LIBNET. Once uploaded, the records belong to LIBNET in terms of the subscription agreement, but they also belong to the originating library and may not be sold by LIBNET without permission or recompense.

7. Having paid for their subscriptions and the downloading of their own bibliographic records from LIBNET, individual libraries are entitled to establish their own domestic bibliographic database, but may not sell records downloaded from LIBNET.

8. Any library is free to sell, or otherwise make available, its own bibliographic records to any other individual or library, as it sees fit.

"Hey. That's good!" complimented Jan. "Let's go through each one and see if we can pick holes in them!"

From this set of basic principles, Sid and Jan debated their implications.

"What if the larger libraries withhold the uploading to LIBNET of their retrospective conversion records and recover their costs by selling them to other libraries? OK. In a way this would be going into competition with LIBNET and would be in breach of the original agreement we signed when we joined LIBNET."

"But by meeting that obligation, we are creating a stick for our own backs," grumbled Sid. "Increased interlibrary loans are a significant counter-incentive increasing staff pressure in a sensitive area. Not only must I deal with pressure on my materials budget, must keep my staffing budget under control. The budget cuts affect both materials as well as staffing budgets."

"So what about a regional initiative?" asked Jan. "There is the financial incentive that flows from the possibility of overseas funding by benefactors. That could make a big difference to our situation. It will make good political sense too. We will be seen to be driving academic regional cooperation where many other initiatives have failed. Also, a smaller cooperative network would be easier to handle, would give more direct administrative control and would build on what we have already done through our earlier discussions and through LIBNET." He looked questioningly at Sid.

"Well, if LIBNET is unable to come up with some new and revised tariff structure that recognizes the contribution we are making, it could make sense for us to slowly withdraw our dependence on LIBNET and build a closer dependence on a regional cooperative structure. After all, we only have a year or so to go before our legal obligations to LIBNET end. As far as I am concerned, the financial constraints being placed on us by our respective administrations are such that all our options need to be considered. I am under a lot of pressure to reduce staff, improve services, increase book stock and take a lead in collaboration and regional rationalization." Sid looked pensive. It sounded like treason. After all the years of working on the promotion of LIBNET and of national and regional library cooperation, to suddenly turn to a narrow and self-serving strategic direction went against the grain. But he had to consider all the options that were open.

Jan looked at his watch. "Hey! It's lunchtime," he announced with a smile. "I have something good for you!" he said, thinking of the grilled yellowtail and the pinotage.

They gathered up their papers and with a sense of relief found their way out of the library and across the square to the university's staff dining room. Based on the discussion over lunch, Jan undertook to prepare a series of proposals for the next meeting of the LIBNET Board. He asked Sid to write up a memorandum on the basis of the day's discussions and forward it to him as soon as possible. He would then consult with his deputies before submitting his final proposals to the LIBNET Board.

The range and implications of their morning discussions ensured an ongoing debate over lunch and dominated their thoughts for the rest of that afternoon. On his way home, and while the issues were still fresh in his mind, Sid dictated a memorandum for typing the next day, so that it could be sent to Jan as a file attachment with the least possible delay. Both Jan and Sid felt they had had a very productive meeting - yet one that could have enormous repercussions for both the future of LIBNET, and also for academic library cooperation. It would probably have some important implications for the principles on which database development is funded and the way that the contribution of members is rewarded.

CURRENT CHALLENGES & PROBLEMS FACING THE ORGANIZATION

The question of database ownership and the provision of incentives and rewards to the information providers were reflective of the changing needs of LIBNET members. Originally, they had required a networked union catalogue of the holdings of the nation's major research libraries. The cost of such a facility was beyond the budget of any one of the libraries, so they were happy to participate in and contribute to the development of this national utility.

After 10 years, however, three things had happened to change the perspective of the members:

1. LIBNET had successfully established the basis of that national catalogue. It had a modern networked system, a staff that nurtured high standards of contribution to the database, and simultaneously promoted the company's services nationwide.

2. The technology had changed, making online, real-time network access to a regional library system both affordable and desirable.

3. The political and economic climate of the country had changed. South Africa was no longer under siege. The academic boycotts, political and economic sanctions, and civil unrest that spread to the campuses of the major LIBNET members were over. Nelson Mandela was out of gaol. The first democratic elections had been held, and around the world, aid agencies and benefactors were keen to contribute to and participate in the remarkable emergence of what Archbishop Desmond Tutu had referred to as "the Rainbow Nation." What better contribution could be made than to democratize the nation's information resources by networking the major libraries on a regional basis so that their collections were accessible to all the citizens, whether or not they were students or staff?

With this option before them, it was understandable that Jan and Sid and their colleagues on the LIBNET Board of Directors started giving attention to who owned the LIBNET database. Their cash-strapped universities saw many benefits flowing from the injection of funds by overseas benefactors. Not only were there savings to be made from cooperative library acquisitions policies and cataloguing activities, but a unified circulation system and a reduction in duplicate journal subscriptions would be facilitated by a regional cooperative system. LIBNET was therefore under pressure to deliver at the same time as its initial "pump-priming" government funding, and the 10-year membership commitments of its founder institutions were coming to an end.

The resolution of the tariff and incentives structure became the catalyst that led on to the restructuring of the entire LIBNET business. On January 1, 1997, LIBNET sold its operations to a private company to enable it to expand into the commercial online market. Today, the new privatized LIBNET thrives as the most successful online information network in Africa. But it is very different in structure from its original conception - largely as a result of the factors driving the decisions outlined above.

The main reasons for "privatizing" LIBNET operations in the mid-'90s were:

* to bring in strategic partners through a shareholding structure,

* to create a vehicle for generating development capital, and

* to attract and keep the right type of staff members.

These intentions are now reflected in the current shareholding structure. The perspective has become one of an equal partnership between clients and staff. So the new LIBNET is evolving into a situation where staff and client shareholder groups will both have a 50% shareholding. The co-ownership concept, together with a creative shareincentive scheme, is making a huge contribution to its success. The business orientation of staff has increased beyond belief. Clients are benefiting through the ongoing improvement of products and services, while costs are controlled in the same process, because it is in the interest of the staff to run a profitable and competitive shop. Although there had been discussions at times with potential strategic partners to buy a stake in the company, that idea was abandoned several years ago without selling off any shares to outside investors. The traditional character of the company was therefore maintained without diluting the value of the shares.

The big challenge in doing business in the new South Africa is the Black Economic Empowerment and Affirmative Action law. The general line of thinking is that all businesses should have a 25% black ownership by 2010. Government itself is more concerned about real empowerment, such as people development, skills transfer, enterprise development, corporate social upliftment, and so forth. The record shows that there are, unfortunately, a small number of black businessmen in the country who are pushing the shareholding idea without contributing anything to the growth of the economy. As a result, LIBNET is still not listed on the Johannesburg Stock Exchange (JSE) and has no immediate plans to do so. The corporate scandals of the last couple of years have made the JSE less attractive (from a cost viewpoint) to apply for a listing. LIBNET doesn't need capital at present and shareholders are not prepared to sell their shares, so a listing does not make any sense. Accordingly, the new LIBNET intends to grow its black shareholding through the current structures of staff and client shareholders. Initially, shares were sold to staff at R0,20 per share at the time of privatization. Those shares were subdivided in the ratio of 10:1 five years later. The latest official valuation of the shares is about R0,50 to R0,60 per share. That is equal to 5 to 6 Rand per share before the subdivision.

Functionally, LIBNET has developed into a company with a primary focus on the maintenance and development of its traditional services (cataloguing support, interlending and reference services). These are still growing slowly, but the real performers are the newer products, such as electronic journals and the legal products (government and provincial gazettes, parliamentary monitoring and statutes). This has helped to spread the risks far better than before. Structurally, LIBNET has divided into two separate business units (Academic/Library, Corporate) to reflect the separate focuses, and these are functioning well with totally different marketing and support approaches. The core strengths remain the same - excellent relationship with clients backed by high-quality client support, and an excellent team of people doing the job.

The challenges facing the new LIBNET reflect the current economic development climate in contemporary South Africa. Apart from Black Economic Empowerment and Affirmative Action employment laws, these include doing international business with an unstable local currency, growing the markets and competing with larger international competitors.

References

REFERENCES

Ahmad, S. & Schroeder, R.G. (2001). The impact of electronic data interchange on delivery performance. Production and Operations Management, 10(1), 16-30.

Angeles, R. & Nath, R. (2001). Partner congruence in electronic data interchange (EDI)enabled relationships. Journal of Business Logistics, 22(2), 109-127.

Bensaou, M. & Venkatraman, N. (1996). Interorganizational relationships and information technology: A conceptual synthesis and a research framework. European Journal of Information Systems, 5(2), 84-91.

Braunstein, Y. (1981). Information as a commodity. In R.M. Mason & J. E. Crebs, Jr. (Eds.), Information Services: Economics, Management and Technology (pp. 9-22). Boulder, CO: Westview.

Chwelos, P., Benbasat, I. & Dexter, A. S. (2001). Research report: Empirical test of an EDI adoption model. Information Systems Research, 12(3), 304-321.

Communications Industry Report. (2000) 14th ed. New York: Veronis, Suhler and Associates (as cited by Jain & Kennan, op. cit. p 1123).

Crook, C. W. & Kumar, R. L. (1998). Electronic data interchange: A multi-industry investigation using grounded theory. Information Management, 34, 75-89.

Ebbinghouse, C. (2004). If at first you don't succeed, Stop!: Proposed legislation to set up new intellectual property rights in facts themselves. Searcher, 12(1), 8-17.

Fountain, J. E. (2001). Building the Virtual State: Information Technology and Institutional Change. Washington, DC: Brookings Institute Press.

German, G. E. & Cullen, R. (2000). Models and opportunities for library cooperation in the Asian region. Library management, 21(1), 373-384.

Hayes, R. M. (2003). Cooperative game theoretical models for decision-making in contexts of library cooperation. Library trends, 51(3), 441-461.

Holmes, D. (2001). eGov: e-Business strategies for government. London: Nicholas Brierley.

Hooper, A. S. C. (1989). Formal cooperative agreements among libraries: Towards a South African model. South African Journal for Librarianship and Information Science, 57(2), 125-129.

Hooper, A. S. C. (1990). Overlapping journal subscriptions as a factor in university library co-operation. South African Journal for Librarianship and Information Science, 55(1), 25-32.

Iacovou, C. L., Benbasat, I. & Dexter, A. S. (1995). Electronic data interchange and small organizations: Adoption and impact of technology. MIS Quarterly, 19(2), 465-485.

Jain, S. & Kannan, RK. (2002). Pricing of information products on online servers: Issues, models and analysis. Management Science, 48(9), 1123-1142.

Johnston, R. B. & Gregor, S. (2000). A theory of industry-level activity for understanding the adoption of interorganizational systems. European Journal of Information Systems, 9, 24-251.

Kemp, G. (1996). Networking in South Africa. Bulletin of the American Society for Information Science, 22(6), 26-27.

Kopp, J. J. (1998). Library consortia and information technology: The past, the present, the promise. Information Technology and Libraries, 17(1), 7-12.

Laing, R. (1997). LIBNET (A Financial Mail Special Report). Financial Mail, 144(4), 53-64.

Maingot, M. & Quon, T. (2001). A survey of electronic data interchange (EDI) in the top public companies in Canada. INFOR, 39(3), 317-332.

Martey, A. K. (2002). Management issues in library networking: focus on a pilot library networking project in Ghana. Library Management, 23 (4/5), 239-251.

Morrell, M. & Ezingard, J. N. (2001). Revisiting adoption factors of inter-organizational information systems in SMEs. Logistics Information Management, 75(1/2), 4657.

Musiker, R. (1986). Companion to South African Libraries. Johannesburg: Ad Donker.

Patrick, R. J. (1972). Guidelines for Library Cooperation: Development of Academic Library Consortia. Santa Monica, CA: System Development Corporation.

Potter, W. G. (1997). Recent trends in state wide academic library consortia. Library Trends, 45, 417-418 (as cited by Kopp, 1998, op. cit.).

Premkumar, G. & Ramamurthy, K. (1995). The role of interorganizational and organizational factors on the decision mode for adoption of interorganizational systems. Decision Sciences, 26(3), 303-336.

Rayport, J. E. & Jaworski, BJ. (2002). Introduction to E-Commerce. New York: McGraw-Hill.

Siau, K. (2003). Interorganizational systems and competitive advantages: Lessons from history. The Journal of Computer Information Systems, 44(1), 33-39.

Spence, A. M. (1974). An economist's view of information. Annual Review of Information Science and Technology. American Society for Information Science.

West, L.A. (2000). Private markets for public goods: Pricing strategies of online database vendors. Journal of Management Information Systems, 17(1), 59-85.

AuthorAffiliation

A.S.C. Hooper, Victoria University of Wellington, New Zealand

AuthorAffiliation

After many years as an academic library director, A.S.C. (Tony) Hooper now teaches Information Systems Management at the Victoria University of Wellington, where he is program director for the Master's of Information Management degree.

View Image -   APPENDICES
View Image -   APPENDICES
View Image -   APPENDICES
View Image -   APPENDICES

Subject: Case studies; Electronic commerce; Intellectual property; Property rights; Alliances; Libraries; Data base management

Classification: 9110: Company specific; 5250: Telecommunications systems & Internet communications

Publication title: Journal of Cases on Information Technology

Volume: 7

Issue: 3

Pages: 77-97

Number of pages: 21

Publication year: 2005

Publication date: Jul-Sep 2005

Year: 2005

Publisher: IGI Global

Place of publication: Hershey

Country of publication: United States

Publication subject: Business And Economics--Computer Applications

ISSN: 15487717

Source type: Reports

Language of publication: English

Document type: Business Case

Document feature: references

ProQuest document ID: 198658100

Document URL: http://search.proquest.com/docview/198658100?accountid=38610

Copyright: Copyright Idea Group Inc. Jul-Sep 2005

Last updated: 2011-07-21

Database: ABI/INFORM Complete

Document 46 of 100

ERP Implementation for Production Planning at EA Cakes Ltd.

Author: Portougal, Victor

ProQuest document link

Abstract:

This case details the implementation of the Systems Applications & Products (SAP) Production Planning module at EA Cakes Ltd. The market forced the company to change its sales and production strategy from make-to-order to make-to-stock. The decision to change the strategy involved not only the company's decision to invest much more money in accumulation and keeping stocks of finished goods, it required a complete redesign of its production planning system, which was an integral part of an ERP system that used SAP software. A team of IT specialists and production planning personnel was formed for designing computer support for the new production planning system business processes. There was no consensus in the design group. IT specialists were sure that existing SAP software could provide adequate computer support. The production planning staff had doubts that SAP modules are relevant to their business processes. To resolve the problem, the management invited a consulting company. The consultants suggested quickly designing a rough prototype system. Apart from giving adequate computer support to the new production planning system, the SAP implementation had to solve several implementation problems identified by consultants.

Full text:

Headnote

EXECUTIVE SUMMARY

This case details the implementation of the Systems Applications & Products (SAP) Production Planning module at EA Cakes Ltd. The market forced the company to change its sales and production strategy from "make-to-order" to "make-to-stock." The decision to change the strategy involved not only the company's decision to invest much more money in accumulation and keeping stocks of finished goods, it required a complete redesign of its production planning system, which was an integral part of an ERP system that used SAP software. A team of IT specialists and production planning personnel was formed for designing computer support for the new production planning system business processes. There was no consensus in the design group. IT specialists were sure that existing SAP software could provide adequate computer support. The production planning staff had doubts that SAP modules are relevant to their business processes. They argued that poor fit between the business processes implicit in the software and the business processes of EA Cakes will result in failure. To resolve the problem, the management invited a consulting company. The consultants suggested quickly designing a rough prototype system. Analyzing this system would help the working group to reach a consensus. Apart from giving adequate computer support to the new production planning system, the SAP implementation had to solve several implementation problems identified by consultants. The question is: can a standard software system like SAP give adequate computer support to an individually designed business management system?

Keywords: enterprise modeling; enterprise resource planning; material flow management; production planning IS

ORGANIZATIONAL BACKGROUND

EA Cakes Ltd., New Zealand, is a successful food manufacturing company with a major share of the market in New Zealand and the Asia-Pacific region. It produces more than 400 different kinds of fresh and frozen food products.

From a shelf-life point of view, the company manufactures three types of products:

1. Shelf-stable and frozen food with practically infinite shelf life (up to one year)

2. Chilled products with a medium shelf life (from three to six months)

3. Short shelf life products (from one week to six weeks)

The demand for many products is uneven. Christmas cakes and puddings, for example, are mainly sold during November and December. Generally, the demand for cakes is lower during summer than during winter. Sales are also volatile because they are conducted through numerous channels, including major supermarket chains, route outlets (such as groceries stores), and food service for hospitals, hotels, and restaurants. Sales to Australia, the major export market, add uncertainty to demand.

For years EA Cakes Ltd. built a reputable brand name and had enjoyed a stable market. As a result, the dominant production strategy of the company was make-to-order, MTO (see for example, Vollmann, Berry, and Whybark, 1997). Permanent customers, such as supermarkets, shops, and restaurants, placed orders either for the next week, or for longer intervals with a regular delivery, and the company provided good customer service both in terms of quality and of on-time delivery.

In the late 1990s EA Cakes Ltd. began to observe a decline of its market share in many of the traditional markets. Marketing analysis showed that the main reason for the drop in sales was price increase due to the company's high production costs, and as a result competitors offered lower prices on similar products. The famous brand name did not attract customers enough to support the higher prices. An attempt was made to compete on low retail prices, with the results of slightly increased sales volumes, but significantly decreased profit.

Soon the company was forced to reconsider its sales and production strategy. Two major faults were identified:

1. To support its MTO strategy, the company was forced to have a significant capacity cushion both in labor and equipment. It was necessary for providing stable customer service while the demand was uneven, sometimes with huge lumps. During Christmas, for example, the company usually tripled their average sales volumes. EA Cakes Ltd. was accustomed to seasonal variations and Christmas sales lumps, and coped with them by accumulating stock. Daily and weekly variations, however, led to losses in production time in low periods and to excessive use of overtime during peak periods. High labor cost variances (as compared to the standards) and low machine capacity utilization were prevalent.

2. The MTO strategy implied that the company always quoted lead times to customers; for example, an order placed this week would be promised to deliver next week, or the week after, if there were too many orders. Old traditional customers agreed with this system, and the company was mostly successful in keeping its promises. The market, however, had become much more dynamic. Increased competition from NZ and overseas and a heavy promotional activity required improved "speed to market." Many customers wanted the product on demand, not next week. The company was unable to exploit such opportunities and lost this significant part of the market.

As a result EA Cakes Ltd. had decided to change its production and sales strategy (as recommended by operations management literature; see for example, Vollmann, Berry, and Whybark, 1997) for long and medium shelf-life products from "make-to-order" (MTO) to "make-to-stock" (MTS). The MTS strategy costs more in inventory than MTO, but it has two benefits:

1. Increased "speed to market" allows expanding the market share by attracting new customers and by catching unexpected opportunities.

2. Capacity may be utilized more efficiently using the inventory "cushions" instead of capacity cushions (see McNair and Vangermeersch, 1998).

MTS companies hold stocks of all advertised products. The stocks usually are managed by a "min-max" rule: stocks below or close to minimum trigger production until they reach or approach the maximum level. The difference between minimum and maximum is defined by the demand forecast during a planning period. The production process is driven by the current levels of stocks rather than by customers' orders.

The decision to change the strategy from MTO to MTS involves not only the company's decision to invest much more money in accumulation and keeping stocks of finished goods, it requires a complete redesign of its production planning system. There are several major reasons for making significant changes in production planning:

* MTO is driven by customers' orders, MTS is triggered by forecasts; a forecasting system had to be designed and implemented.

* There are no significant stocks of finished goods under MTO, so there is no need for stock management; for MTS, an inventory management system for finished goods had to be developed.

* Under MTO there are no significant information links between the company planning and shop floor production planning; under MTS it is vital that the planning system preserves continuity. It has to be continuity in planning. That means the plans produced by each level are detailed plans of the top level. Also there must be feedback continuity: feedback of the top levels is an aggregation of bottom level feedback - for more detail see McNair and Vangermeersch (1998).

The production planning system was an integral part of an ERP system that used SAP software. Its redesign was a part of a major project of the ERP system development, carried out by Ernest Edams Ltd. for two years.

SETTING THE STAGE

The new production planning system consists of three levels (Figure 1).

Aggregate Capacity Planning (ACP)

The first (top-level) procedure is part of the general budgeting procedure, which starts from sales budget development. Sales budget is not a simple forecast of the amount of products that could be sold in the future. The budget not only predicts, but also directs the sales and marketing efforts of the company. Thus it is more a sales plan than a forecast. This defines the dual nature of the budget: on the one hand it should be realistic and should define what could be sold; on the other hand it should meet the business and financial goals of the company.

View Image -   Figure 1: Three-Level Production Planning System Supporting MTS Strategy

The sales budget is a management tool for control of company performance by the Board of Directors. The Board provides the inputs to this budget in the form of key performance indicators. The marketing department provides other inputs (launch of new products and other marketing initiatives). The sales budget is developed for the fiscal year, and it is redeveloped every quarter with a one-year time horizon (a rollover procedure). All the budgets and rollovers are stored in the information system for reference and subsequent statistical processing. At any time two versions are available for analysis and use in the sales and production planning: a full budget for the current fiscal year, approved by the Board of Directors, and a current rollover budget.

ACP has all the features of a capacity planning procedure. Starting from the sales budget, it produces an aggregate production plan for the following planning periods up to the planning horizon. The plan is balanced against the agreed target capacity, and at the same time meets the production and sales goals of the company. The demand forecast, the financial goals of the company, the target stock levels and actual stock levels are kept in the budget database.

The planning starts from defining an optimum production strategy. The production strategy that follows the demand pattern month by month ("chase" strategy) is not sustainable here because of high seasonality of some products. Figure 2 shows that the "level" strategy with even production levels is not sustainable as well, because there is not enough time for stock accumulation from the beginning of the year until the start of the peak season. If production starts earlier, then the level of stocks becomes excessive.

View Image -   Figure 2: The "Level" Strategy is Not Sustainable - Negative Stocks Show This

The optimum "mixed" strategy that combines stock accumulation with overtime use is shown in Figure 3. It plans some overtime at the peak season, and decreased resources utilization at the beginning of the year to compensate for the effect of increased production.

The optimum mixed strategy, expressed in sales dollars, then is converted to an aggregate production plan. The planner uses:

* conversion tables, containing unit prices;

* capacity tables, which show the lines' capacity (units/hours); and

* labor content tables (labor hours/machine hours) - these are necessary because different lines have crews of different sizes.

Here the planner shifts shelf-stable seasonal products to an earlier month, targeting the optimum stock levels and loading the lines up to their capacity. The development of an aggregate plan based on the optimum strategy is necessary because:

* The strategy gives total sales dollars and cannot be used for production planning while the plan is expressed in units of each products.

View Image -   Figure 3: Optimum "Mixed" Strategy

* There is no direct relationship between the selling price and production hours, therefore the strategy is not balanced against capacity.

Thus, the strategy serves as a goal for ACP. The aggregate capacity plan is developed initially for the fiscal year, and it is redeveloped every quarter with a one-year time horizon (a rollover procedure).

Master Production Scheduling

The master production scheduling system is the most important managerial tool for the operations manager of an MTS company. Master Production Schedule (MPS) gives the ability to ensure that available capacity is allocated with a customer service focus. The main MPS inputs are:

* aggregate capacity plan for the following two months,

* actual stock levels, and

* short-term demand forecast.

The sales team prepares a short-term demand forecast by-product for the next five weeks, each week (a rollover forecast). The sales managers of particular products modify the monthly sales forecasts from the current budget, taking into account changes in demand, planned promotions, and so on.

View Image -   Figure 4: Make-to-Stock Production

Starting from the demand forecast for the following planning period, the Master Scheduler produces a weekly production plan for the next five weeks, which is balanced against capacity, and at the same time meets production and sales goals of the company.

View Image -

The MPS is calculated using several planning runs and is being balanced with the capacity. This can highlight where the capacity is insufficient for meeting the schedule or where the capacity utilization is insufficient within the schedule.

The procedure is performed initially at the beginning of the planned month (the main run) in order to work out the MPS for the month. Only the first week of the plan is valid (and frozen). The rest of the plan is necessary for keeping the continuity of planning during the month. At the end of each week, when feedback on actual production and updated demand forecast become available, the procedure is run for the rest of the planning period (a control run). During this run the updated MPS for the following weeks will be produced. Also, instant changes in demand can initiate a control run in order to react quickly to the market demand.

The primary function of the MPS is to produce feasible assignments for all product lines, which ensure their performance according to ACP with minimum cost.

The other functions of this level are:

1. To keep desirable stock levels.

2. To implement a "speed-to-market" principle: react quickly to significant changes in market demand.

Shop Floor Scheduling

This level performs actual scheduling for the next week (with a daily subdivision), specified by production lines and products.

The scheduling constraints (for both men and machines scheduling) have been worked out as fixed recommended schedules for different proportions of the output. Set-up times, planned downtime and average capacity losses due to unplanned downtime are known and used for realistic scheduling. This required a downtime reporting procedure and a schedule for major planned maintenance. The scheduling is performed initially at the beginning of the planned week (the main run) in order to work out an optimal weekly schedule. At the end of each day, when feedback on actual production becomes available, the procedure is run for the rest of the planning period (a control run). During this run the updated plan for the following days, subject to the same planning constraints, is produced.

It was assumed that this level would be supported by a whole set of shop floor control procedures recognized in literature (Sherer, 1998).

Similar to most organizations, EA Cakes Ltd. operates on a hierarchical basis.

All activities and documents are organized through the Production Planning hierarchy. The hierarchy is organized so that the aggregate capacity planning (ACP) process is at the highest level of aggregation, while the shop floor scheduling process is at the lowest level. These levels can be presented using different parameters. Thus it includes a product hierarchy, time hierarchy, and organizational hierarchy. Each level varies in purpose, time span, and amount of detail (Figure 5).

CASE DESCRIPTION

The implementation of the Systems Applications & Products (SAP) Production Planning module at EA Cakes Ltd. in order to provide computer support to the MTS production planning system started from the detailed analysis of the problems.

The production planning system described above carries specific features of production planning of EA Cakes. Standard software (and SAP by definition is standard software), on the other hand, comprises programs developed for an anonymous market. The question is: can a standard software system like SAP give adequate computer support to an individually designed business management system?

This class of problems is widely discussed in literature (e.g., Robey, Ross, and Boudreau, 2002; Jacobs and Bendoly, 2003), with rather uncertain results, always pointing at the specific features of the enterprise. Because of this, a team from IT specialists and production planning personnel was formed for designing computer support for the new production planning system business processes.

The concept of a business process is central to many areas of business systems design, specifically to business systems based on modern information technology (see Scholz-Reiter and Stickel, 1996). In the new era of computer-based business management, the design of business process has substituted the previous functional design. There are many definitions of a business process (see Davenport, 1993; Sharp and McDermott, 2001; Rosemann, 2001). According to Sharp and McDermott (2001), a business process is a collection of interrelated tasks initiated in response to an event that achieves a specific result for the customer of the process. Thinking in terms of business processes helps managers to look at their organization from the customer's perspective. Usually a business process involves several functional areas and functions within those areas. Thus, a business process is cross-functional.

View Image -   Figure 5: Breakdown of Product, Time, & Production Planning System Hierarchies at EA Cakes Ltd.

Definitely, this is the case of the production planning at EA Cakes.

The aggregate capacity planning uses sales budget, stock feedback, and available capacity (manpower and machinery). The master scheduling involves forecasting, feedback on stocks. The shop-floor scheduling and control absorbs a huge variety of activities from other functional areas such as material control, human resource management, inventory management, and so on.

Quite to the contrary, standard software was initially developed only for certain functions that could easily be standardized. Modern standard software such as SAP is said to be object oriented or process oriented (see Kirchmer, 2002). However, it is still mostly functional, and the necessary orientation can only be achieved by adjusting the appropriate parameters. Even after the adjustments, the functionality of SAP may not be completely relevant to the business processes of a particular company. Then the implementation team will have only two options (Sawy, 2001 ):

1. To substitute the business processes of the company for the business processes implemented in SAP.

2. To create additional special software for providing computer support to production planning.

There was no consensus in the design group.

When the production planning staff got acquainted with the business processes suggested for production planning by SAP, they had doubts that these modules are relevant to their business processes. They argued that SAP, like most ERP systems, still focuses on the function such as inventory, production, accounting, finance, and so forth. The functional view poorly represents the interaction with other functional views. Many companies have to modify their current business activity in order to use the ERP system. The members of production planning staff were the authors of the new production planning system, and they had a rather firm position that their planning processes were the most efficient for EA Cakes. No changes would be accepted.

On the other hand, IT specialists were sure that existing SAP software could provide adequate computer support. They argued that SAP software mostly represents the "best-of-breed" solutions, thus producing a system that better fits each process in the company. While the best-of-breed solution would not fit precisely, it may be an investment that provides greater long-term flexibility and better solutions to the company's problems.

So, the management of EA Cakes was presented with the following dilemma:

1. Believing the IT specialists and continuing to implement the existing SAP modules on comparatively low cost, but facing all the risks of losses due to planning inefficiency.

2. Believing the planning staff and ordering high cost computer support in addition to existing SAP system.

The management invited a consulting company. The consultants suggested quickly designing a rough prototype system (Hoffer, George, and Valasich, 1998), using ARIS (Sheer, 1999). Analysing this system would help the working group to reach a consensus.

Apart from giving adequate computer support to the new production planning system, the SAP implementation was intended to solve several implementation problems (Hong and Kim, 2002) identified by consultants.

Problem 1

The manufacturing process requires an updated short-term forecast each week. Sales managers must produce the forecast, and then it is automatically processed within the Master Production Scheduling. Sales figures for individual products have to be provided on a weekly basis for the current month and the next month. Actual sales made each week are captured and available for reporting on the following morning (after actual sales completion). Sales staff compare actual sales with long-term forecasts and using judgement make necessary adjustments. Currently, forecasts are prepared manually and then put into the database. It needs computer support to relieve sales personnel and to eliminate data entry.

Problem 2

The Master Scheduler has to check the capacity requirements and to change the production volumes according to available capacity. Then he must present the changes to the Sales Department and the Production Department for acceptance.

Problem 3

Presently at EA Cakes Ltd., scheduling is only done on finished items. It is desirable to schedule some components production as well.

Problem 4

It is necessary to provide a reliable method for checking inventory availability.

The question is: Can the SAP implementation solve all these problems?

CURRENT CHALLENGES

One of the biggest problems for EA Cakes Ltd. is low capacity utilization. The company has sufficient regular work force. Nevertheless, the Master Scheduler sometimes has to schedule overtime production, paying for overtime labor, which results in higher production costs for products. This can also cause shortages or stock-out of some materials for production, further increasing the cost of production. Managers are especially frustrated when an instant need for overtime follows a period of low demand, when inventory could have been built up; for example, in anticipation of an increase in sales following production promotions by marketing.

Another problem was identified in inventory management. Stock control of raw material and finished items needs double-checking. Initially, the line manager records the data about actual production and actual use of raw materials. However, due to possible conflict of interests, this data is not absolutely reliable. The actual amounts of goods produced should be verified regularly. Any variances must be investigated; hence the necessary data must be kept for a longer time. More thought is required on the handling of rejects/seconds, as some are almost planned by-products. This will also have ramifications with stock control and sales analysis.

There are hopes that these problems could be fixed after the ERP implementation by existing SAP tools. Of course, the company must modify its current business activity in order to fully use the functionality of SAP. If the planning staff will accept modest trade-offs, then the IT specialists are still sure that existing SAP software could provide adequate computer support.

References

REFERENCES

Davenport, T.H. (1993). Process Innovation. Boston, MA: Harvard Business School Press.

Hoffer, J.A., George, J.F., & Valacich J.S. (2002). Modern Systems Analysis and Design (third edition). Upper Saddle River, NJ: Prentice Hall.

Hong, H.K. & Kim, Y.J. (2002). The critical success factors for ERP implementation: An organisational fit perspective. Journal of Information and Management, 40(1), 25-40.

Jacobs, F.R. & Bendoly, E. (2003). Enterprise resource planning: Developments and directions for operations management research. European Journal of Operational Research, 146, 233-240.

Keller, G. & Teufel, T. (1998). SAP R/3 Process Oriented Implementation. Harlow: Pearson Education Ltd.

Kirchmer, M. (2002). Business Process Oriented Implementation of Standard Software (2nd edition). Springer.

McNair, C.J. & Vangermeersch, R. (1998). Total Capacity Management: Optimizing at the Operational, Tactical, and Strategic Levels. Boca Raton, FL: St. Lucie Press.

Robey, D., Ross, J.W. & Boudreau, M. (2002). Learning to implement enterprise systems: An exploratory study of the dialectics of change. Journal of Management Information Systems, 17-46.

Rosemann, M. (2001, March). Business Process Lifecycle Management. Queensland University of Technology, pp. 1-29.

Sawy, O.A. (2001). Redesigning Enterprise Processes for e-Business. Boston, MA: McGrow Hill, Irwin.

Sharp, A. & McDermott, P. (2001). Just what are processes anyway? Workflow Modeling: Tools for Process Improvement and Application Development, pp. 53-69.

Sheer, A.-W. (1999). ARIS: Business Process Frameworks (3rd edition). Berlin: Springer-Verlag.

Sherer, E. (1998). Shop Floor Control: A Systems Perspective. Berlin: Springer-Verlag.

Scholz-Reiter, B. & Stickel, S. (1996). Business Process Modelling. Berlin & New York: Springer.

Vollmann, T.E., Berry, W.L. & Whybark, D.C. (1997). Manufacturing Planning and Control Systems (4th edition). Chicago: Irwin.

AuthorAffiliation

Victor Portougal, The University of Auckland, New Zealand

AuthorAffiliation

Victor Portougal is associate professor in the Department of Information Systems and Operations Management, Business School, The University of Auckland. His research interests are in quantitative methods both in management science and information systems. In information systems his research specializes in security, information systems design and development, and ERP. Dr. Portougals practical and consulting experience includes information and ERP systems design and implementation for companies in Russia and New Zealand. He is the author of many articles in scholarly journals, practitioner magazines, and books. He holds degrees from the University of Gorki, Russia (BSc, MSc, Computer Science), Academy of Sciences, Moscow (PhD, Operations Research), and the Ukrainian Academy of Sciences, Kiev (Doctor of Economics).

Subject: Case studies; Enterprise resource planning; Production planning

Classification: 9110: Company specific; 5240: Software & systems; 5310: Production planning & control

Publication title: Journal of Cases on Information Technology

Volume: 7

Issue: 3

Pages: 98-109

Number of pages: 12

Publication year: 2005

Publication date: Jul-Sep 2005

Year: 2005

Publisher: IGI Global

Place of publication: Hershey

Country of publication: United States

Publication subject: Business And Economics--Computer Applications

ISSN: 15487717

Source type: Reports

Language of publication: English

Document type: Business Case

Document feature: charts graphs tables diagrams references

ProQuest document ID: 198655150

Document URL: http://search.proquest.com/docview/198655150?accountid=38610

Copyright: Copyright Idea Group Inc. Jul-Sep 2005

Last updated: 2011-07-21

Database: ABI/INFORM Complete

Document 47 of 100

Experiences from Using the CORAS Methodology to Analyze a Web Application

Author: den Braber, Folker; Mildal, Arne Bjørn; Nes, Jone; Stølen, Ketil; Vraalsen, Fredrik

ProQuest document link

Abstract:

During a field trial performed at the Norwegian telecom company NetCom from May 2003 to July 2003, a methodology for model-based risk analysis was assessed. The chosen methodology was the CORAS methodology (CORAS, 2000), which has been developed in a European research project carried out by 11 European companies and research institutes partly funded by the European Union. The risk analysis and assessment were carried out by the Norwegian research institute SINTEF in cooperation with NetCom. NetCom (www.netcom.no) is one of the main mobile phone network provider s in Norway. Their 'MinSide' application offers their customers access to their personal account information via the Internet, enabling them to view and change the properties of their mobile phone subscription. 'MinSide' deals with a lot of sensitive customer information that needs to be secure, while at the same time being easily available to the customer in order for the service to remain usable and competitive. The goal of the analysis was to identify risks in relation to the use of the 'MinSide' application and, where possible, suggest treatments for these risks. This was achieved through two model-driven brainstorming sessions based on system documentation in the form of UML sequence diagrams and data flow diagrams. [PUBLICATION ABSTRACT]

Full text:

Headnote

EXECUTIVE SUMMARY

During a field trial performed at the Norwegian telecom company NetCom from May 2003 to July 2003, a methodology for model-based risk analysis was assessed. The chosen methodology was the CORAS methodology (CORAS, 2000), which has been developed in a European research project carried out by 11 European companies and research institutes partly funded by the European Union. The risk analysis and assessment were carried out by the Norwegian research institute SINTEF in cooperation with NetCom. NetCom (www.netcom.no) is one of the main mobile phone network provider s in Norway. Their 'MinSide' application offers their customers access to their personal account information via the Internet, enabling them to view and change the properties of their mobile phone subscription. 'MinSide' deals with a lot of sensitive customer information that needs to be secure, while at the same time being easily available to the customer in order for the service to remain usable and competitive. The goal of the analysis was to identify risks in relation to the use of the 'MinSide' application and, where possible, suggest treatments for these risks. This was achieved through two model-driven brainstorming sessions based on system documentation in the form of UML sequence diagrams and data flow diagrams.

Keywords: access control; authentication; case study; computer viruses; cost benefits analysis; cost estimation; data security; digital signature; encryption algorithm; hacker; Internet privacy; IS project teams; iterative design; passwords; risk management; security risk

ORGANIZATIONAL BACKGROUND

NetCom

NetCom is the second largest mobile phone network provider in Norway, providing solutions for mobile communication. NetCom is an innovative company that uses new technology and knowledge to meet its customers' demands and aims to be a leading company in Norway within the market of mobile communication. A main goal for NetCom is that their products shall be competitive on price and quality, while at the same time remaining easy to use and understand for all its customers. With offices in Trondheim, Bergen, Stavanger, Kristiansand and Tønsberg, and its main office located in Oslo, NetCom has 740 employees in Norway.

NetCom is owned by the Swedish-Finnish company TeliaSonera, the leading telecom company in the Nordic and the Baltic regions. Based on the number of customers, the company is the largest mobile provider in Sweden and Finland, the second largest in Norway (NetCom) and the fourth largest in Denmark. TeliaSonera is also the largest fixed voice and data provider in the region, with leading positions in Sweden and Finland. Furthermore, TeliaSonera is the largest operator in the Baltic region, with consolidated mobile and fixed line operations in Lithuania and consolidated mobile operations in Latvia. The TeliaSonera share is traded in Stockholm, Helsinki and on the NASDAQ Stock Market in the United States.

SINTEF

SINTEF is a Norwegian research institute with 1,700 employees. SINTEF performs research for the industry and the public sector in a number of different fields, ranging from oil and process industry to IT and medical research.

The group involved in this case study is the group for Quality and Security Technology (QST), which consists of seven people. This group was also strongly involved in the CORAS project during which the used methodology was developed. QST is part of SINTEF Information and Communication Technology (ICT) with about 300 employees.

View Image -   Table 1: NetCom's Key Figures

SETTING THE STAGE

Communication is a key aspect for NetCom's products; naturally, the quality of the communication with its customers is an important part of the services offered by NetCom.

NetCom offers its customers roughly three possibilities for interaction:

* a 24-hour telephone-based helpdesk and customer service center;

* e-mail and regular mail can be used to get answers about various topics; and

* a Web application which lets customers log on to their own mobile phone account Web site to view billing information, usage history information, and more.

Focus during the risk analysis was on the last of these three alternatives, the Web application called 'MinSide' (Norwegian for 'MyPage'). MinSide makes it possible for each customer to get a complete overview of his or her mobile phone account, at any time of the day and from any place. The helpdesk/customer service was also slightly addressed but only where it was influenced by the MinSide application.

Giving customers the ability to interact with NetCom's databases and view their personal and sensitive information through the Internet requires a high level of security. With the help of the MinSide application, users are able to get information about their calling history and their calling cost status. MinSide also opens up for more interactive functionality, allowing the customer to send SMS and change their personal information and preferences.

In addition to security, this kind of service leads to requirements on availability. Serving more than a million users, the system needs to be able to handle all customers at any time, satisfying their wants and needs with respect to the use of their personal Web site.

A helpdesk where telephone operators are answering requests from customers related to their mobile phone account on a 24-hour basis is very costly. As a sub-goal, the MinSide application is meant to save money by relieving the helpdesk. Even though extra traffic will be generated from people with questions or problems related to MinSide, it is still believed that the MinSide application contributes to a reduction of the total helpdesk traffic.

Security

Having personal Web sites and login functionality is nothing new. However, the fact that all users are mobile phone owners opens for some extra possibilities, both for users such as people having a NetCom mobile phone account, and misusers such as people illegally exploiting MinSide. NetCom uses a combination of a password and a PIN code for the login process. The password needs to be remembered by the customer while the PIN code is sent to the customer's mobile phone in a text message (SMS).

NetCom's situation related to serving its customers with a Web application giving them direct access to their mobile phone account means that there is a need to identify both the security status and the security requirements related to the MinSide application. This case study describes the process used to analyze risks related to the MinSide application and to identify possible treatments to eliminate or reduce these risks.

CASE DESCRIPTION

The main goal of the analysis was to identify possibilities for misusing the MinSide application by violating one of the four security requirements: confidentiality, integrity, availability or non-repudiation, as defined in a number of standards related to IT security (ISO/IEC TR 13335,2001 ; ISO/IEC 17799,2000). This was achieved by carrying out a risk analysis based on the CORAS methodology. CORAS is specifically designed to address risk analysis of security-critical IT systems and offers a tool supported methodology for model-based risk analysis (MBRA). During a model-based risk analysis, models, in particular UML models, are used for specification and documentation of both the system (target of evaluation) and the risks. Also these models are the main medium for communication among the participants.

We will not explain the complete methodology here, but provide a short outline of the process in order to illustrate the main steps of a risk analysis based on the CORAS methodology.

Activities of the Risk Management Process

The CORAS risk management process is based on the Australian/New Zealand Standard 4360 (1999) and provides a sequencing of the risk management process into the five sub-processes illustrated in Table 2.

Each of these five sub-processes comprises a number of activities, and the CORAS methodology for model-based risk analysis proposes different methods and models for use in the different sub-processes and activities.

The CORAS methodology is developed to address systems of all kinds and sizes. For this field trial, one of the goals was to perform a lightweight risk analysis; therefore, several activities in the standard full CORAS methodology were skipped or modified. A description of the techniques and activities used is given below where the different subprocesses are described in more detail. Another goal was to test the CORAS tool that supports the risk analysis methodology.

View Image -   Table 2: CORAS Risk Management Process

Hypotheses for the NetCom MinSide Risk Analysis Field Trial

Prior to the field trial, a list of hypotheses concerning the use of the CORAS methodology and tool was produced. One of the goals of the field trial was to test whether these hypotheses were valid. The hypotheses were:

* A lightweight model-based risk analysis (CORAS light) produces results whose value corresponds to the investment.

* The CORAS light methodology leads to risk analysis results at the "correct" level of abstraction.

* The CORAS Web-based risk analysis tool supports the risk analysis process and makes it more efficient.

* The CORAS Web-based risk analysis tool provides the functionality that is required to perform a (lightweight) risk analysis.

Model-Based Risk Analysis

The CORAS methodology defines its own UML stereotypes and methods for describing UML models related to security analysis. These specific security-related UML aspects are caught in the CORAS UML profile (OMG, 2003b). This UML profile for security modeling defines an abstract language for supporting model-based security analysis. The asset, threat and treatment diagrams in Figure 2, Figure 5, Figure 7 and Figure 8 are examples of how this profile is used, and shows where the term "model-based" comes from.

Organization of the Trial

The field trial described in this case study was carried out over a period of three months, lasting from May 2003 to July 2003. It consisted of two brainstorming sessions that took place on the 21st and 27th of May, in which people from both NetCom and SINTEF participated. The preparations and analysis work before and after these sessions were mainly carried out by the risk analysis experts at SINTER Table 3 shows how many people from the two organizations were involved in the analysis and what roles they had.

Three Phases

The field trial was split into three main phases.

* The first phase consisted of context identification and high-level risk analysis. This was performed by the risk analysis experts (SINTEF) with input from NetCom.

View Image -   Table 3: Roles

* The second phase was the risk identification and analysis. This consisted of two half-day meetings at NetCom, as well as preparatory work performed prior to each meeting by the risk analysis experts.

* The third phase consisted of continued analysis, treatment identification and structuring of the results gathered during the brainstorming sessions.

Context Identification

The goal of the first sub-process is to identify the context of the analysis, in other words: what are we going to analyze? This includes describing the system, its environment and the target of evaluation, and identifying usage scenarios, the assets of the system and its security requirements. The process steps that were followed for the context identification are illustrated in Figure 1.

View Image -   Figure 1: Context Identification
View Image -   Table 4: Target of Evaluation Table

With assets we mean those parts of the system that contain a value that can possibly be lost. This can be anything from information to hardware. The identified assets are documented in an asset diagram, which is a UML class diagram. The asset diagram for this case is shown in Figure 2.

Every context identification process ends with an approval meeting where all stakeholders involved in the coming risk analysis agree on the chosen target of evaluation and the describing documentation.

It was decided that NetCom's MinSide application was a suitable target of evaluation for the field trial. Prior to the context identification activity, NetCom provided system documentation in the form of UML (OMG, 2003a) use case (Cockburn, 1997) and class diagrams, use case descriptions and other textual descriptions.

View Image -   Figure 2: Asset Diagram
View Image -   Table 5: Use Case Description - Retrieve New Password

The risk analysis experts produced UML sequence diagrams based on the use case descriptions provided by NetCom, which were sent to NetCom for review and approval. Following is a selection of risk analysis documentation in the form of tables and diagrams that specify the target of evaluation and provide the main input to the risk identification sub-process.

Table 5 contains a use case description made by NetCom. This is shown to illustrate how such a description looks and to show the source for the sequence diagram in Figure 3. The description contains some terms that are specific to NetCom; they are irrelevant for the understanding of the case and will therefore not be further explained.

Based on this use case, a sequence diagram was created, as shown in Figure 3. The sequence diagram shall specify the same behavior as the use case description. However, we believe that the sequence diagram is much easier to read and therefore more suitable as a starting point for a risk analysis. This sequence diagram was one of the diagrams used during the first risk analysis session.

View Image -   Table 5: Use Case Description - Retrieve New Password  Figure 3: Sequence Diagram - Retrieve New Password
View Image -   Figure 4: Data Flow Diagram - PasswordForgotten

The data flow diagram shown in Figure 4 was one of five diagrams provided by NetCom as system documentation to be used during the second risk analysis session.

Risk Identification

The risk identification process was performed during two meetings at NetCom on May 21 and May 27. These two risk identification sessions were the key activities in the analysis. They not only served to generate risk analysis results, but also gave valuable feedback on the CORAS process. Following is a description of these meetings.

21st May - First HazOp Analysis

The meeting started with an approval session where the risk analysis leader performed a walkthrough of the context identification results and sequence diagrams that would be used as a basis for the risk identification. This was done as part of the first risk analysis meeting instead of conducting a separate approval meeting.

Based on the results of this approval meeting, some information was added to the asset and risk evaluation criteria tables, but no other significant changes were made. Later it became clear that the importance of this approval was underestimated by both the system experts and the risk analysis team, as described.

HazOp Analysis

After the approval session, the risk analysis leader gave a brief introduction to HazOp (Hazard and Operability) analysis (Redmill, 1999), a risk analysis method to be used during the risk identification session. A HazOp analysis can be described as a 'structured brainstorming'. The idea is to focus on certain items in the system documentation that are part of the target of evaluation, and try to identify risks connected to failure or incompleteness of these items. In this case, the use cases and especially their corresponding sequence diagrams were used. In order to find threats to the scenarios described in the use cases, one can ask the following questions for every message in a sequence diagram.

What happens if this message...

* ...is not sent?

* ...is not received?

* ...is delayed?

* ...is changed?

During a HazOp session, the knowledge, expertise and intellect of all the members in the group is exploited, in order to find as many relevant risks as possible. The session is led by the risk analysis leader while the risk analysis secretary is responsible for writing down the results of the analysis itself. The results are stored in a HazOp table. Table 6 shows a part of the HazOp table produced during this risk analysis session. The CORAS tool was used to store the results from the HazOp analysis.

The threats identified during the HazOp analysis are drawn in a threat diagram. An example of such a diagram from this analysis is given in Figure 5. The threat diagram shows the security scenarios that initiate the unwanted incidents that affect the assets.

This case showed the importance of displaying the system documentation, which is the source for the analysis. The system documentation diagrams are the main input to HazOp, and it is therefore important for the people involved in the analysis to be able to look at them during the whole session.

View Image -   Table 6: HazOp Table Template

While analyzing the different steps of the sequence diagrams, it became clear that the diagrams did not describe the system correctly, for example, they were not complete or showed wrong behavior. In an ideal situation this would have been recognized and corrected during a separate approval phase. The fact that this was not the case here indicates that the approval session deserves more attention.

An important organizational detail for this type of analysis is the physical separation of analysis objects and recording results. Only one laptop was used for showing the diagrams to be analyzed and for recording the analysis results, which led to confusing situations. A better solution would have been to use one laptop for showing the diagrams to be analyzed and one laptop for gathering the analysis results. The second analysis session proved this was indeed a right conclusion.

A comment from the system experts was that the information in the sequence diagrams was at too low a level of abstraction and that they were not very suitable to identifying threats. A bigger picture was suggested that could include more of the surrounding environment (users, mobile phones, customer service, social hacking, etc.). As mentioned above, this also motivates using a reasonable amount of time on approval of system documentation, not only to ensure that the documentation is correct, but also that it is addressing the right level of abstraction.

View Image -   Figure 5: Threat Diagram - First Session

It was decided to update the target of evaluation and to use data flow diagrams supplied by NetCom as the basis for the analysis during the second meeting. This meant that focus was shifted to a subcomponent of the MinSide application responsible for the login and authentication process. The system specification used during the second session consisted of data flow diagrams. One of these diagrams is shown in Figure 4.

27th May - Second HazOp Analysis

This time, the data flow diagrams were used as an input to the risk analysis process. The risk analysis leader led the brainstorming session, using one laptop to show the diagrams that were being analyzed to all the participants. Another laptop was used by the risk analysis secretary to record the results on the fly. This activity was hidden from the other participants, allowing them to focus completely on the brainstorming session and coming up with new threats and risks. The risk identification process is illustrated in Figure 6.

A selection of the results of this second HazOp analysis session is given in Table 7.

Again the results of the HazOp analysis were translated into threat diagrams. Figure 7 shows one of them.

After the risk analysis leader had gone through all the data flow diagrams, the HazOp table was shown to everyone, and the remaining time (about one hour) was spent cleaning up the table and filling in the missing information such as frequencies and consequences.

View Image -   Figure 6: Risk Identification  Table 7: Fragment of Filled in HazOp Table
View Image -   Figure 7: Threat Diagram - Second Session

Risk Analysis

As described above, during the risk analysis sub-process, the consequences and frequencies for the identified unwanted incidents are determined. Unwanted incidents become risks as soon as they are assigned a consequence and frequency value. Doing this requires a thorough knowledge of the analyzed system and is therefore also performed in cooperation with the system experts. When this is done the risk matrix can be drawn. Table 8 shows such a risk matrix.

The qualitative values for both consequence and frequency scales where already indicated in the context identification phase, and are given in Table 9 and Table 10.

During a complete risk analysis, a technique called Fault Tree Analysis (FTA) (IEC 1025, 1990) is used in order to calculate consequences of complicated unwanted incidents.

Because of resource restrictions during this analysis, it was decided to combine the risk analysis sub-process with the risk identification process that was carried out at the two NetCom meetings. Instead of using FTA, consequence and frequency values were estimated with the help of the system experts, and these values were recorded together with the other risk information in the HazOp table.

View Image -   Table 8: Risk Matrix  Table 9: Consequence Values  Table 10: Frequency Values

Risk Evaluation & Risk Treatment

The NetCom meetings were the only two sessions where the system experts and risk analysis experts physically met. The results of these sessions were structured and summarized by the risk analysis experts. As a result of this, sub-process 4 - risk evaluation and sub process 5 - risk treatment were combined, and these were performed mainly by the risk analysis experts at SINTER The risk treatment sub-process was however to a certain degree also combined with the risk identification process, by recording treatments that were suggested during the HazOp session.

View Image -   Table 11: A Selection of Ranked Risks

Using the information of Table 8, Table 9 and Table 10 for the identified risks mentioned in the HazOp Table 7, we can range the risks after their risk value. This is done in Table 11.

Following is a selection of the indicated treatments for the risks with risk ID G2.1, G2.2, G2.3 and G2.4, here identified by G2.*. The treatment for these risks is specified in a treatment diagram and a treatment activity diagram.

View Image -   Figure 8: Treatment Diagram for the Risks G2*
View Image -   Figure 9: Treatment Activity Diagram for the Risks G2*

CURRENT CHALLENGES/PROBLEMS FACING THE ORGANIZATION

The field trial produced valuable results in the form of identified threats and risks as well as possible treatments. One challenge for NetCom is to adjust these results of the analysis to its own organizational structure. Even though the analysis was restricted to address the MinSide application, the results of this analysis will affect other parts outside the scope of MinSide but inside NetCom's organization.

In fact, since the termination of the field trial, it has already been shown that the effect of this trial on new projects at NetCom has been considerable. The methods used during this field trial have been adopted in several new projects in order to indicate risks and possible treatments at an early stage in the development or maintenance process.

An individual project or case study with restrictions on both time and resources, carried out in a relatively large organization, will naturally have a corresponding limit on the ability to affect the organization. However, the choice of addressing only a small part of the organization implies a limit in itself. The expectations of such a project should reflect the amount of time and effort that is put into the case.

The scope of the risk analysis described in this case was restricted to the MinSide application. Even though the results of such a risk analysis cannot be expected to have a major impact on how NetCom handles its customers, it certainly gives a good overview on the functionality of this specific service.

The main problem connected to the use of the MinSide application that NetCom faces on a 24-hour basis is offering the customers the service they pay for, while protecting them at the same time. Through carrying out this risk analysis, this ability has increased. Since systems are continually updated, these analyses will also need to be updated. NetCom will always strive to be one step ahead of the people looking for the security holes in order to protect its customers. Hence a major challenge for NetCom is to obtain a correct picture of relevant risks and their risk values, and maintain the validity of this picture as the application, its context and NetCom's business objectives evolve.

Another issue related to this field trial is the relation between a system and its risk analysis over time. Is it enough to carry out a single risk analysis for a system like MinSide? Should a risk analysis of MinSide be carried out every other year? Every year? Are there systems that can safely be put into production without a preceding risk analysis?

These are topics that span far wider than the scope of this teaching case. We refer to the list of additional sources of reading to find references to books and articles about risk analysis in general and model-based risk analysis in particular.

References

REFERENCES

Australian/New Zealand Standard AS/NZS 4360. (1999). Risk management.

Cockburn, A. (1997). Structuring use cases with goals. Journal of Object-oriented Programming, (Sep/Oct), 35-40; (Nov/Dec), 56-62.

CORAS. (2003). A platform for risk analysis of security critical systems. IST-2000-25031. Online: http://coras.sourceforge.net/

IEC 1025. (1990). Fault tree analysis (FTA).

IEC 61508. (2000). Functional safety of electrical/electronic/programmable safety related systems.

ISO/IEC 10746. (1995). Basic reference model of open distributed processing.

ISO/IEC TR 13335. (2001). Information technology - Guidelines for the management of IT security.

ISO/IEC (1999). Information technology - Security techniques - Evaluation Criteria for IT Security ISO/IEC, 15408-1.

ISO/IEC 17799. (2000). Information technology - Code of practice for information security management.

OMG. (2003a). Unified Modeling Language specification. Version 2.0. OMG document number: ptc/03-09-15.

OMG. (2003b). UML Profile for Modeling Quality of Service and Fault Tolerance Characteristics and Mechanisms, OMG Draft Adopted Specification. OMG Document: ptc/2004-06-01.

Raptis, D., Dimitrakos, T., Gran, B.A., & Stølen, K. (2002). The CORAS approach for model-based risk analysis applied to the e-commerce domain. In Proc. Communication and Multimedia Security (CMS-2002) (pp. 169-181). Kluwer.

Redmill, R, Chudleigh, M., & Catmur, J. (1999). Hazop and software Hazop. Wiley.

Sindre, G., & Opdahl, A. L. (2000). Eliciting security requirements by misuse cases. In Proc. of TOOLS_PACIFIC 2000 (pp. 120-131). IEEE Computer Society Press.

AuthorAffiliation

Folker den Braber, Norway

Arne Bjørn Mildal, NetCom, Norway

Jone Nes, NetCom, Norway

Ketil Stølen, SINTEF, Norway

Fredrik Vraalsen, SINTEF, Norway

AuthorAffiliation

Folker den Braber holds an MSc in Computer Science from the University in Leiden, The Netherlands. He has been employed as a research scientist in the Cooperative and Trusted Systems group of SINTEF Information and Communication Technology since 2001. Through his work on several projects around model-based risk analysis, he has been able to apply and increase his knowledge about specification, design and modeling. Other fields of interest are formal methods, Petri Nets and Genetic Algorithms.

Arne Bjørn Mildal has worked for NetCom since 1996 and has held various positions within the IT organization. His present position is development manager of IT & Internet with responsibility for all IT development activities within NetCom. This includes internal IT systems for billing and customer care, ERP systems, portals and self-service applications for customers and partners. Before joining NetCom he worked in several large projects, building offshore constructions for the North Sea with responsibility for instrumentation and telecom engineering and testing. He holds an MSc in Electrical and Computer Science from the Norwegian University of Science and Technology (1988).

Jone Nes holds a master's degree from the Norwegian School of Management. After working as a consultant for Avenir (now Ementor), where he worked with system development and project management, he is now project leader for NetCom. He works mainly on development projects with a focus on customer aspects, both internal and external. The past year he has been the driving force behind the establishment of a data management group within NetCom, with the task of designing a logistic data model for the entire organization in order to facilitate internal business communication.

Ketil Stølen is senior scientist and leader for the Quality and Security Technologies group at the Department for Cooperative and Trusted Systems at SINTEF Information and Communication Technology. He is also a professor in Computer Science at the University of Oslo. Dr. Stølen has broad experience from basic research (four years at Manchester University; five years at Munich University of Technology) as well as applied research (one year at the Norwegian Defense Research Establishment; three years at the OECD Halden Reactor Project; and four years at SINTEF Telecom and Informatics). He completed his PhD, "Development of Parallel Programs on Shared Data-structures, " at Manchester University on a personal fellowship granted by the Norwegian Research Council for Science and the Humanities.

Fredrik Vraalsen received his MSc in Computer Science from the University of Illinois at Urbana-Champaign (2001). Since 2001 he has been employed as research scientist in the Cooperative and Trusted Systems group of SINTEF Information and Communication Technology.

View Image -   APPENDIX

Subject: Access control; Case studies; Benefit cost analysis; Data integrity; Risk assessment; Computer viruses

Classification: 5140: Security management; 9110: Company specific; 5240: Software & systems

Publication title: Journal of Cases on Information Technology

Volume: 7

Issue: 3

Pages: 110-130

Number of pages: 21

Publication year: 2005

Publication date: Jul-Sep 2005

Year: 2005

Publisher: IGI Global

Place of publication: Hershey

Country of publication: United States

Publication subject: Business And Economics--Computer Applications

ISSN: 15487717

Source type: Reports

Language of publication: English

Document type: Business Case

Document feature: tables diagrams references

ProQuest document ID: 198719789

Document URL: http://search.proquest.com/docview/198719789?accountid=38610

Copyright: Copyright Idea Group Inc. Jul-Sep 2005

Last updated: 2011-07-21

Database: ABI/INFORM Complete

Document 48 of 100

The Algos Center: Information Systems in a Small Non-Profit Organization

Author: Chinn, Susan J; Pryor, Charlotte A; Voyer, John J

ProQuest document link

Abstract:

Two systems faculty from a university was contracted to perform an analysis of information systems at the Algos Center, a small non-profit charitable organization which provides support for children and their families facing losses. The Center specifically requested help in integrating its fundraising and accounting software packages or exploring alternative software solutions. It also needed to generate reports required by the Board of Directors and United Way. Finally, the Center requested help in designing a family database to capture and track statistics about the families receiving services. As the team analyzed the Center, they discovered many underlying issues that would form part of their recommendations to the staff. This case makes two contributions. First, it reveals many problems facing small non-profit organizations, which primarily expend their resources on mission-critical activities, and allows readers to supply possible courses of action. Second, it provides an opportunity to evaluate how a consulting experience was handled and to make recommendations to ensure successful project implementation. [PUBLICATION ABSTRACT]

Full text:

Headnote

EXECUTIVE SUMMARY

Two systems faculty from a university was contracted to perform an analysis of information systems at the Algos Center, a small non-profit charitable organization which provides support for children and their families facing losses. The Center specifically requested help in integrating its fundraising and accounting software packages or exploring alternative software solutions. It also needed to generate reports required by the Board of Directors and United Way. Finally, the Center requested help in designing a family database to capture and track statistics about the families receiving services. As the team analyzed the Center, they discovered many underlying issues that would form part of their recommendations to the staff. This case makes two contributions. First, it reveals many problems facing small non-profit organizations, which primarily expend their resources on mission-critical activities, and allows readers to supply possible courses of action. Second, it provides an opportunity to evaluate how a consulting experience was handled and to make recommendations to ensure successful project implementation.

Keywords: accounting IS; information technology adoption; IS plannng issues; management information needs; non-profit organization; organizational change; organizationl efficiency; user needs

ORGANIZATIONAL BACKGROUND

The Algos Center is a non-profit organization based on the East Coast. (Because we are using a pseudonym to describe the organization, the web site address cannot be revealed.) It was founded in the 1990s by an individual who helped a young relative deal with her aunt's death; he saw a need for a Center that would help and support grieving children. The Center's mission is just that: to aid grieving children, teens, and their families through outreach, education, and peer support. The model for this organization is the Dougy Center, which was the first center in the United States to provide peer-based bereavement support groups for grieving children (Chappell, 2001; http:// www.dougy.org/about.html).

In support of the mission, the Center sponsors many program activities, but bereavement peer support is the primary service provided (Rubin & Witztum, 2000; Stroebe, Strobebe, & Hansson, 2002). Approximately 170 children, teens, and adults attend these support groups every week. Trained volunteers conduct the groups. The volunteers seek to provide a safe environment for participants to express their feelings; they do not attempt to be counselors or therapists. A professional consultant or staff member also attends these meetings. All participants are welcome, even if they cannot afford the suggested monthly pledge donation. Groups are divided into age categories: three to five, six to eight, seven to 12, teens, and young adults (up to age 30). Adult family members participate in support groups as well.

A related program, the Life Care Program (LCP), offers support groups for children and teens dealing with family members facing terminal or life-threatening illnesses. This program was started in the mid-1990s in collaboration with several hospices, hospitals, and nursing and cancer associations. While the bereavement peer support program is ongoing, LCP is offered in six-week sessions.

Two other major programs are offered. The Diversity Peer Support Program provides peer support in association with Kennedy Elementary School, which has a very diverse student body. Many of the students come from war-torn backgrounds and have lost family members. The second program, Community Extensions, is aimed at helping schoolchildren who are faced with a loss, and at assisting adult organizations and businesses dealing with grief issues. Other Center services include presentations to organizations by trained volunteers, and sponsorship of an annual bereavement conference. In addition, the Center offers referrals to mental health professionals, gives telephone support, and sends brochures and other written materials to callers.

The Center is governed by a 25-member volunteer board of directors. The executive director, appointed by the board, manages three full-time staff, six part-time staff members, and five unpaid interns who are university students. More than 100 volunteers assist with the events and support groups. Because there are so few full- and part-time staff, the organizational structure is very flat and informal; most of the staff has direct access to the executive director (see Appendix A for the organization chart). The Center is a public, non-profit charity (a 501 (c) (3) organization) that relies on contributions from individuals, grants from foundations, and United Way allocations, as well as corporate sponsorships and special fundraising events, to support its operating budget. The Center sponsors many activities throughout the year including a Pet Walk, Fun Run, golf tournament, and a gala event featuring dinner and an auction. Appendix B shows its Statement of Income, Expenses and Changes in Net Assets for its most recent fiscal year.

Non-profit organizations such as this Center rely to a large extent on individual donations; successful fundraising necessitates tracking the funds that are received from each donor (Klein, 2004). Information is also needed to evaluate the effectiveness of each fundraising event. Non-profits often use specialized fundraising software for this purpose (Davis, 2002). In addition, the organization's accounting software must be set up so that donated funds or grants that are restricted in purpose can be carefully monitored to ensure that the funds are used only for their designated intentions (Gross, Larkin, & McCarthy, 2003). The Board of Directors typically wants expense information organized in the same way as the budget is prepared, generally by expense category such as salaries and rent, to ensure that the organization's expenses do not exceed the board's authorizations (Trussel, Greenlee, Brady, Colson, Goldband, & Morris, 2002). In addition, funding organizations such as United Way and government agencies, such as the IRS, require that expenses be reported by program type. Many non-profits thus have greater record-keeping requirements than do for-profit enterprises of comparable size (Cutt, Bragg, Balfour, Murray, & Tassey, 1996).

SETTING THE STAGE

Janet Tucker and Caryn Powell, two professors at a local university, both had a strong interest in non-profit organizations. Dr. Tucker was a professor of MIS with an emphasis in systems analysis, while Dr. Powell was an accounting professor with an emphasis in accounting information systems. They put out a general offer to conduct an information system needs assessment for any local non-profit organization in support of the university's mission of community involvement. The assessment could include problem or opportunity identification, project selection, a feasibility study, identification of project risks, and development of recommended courses of action (Block, 2000; Coates, 1997).

The Algos Center responded quickly to the solicitation, and, after a brief phone call with the executive director, a preliminary meeting was scheduled with the key organization members: Elizabeth Medford, Executive Director; Vicki Hume, Development Director; and Dawn Lopez, Operations Manager. Tucker and Powell put together an outline for their first meeting. They wanted to get a sense of what information systems issues the Center was facing, and to set the goals and boundaries for what they were offering to do. They wanted to clarify that they were not proposing to design and implement any new information systems, but rather to evaluate how information was being collected, stored, and reported, and to develop recommendations to improve the systems (Burt & Taylor, 2000). They wanted to set up a schedule to collect data and they also wanted to make sure that the board of directors would approve of their involvement (Cornforth, 2003).

At the initial meeting, Elizabeth Medford, Vicki Hume, and Dawn Lopez explained some of the major issues they had been having with their information systems. The first issue concerned the software they were using for fundraising, Paradigm (http:// www.mip.com/software/fundraising/paradigm.htm), and their accounting software, QuickBooks (http://quickbooks.intuit.com/). Vicki said she was having a hard time getting the reports she needed out of Paradigm. Both Vicki and Elizabeth acknowledged that there were inconsistencies in how data (notably expense codes) were being entered in each program. Dawn believed that they were not taking full advantage of Paradigm's features. They liked QuickBooks, but they wanted to see if there were features in it that they could be using better, or if there was a way for the two packages to work together. This is a concern that many non-profits have when they attempt to use off-the-shelf software (Jones, 2000). Dawn noted that they were currently entering duplicate data in both systems.

The second issue concerned reports that the Center was obligated to produce for the board of directors and United Way. As is true of many non-profits, the Center received revenue not only from hundreds of individual and corporate donations, but also from various funding sources, such as United Way. These fund providers need detailed information about how the money is spent (Bradley, Jansen, & Silverman, 2003). Non-profits also require accurate financial and program data in order to plan for future growth - an especially critical need for organizations like the Center with limited technological expertise (Smith, 2002).

The third issue involved a database project that Dawn was starting. She wanted to design a family database that would allow the Center to track bereavement meetings and to generate statistics. The database would be useful to the Center, and it would also facilitate reporting to United Way. For example, United Way required demographic data that the Center staff had had trouble compiling other than manually (Cutt et al., 1996).

Elizabeth indicated that the Center was growing, and there was a need to prepare for the growth they were expecting. Tucker and Powell were offering their services pro bono, but they did ask Elizabeth if they should be mindful of any financial constraints when developing recommendations for purchasing software or equipment. Elizabeth said not to worry about it. Elizabeth also asked for confidentiality when viewing any information about their clients. However, she and the rest of the staff agreed to be very open about sharing documents and other agency information with the university team.

After their meeting, Tucker and Powell immediately drafted a letter to Elizabeth, which in essence was the consulting contract (Block, 2000). The agreement was to review their software, reports, and database design, and to evaluate alternative approaches to the integration and growth issues that had been discussed. The letter stated that the Center's current environment would be assessed through interviews, document collection and review, and an analysis of their computer systems. The project, starting in July, was to terminate in the fall with a formal report of recommendations.

CASE DESCRIPTION

Gathering Fundraising & Accounting Software Requirements

Tucker and Powell decided to meet first with Dawn Lopez, Operations Manager, to get an overview of how Paradigm (the fundraising software) and QuickBooks (the accounting software) were being used. Dawn was glad to show the team what she did. The team immediately got the impression that Dawn, as an information technology manager, worked hard to keep the Center's operations running, even though she worked part-time while pursuing a degree at a two-year technical school. Administrative Assistant Alicia Austin recorded donations in Paradigm, and then, Dawn recorded the donated amounts in QuickBooks. Dawn stated that she believed Paradigm could be used to record information about the volunteers that the Center wanted but was not currently collecting. She also showed the team how she produced reports in QuickBooks.

Dawn provided the team with a document describing deposit and data entry procedures. The team noticed that the names used for the same donation types entered in Paradigm and in QuickBooks were not consistent. For example, QuickBooks used "publications" and Paradigm used "booklets" to describe the same thing. The team observed Dawn as she demonstrated how deposits were entered into QuickBooks. At month's end, she manually compared the deposit report generated in QuickBooks with the list of donations entered in a Paradigm report. They usually did not match, and Dawn had to discover where the discrepancies were. In the case of one particular discrepancy, it was not easy for her to show the team how she had resolved it; she had simply attached a sticky note to a printed report saying that the discrepancy had been resolved. It seemed to the team that there was much less duplication of data in the fundraising and accounting programs than had originally appeared to be the case. The total dollar amount of a group of donations deposited at one time was entered as a single transaction in QuickBooks; the individual donations and data relating to each donor were recorded only in Paradigm. In another instance, the team observed Dawn entering a contribution that was designated to cover expenses as a negative expense, instead of as contribution revenue that would offset the relevant expense. Dawn admitted that although she was responsible for entering data into QuickBooks, she had no formal training in accounting. This is a common problem for non-profits with limited staff; they may not have been trained to enter data properly (Barrett & Greene, 2001). The team and Dawn also discovered that Paradigm only supported exporting data to a limited number of programs such as dBase, old versions of Excel, and a comma delimited ASCII format. There were no export options to QuickBooks. Dawn had not been successful trying to export data.

After meeting with Dawn, Tucker and Powell believed that meetings with both Vicki Hume and Elizabeth Medford were needed. They wanted to know how Vicki was using Paradigm, what reports she was producing, and what information she needed that she was not able to produce. From Elizabeth, they wanted to learn more about United Way reporting needs.

The team met with Vicki Hume and inquired about the donation category and expense code discrepancies between QuickBooks and Paradigm. Vicki replied that the staff had simply not gotten together to standardize the codes, and furthermore, that some codes were "deliberately" entered differently in the two software packages. She said she would prefer a solution where the Center could use QuickBooks for all their work, but she realized that fundraising software would be needed to handle event tracking, a feature usually absent from a general purpose software application.

As development director, Vicki was a heavy user of Paradigm. She generated two important reports: one segmented donors into categories to use in generating mailing lists; the other was an analysis of contributions, which she used to track the progress of fundraising campaigns and to analyze donation trends (see Appendix C for a sample report). In order to produce reports, it was necessary to generate queries; some reports also required subqueries. For many reports, Vicki kept getting an error message that the subquery could not return more than one row. The team asked Vicki to keep track of specific querying problems over the next few weeks. Vicki agreed with Dawn that there were many functions in Paradigm that were not being used, and that it was hard to figure out which fields would print out. She also had to resort to calculating many aggregate functions (e.g., counts, averages) manually. When the team asked if she consulted the user's manual to help solve some of these problems, she remarked that the user's manual was missing. Concerning vendor support, Vicki said she believed they paid a flat rate for a specific number of calls per year, and to ask Dawn for details.

During a subsequent meeting with Dawn, Vicki presented the team with a Paradigm query she had tried to run without success. Vicki also said that she wanted an audit trail of who made each update to the data in Paradigm to see who might be to "blame" for poor data entry. Later, back at the university, the team re-ran the query using test data on their office computer and found that it worked perfectly. During their next visit, they examined some of Paradigm's features with Dawn and found an error log tool. The error log displayed error codes and SQL statements that appeared to fail because of data entry problems (e.g., attempts to put two values into a single-valued field). Dawn learned that she could contact the vendor to acquire SQL scripts that could be run to "kick out" problem data. Dawn had never previously looked at the error log.

Tucker and Powell asked Dawn for more information about Paradigm documentation and user training. First, the team inquired about the missing Paradigm manual; Dawn said it was available, and that Vicki would often say that something was missing when, in fact, it was not. Dawn loaned the manual to the team and the CD-ROM updates. The CD had updated pages that were supposed to be printed out and inserted into the manual, but although the pages had been printed out, Dawn lacked the time to insert the pages. It was later discovered that the CD actually had the complete manual on it, but that several computers (including Vicki's) lacked CD-ROM drives. The team then asked about the Paradigm training Dawn had received. Training is often a major component in successful technology adoption, but can often be a shortchanged component in a resource-constrained non-profit organization (Barrett & Greene, 2001; Hecht & Ramsey, 2002; Light, 2002). Staff personnel need to be cross-trained in the event that one staff member should leave. The staff also needs ongoing training to take advantage of up-grades in software, hardware, networking, etc. (Smith, Bucklin & Associates, Inc., 2000). Both Dawn and Alicia had taken a training course. The training emphasized building queries that served as the basis for generating reports. Dawn told the team that she could call the vendor for unlimited support and that all of the updates came bundled with the support contract.

Center Reporting Requirements

Elizabeth discussed reports requested by the board of directors with the team. To produce one of the reports required by the board, the treasurer had to export information from two QuickBooks reports into an Excel spreadsheet; from there, he had to manually prepare the report in the desired format. Elizabeth hoped it would be possible to produce this report more easily, saving the treasurer much effort. Elizabeth also explained that the board needed to have monthly reports that listed expenses by functional classification (e.g., for salaries, rent, depreciation, and utilities) in the same format in which the budget was prepared (see Appendix D for a sample report). This format would improve the directors' ability to compare expenses with budget authorizations. United Way required not only expenses by functional classification, but also wanted management expenses to be distinguished from program expenses (see Appendix E for a sample United Way report). The Center wanted to set up the accounts in QuickBooks so that the data could be retrieved more easily by both functional classification and program. In addition, Elizabeth explained that increasing reliance on grants meant that in the near future, the Center would need to start tracking the use of restricted purpose funds across fiscal years. There was no one on the staff who knew how to do this in QuickBooks.

The Family Database Project

Elizabeth explained that the Center needed a database because United Way required a lot of demographic information about the Center's clients, such as age, ethnicity, etc. She provided the team with the Center's intake form that clients fill out and a copy of the United Way's information requirements. Elizabeth said there were two important reports that would be "nice to have." First, she wanted a report that provided the reasons why families sought out the Center; this report would enable the staff to analyze who did or did not use the Center and why. The second was a report that would show the growth in demand for services over the years. Dawn provided the team with a description of the types of information they wanted from the database. Some of the desired information would require data the Center did not currently collect. She also provided a copy of her plan to set up the database in Microsoft Access (http:// www.microsoft.com) including a list of tables and attributes (see Appendix F for her data model).

Tucker and Powell analyzed the forms and compared them to both Elizabeth's reporting requests and to the requirements Dawn had provided for future report generation. The Center's intake form lacked some of the fields (e.g., ethnicity) for information that Elizabeth needed for United Way reporting. In addition, some of the information, such as income that United Way requested was included on the intake form, but was not being filled in.

The team spent additional time seeking clarification from Dawn about the data the Center wanted to track, as well as assessing her database design skills and her preliminary data model. Dawn said she had taken an online course in Microsoft Access and had gotten an A in it; however, the concept of foreign keys was new to her. As the team worked with Dawn on redesigning the data model, they discovered that the Center also wanted to use the family database to track attendance at various group sessions; however, facilitators were not taking attendance at group meetings. The Center also wanted to track phone calls using the family database; thus, Dawn had included phone calls in her original data model. The Center wanted every cold call as well as calls from participating (current) clients to be included in the database. There was no policy about how long the Center planned to keep the data. Pamela Russell, Family Coordinator, kept a manual phone log, so the team decided that talking with her would be in order (see Tribunella, Warner, & Smith, 2002, for a rigorous discussion of database design).

The team then paid a visit to Pamela to look at the phone log. They discovered that Pamela kept a manual log of all calls, but that she was instructed to check off only one action (outcome) per call (see Appendix G for the phone log form). For example, if she mailed program information to a caller and provided an outside referral, she could only select one of those outcomes. At the end of every month, she manually tallied up the different actions and then summed those totals for the reporting year (Tribunella et al., 2002, discuss more systematic data gathering approaches).

CURRENT CHALLENGES/PROBLEMS FACING THE ORGANIZATION

Given the number of technology issues they found, Tucker and Powell were impressed with the way the Center's staff managed to keep their operations running as smoothly as they did. They were further impressed when they saw the hardware the Center was using. The file server was a donated PC that was rapidly running out of disk space. During the team's visits, Dawn was able to acquire another PC that she hooked up to the first one as a cluster. Most of the computer equipment in the Center had been donated; in fact, one of the team members wound up donating her five-year-old computer, and it was gratefully accepted. They were particularly impressed with the staff, especially Dawn. Not only was Dawn going to school and working at the Center part-time, she was also heavily involved (as were the rest of the staff) in fundraising activities. She even served as a bereavement support facilitator.

As Tucker and Powell studied the Center, they kept thinking about what they would put into their final report of recommendations, and what kinds of reactions they would receive. The Center, as an organization with a small staff and limited resources, was acting as an "adopter" of technology; that is, the type of organization that is simply operating in a survival mode and "making do" with existing technology (Fried, 1995). A major challenge facing many consultants working with non-profits is that they encounter a culture where non-profits shortchange themselves on technological resources, so that they can devote most of their resources to the primary mission (McCarthy, 2003). Tucker and Powell also knew that some of the Center's staff was aware that technology might be better harnessed to support their mission activities, but the staff did not have a plan in place for realizing this goal. Some of those technology goals would mean that the Center would experience radical changes in its business processes (Amis, Slack, & Hinings, 2004). Was the Center ready for change? The team also reflected on how they might evaluate their own efforts as consultants and as change agents (Bergholz, 1999). They had tried to function in the role of facilitator, which involved empowering clients to "own" changes in technology use and to mobilize and support client initiatives (Winston, 1999); however, they wondered if instead their role had been more of a traditional one or as an advocator. In the traditional role, consultants functioning as change agents focus on the implementation of technology, while advocators create a business vision and proactively function as champions for change (Winston, 1999). Was their position as facilitator a good match for a client in the adoptive mode? Had they been effective consultants to the Algos Center to date? How could they be useful to the Center in the future?

References

REFERENCES

Amis, J., Slack, T., & Hinings, C. R. (2004). The pace, sequence, and linearity of radical change. Academy of Management Journal, 47(1), 15-39.

Barrett, K., & Greene, R. (2001). Powering up: How public managers can take control of information technology. Washington, DC: CQ Press.

Bergholz, H. (1999). Not-for-profit consulting. Journal of Management Consulting, 10(3), 13-16.

Block, P. (2000). Flawless consulting. San Francisco: Jossey-Bass.

Bradley, B., Jansen, P., & Silverman, L. (2003). The nonprofit sector's $100 billion opportunity. Harvard Business Review, 81(5), 3-11.

Burt, E., & Taylor, J. A. (2000). Information and communication technologies: Reshaping voluntary organizations? Nonprofit Management and Leadership, 11(2), 131-143.

Chappell, B. J. (2001). My journey to the Dougy Center. Amityville, NY: US Baywood Publishing.

Coates, N. (1997). A model for consulting to help effect change in organizations. Nonprofit Management and Leadership, 8(2), 157-169.

Cornforth, C. (ed.). (2003). The governance of public and non-profit organizations: What do boards do? London: Routledge.

Cutt, J., Bragg, D., Balfour, K., Murray, V., & Tassie, W. (1996). Nonprofits accommodate the information demands of public and private funders. Nonprofit Management and Leadership, 7(1), 45-68.

Davis, C. N. (2002). Look sharp, feel sharp, be sharp and listen - Anecdotal excellence: People, places and things. International Journal of Nonprofit & Voluntary Sector Marketing, 7(4), 393-400.

Fried, L. (1995). Managing information technology in turbulent times. New York: John Wiley & Sons.

Gross, M. J., Larkin, R. F., & McCarthy, J.H. (2003). Financial and accounting guide for not-for-profit organizations (6th ed.). New York: John Wiley & Sons.

Hecht, B., & Ramsey, R. (2002). ManagingNonprofits.org. New York: Wiley.

Jones, R. A. (2000). Sizing up NPO software. Journal of Accountancy, 190(5). 28-44.

Klein, K. (2004). Fundraising in times of crisis. San Francisco: Jossey-Bass.

Light, P. C. (2002). Pathways to nonprofit excellence. Washington, DC: Brookings Institution Press.

McCarthy, E. (2003, August 18). A confluence of technology and philanthropy. The Washington Post, p. E5.

Rubin, S., & Witztum, E. (eds.). (2000). Traumatic and non-traumatic loss and bereavement: Clinical theory and practice. Madison, CT: Psycho-social Press/ International Universities Press.

Smith, S. R. (2002). Social services. In L. M. Salamon (Ed.), The state of nonprofit America (pp. 149-186). Washington, DC: Brookings Institution Press.

Smith, Bucklin & Associates, Inc. (2000). The complete guide to nonprofit management (2nd ed.). New York: Wiley.

Stroebe, M.S., Strobebe, W, & Hansson, R. O. (eds.). (2002). Handbook of bereavement. Cambridge: Cambridge University Press.

Tribunella, T., Warner, P. D., & Smith, L.M. (2002). Designing relational database systems. CPA Journal, 72(7), 69-72.

Trussel, J., Greenlee, J. S., Brady, T., Colson, R.H., Goldband, M., & Morris, T. W. (2002). Predicting financial vulnerability in charitable organizations. CPA Journal, 72(6), 66-69.

Winston, E. R. (1999). IS consultants and the change agent role. Computer Personnel, 20(4), 55-73.

AuthorAffiliation

Susan J. Chinn, University of Southern Maine, USA

Charlotte A. Pryor, University of Southern Maine, USA

John J. Voyer, University of Southern Maine, USA

AuthorAffiliation

Susan J. Chinn, Assistant Professor of MIS at the University of Southern Maine, holds a PhD from Kent State University and an MS from Virginia Commonwealth University. She spent several years in industry as a programmer/analyst and consultant. Dr. Chinn has taught systems analysis, systems design, expert systems, programming languages, and introductory undergraduate and graduate MIS survey courses. Her research interests include information technology in non-profit organizations, organizational use of the Internet, and tools and techniques for systems analysis and design.

Charlotte A. Pryor, Assistant Professor of accounting at the University of Southern Maine, holds a PhD from the Pennsylvania State University and a CPA certificate. Professor Pryor teaches accounting information systems, and managerial and governmental & not-for-profit accounting. For a number of years, Dr. Pryor was the chief accounting officer for the Washington, DC region of the National Park Service and treasurer of the Potomac Appalachian Trail Club. She is a member of the AICPA and the IMA. Her research interests primarily involve accounting education and accounting and information systems issues in small businesses and government and non-profit organizations.

A frequent adviser to public and private concerns, John J. Voyer, Professor of management at the University of Southern Maine, is the author or co-author of several monographs and journal articles. He has made numerous refereed presentations before professional organizations in his field, serves as a reviewer for a number of academic journals in management as well as for conference papers, and is a former member of the editorial board of Group and Organization Management. Dr. Voyer has held the title of Price-Babson Fellow (2000), Sam Walton Fellow (2003) and has participated in the Art and Practice of Leadership Seminar (Harvard Kennedy School of Government, 2003).

View Image -   APPENDIX A  APPENDIX B
View Image -   APPENDIX B  APPENDIX C  APPENDIX D
View Image -   APPENDIX D  APPENDIX E
View Image -   APPENDIX F
View Image -   APPENDIX F  APPENDIX G

Subject: Accounting systems; Case studies; Technological planning; Nonprofit organizations

Location: United States, US

Classification: 5240: Software & systems; 4120: Accounting policies & procedures; 9110: Company specific; 9540: Non-profit institutions; 9190: United States

Publication title: Journal of Cases on Information Technology

Volume: 7

Issue: 2

Pages: 1-15

Number of pages: 15

Publication year: 2005

Publication date: Apr-Jun 2005

Year: 2005

Publisher: IGI Global

Place of publication: Hershey

Country of publication: United States

Publication subject: Business And Economics--Computer Applications

ISSN: 15487717

Source type: Reports

Language of publication: English

Document type: Business Case

Document feature: charts references tables

ProQuest document ID: 198658568

Document URL: http://search.proquest.com/docview/198658568?accountid=38610

Copyright: Copyright Idea Group Inc. Apr-Jun 2005

Last updated: 2011-07-21

Database: ABI/INFORM Complete

Document 49 of 100

Automotive Industry Information Systems: From Mass Production to Build-to-Order

Author: Howard, Mickey; Powell, Philip; Vidgen, Richard

ProQuest document link

Abstract:

Building cars to customer order has been the goal of volume vehicle manufacturers since the birth of mass production. Eliminating the vast stocks of unsold vehicles held in distribution parks around the world represents potential savings worth billions, yet the current supply chain resembles islands of control, driven by production push. Despite recent advances in information technology offering total visibility and real-time information flow, transforming an "old world" industry to adopt customer responsiveness and build-to-order represents a significant step change. This requires overcoming barriers both within and between supply partners and at all levels of the supply chain. Yet, what are these barriers really like and how can the industry overcome them? [PUBLICATION ABSTRACT]

Full text:

Headnote

EXECUTIVE SUMMARY

Building cars to customer order has been the goal of volume vehicle manufacturers since the birth of mass production. Eliminating the vast stocks of unsold vehicles held in distribution parks around the world represents potential savings worth billions, yet the current supply chain resembles islands of control, driven by production push. Despite recent advances in information technology offering total visibility and real-time information flow, transforming an "old world" industry to adopt customer responsiveness and build-to-order represents a significant step change. This requires overcoming barriers both within and between supply partners and at all levels of the supply chain. Yet, what are these barriers really like and how can the industry overcome them?

Keywords: business process transformation; manufacturing industy; organizational effectiveness; organizational value chain

ORGANISATIONAL BACKGROUND

Automotive manufacturing is a global industry producing 56 million new cars per year, and represents a significant proportion of gross domestic product in developed countries, for instance, 5% in the United Kingdom (Crain, 2002). Yet despite steady sales, the industry in Europe is facing a period of significant change, driven by poor profitability, excess finished stock and over-capacity. Current vehicle manufacturing and distribution represents an old-world industry struggling to come to terms with a digital economy, driven by increasingly price conscious, demanding customers who require vehicles built to individual specifications and delivered in short lead-times. Vehicle manufacturers can no longer rely on selling cars from existing stocks and are shifting their business models away from mass production toward mass customisation and build-to-order (BTO).

The 'double prize' for manufacturers in achieving BTO is eliminating the vast car parks of unsold inventory, and reducing vehicle discounting by dealerships that can demand a premium price for vehicles tailored and delivered according to customer choice. However, this increases the importance of existing systems for efficient order execution and integrated information flow, where manufacturers' IT infrastructure still reflects the hierarchical, function-orientated nature of communication in many corporations.

The rise of BTO reflects the increasing dissatisfaction in the marketplace with the traditional vehicle production philosophy that typically builds the vehicle first before finding a customer. In Europe, manufacturers expect dealers to hold between 60 to 100 days of inventory that amounts to billions of dollars (ATKearney, 2003). Even in the USA where vehicles are usually sold from dealer stock, 74% of customers would rather wait and order the vehicle instead of buying one from the dealer lot that is incorrectly equipped (Business Wire, 2001). Customers are beginning to realise that they are paying for the waste in the automotive distribution system. Hence, many manufacturers are now exploring the possibilities of reducing order-to-delivery lead-time to the customer through their own initiatives: that is, BMW - 'Customer Orientated Sales and Production Process'; Ford - 'Order Fulfilment'; Renault - 'Project Nouvelle Distribution'; and Volvo - 'Distribution 90'.

SETTING THE STAGE

The ability to communicate effectively both locally and globally increases the reliance on information systems (IS) and information technology (IT). The auto industry operates complex IS, where current systems act as a major inhibitor both to time compression in the order fulfilment process and to organisational change. These inhibitors or information barriers, are the subject of a research programme called '3DayCar'. A key finding from this research shows an average delivery lead-time of a new car in the UK is around 40 days. Moreover, only 5% of the delay is taken up by manufacturing, and 85% of the process is related to customer order, supplier schedule, and vehicle sequence information systems (Figure 1).

View Image -   Figure 1: Delay in the UK Customer Order Fulfilment Process (Holweg & Pil, 2001)

A transformation is required in order to satisfy customers and remove the functional chimneys, silo mentality and waste, towards the integration of IS across the whole supply chain. 3DayCar (3DC) is a complex project that aims to understand the current practice, relationships and technology. It involves universities and independent research institutions to examine the role of BTO and the barriers to change across the automotive supply chain in the UK. The programme is unique as it encourages the participation of sponsors from all parts of the supply chain and some beyond, including vehicle manufacturers (VMs), dealers, component suppliers, logistics, consumer groups, trade associations, and financial corporations. The key objective of 3DC is to develop a framework in which a vehicle can be built and delivered to customer specification in minimal lead-times, with a three-day order-to-delivery as the ultimate goal.

The generic map of the current order fulfilment process presents the extent of the problem to order, build and deliver a new vehicle within a short lead-time (Figure 2). It uses process mapping to record information and physical flows during the order to delivery process. In response to the productivity gap between Japan and the West - highlighted by the best-seller, The Machine that Changed the World (Womack, Jones, & Rods, 1990) - the past two decades have seen vehicle manufacturers optimising their own production operations while transferring more responsibility to upstream and downstream partners. Figure 2 highlights the challenge for the industry today, where competitiveness no longer depends solely on assembly plant performance and 'metal bashing', but on the collaboration of all stakeholders across the entire vehicle delivery process - from extraction of raw material to final inspection at the dealership.

View Image -   Figure 2: Generic Map Showing UK Leadtime and Order Fulfilment Process (3Daycar)
View Image -   Figure 3: Current IT Barriers (Howard, 2000)

Identification of the barriers to change is essential if they are to be incorporated into planning for the redesign of the industry (Figure 3). This will promote a successful transition from the current mindset of 'production push' and the erosion of profits through discounted sales, towards responsive production and 'customer pull'. The following accounts explore the experiences of key industry stakeholders, and highlight the major difficulties both in identification and amelioration of information barriers.

CASE DESCRIPTION

Customer & Dealer

"We don't confirm the delivery date to the customer until the vehicle actually arrives at the showroom, so much can go wrong. " (Sales Director)

The lack of integration between Dealer Management Systems (DMS) and Dealer Communication Systems (DCS) is causing high levels of hand-keying and information duplication. Dealers operate two distinctly separate systems: DCS is linked with the VM and provides information on vehicle availability, price, incentive and orders. DMS provides the dealer with their own independent database of customer details, costs, and sales. When an order for a new vehicle is placed, significant levels of duplication occurs, where identical data such as vehicle description and owner details are hand-keyed into both systems. Ideally, dealers can do without the complexity and delay caused by maintaining two systems.

Other stand-alone PCs are also used to support activities such as finance schedules. Hence, in terms of changing the entire vehicle delivery process from a manual to an electronic system, much development is required, as there are still up to 20 'hard copy' documents per vehicle. For example, this research found the process to require an Order Form, Cash Back Claim Form, Vehicle Invoice, Supplementary Invoice, Vehicle Registration Certificate, Vehicle Swap Sheet, Vehicle Delivery Note, Purchase Invoice, Product Delivery Inspection Note, and Requisition Note.

Dealerships in the UK still operate within a territory, and their customer data is considered confidential both from the VM and other dealers. It is suggested that integration is possible if DMS system architects can be persuaded to use a common middleware implementation with DCS capable of masking specific data streams. This means that each system must retain the facility for hiding certain information fields from other organisations. Extensible mark-up language (XML) will be a key enabling technology in this situation. XML is a universal standard for representing any kind of structured data. 'Markup' means the insertion of information into a document to convey information about its contents. The power of the language is that users can access documents in an intelligent manner based on the grammar they use. Thus, specific files can only be accessed according to a standard, predetermined syntax.

System Support

The system support provided for dealers is often inadequate and not aligned with the needs of the business. Hardware choices promoted by the VM may be inappropriate. For example, current DCS satellite bandwidth is often too narrow to transmit all necessary information to the VM. Consequently, some dealers are reverting to traditional terrestrial systems. Due to the complexity of the process and the duplicative systems, training system administrators for the role can take between one and two years.

Despite Sunday being a busy day for order enquiries (confirmed by 3DayCar market research), no IT system back-up is provided by VMs because the weekend is traditionally reserved for system maintenance.

Liaison over systems designed for the dealer network does not appear to adequately involve 'Dealer Councils'. The manager of one dealership stated that he had heard of 13 new DCS software 'improvements' currently being prepared by the VM, but had not been consulted about any of them during their development process. There is a distinct feeling of 'IT Specialists' at the VM creating new software without working with the end user first. This extends to the use of the Internet by dealers for new car sales: the lack of their involvement in the VM's going online is making dealers uncertain of the future and provides the gap for new entrants, particularly Internet brokers, to enter the market.

Order Visibility & Customer Information Needs

Order visibility beyond stocks held in VM compounds and distribution is highly variable, but all dealers can see UK market stock for their franchises. If the vehicle required by the customer is visible in the stock locator, such as held in a compound or at another dealer, then response is either instantaneous or reasonably quick.

Once a factory order has been placed, some versions of DCS can provide data further upstream in production, but feedback can be slow. If the vehicle is in the VM pipeline, then it can take 24 to 48 hours for this information to be given to the dealer.

Some dealer franchises can see into production, others cannot. Some dealers can see all orders in the pipeline; some can only see their own orders. Some VMs raise all stock orders; some systems operate totally from dealer orders, requiring the dealer to phone another dealer who has an unsold model and 'agree to a swap' before they can acquire it and specify it for their customer. All systems allow different levels of order specification amendments.

Many DCS either do not give a delivery date, or have significant time delays in confirming them, which is a particular problem for customer-built orders. When dealers are given delivery dates on the system, these can and often do change and are not guaranteed. Dealers will add on days for quotation to the customer to compensate.

Dealers and customers need a search facility for stock and pipeline that supplies the information they need when they want it. If they request a certain specification, product mix, and delivery date, they want to know whether these service needs can be met, and what near matches are also available.

Uncertainty Over the Internet for New Car Sales

Dealers are in an uncertain position on how to embrace the Internet for new car sales. The introduction of vehicle selling over the Internet is seen as a threat by some dealers, concerned that they will lose significant market share of price driven, online purchasers either buying direct from the manufacturer or from importers such as Jamjar or Virgin Cars.com. Others feel that brokers such as Autobytel are building an Internet presence for dealers and customers in the gap left open by VMs. These brokers are able to advertise over any geographical area and allow customers to search for value offers by contacting many dealers quickly and efficiently. Some dealers feel that the customer prefers a face-to-face purchasing experience, built on the more traditional concept of 'service and trust' and that the Internet cannot replace these elements of new car buying.

'Clicks and mortar' summarises the use of the Internet in the USA where it is generally perceived as an extension to existing customer services and where vehicle enquiries are directed to the nearest available showroom. In the UK, leads to customers are being generated for dealers via manufacturer sites and brokers, but very little through their own sites. However, it must also be remembered that the UK is behind the US in most respects in e-commerce, although it is catching up fast. The 3DayCar National Franchised Dealer Association (NFDA) survey highlighted that dealers feel slightly threatened by the Internet, but would have faith in a 'clicks and mortar' approach if the manufacturers gave them more of a lead in implementing an integrated online new car sales presence.

Dealers & Change

Dealer IT Systems currently suffer from excessive hand-keying, duplication of processes and poor integration. They have largely failed to capitalise from the technological advances of the last decade, shown by their reliance on manual controls and hard copy documentation. However, to what extent have barriers emerged through a lack of technological integration as opposed to process re-engineering?

Significant conflict exists in vehicle retailing at present between the traditional 'territorial sales' approach encouraged by the VMs, and the 'empowered customer' approach currently being adopted by new entrant IT specialist companies. New entrants who offer customers the facility to trawl for a quote from any number of dealers, are undermining the current system based on local sales territories. Despite the imminent threat of losing market share to importers, the traditional boundaries between VM/ dealer and dealer/dealer remain, where system ownership and resistance to sharing is obscuring the potential benefits of a collaborative solutions. One dealer is quoted as saying:

"Technology is the easy bit, 90% of our problems are process related".

Vehicle Manufacturer

"The Internet is the 21st century equivalent of the moving assembly line." (Jac Nasser, Ford Motor Company CEO, 1999-2001)

'Batch Processing' represents a major IT systems barrier to 3DayCar where large numbers of customer orders are processed prior to production at a set time every 24 hours. The current configuration of VMs' systems typically results in individual mainframe systems updating overnight, processing batches or 'buckets' of orders in time intensive cycles that adds four to five days to the order lead time (Figure 4). Due to the fact that the information flow through the batch processing systems is largely un-sequenced, it is possible for the output of one process to miss the start of the next window, adding further time into the process.

IT managers confirmed that there was an increasing emphasis on developing the capability for building-to-order. Proposals had been made to 'speed up' the system by shortening batch processing periods to around 10 minutes (currently around four hours, overnight). This represents a logical progression for VMs that can avoid scrapping existing databases, and only needing to replace IT software in order for it to handle such a change.

IT System Legacy

Legacy systems were originally built for a 'different world' of IT capability, specific tasks, and where technology was associated with 'control'. Systems today are still driven by in-bound logistics and pushed by production, rather than by order demand.

View Image -   Figure 4: Generic IT Map of the Automotive Supply Chain (Howard, 2000)

It was found during the research that the total lead-time required to develop, pilot and 'roll-out' systems across several continents could be as much as 10 years. Once committed to an operational IT strategy, VMs have little choice but to complete them almost regardless of any changes to the external business environment that may occur during the period.

Changes to the IT infrastructure have been achieved in the past by simply 'bolting on' additional systems alongside existing mainframe architecture. For example, in the 1990s, PC-based, client-server architecture offered a powerful industry standard on which to base new systems. However, very few of the old systems were ever fully engineered out of the business and switched off, resulting in a mess of complex, overlapping networks. Today a typical production plant runs over 200 separate IT systems; hence, many VMs are faced with an expensive and ongoing burden of replacement and repair of an aging 'spaghetti' infrastructure.

Often, the fault lies not with the legacy databases themselves (the 'IBM AS 400' remains one of the most popular and reliable models from the 1980s), but the network of cabling, applications/software and user terminals, that require replacing without disrupting the order flow.

The introduction of 'middleware' technology such as Tuxedo (BEA Systems) has significantly increased the flexibility of writing IT applications as business services and linking this information with local area network and Internet-based environments. However, the success of this approach depends on the reliability of the legacy system. Some VMs have begun to recognise the weakness of simply building onto existing infrastructure and are now systematically replacing sections with 'modular solutions' that offer a universal platform and the flexibility to accommodate future change. There are products available now that allow core systems to be retained without having to renew the entire network.

Stovepipe/Chimney

IT systems tend to be designed to meet the specific objectives of the different players in the supply chain within an organisation. They are not, therefore, driven by true customer order fulfilment philosophy and inhibit smooth order flow. 'Stovepipe/chimney' refers to the mentality that focuses on the requirements of specific parts of the process without considering what effects may result in other areas. This multiplies the series of batch systems operating, such that once an order has entered the system, it is often invisible to the rest of the organisation and other supply chain partners until it reaches the order sequencing or operational scheduling stage.

The stovepipe/chimney mentality also extends inside the functions. Manufacturing is a particular example where, once an order enters the order bank, it often cannot be amended, before emerging from production in, at best, eight days time. The extent of IT legacy means that the ability of VMs to move toward a BTO environment is severely limited. VMs are largely governed by a centralised 'package' mentality, built around an in-bound logistics optimisation view rather than out-bound customer delivery. There is some evidence of a growing emphasis being placed on removing internal stovepipes and increasing system visibility. However, where this is the case, change is quoted by automakers on a timescale of five to 10 years.

Central Management Systems

Central management systems are popular amongst VMs because of the ease of maintenance and the purchasing advantage gained through economies of scale. However, the time lag introduced at regional plant level, where central batch processing cannot allow for local time differences, can result in higher levels of inventory.

The research also found examples of managers flying around Europe looking for the original IT system architect. In some cases, it took weeks to locate and resolve the system query because the problem originated from central VM headquarters, located on the opposite side of Europe.

Driven by material optimisation, IT systems are designed for the purchasing and in-bound logistics (pull to production) aspects of supply rather than for the flexibility to respond to individual markets (pull to customer demand). Is there a case for examining the balance between central versus regional systems?

Supplier

"Once you get past Tier one, there aren't any system standards." (IT Manager)

EDI Standards

Electronic Data Interchange (EDI) emerged in the early 1980s as a bespoke, dedicated communication link between two organisations for logistical and technical messaging. Suppliers perceive the major IT system barrier as a lack of adherence to EDI standards by VM's in terms of protocol and data format (label layout). Protocol means the language used during transmission: for example, OFTP (Odette File Transport Protocol) and TCPIP (Transport Control Protocol - Internet Protocol). Data format refers to the visual interface containing predetermined fields or subsets into which information is entered: for example, supplier name, address, date, material, and quantity.

Odette was set up as the original EDI system with the support of Ford Europe in the early 1980s, but they felt the system was not developing fast enough and went on to develop VDA and Fordnet. While many European Suppliers still use a version of Odette, France has developed its own system called Galia. No VM uses EDI in exactly the same way. The differences usually manifest themselves in the layout and content of the data. In an attempt to make systems more compatible, all VMs have pledged to adopt a new standard called Edifact where everyone will use universal 'fields' (i.e., NAD-Name and address, QTY - Quantity, DTM - Date and time) with free-text fields left for specific comments.

Currently, EDI format changes are made by VMs up to three times a year. Suppliers are already receiving messages in about a dozen different formats, all of which must be converted to a common standard before they can be processed internally. This all causes delay and disruption to the system, particularly in the event of a system malfunction. During the research it was calculated that each format change costs a supplier around two 'IT manager weeks' of labour. Considerable time is also spent with IT software consultants, where suppliers are understandably reluctant to build and maintain a customised system with diverse inputs from around a dozen demanding customers who seem to change their minds on a whim. Suppliers are currently concerned about the significant costs of IT system administration caused by the undisciplined approach by VMs and the implications of adopting new technology on an unregulated, firm-to-firm basis.

With traditional EDI, there is usually no acknowledgment, where messages are sent at a pre-agreed time to ensure the equipment is switched on and operating correctly. Internet communication offers many business-to-business benefits, particularly in areas such as automatic electronic invoicing that may soon become widespread across the industry. However, like many aspects of electronic communication discussed so far, homogenous procedures need to be established by all players.

Internet Security

There is some concern by suppliers who have adopted Web-enabled systems that do not offer sufficient reliability or security to conduct transactions between businesses. A total system failure, whether caused by the Internet or otherwise, cannot be buffered by the low stock levels typically held at most assembly plants. However, Internet security is being improved with the use of a virtual 'firewalls' which are inserted between the host organisation's core communication platform and the external electronic environment. Supply partners wishing to share information must first verify their identity via a password.

Some suppliers question whether the Internet is ready to support mission-critical operations, despite its success in other areas of commerce (e.g., Internet banking) where delay in delivering a message could ultimately mean the stopping of a vehicle assembly line. Accountability would ultimately rest with the supplier. The delays and occasional inconsistencies currently experienced in e-mail delivery, not to mention the new dimensions of Internet crime such as hackers and viruses, are regenerating some support for traditional, dedicated 'machine-to-machine' links such as bespoke EDI.

Visibility

Internet technology potentially offers total connectivity and visibility to the auto industry. At present, the component supplier does not know the true demand for his product. The end customer is seen as the VM, not the new car buyer. Current IT systems reflect this: There is no customer delivery date attached to any parts ordering. A component may be used within days of its despatch or may remain in inventory for a considerable period.

In the transition from traditional EDI to Web-enabled systems, the full potential of total visibility across the entire supply chain must be exploited: The system must not simply emulate the original functional, stovepipe/chimney mentality. A recent development is 'WebEDI' which emerged in the late 1990s using XML code and standard computers to offer a flexible, low-cost solution for suppliers seeking a connection to other business partners via the Web. It is increasingly used by tier 1 suppliers to overcome the high costs of installing bespoke EDI to connect smaller upstream partners, where improvements in efficiency and responsiveness can reduce the need for safety and buffer stock.

Questions remain about how suppliers will fit into the consortium automaker portals like the 'Covisint' Internet trade exchange founded in 2000 by Ford, General Motors, and DaimlerChrysler (also known as a portal or 'e-hub'). Some industry observers think a single automotive e-hub will evolve linking everything from the lowest-tier suppliers to dealers. Others believe a variety of exchanges will emerge, not a single online marketplace that dominates the industry. To date, the fortunes of the e-hub in the auto industry have been mixed, with Covisint suffering from a Federal antitrust case, delays in the introduction of new technology, and departures of a succession of CEOs. Current total investment in the hub stands at $500 million with still no sign of the business reducing its losses (ANE, 2004). Yet 'SupplyOn' is a successful third party managed hub originally founded by Bosch, which currently serves 2,700 suppliers. It receives a monthly subscription from each firm in return for the provision of electronic training, a connection service, and online collaborative product engineering software.

Logistics

"E-commerce and IT will wring out cost from our massive supply chain management systems." (Ford press release on their alliance with UPS Logistics, USA, 2000)

System Integration & Data Quality

In-bound logistics IT systems for materials and components to be delivered to the assembly line are more developed than out-bound vehicle distribution, but this contradicts the value of the goods carried. Despite having their own systems, the lack of contractual commitment given to logistics providers by VMs on out-bound delivery promotes a short-termism that hinders long-term investment and the development of new IT.

Vehicle manufacturer annual capacity is based upon a production plan and sales forecast, which will differ over the year. Capacity judgments by the logistics provider are based more on risk management than firm data. More information is required by logistics providers prior to vehicle release from production. The key issue is poor data on projected volumes and resource planning, as part of the general quality of advance information from VM's central control.

Labelling

In supplier-to-supplier logistics, or in-bound logistics, to the VM assembly plant, there are no universal standards in terms of Odette label formats. Upon receiving an EDI transmission, labels are individually printed off, attached to a crate or 'stillage', and the bar-code portion scanned before departure and upon arrival. However, subtle label format differences require significant levels of VM-specific knowledge by all individuals who come into contact with the system, creating confusion and inevitably resulting in time lost during the process.

Converting electronic data to 'hard-copy' documentation is becoming a very lengthy process for suppliers faced with delivering vehicle parts to depots in transit to other destinations. Typically seven duplicate copies of documentation per part are required, specifying carrier, warehouse, depots, and final destination. Some areas of in-bound delivery work well, assuming constant demand, such as sequenced in-line supply. However, it will be some time before logistics providers, suppliers and VMs achieve a truly 'paperless revolution' where electronic tagged containers automatically trigger a goodsreceived message as a truck completes its delivery, which in turn sets off a sequence of electronic billing.

Connectivity: Wide Area Networks & Extranets

Lack of connectivity is the main technical obstacle, particularly in current outbound logistics. Wide Area Networks (WANs) will replace Local Networks (LANs) and these WANs can be combined with company intranets to provide a shared space, an extranet, portal, or electronic hub. The combined power of e-hubs can be harnessed to provide a high portability of information, ease of transfer and access, eliminate re-keying of data and time lost on updates.

The replacement of traditional LAN-based access within companies by e-hubs will allow increased portability of information, reports and real-time data exchange between departments increasing their 'single world view'. This should improve the chance of non-contradictory messages from VMs being exchanged with supply chain partners, a common issue for logistics providers for out-bound transport. A common platform is needed to facilitate sharing spare capacity, particularly on return runs (called 'back loading') between rival haulage firms, although this requires significantly higher levels of trust between VM/logistics and logistics/logistics partners.

Planning & Routing

Load consolidation and planning is executed as vehicles come in from the manufacturer. There is no direct consideration of load consolidation and planning by the manufacturer in passing advance information to the out-bound logistics company. In a 3DayCar scenario, this would be unacceptable. Currently, around three days is given to move product, including time taken for consolidation.

Transport providers use off-the-shelf routing and load-planning software, but the development of more sophisticated network planning systems is under development and can learn from route planning. This software uses "genetic algorithms" that claim to cut journeys through experience and recalculation: A route is reworked over result generations to improve overall journey minimisation.

Proactive decision making systems are required, such as suppliers taking control of replenishment, based upon a signal to build for delivery date from order placement at the factory. Mid-journey re-routing could also be harnessed by logistics companies using global positioning system (GPS) and Internet technology in order to provide a '24/7' operating environment, which is totally responsive to changing requirements and takes into account fleet capacity. However, this represents a significant speculative investment for logistic providers.

CURRENT CHALLENGES FACING THE ORGANISATIONS

Organisations wishing to begin the transition from mass production to build-toorder face a number of significant challenges. This is because the problem lies less with 'technology', and more within the people who use it. A mindset change is needed away from vertical, hierarchical reporting and the optimisation of only part of the system (i.e., production) and toward embracing the concepts of information transparency and responsiveness from the perspective of the end customer. Four core challenges for the automotive industry as a whole are raised here:

1. There is considerable work to do in Europe (and the US) in building an electronic infrastructure that overcomes the proliferation of standards and protocols that creates so much additional work for supply partners. A situation where information systems expand through poor regulation, such as the case with bespoke EDI, must not be repeated with Web-enabled e-commerce.

2. Better measures are needed to encourage supply chain collaboration and the adoption of inter-organisational systems over the nature of the realised benefits from building-to-order, and a clearer vision over who - other than VMs - are likely to share in them.

3. A coordinated adoption of information systems across multiple stakeholders is needed, driven by 'electronic leadership' skills that are currently lacking at boardroom level. The premature departure of Jac Nasser as CEO of Ford shows that even top executives are not immune from the outcome of business decisions involving the Internet.

4. In order to meet the requirements of 3DayCar and build-to-order, there must be a reduction in the number of processes that an order goes through prior to production. Eventually, customer orders should be treated as 'batch sizes of one' capable of being handled in real time. Hence, a major challenge facing the automotive industry today is how to adopt an Internet-enabled inter-organisational system that supports total supply chain transparency and connects all stakeholders with the customer (Figure 5).

View Image -   Figure 5: Core Information Systems for 3DayCar
References

REFERENCES

ANE - Automotive News Europe. (2004). A decimated Covisint is put up for sale. p. 17.

ATKearney. (2003). Lean distribution in the United Kingdom, www.prnews.com/cnoc/ ATKlean

Business Wire (2001, Feb). Gartner survey shows US consumers prefer concept of build-to-order when buying an automobile.

Crain, K. (2002, Oct 15). Global market data book. Automotive News Europe.

Holweg, M., & Pil, F. (2001). Successful build-to-order strategies start with the customer. Sloan Management Review, (Fall), 74-83.

Howard, M. (2000). Current information technology systems: The barriers to 3DayCar. 3DayCar sponsor report. Ref: T3 - 7/100. Online: www.3daycar.com

Womack, J., Jones, D.T. & Roos, D. (1990). The machine that changed the world. Rawson Associates. 3DayCar - www.3daycar.com

AuthorAffiliation

Mickey Howard, University of Bath, UK

Philip Powell, University of Bath, UK

Richard Vidgen, University of Bath, UK

AuthorAffiliation

Mickey Howard is a researcher and lecturer in Operations and Information Systems at the School of Management, University of Bath. He worked in the UK for 10 years in industrial design and engineering using computer-aided design to bring to market a wide range of products -from furniture to automotive components. Dr. Howard joined the University of Bath as a research officer on the 3DayCar Programme in 1999. He holds a first class degree in Industrial Design from Newcastle Polytechnic, a Masters in Business Administration from Durham University Business School, and has recently completed his PhD in inter-organizational systems and e-business.

Philip Powell is deputy dean and professor of information management at the School of Management, University of Bath. Formerly, he was a professor of information systems, University of London, and director of the Information Systems Research Unit at Warwick Business School. Prior to becoming an academic, he worked in insurance, accounting and computing. Currently he is researching IS strategy and planning particularly for small businesses and in health care, IS evaluation, issues of flexibility in and from IS, inter-organisation systems, and e-commerce. He has authored five books on information systems and financial modeling and more than 80 refereed journal publications.

Richard Vidgen is a reader in information systems at the School of Management, University of Bath. He worked in information systems development in industry for 15 years, during which time he was employed by a large software firm, a high street bank, and as a consultant. Dr. Vidgen joined the University of Salford in 1992, where he completed a PhD in systems thinking and IS quality. He is the author of two books: Data Modelling for Information Systems (Pitman, 1996) and Developing Web Information Systems (Elsevier, 2002). His current research interests include e-Business quality, e-marketplaces, and IS development methods.

Subject: Automobile industry; Case studies; Order processing; Information systems

Classification: 8680: Transportation equipment industry; 9110: Company specific; 5240: Software & systems

Publication title: Journal of Cases on Information Technology

Volume: 7

Issue: 2

Pages: 16-30

Number of pages: 15

Publication year: 2005

Publication date: Apr-Jun 2005

Year: 2005

Publisher: IGI Global

Place of publication: Hershey

Country of publication: United States

Publication subject: Business And Economics--Computer Applications

ISSN: 15487717

Source type: Reports

Language of publication: English

Document type: Business Case

Document feature: charts diagrams references

ProQuest document ID: 198655375

Document URL: http://search.proquest.com/docview/198655375?accountid=38610

Copyright: Copyright Idea Group Inc. Apr-Jun 2005

Last updated: 2011-07-21

Database: ABI/INFORM Complete

Document 50 of 100

Up In Smoke: Rebuilding After an IT Disaster

Author: Ross, Steven C; Tyran, Craig K; Auer, David J; Junell, Jon M; Williams, Terrell G

ProQuest document link

Abstract:

On July 3, 2002, fire destroyed a facility that served as both office and computer server room for a College of Business located in the United States. The fire also caused significant smoke damage to the office building where the computer facility was located. The monetary costs of the disaster were over $4 million. This case, written from the point of view of the chairperson of the College Technology Committee, discusses the issues faced by the college as they resumed operations and planned for rebuilding their information technology operations. The almos-ttotal destruction of the college's server assets offered a unique opportunity to rethink the IT architecture for the college. The reader is challenged to learn from the experiences discussed in the case to develop an IT architecture for the college that will meet operational requirements and take into account the potential threats to the system. [PUBLICATION ABSTRACT]

Full text:

Headnote

EXECUTIVE SUMMARY

On July 3, 2002, fire destroyed a facility that served as both office and computer server room for a College of Business located in the United States. The fire also caused significant smoke damage to the office building where the computer facility was located. The monetary costs of the disaster were over $4 million. This case, written from the point of view of the chairperson of the College Technology Committee, discusses the issues faced by the college as they resumed operations and planned for rebuilding their information technology operations. The almosttotal destruction of the college's server assets offered a unique opportunity to rethink the IT architecture for the college. The reader is challenged to learn from the experiences discussed in the case to develop an IT architecture for the college that will meet operational requirements and take into account the potential threats to the system.

Keywords: data security; disaster plan; educational IS; information infrastructure; IS architecture; IS failure; IS operational planning; IS planning issues; IS planning objectives; IS problems; issues in organizing IS; risk assessment

ORGANIZATIONAL BACKGROUND

Western University1

Western University (WU) is a public, liberal arts university located on the west coast of the United States. The university's student enrollment is approximately 12,000. WU focuses on undergraduate and master's level programs and is comprised of seven colleges, plus a graduate school. WU receives much of its funding from the state government. The university has earned a strong reputation for educational quality, particularly among public universities. In its 2003 ranking of "America's Best Colleges," US News & World Report ranked Western University among the top 10 public master'sgranting universities in the United States. The university community takes pride in WU's status. According to Dr. Mary Haskell, President of WU, "Continued ranking as one of the nation's best public comprehensive universities is a tribute to our excellent faculty and staff. We are committed to maintaining and enhancing the academic excellence, personal attention to students and positive environment for teaching and learning that has repeatedly garnered Western this kind of recognition."

College of Business Administration

The College of Business Administration (CBA) is one of the colleges at WU. CBA's programs focus on junior and senior level classes leading to degrees in either Business Administration or Accounting. In addition, CBA has an MBA program. About 10% of the students at WU (1,200 FTE) are registered as majors in the CBA. Each year, CBA graduates roughly 600 persons with bachelor's degrees and about 50 with MBA degrees.

CBA has four academic departments - accounting, decision sciences, finance and marketing, and management - each of which has about 20 full-time or adjunct faculty members and an administrative assistant. Other academic and administrative units for the college are the college office, three research centers, and the CBA Office of Information Systems (OIS) - about 20 persons total.

View Image -   Figure 1: Partial Organization Chart for Western University

Organizational Structure of Information Systems at Western University & CBA

The organizational structure of information technology (IT) support services at WU includes both centralized and decentralized units. Figure 1 shows a partial organizational chart for WU that depicts the different groups and personnel relevant to the case.

WU Information Systems

WU's Office of Information and Technology Services (OITS) group is a large centralized organization that provides university-level services to the WU administration, the seven colleges, and students. OITS is headed by the Vice-President for Information Systems Services Ken Burrows and is organized into three areas: User Support (US), Administrative Services (AS), and Information Technology Services (ITS). OITS has offices in Thompson Hall, which houses the WU administration offices, and the Administrative Center located approximately one mile off campus on 23rd Street (and more often called "23rd Street" than by its proper name of "Administrative Center"). The 23rd Street facility contains a secure, fire-protected, emergency power equipped server room. The OITS main offices and US are located in Thompson Hall, while ITS and AS are located at 23rd Street. The key server computers that are operated by OITS are summarized in Table 1.

View Image -   Table 1: Server Computers at Western University and CBA

CBA Information Systems

While some of WU's colleges rely almost completely on the OITS group for all of their IT service needs (e.g., management of data servers, end user support, etc.), other colleges - including CBA - have created their own decentralized IT unit to address specific information service needs. CBA's Office of Information Systems (OIS) was created in 1985 to provide systems support to CBA's microcomputer lab and faculty workstations, which were the first on campus. Although OITS now provides support for these types of systems, CBA has elected to continue its OIS function. CBA's OIS staff provides most of the information systems and technology services used by CBA, including its 55-workstation computer lab.

CBA's OIS group is located in Mitchell Hall, which is CBA's office building. Mitchell Hall is an older building that lacks a number of features that are common in newer buildings. For example, at the time of this case, Mitchell Hall had fire alarms that could be triggered manually, but it did not have automatic fire alarms that would detect a fire and then contact the fire department and shut off the ventilation system (shutting down the ventilation system is critical to reduce smoke damage). Office and work space in Mitchell Hall was at a premium. The OIS group's computers and operations were limited to a cramped office that was about 30 feet long and 15 feet wide. This space was home to 13 computer servers, a variety of technical equipment, numerous file cabinets and bookshelves, and the OIS staff.

Table 1 lists CBA servers that existed at the time of the fire. CBA servers were named after states. While some of the servers were new and powerful machines, others were upgraded workstations that were used for low demand special purpose applications. The age of the CBA servers ranged from one year old to six years old.

Due to a tight operating budget, the staffing resources for CBA's OIS group were very limited. The OIS group had two full-time employees who were supplemented by numerous part-time student employees. The Director of Information Systems for OIS was Bill Worthington, who had been in the position for over five years. Worthington had extensive operating experience with a number of technologies and operating system environments.

In early 2001 CBA hired Don Clark to serve as the OIS group's second full-time employee. Clark's title was manager of Information Technology, and his job was to manage operations for the OIS group. Clark knew the people and information systems of CBA very well, since he had worked under Worthington the previous two years before he graduated from CBA with an MIS degree.

CBA's Technology Committee

CBA has a Technology Committee that provides advice to the dean and OIS concerning a variety of matters involving the planning, management, and application of technology in CBA. At the time of the case, the committee was chaired by an MIS professor named Sam Moss. Other members of the committee included other MIS faculty and representatives from each of the CBA departments - usually the most technology-literate persons in those departments.

SETTING THE STAGE

On the evening of July 3,2002, a fire destroyed many components of the information systems infrastructure for CBA, including virtually all of the server machines for CBA's computer network. To help provide a context for understanding the issues associated with IT disasters, this section provides an overview of the topic of disaster recovery, followed by a description of the fire disaster incident at CBA and a summary of the key people and places involved with the disaster and subsequent recovery process.

Information Technology Disasters & Disaster Recovery

An information technology (IT) disaster can be considered any type of event that may significantly disrupt IT operations (Lewis, Watson, & Pickren, 2003). Examples of disasters range from events that are more ordinary (e.g., an IT move or upgrade) to those that are more dramatic (e.g., a hurricane). A recent study analyzed all disaster recovery events (a total of 429) handled by a large international provider of disaster recovery services during the period from 1981 to 2000 (Lewis et al., 2003). This study identified the most common types of disaster events, as well as the degree of disruption caused by the events. Seven types of disasters were found to be most common, with the disaster categories of "natural event" and "IT failure" being the most frequent types of disasters encountered. While disasters associated with fires and IT moves/upgrades were not as common, the study found that the potential for extended periods of disruption for these types of disasters were particularly high (Table 2).

While IT disaster recovery has long been an important issue for organizations (e.g., Rhode & Haskett, 1990), the issue of IT disaster recovery gained a higher profile and sense of urgency following the terrorist attacks on September 11, 2001 (e.g., Eklund, 2001). Although many organizations may not feel threatened by terrorism, most organizations are vulnerable to some form of disruption to their IT operations. For example, the electrical blackout that hit the northeastern section of the United States in August 2003 exposed many businesses to vulnerabilities in their ability to handle a disaster (Mearian, 2003). Given the importance of IT operations to contemporary organizations, it is critical for organizations to be prepared. Unfortunately, industry surveys indicate that many organizations are not as prepared as they should be (Hoffman, 2003). In particular, small and medium-sized organizations tend to be less prepared, often due to limited IT budgets (Verton, 2003).

View Image -   Table 2: Most Frequent Types of IT Disasters (Adapted from Lewis et al., 2003)

Disaster planning can require significant time and effort since it involves a number of steps. As described by Erbschloe (2003), key steps in disaster planning include the following: organizing a disaster recovery planning team; assessing the key threats to the organization; developing disaster-related policies and procedures; providing education and training to employees; and ongoing planning management.

The Night of July 3, 2002

The fire disaster event at CBA occurred on the night of Wednesday, July 3, 2002. During this evening, the WU campus was quiet and deserted. The following day was Independence Day, which is a national holiday in the United States. The July 4th holiday is traditionally a time when many people go on vacation, so a large number of WU faculty and staff who did not have teaching commitments had already left town. The library and computer labs on campus were closed at 5 p.m. in anticipation of the holiday, and custodial staff took the evening off.

The quiet mood at the WU campus on the evening of July 3rd changed considerably at 10:15 p.m. when a campus security officer spotted large amounts of smoke emerging from Mitchell Hall. The officer immediately reported the incident to the fire department. Within minutes, Mitchell Hall was surrounded by fire trucks. The fire crew discovered that a fire had started on the third floor of Mitchell Hall. Fortunately, the fire fighters were able to contain the fire to an area surrounding its place of origin. Considering that Mitchell Hall did not have an automated smoke alarm system, the structural damage to the building could have been much worse. As noted by Conrad Minsky, a spokesman for the local fire department, "If it hadn't been for [the security officer's report of the smoke], the whole building probably would have burned down." Unfortunately, the room where the fire started was Mitchell Hall 310 (MH 310), the central technical office and server room for CBA - where virtually all server hardware, software, and data for CBA were located.

The dean of CBA, Peter James, and the Director of CBA's OIS, Bill Worthington, were called to the scene of the fire late on the night of July 3rd. Their hearts sank when they learned that the fire had started in MH 310 and that it had completely devastated the contents of that room. Due to the fire department's protocols involving forensic procedures at a disaster site, neither James nor Worthington was initially allowed into the area near MH 310. However, based on what they could see - numerous fire fighters in full gear coming in and out of the Mitchell Hall building - they could imagine a grim situation inside the building.

There wasn't much that James or Worthington could do that evening, other than wonder if anything could be saved from the room and what it would take to recover. James found a computer on campus from which he could send an e-mail message to the CBA staff and faculty, most of whom were blissfully unaware of the disruption that was about to happen in their lives. The e-mail sent by Dean James is shown in Figure 2.

After the Smoke Had Cleared

After the fire fighters managed to put out the fire and clear the area of smoke, the fire department's forensic team closely examined the burn site. The extent of the damage to MH 310 and its contents was complete. According to the fire department spokesman Conrad Minsky, "It was cooked beyond belief. It was so hot in there that a lot of the [forensic] evidence burned ... All we saw was just huge clumps of melted computers." The extent of the damage is illustrated in Figure 3, which shows a picture of a MH 310 server rack shortly after the fire was extinguished. Based on the evidence available at the scene, the forensic team concluded that an electrical fire in one of CBA's oldest server computers had started the blaze. Once the fire started in the server, it slowly spread to other servers in a slow chain reaction. Since the servers were not in contained fire-proof server racks, there was nothing to stop the initial server fire from spreading. Ultimately, the entire server room and all of its contents (including technical equipment, furniture, back-up tapes, and papers) were destroyed.

View Image -   Figure 2: E-Mail Message from Dean James
View Image -   Figure 3: Computer Server Rack in Mitchell Hall 310 Following the Fire

CASE DESCRIPTION

This section discusses the key activities and issues that confronted the members of the CBA IT staff and administration following the fire. As is the case with many disaster events, it took some time for the people involved to get a complete understanding of the extent of the disaster and its implications. Once the situation was assessed, a number of issues needed to be addressed to deal with the disaster. These issues included data recovery, the search for temporary office space and computing resources, rebuilding Mitchell Hall, and disaster funding.

The Morning After

Sam Moss, MIS Professor and Chair of the CBA Technology Committee, awoke on the morning of July 4th looking forward to a day of relaxation - a bit of work around the house capped off by a burger and a brew while he and his friends watched the civic fireworks show that evening. Little did he realize that the real fireworks had happened the evening before.

Moss always checks his e-mail, even on a holiday. He was, of course, rather disturbed to see the message from Dean James about the fire in Mitchell Hall. Moss's first reaction was to try to visit a web site that he maintained on his experimental server, Iowa, which was located in his office. Much to his relief, the web site responded and appeared to be working as usual.

Moss also tried to access the CBA web site, which he had developed with another colleague (Chanute Olsen), as well as files maintained on the CBA faculty data server. Neither of these last two attempts was successful.

Upon first reading, the Dean's message did not convey the full impact of the loss

of systems to Moss, who hoped that the servers might be recoverable. Moss knew that the CBA office maintained tape backups of the directories containing the web site, faculty, and student data. While he expected a few weeks of disruption, he anticipated that CBA's IT operations would be in pretty good shape shortly.

Moss was very familiar with the techniques for remote access to Iowa and other college and university systems (see Microsoft Corporation, 2004a, and Novell Corporation, 2004, for examples of remote access software). Concerned that access to his office, where Iowa was located, might be limited for a few days, Moss immediately copied the backup files of his database projects and those of his students to his home machine. He also copied .ASP (active server page) files and any other documents that would be difficult to replace.

Moss contacted Dean James later in the day via e-mail. Moss made his remarks brief: "Iowa appears to be OK, we can use it as needed as a temporary server." ... and ... "Would you like me to convene the College Technology Committee to provide advice for the rebuilding of our technology support?" James's response was that he appreciated the offer of Iowa, and yes, he wanted advice on "How should we rebuild?" The following sections summarize what was learned and what was done by key players during the month after the fire. These items are not in chronological order; they are a summary of what Moss learned as he prepared to address the issue of rebuilding the college's IT architecture.

Determining the Extent of Data Loss

The first question, of course, concerned the state of the data back-up tapes of the CBA servers. Unfortunately, the situation regarding the back-ups was discouraging. While nightly data back-ups had been made, the tapes were stored in MH 310. Copies were taken off-site every two weeks. At the off-site location, the most recent copies of data and documents from Wisconsin and Missouri were dated June 16 - the last day of Spring Quarter. All of the more recent backup tapes were located on a shelf near the server machines and had been destroyed in the fire. On Maryland, the static pages and scripts to create dynamic pages (e.g., a list of faculty drawn from the database) of the CBA web site had been backed up, but the SQL Server database (which included data as well as stored procedures and functions) on that machine had not been backed-up. According to Worthington, the college was waiting for special software needed to backup SQL Server databases.

In addition to the back-up tapes, there were several other sources of backed-up data; however, these sources were rather fragmented. For example, many professors worked on the files for their university web sites from home and used FTP (file transfer protocol) to copy the updated files to the web server. Their home copies were, in effect, back-ups. Moss had made some changes to the CBA web site pages the evening of July 2nd and had copies of those pages on his home system. The Iowa server in Moss's office had been used as the test bed for the database portion of the web site; therefore it contained the structure of the database, but neither the most recent data nor the stored procedures and functions.

Although no desktop machines, other than those in MH 310, were burned in the fire, they were not readily available immediately after the event. Smoke and soot permeated the building. There was a concern that starting these machines, which were turned off at the time of the fire, might lead to electrical short circuits and potentially toxic odors and fumes. The decision was made to clean these machines before restarting them.

Recovery & Repair of Smoke-Damaged Systems

Within 48 hours of the fire, the university contracted with BELFOR International to help with clean-up. BELFOR specializes in disaster recovery and restoration. Examples of high profile disasters that BELFOR responded to in 2003 included the major wildfires in California and hurricane Isabel in the eastern United States (BELFOR, 2004). With extensive experience with disaster recovery and regional offices in Seattle, Portland, and Spokane, BELFOR was well-positioned to respond to the Mitchell Hall fire incident. BELFOR's areas of expertise included restoration of building structures, office equipment, and paper documents.

Based upon BELFOR's initial analysis, none of the computer systems, nor any of their components, from MH 310 was deemed recoverable. On the other hand, all other computers in the building escaped heat and water damage and could be "cleaned" and continued in service. These machines contained valuable data and were set up with individual users' preferences. Recovering them would be a major benefit.

The cleaning procedure for computers was a labor intensive process that involved immersion in a special water solution followed by drying and dehumidification. Systems units, monitors, and most printers could be cleaned. Keyboards, mice, and speakers were cheaper to replace than to clean. Most of these systems were cleaned in the 30 days following the fire and then stored until the reopening of the building in mid September. The college identified a few critical systems, based on the data they contained, for expedited cleaning and return to service.

Sources of Funding for Disaster Recovery

The cost of cleaning Mitchell Hall and rebuilding the computer system was significant. Estimates rose dramatically during the period that followed the fire. The initial estimate was $750,000. However, ongoing investigation of the damages and building contamination indicated that the total cost would be much higher. By the end of July, the university issued a press release indicating that the costs required to replace equipment and make Mitchell Hall ready for classes would be approximately $4 million. In fact, the final cost was about $4.25 million.

The repair costs were high because of smoke and water damage. The ventilation system in Mitchell Hall had used fiberboard ducts instead of metal ducts, and these had absorbed smoke and particles during the fire. The ducts could not be cleaned and had to be completely replaced on the top three floors. This required new ceiling tile installations to accommodate the new locations of the ventilation ducts. Carpets on these three floors also had to be replaced. MH 310 was completely gutted and rebuilt starting with the metal studding in the walls. The remainder of the third floor had the drywall walls torn out and replaced. In addition, the electrical and network infrastructure was rebuilt, which required completely rerunning the associated wires back to an electrical closet on the third floor. BELFOR handled the cleaning for all computers and other electronic equipment that was of sufficient economic value to justify the work. These cleaning costs totaled more than $100,000. The replacement costs for computer equipment and software that had been lost in the fire was approximately $ 150,000 - an amount that did not include the labor required to install and test the hardware and software.

The cost of the recovery was paid from two sources. WU had a specialized Electronic Data Processing (EDP) insurance policy to cover hardware losses. This policy provided up to $250,000 (on a "replacement cost" basis) less a $25,000 deductible. The other source of funds was a self-funded reserve set up by the state. The amount of money provided from this fund was determined by the State Legislature. President Haskell invited several legislators to campus and conducted first-hand tours of Mitchell Hall so that they could view the damage. Based on their review of the situation, the State Legislature provided a sufficient amount of funding to WU to rebuild Mitchell Hall and to replace all the hardware and software that had been destroyed. In a press release, President Haskell stated "We are very pleased with the timely and supportive action from legislative leaders and the Governor's office."

Temporary Quarters

Office space on the WU campus is at a premium. Fortunately, there was a small area in WU's administration building, Thompson Hall, which had been recently vacated. This office, with perimeter cubicles surrounding a large open area, became the temporary location of CBA's department offices. Each department chair and each department secretary had a workspace with a desk, phone, and limited storage for files and books. The offices had connectivity to the campus network. An open area was converted to a "bull pen" for faculty use and small group meetings.

Because the incident happened in the summer, it was relatively easy to relocate the classes. During the school year, university classrooms are at 100% utilization during mid-day class hours but in the Summer Quarter, less than 50% utilization is common. The only class sessions lost were for the few classes scheduled to meet on Friday, July 5th. Classes resumed as usual on July 8th, although in different rooms. Those that had been assigned to meet in the Mitchell Hall computer lab were relocated to another lab on campus.

Computer Hardware Resources Available for Immediate Use

For the immediate term, CBA was able to make use of 15 computers that had been received but not yet deployed in Mitchell Hall. These machines had been ear-marked as replacements for older systems and for recently hired faculty due to arrive in the fall. Fortunately, these systems were being held in the 23rd Street facility. They were quickly configured and delivered to the offices in Thompson Hall.

The MIS program at Western had a set of 20 notebook computers that were used for classroom instruction as part of a "mobile computer lab." At the time of the fire, they were stored in a locked cabinet in a second floor room in Mitchell Hall. These computers were examined by the health inspectors and deemed safe to use (i.e., cleaning was not needed). These machines contained wireless network cards and were configured with the Microsoft Office suite. No MIS classes were scheduled to use this lab during the summer, so these computers were signed out to faculty who did not have sufficient capacity in their home systems. The combination of new systems, the notebook computers, and individuals' home systems was sufficient to equip all staff and faculty with adequate workstations.

The loss of servers was much more problematic. The college lost every server it had with the exception of Iowa - the research and development server running Windows 2000 Server and MS SQL Server 2000. Iowa was located in Moss's office on the third floor. Although this location was less than 100 feet from the scene of the fire, Iowa had been relatively protected in Moss's office. Because Iowa had been operational continuously since the start of the fire and had not shown evidence of any problems, Moss and Worthington decided to keep it in operation (not clean it). Iowa was relocated to a well-ventilated area in the Thompson Hall offices.2

The university maintains many servers: a series of Novell systems used for student and faculty data, a server running Windows NT devoted to academic use, and a UNIX server used for most university, faculty, and student web pages. Worthington was able to negotiate for space on one of the Novell servers to hold the data that had been stored on Wisconsin and Missouri.

Recovering Files from Novell OS Servers

Immediately following the fire, Worthington obtained temporary workspace in the 23rd Street building and set out to recover the data from the June 16th tapes. He quickly ran into a severe stumbling block. CBA used digital tape equipment that was newer than the drives attached to Kermit, WU's Novell server. Fortunately, a tape drive in the correct format was attached to Grover, WU's UNIX server. To recover data from Wisconsin and Missouri, it was necessary to copy the tape contents to a disk on Grover; then write the data to tapes in the format of the drives attached to Kermit, and finally restore from those tapes. Most of the data was available within a week, thanks to Worthington's diligent efforts.

Back on the Web

The Windows servers that were used to support CBA's WWW sites and database applications were also lost. As it turned out, the process of recovering and recreating this data took much longer than the Novell files and was not completed until July 31st. Worthington was able to recover portions of the CBA web site which had been backed up on June 16th. The recovered data consisted of those folders that professors and department chairs had prepared for their web sites. As the files were recovered, they were copied onto the Iowa server. Unfortunately, the database data for the CBA WWW site, including the views and stored procedures used to execute queries, had not been backed-up to tape and were lost.

Sam Moss and Chanute Olsen set about to reestablish the site as quickly as possible. Once Iowa was operating in its new location in Thompson Hall, they arranged for the DNS entry for the web site to point to Iowa's IP address. They quickly rebuilt portions of the database and copied as much data as they could from other sources. On his home computer, Moss had current copies of many of the Active Server Page (ASP) files that were used to extract data and format the data for the page displays on CBA's WWW site. Moss immediately loaded these files onto Iowa. Unfortunately, Moss did not have copies of ASP files on the Windows server that had been maintained by others. These files ultimately had to be recreated from scratch.

Much of the information displayed on the college web site was drawn from a database. Maintenance of the database data was done by the department chairs and secretaries. Once Iowa was fully operational, these persons had to re-enter data about their departments.

Moss and Olsen contacted the professors who had sites on the college web site. For those who had home back-ups of their data, it was easy to recreate their sites on Iowa. Those who did not have a back-up were forced to wait until files were copied from the back-up tapes. By the first of August, all web sites had been restored and most of the database entries had been recreated.

CURRENT CHALLENGES/PROBLEMS FACING THE ORGANIZATION

During the period following the fire, Moss thought about the challenges that the college would face once the immediate tasks of restoring data and temporary operations were accomplished. He knew that a major task would be rebuilding the College's IT operations. Moss would need to work with his College Technology Committee through the months of July and August to come up with recommendations. As Moss pondered the situation, he realized that there were many unanswered questions, which he organized into two categories:

* Planning for IT architecture : What system applications and services were needed at CBA? What were the hardware/operating system requirements for these applications? How should the applications and services for CBA be allocated across servers? How many servers should CBA acquire? Where should the servers be physically located, and under whose control?

* Assessment of threats: What were the disaster-related threats to the CBA information systems? Would it be possible to design a CBA IT architecture that would minimize the impact of disaster and facilitate disaster recovery?

Planning for the Information Technology Architecture

Issues concerning IT architecture were at the top of Moss's list. As discussed by Seger and Stoddard (1993), "IT architecture" describes an organization's IT infrastructure and includes administrative policies and guidelines for hardware, software, communications, and data. While one option for CBA would be to replicate the architecture that had been destroyed, Moss did not believe that this would be the best way to go. The array of servers and systems before the fire had grown on an "as needed" basis over time, rather than guided by any master plan. While the previous system had worked, Moss wondered if there might be a different, more effective IT architecture for CBA. Since CBA would need to rebuild much of its IT operations from the ground up in any event, Moss thought that it would be worthwhile to take this opportunity to re-examine the IT service requirements and the way that the requirements would be implemented. By doing so, it was possible that the college might adopt a new IT architecture.

Moss was aware that an important first step in IT architecture planning is to determine the applications and services that will needed (Applegate, 1995). To kick off the IT architecture planning process, Moss sent an e-mail message to all faculty and staff on the morning of July 8th. The purpose of the message was to solicit input from the CBA user community regarding IT service requirements. The e-mail message is shown in Figure 4.

By learning more about the desired IT applications and services, Moss and his committee would be able to determine the types of application software that could be used to provide the specified services. This information would be useful, as it would have implications for the types of operating systems that would be needed. Due to operational considerations, Moss anticipated that no more than one type of operating system would reside on any given server. After the services were identified and the operating systems requirements were determined, the next step would be to decide on the number and type of server machines. Based on input from Worthington and others, Moss knew that an "N-tier" type of IT architecture would offer useful advantages for CBA. An N-tier design (also called multi-tiered or multi-layered) would involve separating data storage, data retrieval, business logic, presentation (e.g., formatting), and client display functions. One benefit of an N-tier design is that the development staff can focus on discrete portions of the application (Sun Microsystems, 2000). Also, it makes it easy to scale (increase the number of persons served) the application and facilitates future change because the layers communicate via carefully specified interfaces (Petersen, 2004). Although multiple tiers may reside on the same server, it is often more efficient to design each server to host specific parts of the application. For example, database servers perform better with multiple physical disks (see McCown, 2004). The use of more than one server can also complement security offered by network operating systems. For example, CBA provided file storage services for both faculty and students. Although these services could be hosted on a single machine, allocating the services on separate machines, and not allowing any student access to the "faculty" machine, would provide additional security for faculty files (e.g., student records, exams, faculty research).

View Image -   Figure 4: E-Mail Message from Sam Moss

As Moss received responses to his e-mail message, he organized the responses in a table to help him and his committee analyze the requirements. As indicated in Table 3, Moss had organized his list of application and service requirements for CBA into different categories based on the type of server that might be used to host the services. A variety of different types of servers may be used in an N-tier architecture. Examples of some of the different types of servers and their functions include the following (TechEncyclopedia, 2004):

* Application server. The computer in a client/server environment that performs the business logic (the data processing). For WWW-based systems, the application server may be used to program database queries (e.g., Active Server Pages, Java Server Pages).

* Database server. A computer that stores data and the associated database management system (DBMS). This type of server is not a repository for other types of files or programs.

View Image -   Table 3: CBA IT Requirements

* Directory services: A directory of names, profile information and machine addresses of every user and resource on the network. It is used to manage user accounts and permissions.

* File server: A computer that serves as a remote storage drive for files of data and/ or application programs. Unlike an application server, a file server does not execute the programs.

* Print server: A computer that controls one or more printers. May be used to store print output from network machines before the outputs are sent to a printer for printing.

* Research and development server. A local name used at CBA to describe a computer that is used for developing and testing software and programs. A single R&D server often hosts multiple tiers because demand (i.e., number of clients served) is light.

* Tape back-up server. A computer that contains one or more tape drives. This computer reads data from the other servers and writes it onto the tapes for purposes of backup and archive.

* Teaching server. Another local name used at CBA to describe a computer that is used for educational purposes to support classroom instruction in information systems courses (e.g., WWW development, database management, network administration).

* Web server. A computer that delivers Web pages to browsers and other files to applications via the HTTP protocol. It includes the hardware, operating system, Web server software, TCP/IP protocols, and site content (e.g., Web pages and other files).

Assessment of Threats

It was clear to Moss that the College had not been well positioned to handle an IT disaster. Although many books on IT management include references to disaster planning (e.g., Frenzel & Frenzel, 2004), the college had been too busy handling day-to-day IT operations to devote resources to disaster planning. Moss resolved to ensure that the next disaster, if there was one, would not be as traumatic. As part of this process, Moss wanted to identify the threats to CBA's IT system (Microsoft Corporation, 2004b). As suggested by Table 2, Moss knew that IT disaster threats can come from the physical environment (e.g., WU's location makes it susceptible to both earthquake and volcanic activity), from machine failure, and from human causes. With the help of the technology committee, Moss set out to identify the primary threats.

Once Moss and his committee had generated the list of threats to CBA's IT operations, he hoped to design the IT architecture in a way to minimize the impact of any future disasters and facilitate future disaster recovery. Toigo (2000) has pointed out that decentralized IT architectures, such as a N-tier design, involve special considerations for disaster planning. To help minimize the impact of disaster, Tiogo recommends that a decentralized system include high-availability hardware components, partitioned design, and technology resource replication. For example, having similar machines in multiple locations may provide an immediate source of back-up computing resources (as illustrated by the use of Iowa and Kermit after the CBA fire). Moss planned to arrange meetings with both OIS and OITS personnel to determine how CBA and WU could shape its IT architecture plan to minimize the impact of any future disaster.

Footnote

ENDNOTES

1 The facts described in this case accurately reflect an actual disaster incident that occurred at a university located in the United States. For purposes of anonymity, the name of the organization and the names of individuals involved have been disguised.

2 In the two years since the incident, Iowa has operated continuously with no hardware problems. The monitor was cleaned and the mouse and keyboard were replaced, but the only cleaning the system unit received was a wipe of the outer surface. Iowa initially emitted a pungent smell, but that odor disappeared after two to three weeks.

References

REFERENCES

Applegate, L. M. (1995). Teaching note: Designing and managing the information age IT architecture. Boston, MA: Harvard Business School Press.

BELFOR (2004). BELFOR USA News. Retrieved May 30, 2004: http://www.belfor.com/ flash/index.cfm?interests__id=41&modul=news&website_log_id=27802

Burd, S.D. (2003). Systems Architecture (4th edition). Boston, MA: Course Technology.

Eklund, B. (2001). Business Unusual. netWorker, December, 20-25.

Erbschloe, M. (2003). Guide to Disaster Recovery. Boston, MA: Course Technology.

Frenzel, C.W., & Frenzel, J.C. (2004). Management of information technology. Boston, MA: Course Technology.

Hoffman, M. (2003). Dancing in the Dark. Darwin, September 1.

Lewis, W., Watson, R.T., & Pikren, A. (2003). An Empirical Assessment of IT Disaster Risk. Communications of the ACM, 46(9ve), 201-206.

McCown, S. (2004). Database Basics: A few procedural changes can help maintain high performance. InfoWorld, February 20.

Mearian, L. (2003). Blackout tests contingencies. ComputerWorld, August 25.

Microsoft Corporation (2004a). Windows 2000 Terminal Services. Retrieved May 27, 2004: http://www.microsoft.com/windows2000/technologies/terminal/ default.asp

Microsoft Corporation (2004b). Microsoft Operations Framework: Risk Management Discipline for Operations. Retrieved June 1, 2004: http.//www.microsoft. com/ technet/itsolutions/techguide/mof/mofrisk.mspx

Novell Corporation (2004). Novell iManager. Retrieved May 27, 2004: http:// www.novell.com/products/consoles/imanager/

Petersen, J. (2004). Benefits of Using the N-Tiered Approach for Web Applications. Retrieved June 1, 2004: http://www.macromedia.com/devnet/mx/coldfusion/articles/ntier.html

Rhode, R. & Haskett, J. (1990). Disaster Recovery Planning for Academic Computing Centers. Communications of the ACM, 33(6), 652-657.

Seger, K. & Stoddard, D.P. (1993). Teaching Note: Managing Information: The IT Architecture. Boston, MA: Harvard Business School Press.

Sun Microsystems (2000). Scaling the N-Tier Architecture. Retrieved June 4, 2004: http://wwws.sun.com/software/whitepapers/wp-ntier/wp-ntier.pdf

TechEncyclopedia (2004). Retrieved June 2, 2004: http://www.techweb.com/ency-clopedia

Toigo, J.W. (2000). Disaster Recovery Planning (2nd edition). Upper Saddle River, NJ: Prentice-Hall.

Verton, D. (2003). Tight IT budgets impair planning as war looms. ComputerWorld, March 10.

AuthorAffiliation

Steven C. Ross, Western Washington University, USA

Craig K. Tyran, Western Washington University, USA

David J. Auer, Western Washington University, USA

Jon M. Junell, Western Washington University, USA

Terrell G. Williams, Western Washington University, USA

AuthorAffiliation

Steven C. Ross is an associate professor of MIS at Western Washington University (WWU) and was previously on the faculties of Montana State and Marquette Universities. He holds degrees from Oregon State University (BS) and the University of Utah (MS, PhD), and conducts research in the areas of microcomputer software, systems development, and applications of database technology.

Craig K. Tyran is an associate professor of MIS at WWU and was previously on the faculties of Oregon State and Washington State Universities. He holds degrees from Stanford (BS, MS), UCLA (MBA), and the University of Arizona (PhD), and conducts research in the areas of technology support for collaboration and learning.

David J. Auer is the director of information systems and technology services in the College of Business and Economics at WWU. He holds degrees from the University of Washington (BA) and WWU (BA, MA, MS) and has published several textbooks.

Jon M. Junell is the manager of information systems in the College of Business and Economics at WWU. He holds a BA from WWU and has worked in IBM's field services operations.

Terrell G. Williams is a professor of marketing at WWU and was previously on the faculties of California State University, Northridge, University of Colorado, Denver, and Utah State University. He holds degrees from the Universities of Wyoming (BS, MS) and Arizona (PhD) and has conducts research in the areas of consumer behavior, marketing strategy, and marketing education.

Subject: Disaster recovery; Fires; Case studies; Information technology; Colleges & universities; Safety management

Location: United States, US

Classification: 9190: United States; 5340: Safety management; 5220: Information technology management; 8306: Schools and educational services

Publication title: Journal of Cases on Information Technology

Volume: 7

Issue: 2

Pages: 31-49

Number of pages: 19

Publication year: 2005

Publication date: Apr-Jun 2005

Year: 2005

Publisher: IGI Global

Place of publication: Hershey

Country of publication: United States

Publication subject: Business And Economics--Computer Applications

ISSN: 15487717

Source type: Reports

Language of publication: English

Document type: Business Case

Document feature: tables charts photographs references

ProQuest document ID: 198671770

Document URL: http://search.proquest.com/docview/198671770?accountid=38610

Copyright: Copyright Idea Group Inc. Apr-Jun 2005

Last updated: 2011-07-21

Database: ABI/INFORM Complete

Document 51 of 100

A Case of Information Systems Pre-Implementation Failure: Pitfalls of Overlooking the Key Stakeholders' Interests

Author: Schneider, Christoph; Sarker, Suprateek

ProQuest document link

Abstract:

This case study examines an often overlooked context of information system failures, that of preimplementation failure. It focuses on an Information Systems Development (ISD) project at a large public university that failed even before implementation could get under way. Specifically, it describes the vendor selection process of a proposed computerized maintenance management system. While the managers in charge of the project took great care to avoid commonly discussed types of information systems failures by emphasizing user involvement and trying to select the best possible system they could afford, non-functional requirements, procedures as outlined in the RFP, and the roles of relevant but relatively "hidden" decision makers during the pre-implementation stage of the project were overlooked. This led to the termination of the project after an appeal was lodged by a software vendor whose product had not been selected for implementation. [PUBLICATION ABSTRACT]

Full text:

Headnote

EXECUTIVE SUMMARY

This case study examines an often overlooked context of information system failures, that of preimplementation failure. It focuses on an Information Systems Development (ISD) project at a large public university that failed even before implementation could get under way. Specifically, it describes the vendor selection process of a proposed computerized maintenance management system. While the managers in charge of the project took great care to avoid commonly discussed types of information systems failures by emphasizing user involvement and trying to select the best possible system they could afford, non-functional requirements, procedures as outlined in the RFP, and the roles of relevant but relatively "hidden" decision makers during the preimplementation stage of the project were overlooked. This led to the termination of the project after an appeal was lodged by a software vendor whose product had not been selected for implementation.

Keywords: enterprise IS; IS project failure; system selection; user involvement; user participation

ORGANIZATIONAL BACKGROUND

UMaint is the maintenance department of a large public university (BigU1) in the northwest of the United States. Currently, about 18,000 students are enrolled at BigU, a large proportion of whom reside on-campus. This makes BigU's main campus one of the largest residential campuses in the Pacific Northwest. In addition to the student body, about 7,000 faculty and staff work on campus.

UMaint's employees are responsible for the maintenance of BigU, the campus area of which encompasses more than 400 buildings and over 1,930 acres of land. In a typical year, UMaint handles approximately 60,000 service calls, and schedules and completes 70,000 preventive maintenance projects for 69,000 pieces of equipment.

The primary departments of UMaint are Architectural, Engineering, and Construction Services, Utility Services, Custodial Services, and Maintenance Services. These departments are supported by UMaint's Administrative Services. Architectural, Engineering, and Construction Services are involved in all new construction projects as well as all modifications to existing facilities. The Utility Services department operates the university's power plant and is responsible for providing utilities such as steam, electricity, and water. Custodial Services, UMaint's largest department, handles the custodial work for all buildings and public areas on campus. Maintenance Services is divided into environmental operations, life safety and electronics, plant maintenance and repair, and operations, and is responsible for the upkeep of the university's buildings and facilities.

The Administrative Services department encompasses units such as operational accounting, personnel and payroll, storeroom, plant services (including motor pool, heavy equipment, trucking and waste, and incinerator operations), and management information systems. This department handles all supporting activities needed to coordinate and facilitate UMaint's primary activities. Overall, more than 450 employees work for UMaint in order to support the university's operations. Please refer to Appendix A for the organizational chart of UMaint.

SETTING THE STAGE

The major challenges faced by UMaint arose from the state's tight budget situation and increased competition from outside service suppliers. In order to deal with these challenges, UMaint had to constantly strive to reduce costs and streamline operations. One major obstacle to providing services efficiently and effectively, as is the case in many universities and even business organizations, was UMaint's outdated information systems infrastructure.

This infrastructure consisted primarily of an outdated mainframe, in which the applications were written in Natural and the databases were hosted in ADABAS. Administrative functions were conducted using form-based systems that had been developed in-house. Over the years, the systems had grown with the needs of UMaint. In the absence of an information systems (IS) department that was internal (or dedicated) to the needs of UMaint, the growth of the systems in this area has been rather uncontrolled, leading to a variety of different applications, the majority of which were incompatible with one another. In order to perform accounting, inventory management, maintenance, and project development functions, the employees had to work with over 100 different databases. This situation led to a huge paper trail, the need for multiple paper copies of documents and considerable redundancy of work, which in turn resulted in the lack of data integrity, a major hindrance to efficient operations. As one manager explained "... [UMaint has] someone three cubicles down from another person replicating the same work, unnecessarily."2

In the mid-1990's, UMaint's director and departmental managers (hereafter referred to as top management) decided to implement a computerized maintenance management system (CMMS) in order to consolidate the legacy applications into one integrative system. With this, UMaint hoped to be able to provide more efficient and higher quality service, obtain more timely and accurate information for top management, and reduce costs for the customers by eliminating the need for multiple data entry and simultaneously reducing the potential for errors associated with the maintenance business processes. Additional goals were to increase the accountability of the organization as well as to better maintain the university's facilities. Appendix B displays typical features of a CMMS.

In order to achieve these goals, UMaint formed an implementation team consisting of employees representing different levels of the organization. These were charged with initiating the CMMS project. In the first stage, the primary task was to gather information about different CMMS vendors. As the members of the implementation team conducted all project-related activities in addition to their regular tasks, many of them spent additional hours in the evenings to work on the CMMS project, often leading to dissatisfaction among the project team-members. Unfortunately, the personal sacrifices of the team-members proved to be in vain, since shortly thereafter, work on the project was halted due to lack of adequate funds. A timeline of the events is shown in Appendix C. The idea of introducing a CMMS however was never completely abandoned. In the year 2000 (after the Y2K crisis never materialized), top management again decided to make a renewed commitment to implementing a CMMS. After a new president had been hired to take on leadership of BigU, a new strategic plan was set up for the entire university; one of the goals was to "create a shared commitment to quality in all ... activities", which included to "develop strategies that foster a university culture dedicated to adopting and extending best practices that promote an ongoing commitment to continuous improvement". As this goal was closely linked to the services of UMaint, Jack, the director of UMaint, was invited to be a member of the implementation team for this goal. Since Jack had been with BigU for a long time, he therefore enjoys high credibility and good relationships with higher management, but as in most large institutions, he is constrained by his budget and the strategic goals of BigU. With the introduction of a CMMS, UMaint would clearly help BigU in achieving this goal, thus, funding seemed much more likely, and consequently, an internal IS department responsible for providing information services and technical support for UMaint's information systems was created. The IS department was also charged with the project of implementing the computerized maintenance management system. Currently, the information systems department consists of an Information Systems Manager ("Frank") and two Computer Systems Administrators, in addition to several computer-savvy college students serving as Support Staff.

Top management was very excited about the project and had a good grasp on the project's potential implications for the organization, a factor that would help in the selection process (West & Shields, 1998). Specifically, Jack (the director of UMaint) strongly believed that "the selection of a CMMS will affect the way [UMaint does] business for the next 10 years."

In addition to serving UMaint, the CMMS was supposed to serve BigU's housing department and Central Stores. University Housing would use the system to support all maintenance related aspects of their operations, as well as to manage its warehouse, and Central Stores would use the system for all procurement-related activities. Several other departments played a role in the process as well; for example, the university's Budget Office allocated the funds for the project and was hence involved in the purchasing process. As the total amount budgeted for the purchase of the CMMS exceeded $2,500, the acquisition had to be made through the university's Purchasing Department in the form of a bidding process; furthermore, due to the administrative, rather than academic or research related nature of the project and the fact that BigU is a state university, unsuccessful bidders had the option of filing a protest with the state's Department of Information Services (DIS) after the announcement of the final decision. The DIS had the authority to review and override any decisions made by UMaint. Furthermore, acting as an outside consultant (Piturro, 1999), the university's IS department provided guidance to UMaint's IS department during the selection process. Please refer to Appendix D for a diagram displaying how UMaint fits into the university's structure; Appendix E shows the major stakeholders of the proposed system.

Given that upper administration was well aware of the large impact the system would have, everyone agreed to implement and routinize the "best possible alternative" for the proposed system. Due to the limited resources, developing an integrated system in-house was not seen to be feasible. Therefore, it was decided to purchase a system from an outside vendor. Even though highly customized solutions can be problematic in the long run (Ragowsky & Stern, 1995), both off-the-shelf packages and solutions specifically designed for UMaint by interested vendors were considered.

CASE DESCRIPTION

In the practitioner literature, there has been a limited number of articles on software vendor selection processes; most of these articles have offered somewhat simplistic implementation guidelines such as having sufficient human resources, securing commitment by top management, conducting site visits, or being aware of possible problems associated with customized software (e.g., Ciotti, 1988; Piturro, 1999; Ragowsky & Stern, 1995; West & Shields, 1998). In addition, few academic IS researchers have directed attention to critically examining the process of software vendor selection; consequently, normative rational processes (Howcroft & Light, 2002) are seen to guide systems acquisition initiatives (Please refer to Appendix F for a model of the software vendor selection process). Even fewer have empirically studied the vendor selection process (e.g., Gustin, Daugherty, & Ellinger, 1997; Howcroft & Light, 2002; Lucas, Jr. & Spitler, 2000; Weber, Current, & Benton, 1991). A recent meta-analysis found that in information systems development process, user participation can influence IS success (e.g., Hwang & Thorn, 1999). Consistent with these findings, noted researchers such as Land (1982) have explained that in the software vendor selection process, user input is seen as an important step in determining business needs, which is fundamental to implementing a successful system. According to Land (1982), user participation can be consultative, democratic, or responsible, where responsible participation implies the greatest influence on the part of the users. At UMaint, one of the first steps in the vendor selection process was to inquire about experiences with a CMMS implementation at similar institutions. Frank briefly described the experiences other universities had:

I talked to a lot of schools [that had] been through [this process], read a lot of implementations, and saw where the weaknesses were; the weaknesses were people not getting involved, I spent some time over at [WesternU], looking at them and their implementation, and one of the biggest regrets and problems was they didn't get people involved.

Just a few years ago, WesternU, another large university in the Northwest region of the US went through a similar process and faced severe implementation problems, partly due to lack of stakeholder involvement with the project from the very beginning. On talking to WesternU, Frank found out that:

... they went through this a couple of years ago, and have a vendor and have implemented it and are still in partial implementation, and they said the biggest problem that they had is when they went to train people and so many people down at the very lowest level claiming not to know what is going on, or not to be happy with the system.

Knowing about the beneficial effects of user involvement (Hwang & Thorn, 1999; Land, 1982; Schwab & Kallman, 1991), top management tried to involve their employees from the initiation stages of the project. Joan (the Assistant Director for Administrative Services) recognized the fact that it would be impossible to involve all employees directly; therefore, she strived to inform as many people as possible, rather than ensure direct participation from every employee:

We obviously selected a core group to work on it because every one of 400 people can't be involved...I'm not sure if they have the need to say vendor A is better than C or D or E, it's more the idea that, okay, it's going to change what I do, am I comfortable with that idea and then as far as which vendor we choose, they're going to have to learn something new, no matter what. So it's more trying to get them the information... them knowing about it, knowing that it's coming, and giving input where they can. But it's...it's very specific what they're going to be doing, and I think it's really important for them to know that it's happening and feel comfortable with the idea.

Therefore, committees were formed in order to involve people from all departments. The Executive Committee was responsible for making the formal decisions while the CMMS Evaluation Team was heavily involved in ranking and scoring the different vendors. In addition to these committees, process teams were created; these were charged with analyzing the workflows in different areas such as accounting, human resources, scheduling, preventive maintenance, or engineering and design. The Executive Committee consisted of UMaint's Director, his two assistants, and the IS manager. Members of Central Stores and University Housing were only represented in the Evaluation Team. In fact, the CMMS Evaluation Team included members of every department of UMaint, with members being nominated by their respective department heads. Of the 51 members, 16 were managers/directors, 18 were supervisors/leads, and 17 were line employees. The process teams consisted of line employees as well as managers. To ensure adequate say of individuals who actually get the work done, several teams were led by line employees. A requirement from the beginning was that "every supervisor, every manager has to be involved." The committee members were expected to "involve all of their people in some way." In this way, the project leadership hoped to have as many people as possible participating in the selection process.

The implementation of the CMMS was planned in three stages. The first stage involved the request for proposal (RFP) process; the second stage consisted of the decision-making process, and the third stage, the actual implementation.

During the RFP process, the different process teams had to analyze the various business functions. This phase was not completed as smoothly as expected, since some of the groups did not put in the necessary effort. This was seen as a big concern during the RFP process when:

...every area that was going to be involved was requested to go out and say what's important to them. And that's where they didn't participate as fully as maybe another group. Some groups did an excellent job of saying I need this, this, this, this, this. And this is the ranking, this is what we need, this is what we've got to have, this is what would be nice. And we may have had...I think it is mainly one area that just kind of didn't do that very well. And I guess how that will be affected as if they, after we've chosen, come and say, oh, I've got to have this...well, you didn't have it in the RFP, we, I, can't know what's important for you. So that would probably... and laziness maybe is a bad word, but I think that's...they're just not choosing their priorities. Some people realize just how important the process was and some don't realize it... and may be impacted.

As the IS group was concerned with choosing the best possible system for the organization, its members decided to start analyzing the business functions themselves. This helped the groups to get started in the RFP process. Frank described his experience with the process as follows:

[We] charged all the groups to come up with [the business functions] ; that didn't work out too well, the groups really didn't do a good job putting it together, so what happened was, we put them together. Our group did all of them and then what we did, we took 'em back to the groups and said okay, here's the storeroom piece, here is what we think is your function, but we're the wireheads, we're not the workers, we don't know their business, but from working with them, and doing what we have been doing up to this point, we felt we could at least get the ball rolling.

Having started the process, the IS group saw some improvement in participation, and most of the groups seemed more actively engaged in the RFP process:

...so we gave them basically something to react to. And that helped a lot. Then people started coming up with a lot of ideas, a lot of changes, and we started getting more participation that way.... These folks really struggled with coming up with something on their own.

Participation was not seen as mandatory by top management, therefore, the CMMS Decision Team tried to motivate the employees to participate as much as possible. However, they also had the option to exercise power in order to get things done. Since UMaint's executive director was a big supporter of the CMMS project, Frank (the IS manager) mentioned that:

I also have an ace in the hole with the director, who's willing to come at any point and lay the hammer down if somebody don't do what we need them to. We don't do that unless we have to, but if we get into that situation where there's a work group or a person who's simply just not going to pull their share. We're trying to work with them and we're trying to motivate them, and get 'em excited and get their involvement, but otherwise, we just have to take it to another level if it is too critical. It's a big project.

Finally, the mandatory and desirable requirements were put together and the RFP was deemed acceptable by the state's Department of Information Services after a few minor revisions. According to the RFP (please refer to Appendix G for the required structure of the proposals), three vendors were supposed to be invited to conduct on-site product demonstrations. In regards to the requirements, the RFP stated that the proposed CMMS system had to be able to integrate the large number of databases currently used to manage accounting, maintenance, inventory, and project development needs. Furthermore, Microsoft Project Server 2002, Sharepoint Portal and Team Services, as well as several Access Data Projects needed to be integrated into the proposed system. As UMaint already had an existing information systems infrastructure consisting of more than 130 workstations running a combination of Windows NT 4.0, Windows 2000 professional and Windows XP operating systems, no substantial changes in client hardware were desired; however, if additional hardware such as servers would be needed for the implementation, this would have to be covered by the budget initially allocated to the project. Furthermore, it was expected that the vendors' systems would be compatible with the operating systems of the existing workstations. Finally, it was not anticipated to allocate human resources in addition to the IS department's current staff to the support of the CMMS system.

While certain non-functional requirements,3 such as security of the transactions or scalability of the database, were considered to be important factors, a proven track record of successful implementations was considered more important than a system using the newest technologies.

Using the mandatory functional requirements, such as the ability to track the status of each shop assignment, request materials for a work order from a "Materials Management" module, trigger notices to responsible persons for potential problems with contract processes, or track equipment maintenance labor history, the executive committee was able to screen out a large number of vendors that initially had responded to the RFP, bringing down the number of potential vendors to six. Following recommendations provided in the practitioner literature (e.g., Raouf, Ali, & Duffuaa, 1993; Weber et al., 1991), these vendors were scored by the CMMS Evaluation Team according to the CMMS requirements, technical requirements and capabilities, and vendor qualifications. Initially, only one bidder provided the required cost proposal (which did not comply with the RFP), hence it was decided to eliminate this criterion in this stage of the process and to reassign the weights of the remaining criteria. Based on a comparison of the summary scores, four vendors were invited to present their products to the CMMS Evaluation Team according to a scripted scenario. The attendees at the demonstrations had the opportunity to score each vendor's product using a standardized scoring package. The scores given were to be used during the final decision-making; at this point, the vendors that were invited to present their products were asked to re-submit their cost proposals.

In addition to helping with the selection, giving the attendants of the vendor demonstrations the opportunity to score the products was seen as a good way to involve people and to get their "buy in". Most members of the executive committee believed that many employees "just want to be involved, just want to be important," no matter "if things go their way or not." According to Joan, the scoring could be compared to voting, where everyone's vote counts. However, in contrast to management's beliefs, many members of the process teams felt that their input did not count at all, which led to dissatisfaction with the process.

Furthermore, some areas felt "shortchanged" during the vendor demonstrations, having felt that their area has not been considered enough during the demonstrations. Another factor adding to the dissatisfaction with the decision process was a lack of feedback from top management. One administrative employee complained:

...they had us do all kinds of stuff. You know, questions we needed to ask, how everything flows, how it needs to be done.... I'm just a little nervous because ... we put a lot of input in, but we didn't get much information back, or how it would affect us.

Even though the process team members were intended to funnel down the information, the information flow did not take place as expected; indeed, many employees did not receive much information about the proposed system. This problem was of great concern to upper management, as information sharing was seen as critical to the success of the process. Frank stated:

And one of the biggest challenges this place has is the information distribution. The information does not go from the top to the bottom. The manager hears it at a Tuesday manager meeting; it may be six months until the employee hears it. It's really embarrassing, but it happens a lot around here. With a project of this magnitude and complexity, you can't do that. The information has to reach everybody at every time. So one of the tasks for us was, how do we get information out. So we developed the project information site....

The project web site was developed to provide access to announcements about the status of the vendor selection, vendor scores and rankings, background information about the vendors, and the like. Even though the web site was seen as pretty effective by the IS group, it did not help to effectively spread the information throughout the entire organization, as the web site was only accessible to CMMS Evaluation Team members and Executive Committee members.

Since the IS team was in charge of the CMMS project, meetings with line employees were set up in order to provide them with information and solicit feedback. Nevertheless, many employees were unaware of the proposed system's impact on their work. Generally, they saw "other" departments as being impacted to a greater extent, and did not anticipate their own day-to-day responsibilities to change much. Many employees regarded the CMMS as a tool for the higher echelons of administration. This led to a lack of interest in participating in the decision process, which thereafter translated to the perception that their departments had been left out of the process. For example, an employee mentioned:

...I don't know how it will really affect me, unless they would get a couple of modules that would really help out back here. It's my understanding that they're just doing administration modules.... I do know that administration, at the other end of this building, had a lot of input.... I don't know that it will probably help us at this point, (emphasis added)

Antagonism between departments added to such perceptions. As the criteria established for the vendor selection process were viewed as relatively inflexible and determined a priori, many employees saw their area as "covered," and did not see the point of providing additional input into the decision process, many hoping that the IS department, consisting of acknowledged experts, would select the right system for them. One employee, for example, stated that "our info tech group... they do have the knowledge to make something run right and I don't."

The information systems department was well aware of its power arising from the myths of their expertise and magic representing systems professionals as "high priests" (Hirschheim & Klein, 1989; Hirschheim & Newman, 1991) to influence decisions of non-IT employees in UMaint. However, it consciously tried to limit the extent of influence IS professionals would have on the decision process:

...we didn't want to influence anyone's decision. ... this isn't supposed to be about us ... this is about their achievement, this is their product in the end, we're just charged with implementing it. They're the ones who gonna have to use it every day and live with it. We wanted it to be about them, and that's why we've been so big about having their involvement....

Nevertheless, being in such an influential position, the IS manager noticed the benefits of being able to influence people's decision, as he was trying to choose the most adequate system for the organization:

...in many ways, we put our hands on the wheel. Because we basically had to come to a decision that works. Everybody, they're just gonna do whatever we say. So we better make sure that what we're saying is really what is the greatest good for everyone ... and that's one thing that has been very confident for us that we have always been striving for the absolute biggest bang for the buck.... Whatever we could get. The most we could do.

Finally, a decision was made by the Executive Committee based on a number of criteria, which included the weighted scores, reference calls conducted by evaluation team members, and finally, consideration of the budget. Before the final decision was made, an informal vote (that would not influence the final decision) was held. Interestingly, the selection made was not consistent with the results of the vote. The vendor that ranked first in the informal vote was not considered for selection, since its product did not meet the budget criteria. The vendor that ranked second had the newest technology and offered a highly customizable product; however, it was regarded as being too risky, as universities were considered an entirely new market for the vendor and was thus dropped from the selection. The vendor that was finally selected ranked third in the last informal vote.

Even though the vendor selected scored very high in terms of meeting the requirements, functions, and features, the decision found only partial support by many organizational members, including the IS department members. The IS group was not at all convinced that the product had necessary technological and functional capabilities. In a vendor review demonstration, an IS department member mentioned that the vendor's "technology is severely outdated and does not offer any customization for the user." Other departments also were not satisfied with the selection, with a member of the accounting team stating, "...just the one that got chosen... we wished that it hadn't." The storeroom, a very powerful unit of UMaint's administrative services department, shared the same thoughts: "we were looking at [Vendor A] and [Vendor B]. These were what we thought were the two best, but other factors came into play in the decision making...."

CURRENT CHALLENGES FACING THE ORGANIZATION

When the final decision was announced to the vendors, it was also not received too well by the vendors whose products had not been selected for implementation. One of the unsuccessful bidders decided to lodge an appeal with the state's department of information services. The members of the department of information services, who had not been at all involved during the selection process, took only a very short time to review the decision and mandate the termination of the project based on procedural errors. As contended by the unsuccessful bidder, the change in scoring criteria for the first stage could not be considered a harmless error, as vendors might have otherwise submitted different proposals. Furthermore, asking the vendors to re-submit cost proposals could be considered a "best-and-final offer" procedure, which was explicitly ruled out in the initial RFP. On the other hand, not asking the vendors for a renewed cost proposal would have led to the elimination of all vendors but one during the first evaluation stage, rendering the RFP process "just a paper chase" (Ciotti, 1988, p. 48). Making a new selection, as recommended by the State's IS department, would not only mean reviewing the original decision, but also reverting to the beginning stages of the project. In order to select a different vendor, the entire selection process would have to be started anew, including sending out a request for proposals, inviting candidates for product demonstrations, scoring the different products, and making reference calls. As this process would most likely continue well into the following year, funding for the project was not automatically valid any more. UMaint would have to reapply for funding, and in light of the state's tight budget situation, getting funds for such a project a second time seemed highly unlikely.

As of 2003, no computerized maintenance management system was implemented at UMaint. Frank (the IS manager), reflecting on the sequence of events in the project, still remains perplexed about why the initiative turned out to be a disaster, despite all his and his colleagues' efforts to consciously manage stakeholder input and thus avoid failure, so he approached an IS academic to find out the reasons for the failure of the current project, how UMaint's current project could be "salvaged", and how similar problems could be avoided in future projects.

Footnote

ENDNOTES

1 Names of the university and its divisions have been replaced by pseudonyms. Further, the identities of the employees of the university and other stakeholders of the system have been disguised to ensure confidentiality.

2 For the sake of authenticity, the quotations have not been edited.

3 i.e., technical or infrastructure related requirements such as scalability or technical potential for the future

References

REFERENCES

Ciotti, V. (1988). The request for proposal: Is it just a paper chase? Healthcare Financial Management, 42(6), 48-50.

Gustin, C. M., Daugherty, P. J., & Ellinger, A. E. (1997). Supplier selection decisions in systems/software purchases. International Journal of Purchasing and Materials, 33(4), 41-46.

Hirschheim, R., & Klein, H. K. (1989). Four paradigms of information systems development. Communications of the ACM, 32(10), 1199-1216.

Hirschheim, R., & Newman, M. (1991). Symbolism and information systems development: Myth, metaphor, and magic. Information Systems Research, 2(1), 29-62.

Howcroft, D., & Light, B. (2002). A study of user involvement in packaged software selection. In L. Applegate, R. Galliers, & J. I. DeGross (Eds.), Proc. of the 23rd Int. Conf. on Information Systems, Barcelona, Spain, December 15-18 (pp. 69-77).

Hwang, M. I., & Thorn, R. G. (1999). The effect of user engagement on system success: A meta-analytical integration of research findings. Information & Management, 35(4), 229-239.

Land, F. F. (1982). Tutorial. The Computer Journal, 25(2), 283-285.

Lucas Jr., H. C., & Spitler, V. (2000). Implementation in a world of workstations and networks. Information & Management, 38(2), 119-128.

Managestar. (n.d.). manageStar - Products. Retrieved May 3, 2004: http:// www.managestar.com/facility_mgmt.html

Piturro, M. (1999). How midsize companies are buying ERP. Journal of Accountancy, 188(3), 41-48.

Ragowsky, A., & Stern, M. (1995). How to select application software. Journal of Systems Management, 46(5), 50-54.

Raouf, A., Ali, Z., & Duffuaa, S. O. (1993). Evaluating a computerized maintenance management system. International Journal of Operations & Production Management, 13(3), 38-48.

Schwab, S. F., & Kallman, E. A. (1991). The software selection process can't always go by the book. Journal of Systems Management, 42(5), 9-17.

Weber, C. A., Current, J. R., & Benton, W. C. (1991). Vendor selection criteria and methods. European Journal of Operational Research, 50, 2-18.

West, R., & Shields, M. (1998). Strategic software selection. Management Accounting, August, 3-7.

AuthorAffiliation

Christoph Schneider, Washington State University, USA

Suprateek Sarker, Washington State University, USA

AuthorAffiliation

Christoph Schneider is a PhD student in MIS and graduate assistant/instructor at Washington State University. Prior to starting the PhD program at WSU, he has studied at the Department of Business Informatics at the Martin-Luther University in Halle, Germany.

Suprateek Sarker is an associate professor of information systems at Washington State University. His research interests include virtual teams, BPR, IS implementation, and qualitative research methods.

View Image -   APPENDIX A
View Image -   APPENDIX B
View Image -   APPENDIX C  APPENDIX D
View Image -   APPENDIX E  APPENDIX F
View Image -   APPENDIX G
View Image -   APPENDIX G

Subject: Case studies; Information systems; Failure analysis; Colleges & universities; Maintenance management; Technological planning

Classification: 9110: Company specific; 8306: Schools and educational services; 5240: Software & systems; 2310: Planning

Publication title: Journal of Cases on Information Technology

Volume: 7

Issue: 2

Pages: 50-66

Number of pages: 17

Publication year: 2005

Publication date: Apr-Jun 2005

Year: 2005

Publisher: IGI Global

Place of publication: Hershey

Country of publication: United States

Publication subject: Business And Economics--Computer Applications

ISSN: 15487717

Source type: Reports

Language of publication: English

Document type: Business Case

Document feature: charts references illustrations

ProQuest document ID: 198658367

Document URL: http://search.proquest.com/docview/198658367?accountid=38610

Copyright: Copyright Idea Group Inc. Apr-Jun 2005

Last updated: 2011-07-21

Database: ABI/INFORM Complete

Document 52 of 100

End-User System Development: Lessons from a Case Study of IT Usage in an Engineering Organization

Author: Jennex, Murray E

ProQuest document link

Abstract:

How much end-user computing is too much? Should end users develop systems? This case looks at a study of end user computing within the engineering organizations of an electric utility undergoing deregulation. The case was initiated when management perceived that too much engineering time was spent doing IS functions. The case found that there was significant effort being expended on system development, support, and ad hoc use. Reviews of a few key systems illustrate quality problems found with the end-user developed systems. Several issues were identified affecting system development including use of programming standards, documentation, infrastructure integration, and system support. Additionally, the issues of obsolescence, security, and procurement are discussed. [PUBLICATION ABSTRACT]

Full text:

Headnote

EXECUTIVE SUMMARY

How much end-user computing is too much? Should end users develop systems? This case looks at a study of end user computing within the engineering organizations of an electric utility undergoing deregulation. The case was initiated when management perceived that too much engineering time was spent doing IS functions. The case found that there was significant effort being expended on system development, support, and ad hoc use. Reviews of a few key systems illustrate quality problems found with the end-user developed systems. Several issues were identified affecting system development including use of programming standards, documentation, infrastructure integration, and system support. Additionally, the issues of obsolescence, security, and procurement are discussed.

Keywords: case study; end-user computing; end-user programming; IS project development policies; IS project development priorities; knowledge sharing; management support; user attitudes; user needs; user requirements; user satisfaction

ORGANIZATIONAL BACKGROUND

This case looks at end user computing (EUC) in an engineering organization. End users are non-IS professionals who use computers and EUC are those computer activities end users perform (Edberg & Bowman, 1996). Alavi and Weiss (1986) describe EUC as a rapidly growing and irreversible trend. But how much EUC should organizations allow, what kinds of activities should end users do, and how should organizations manage EUC?

The subject engineering organization is part of a large, United States based, investor owned utility. The utility is over 100 years old, has a service area of over 50,000 square miles, provides electricity to over 11 million people via 4.3 million residential and business accounts, and had operating revenues of approximately $8.7 billion in 2002. Utility net revenue has fluctuated wildly the last few years with a $2.1 billion loss in 2000, $2.4 billion in earnings in 2001 (primarily due to one-time benefits from restructuring and other initiatives), and decreasing to $1.2 billion in earnings in 2002. To service its customers, the utility operates a transmission and distribution system and several large electrical generation plants and is organized into three main line divisions: Transmission and Distribution; Power Generation; and Customer Service. Divisions such as Human Resources, Security, and Information Technology (IT) support the line divisions. The utility has approximately 12,500 employees.

The power generation division is organized into operating units dedicated to supporting specific power generation sites. Each operating unit has line organizations such as Operations, Maintenance, Engineering, and Chemistry/Health Physics. Power generation operating units are supported by dedicated units from the corporate support divisions (security, human resources, IT). The engineering organization used for this case study is part of the nuclear operating unit of the power generation division and is located at the largest electrical generation site operated by the utility. IT support is provided to this operating unit by Nuclear Information Systems (NIS) which administratively is part of the corporate IT division and which operationally reports to both corporate IT and the nuclear unit of the power generation division. NIS supported engineering through its Engineering Support Systems group. This group consisted of a supervisor, two project manager/analysts, and two developers. This group was tasked with the maintenance of the 11 systems under NIS control. New systems or enhancements to existing systems were done at the instigation of engineering. Engineering through a charge-back process paid costs associated with these projects and developers were hired as needed to support the work.

At the time of the study the engineering organization consisted of approximately 460 engineers disbursed among several different engineering groups reporting to the Station Technical, Nuclear Design Organization, Nuclear Oversight, and Procurement management structures. Industry restructuring was causing large drops in revenues that was driving the nuclear unit to reorganize engineering into a single organization consisting of 330 engineers under the management of the Nuclear Design Organization.

SETTING THE STAGE

Between May 2000 and June 2001, the cost of unregulated wholesale power rose above revenues collected via rates that were frozen in 1998, and the utility was not allowed by the regulators to pass these excess costs through to its customers. As a result, the utility incurred $4.7 billion (pre-tax) in write-offs related to under-collected costs and generation-related regulatory assets through August 31, 2001. The net impact of these under-collected costs was a net loss of $2.1 billion by the utility in 2000. This put the utility into a crisis situation with the result that all divisions were asked to freeze hiring and restructure to reduce costs.

The power generation division had its groups assess their work to determine what had to be done and what could be dropped or deferred. The nuclear division decided the existing engineering organizations were inefficient and could be consolidated under one management structure. This review determined that staffing should be lowered by approximately 25%. An engineering change management team was formed for identifying where and how work effort could be reduced. During this process, it was noticed that the engineering organizations were spending significant amounts of time and effort on information technology (IT) related tasks. Computer use in all groups/sub-groups included use of the site work process systems and the basic software such as e-mail, WordPerfect, and QuatroPro (all considered standard end user computing per Benjamin (1982)); plus, whatever other software/hardware was deemed necessary to accomplish their mission. This other software included special engineering software packages for a variety of tasks, such as valve, pump, and pipe diagnosis, analysis, and design, various activity tracking systems, and several programs custom built to meet special needs. However, it was also noticed that engineers were building and maintaining/supporting systems.

The nuclear organization's computer support was split between two groups. NIS was responsible for the design, acquisition, implementation, and maintenance of business systems. This included work process systems, the site network, and desktop systems. The computer engineering group, a subgroup of engineering, was responsible for the design, acquisition, implementation, and maintenance of the plant process and control systems. This included systems used to perform plant processes, such as chemical and water treatment systems, reactor control systems, the plant monitoring system, and control room systems. While this seems to be a clear demarcation of responsibilities, conflicts arose with the use of personal computers. Personal computers were originally brought on-site to support reporting and work functions and were clearly understood to be within the NIS domain. However, as personal computers became prevalent, engineering found innovative systems in support of plant activities, such as testing, data collection, and data analysis. During this period of personal computer adoption, NIS was focused on supporting the mainframe-based work process systems and then converting these systems to a client-server infrastructure, and did not have the resources or expertise to support innovative systems of personal computers. It was also perceived by the nuclear organization that NIS had little respect or concern for personal computers and their adoption in supporting plant or work processes. Engineering stepped into this void and provided expertise and support to plant personnel. This continued until the late 1990s when NIS attempted to reassert its control over personal computers used with the business systems. Engineering resisted this and while they had to acknowledge NIS control over the acquisition of personal computers for business systems, they found novel ways of getting around NIS controls. Calling personal computers test equipment and purchasing them along with support services and software with their own budget usually accomplished this. Additionally, engineering had begun to develop their own systems during the 1980s due to a lack of resources and plant knowledge within NIS. This practice continued even after NIS took over control of personal computer systems. It was for these reasons that engineering management perceived that a significant amount of work activities could be shifted to NIS. Finally, there was a perception by engineering that there was a lack of support by NIS for engineer IT needs due to this history.

To assess engineering IT usage and determine work that could be shifted to NIS, a team was formed consisting of engineering and NIS representatives and led by the author, a former member of the engineering organization and at the time of the study, a member of NIS. The team leader was chosen specifically because he had been one of the engineers who had bypassed NIS and had developed systems of his own. It was expected that the team leader would have the trust of the engineering organization and would know where to look for IT activities. Engineering team members consisted of engineers serving as computer representatives/liaisons and were considered to be subject matter experts (SMEs). NIS team members were personnel serving in the engineering support systems group. The goal of the team was to generate an inventory of IT products and resources used by engineering organizations but not supplied, supported, or controlled by NIS, and to assess how IT usage could be better managed by engineering and NIS.

The team started with the inventory generated by NIS's Year 2000 (Y2K) program. This effort documented 151 systems not supported by IS that were used and supported by engineering where the support consisted of personnel and/or annual renewal/licensing costs. It also documented another 11 systems used by engineering but supported by NIS. Next, the team collected data using various informal surveys and interviews while the project manager conducted 40 structured interviews. The process was to first generate an inventory of IT systems used by the engineering organizations but not maintained by the IS group. The scope of the inventory was any specialized software/hardware for data collection, testing, and analysis, specialized databases, any software used for system development, any generic software that was being customized through the generation of macros, scripts, or programs, and any other software/ hardware assessed to be important to engineering and worthy of inclusion.

The second step was to generate a list of IT resources existing within each engineering organization. IT resources were considered to be engineers with IT skills in demand by their coworkers such that they spent significant amounts of time assisting management or their group with IT support. The initial list of resources was developed by the SMEs. The project manager finalized the list after conducting 40 interviews of selected individuals. A set script was used for determining what amount of IT support was being provided by engineers to engineers, any additional inventory items, general levels of automation and needed IT, and what issues were involved in using IT in engineering. Interview subjects were selected based on input from the SME's and known expertise and/or participation in IT development.

The final step was to take the gathered data, analyze it with respect to dollars and time invested as well as issues identified, and generate a set of recommendations for improving management of the IT effort in the engineering organizations. This was documented in a final report by Jennex et al. (2000) that was presented to IS and engineering management and is used as the data source for this paper.

CASE DESCRIPTION

The Assessment

The assessment found a significant but poorly managed investment in IT in terms of money, time, and expertise. With respect to the management of IT, it was observed that NIS is tasked with managing the infrastructure, networks, and enterprise level systems. This provides an overall organizational perspective and strategy for managing these assets. Engineering IT is managed at the division level and was found to lack an overall engineering strategy for the use, adaptation, and implementation of IT. Additionally, IT was unevenly applied throughout the engineering organizations. Some groups were fully automated; others had process steps automated but not the overall process; and still others were not automated at all. The net effect was that IT assets were not performing as effectively as they could and many engineers were expending more time and resources than they should to obtain the information and data they needed. Specifics on these findings are provided in the following paragraphs.

Investment

The inventory recorded 267 systems and other hardware. This number excludes enterprise work process systems, basic personal productivity systems (MSOffice, WordPerfect, Access, etc.), and plant control systems. Included are the analysis tools, graphics packages, scheduling tools, equipment databases, image and web editing and authoring tools, and data collection tools used by engineers. The team was confident this number reflected at least 90% of what was in use. The investment in terms of dollars and effort was not totally determined, not all numbers were known and not all groups were willing or able to report all costs. However, with about 30% of the inventoried systems reporting this data it was found that approximately $ 1,650,000 had been spent to purchase these systems with an additional five-person years (during the last two years) expended on development. Additionally, $290,000.00 was spent annually on license or maintenance fees and 10 full time equivalent engineers (FTEs) were expended maintaining these systems. Finally, an additional approximate 10 FTEs were expended assisting other engineers in the use of these tools. For political reasons, there were significant exclusions from these figures including 45 FTEs and $335,000 in annual licensing cost supporting plant control IT. The team was confident that purchase and support costs and efforts would at least double if all the information was available. For perspective, these numbers were not expected and were considered by management to be extremely excessive although Panko (1988) found in the 1980s that 25-40% of IT expenditures were in EUC and Benjamin (1982) expected EUC to account for 75% of the IT budget by 1990 where EUC is the adoption and use of IT by personnel outside of the IS organization to develop systems to support organizational tasks.

Engineer Involvement in IT

It was observed that engineers supported IT in three ways: supporting other engineers' use/acquisition of IT, learning to use the IT, and maintaining systems; building queries, macros, and reports for special/ad hoc information requests; and developing IT solutions for supporting engineering processes. It was reported previously that at least 20 FTEs were expended supporting other engineers, learning to use IT, and maintaining IT and approximately five person/years were expended (over the last two years) supporting system development. Doubling these values (per the team's estimate) gives 45 FTEs/year for items one and three. The second item was found to take approximately 5% of each engineer's time. Taken as a whole, this is a fairly extensive activity, approximately 21 FTEs yearly. Combining these efforts and excluding assets dedicated to plant IT support (50 FTEs), approximately 66 FTEs/year (16%) are spent on end user IT functions, see Table 1 for a summary of these resources (Note that the 16% figure does not include time spent using enterprise work process systems or standard office personal productivity systems used for doing routine work activities.) This was considered excessive, and if eliminated, could almost provide the necessary manpower reduction.

View Image -   Table 1: Summary of Engineering Time Spent Supporting IT

Rockart and Flannery (1983) found that 85% of EUC was focused on report generation, inquiry, and analysis. The assessment did not find that level of reporting, instead finding a little over 50%, however, even at this level, the ability to do ad hoc reporting was considered a tremendous strength and the team did not see the need for ad hoc reporting decreasing. However, there were several issues that caused the time needed for this activity to be greater than it needed to be. Chief among these are a lack of standard query/reporting tools, advanced training in the use of the available tools, a central repository for queries with the result that many queries were written over and over, and integration of the site databases resulting in more complex and time consuming query/report generation. Interviews recorded numerous complaints of end users not knowing where data was located. Engineers that spent significant time assisting in ad hoc reports and queries stated that their time was taken in assisting with SQL and finding out where data was kept. Additionally, there is no process for tracking end user reports to determine if they are used in sufficient quantity to warrant inclusion in the enterprise system. The team did not consider this very important but from the interviews it appeared that there were several organizations doing the same or similar reports. Discussions with NIS and end user managers found no awareness of what reports and queries were being run although both groups expressed interest in making repeatedly run reports and queries part of the formal system. This leads to the key issue of NIS focusing on the enterprise level and allowing end users to go their own way. This case is an example of more effort than necessary being expended on ad hoc reporting because the enterprise database structure was not available to the end users and no effort is being made to monitor end user usage for common reports and queries. Dodson (1995) found this to be a common problem when IS focuses solely on the organizational systems. What makes this issue more significant is the ability to generalize the average of 5% time spent on ad hoc reports to other organizations. This was considered excessive by the engineering organization's management and would probably be considered excessive in many organizations once it was quantified. Perhaps the most interesting observation during the study was the generally held opinion that the ability to do ad hoc reports was a great strength. While this is an indication of system flexibility and end user ability, it did not occur to anyone that large amounts of ad hoc reports and queries could also be a negative indicator. To address this, the organization is considering publishing a data road map.

Grindley (1995) predicted that, by 1998, 80% of all system development would be done by end users or their consultants and while this case did not find that high of a percentage of system development being done by engineering, it did find that the ability of engineers to develop new systems for addressing specific engineering problems was considered a strength and a need by the engineering organizations. The team agreed that this function would continue to require engineering involvement. However, this is the function least understood by engineering with respect to cost and process. Engineers followed minimal processes and considered the Capability Maturity Model (CMM) processes followed by IS to be a waste of time and money (NIS is a CMM Level 2 shop).

The engineers justified the need for engineering to provide its own IT support through several reasons that could be combined into primarily three issues. The first is that engineering systems are generally not supported by IS so expertise to assist engineers with these systems only exists in engineering. The second is that due to lack of standardization there are multiple products supporting the same function, this makes having central support prohibitively expensive. Experts would be needed for over 200 systems and devices that in many cases are only used by a few people. The third was an overall poor relationship between engineers and IS.

END-USER SYSTEM DEVELOPMENT

The assessment observed that with NIS focusing on enterprise systems, engineering was left free to support its IS needs as it saw fit, and without management oversight, this IS self support caused the organization to shift significant resources away from its central focus and function of supporting power plant operation. Even though this significant use of resources by EUC is common in many organizations (Jenne, 1996), the resources attributed to end-user system development were thought to be excessive and not effectively used. Of particular concern was end user or end user-led system development. Several systems were looked at that were developed by engineering and several issues affecting the quality of these systems identified. These include not following IS development standards, inadequate documentation, obsolescence/replacement of systems, and security. Lack of development standards, maintainability, and documentation are identified as EUC development risks by Amoroso (1988), Davis (1982), O'Donnell and March (1987), Palvia (1991), Sumner and Klepper (1987), and McGill (2002). Wetherbe, Vitalari, and Milner (1994) and Beheshti and Bures (2000) identified obsolescence of systems as a regular IS issue and Sumner and Klepper (1987) identified security as EUC development issues.

The assessment found several systems that were developed directly by engineering or developed by outside developers under the control and direction of engineering; Dodd and Carr (1994) classify this as Systems Development Led by End-Users (SDLU). Many of these systems were found to be developed without following NIS development or programming standards, tended to not meet requirements, were hard to modify, and/ or were designed such that they could not interface with the organizational infrastructure. These systems result in much higher maintenance costs than expected. To illustrate these problems, two systems were found of which the team was told "unofficially" cost approximately $500,000 each with neither able to perform the function it was purchased for due in total or in part to incompatibility with the infrastructure and failure to fully identify requirements.

Engineering developed the accelerated flow corrosion test tracking system after NIS rated it a low priority. Engineering developed the system using outside developers to code the system and engineers as subject matter experts. The purpose of the system is to track outage activities of three groups - engineers, maintenance, and quality control - in the inspection and repair of high-energy steam lines. Engineering worked with the vendor to develop the system to engineering's perceptions of the requirements. Potential process improvements were not considered and IS, quality control, and maintenance were not included on the project team. The system was implemented for use during the 1999 outage; however, it failed to meet the needs of quality control and maintenance and was abandoned after only a few days of use. In 2000, engineering requested IS take a look at the system and attempted to make it work. IS formed a small project team to rework the system. System requirements were gathered through a series of meetings that included all stakeholders and were used to correct the system. The reworked system was verified to meet the requirements of all users through a simulated outage test and was used successfully throughout the next outage. Management was satisfied with the activity as the system facilitated management reporting and assisted in reducing the activity time by 33%. A post outage review was held with all activity participants with enhancements being identified and approved by all four organizations. A one-month window was identified for the work to be completed prior to the next outage scheduled for the other unit at the beginning of 2001. The activity was performed with even more success during the second outage. A post outage review was also held after the 2001 outage and a maintenance plan prepared for maintaining and enhancing the system. Management was extremely pleased with the final system after there had been a great deal of management dissatisfaction when the initial system failed. Re-work of the system was done at a cost of $40,000 with IS estimating that the system could have been built by IS for approximately $200,000.

Engineering also developed the maintenance rule system after NIS rated it a low priority. Engineering developed the system using outside developers to code the system and engineers as subject matter experts. The purpose of the system is to track maintenance activities on critical equipment to determine if there is a maintenance rule violation and required the operations group to input data whenever a work authorization was issued. Engineering worked with the vendor to develop the system to engineering's perceptions of the requirements. Operations and IS personnel were not included in this process with the result that the system failed to work when installation was attempted. After the system installation failure, a meeting was arranged with IS to discuss how to modify the system so that it could be installed in the site infrastructure. IS spent approximately one-person week working with the vendor to see if the system could be made to work with the IS infrastructure and when it was determined that it could not, the system was abandoned. Concurrent with this IS effort, meetings with other stakeholders involved in the process found that the system added data entry burdens that those groups did not have the resources to support. Additionally, other engineers determined that the initial engineering requirements were incorrect. Management was very dissatisfied with this system as the system had to be scrapped and no value was ever obtained from the investment. Finally, when IS reviewed the correct requirements, it was determined that the system could have been built by IS at a maximum cost of $250,000 or half the amount paid to the vendors by engineering.

Both of these systems were built without consideration of IS standards for the operating environment and consulting the appropriate stakeholders for identifying requirements with the result that both failed. Additionally, neither utilized IS standard interfaces or programming guidelines causing low quality and making both difficult to understand and work with from the IS developer viewpoint. While these two examples are the extreme, they were not isolated cases. Numerous examples were found where engineering groups bought or developed hardware and/or software without regard for IS development standards with the result that additional effort was required to get the hardware and/or software to initially work or to maintain it over its useful life.

A review of the literature finds that the low quality found in the end-user developed systems is not uncommon. Edberg and Bowman (1996) compared the quality of enduser developed systems to those developed by IS professionals and found that the enduser developed systems had significantly lower quality. McGill (2002) found that this problem is worsened by less experienced end-user system developers as they tend to overestimate the quality of the systems they produce. Dodson (1995) believes that the trend towards end user system development is an "Achilles Heel" for the enterprise as attempts to integrate end user databases and systems into the enterprise infrastructure encounter problems that raise the cost for or prevent full integration. Edberg and Bowman (1996) support Dodson (1995) as they found that end-user developed systems tend to have major data integrity problems. Amoroso (1988), O'Donnell and March (1987), Palvia (1991), and Sumner and Klepper (1987) found that risks associated with end user developed systems included incorrect design, inadequate testing, and poor maintenance while Dodson (1995) lists issues such as lack of documentation, no planning for maintenance, improper system of design methodologies, and poor communication and understanding of requirements as the main problems associated with end user developed systems. To prevent or mitigate these issues, Dodson (1995) suggests organizations focus on five areas of standardization: business analysis and system design methodologies, communications structures, software architecture/libraries, documentation, and training. Dodson (1995) does not suggest that IS force end users to follow IS system analysis and design methodologies, but rather create hybrid methodologies that end users understand, can implement, and can use to identify, capture, and model user requirements. Communication structures reflect that end users should use the same project communications used in non-IS projects for IS projects, and Dodson (1995) suggests the widespread adoption of Joint Application Design (JAD) and Joint Implementation Process (JIP) as formal communication structures would improve stakeholder understanding and participation. Dodson (1995) recommends that organizations standardize products available to end users. This includes IS making their object, component, and module libraries available for use by end users in system development and IS creating standard design environments. Dodson (1995) suggests that IS specify standard documents that must be produced for all system development projects. The generation and promulgation of standard document templates that can be tailored to the size and complexity of the project facilitate this. Finally, end users need to be trained to use these tools and processes to produce systems.

The two examples were of large systems, but it should be noted that these issues also apply to smaller, personal productivity systems. Miric (1999) warned that the lack of programming standards and planning leads to large numbers of errors in end user created spreadsheets. KPMG Management Consulting studied end user created spreadsheets in their client organizations and found that 95% of the spreadsheets utilized models with significant errors and 59% of the spreadsheets had poor model design (Miric, 1999). To prevent these errors Miric (1999) suggests that spreadsheet development should be treated no differently than system development and that users need to be trained to use organizational programming standards, determine and document system requirements, perform testing, and use automated tools when available.

The literature also suggests that end user groups such as engineering will be more problematic with respect to end-user developed systems. Munkvold (2002) found that high computer skill self-efficacy within end users coupled with a low regard for IS leads to end-user system/system development. Wagner (2000) investigated the use of end users as expert system developers and found that end users have significant domain knowledge. However, it was also found that end users had difficulty knowing and expressing what they know, making their contribution limited in content, quality, size, and scalability. Taylor, Moynihan, and Wood-Harper (1998) agreed that end users do not produce good systems and identified duplication of effort, low quality, and lack of training in system development methodology as issues. Note that low quality is reflected as a lack of documentation, standard development practices, and/or programming standards. Additionally, McBride (2002) found that imposing system development methodology on end users might be regarded as an attempt to impose IT culture and thus be rejected by the end users. Finally, Adelakun and Jennex (2002) found that end user development issues with respect to failing to meet requirements or failure to gather the appropriate requirements could be caused by end users not identifying appropriate stakeholders for project involvement and assessing success of the developed systems.

Lack of Documentation

Previous discussion of the literature found many sources that identified a documentation vulnerability for end-user developed systems. Virtually all of the systems developed or purchased by engineering were found to have minimal to no design documentation. This is potentially a large problem as there is a great deal of memory/knowledge captured in these systems that is not available to system maintenance personnel. Also, there is a great deal of knowledge as to why things are done a certain way built into macros, programs, reports, databases, and models that is not captured in a retrievable manner. As engineering undergoes change, it is likely that a great deal of this knowledge will be lost since engineering's current knowledge management practices assume a static work force and does little to capture knowledge that exists in the heads of its members.

An example was a system developed to model the fire protection system. The system is used to evaluate potential work activities to determine impact on the fire protection system and to determine what compensatory measures need to be taken to ensure the fire protection system will still function when portions of it are taken out of service. The system was designed, built, maintained, and supported by the fire protection engineer. No documentation was generated. The concern is what happens if this engineer leaves, as a replacement has nothing to learn from. The organization has grown to rely on this system, and its loss would severely impact the organization. Another example was a local leak rate system that was found abandoned. This system had been developed to automatically calculate penetration leakages and to determine the plant's overall local leak rate in accordance with federal regulations. When the engineer who built the system left, the incoming engineer had no documentation to teach him how to use or maintain the system so he abandoned it and performed the needed functions using hand calculations where the potential for error is quite high.

These were not isolated cases. Numerous examples were found of special reports, databases, spreadsheets, and systems that were built to satisfy specific needs but are not documented. All rely on the engineer using them to maintain and enhance them and would be lost should the engineer leave and the report, database, spreadsheet, or system have a failure or need to be modified.

What makes these issues significant to this and all organizations is that it has the potential to lead to inaccurate data and incorrect decision-making. As processes change, the systems supporting the processes must be modified. Without documentation or system models to guide developers as to why the system is the way it is, it is easy for the developer to make wrong assumptions that can result in the incorrect modification of key calculations or algorithms. This can result in the system providing inaccurate data and results. This is of particular concern for this case as the subject organization operated a nuclear site and was subject to a great deal of regulatory required reports and data whose inaccurate generation could result in the site being shutdown.

Obsolescence/Procurement Standards

Obsolescence and procurement standards have been recognized as issues for IS planning. However, quite unexpectedly, the team found many plant and engineering digital systems that were approaching their end of life and needed to be replaced or updated. The team found systems running on Windows 3.1 and DOS as well as using 8'' and 5 1/4'' floppy drive technology. Expertise and hardware for maintaining these systems is disappearing. Problems arise as replacements are investigated for these systems and as new equipment/software is purchased for resolving new problems. The NIS infrastructure was standardized on proven technology and was not leading edge. Products bought on the open market tend to be leading or even bleeding edge. This results in some new products not being able to function within the NIS environment and requiring engineers to purchase equipment of an older standard. However, it is not good practice to develop replacement systems for this older infrastructure; instead, developers need to anticipate where the infrastructure is going and design for that. The issue is that NIS needs to create a process for assessing the incorporation of leading edge solutions needed by engineering into the NIS infrastructure while maintaining the reliability and coherence of the infrastructure. Additionally, procurement standards and processes need to be created for engineering to use and follow in the procurement of replacement systems and components. Another side of this issue is lack of documentation for these systems makes selecting and purchasing, or developing, replacement systems difficult as requirements are not documented and available for use in specifying the needs for the replacement systems.

Another example where a lack of procurement standards affects the infrastructure is the rapidly growing use of digital cameras and digital images. Their use has had a very positive impact on productivity. However, due to a lack of procurement standards many varieties of equipment, software, and formats were obtained and implemented. Extra resources were needed to support these multiple versions of equipment and software reducing much of the productivity gains. Additionally, clogged networks (caused by widespread e-mailing of images), dealing with different formats, and incorporating images into processes not designed to handle them has reduced these gains even further.

A final example is the use of web design and management tools. No procurement standards governing the purchase of web tools exist, and organizations have purchased whatever they have wanted making it difficult for NIS to support the use of the tools or to maintain sites created by non-IS endorsed tools. Additionally, use of intranet-based systems has failed to radically improve productivity as a lack of standard design practices and interfaces have resulted in many sites and systems being created with marginal usability and/or purpose.

Security

The team observed that the demarcation between the business systems maintained by NIS and plant systems maintained by engineering was blurring. Plant information flows across the business network on a routine basis. Plant processes have been developed that rely on e-mail and the business network to transmit data. Plant support productivity has improved by using the business networks to access and maintain plant systems. The key issue is to recognize that the boundary for protecting plant information now extends to the intranet firewalls. NIS and site management need to work together to create a security plan that recognizes this reality and allows for the creation of standards and processes for ensuring that systems developed by end users support the security plan. An example of this issue was the use by an engineering group of the business network to access plant equipment from remote locations such as their homes. This greatly increased productivity and reduced overtime costs but failed to take into account security needs. When interviewed and asked about security processes for ensuring proper access and user authorization, the group's manager stated that business network login procedures were all that was necessary as he trusted his people to properly access and use the remote access process to modify plant equipment when needed. Another example was found in end-user system development. While troubleshooting the previously discussed flow tracking system, the author was able to connect to a plant database that had been given to the vendor for testing purposes. The database had been placed on a publicly accessible server that the author was able to access using America Online, raising the issue of possible inadvertent disclosure of restricted data by end users and/or their vendors doing system development.

CURRENT CHALLENGES/PROBLEMS FACING THE ORGANIZATION

The greatest challenge faced by the organization is in learning to managing EUC within its management of traditional IS. McLean and Kappelman (1992) found that EUC has become an extension of corporate computing and suggest EUC be managed as a shared partnership of responsibility and authority. This organization has a schism between NIS and engineering that has resulted in engineering avoiding NIS control and viewing any attempt by NIS to form a partnership with suspicion. Munkvold (2002) found that this is most likely to occur with a group that has computer expertise and a low regard for IS, as the assessment found to be the case with engineering. McBride (2002) predicts this schism will be a hard issue to resolve as any attempt by NIS to enforce conformance with NIS standards will be perceived by the engineers as an attempt to impose IS culture and process on engineering. However, research suggests this must be done and provides suggestions such as Rittenberg and Senn (1993) who recognize that many users do not appreciate the risk involved in end user development and that this knowledge resides in IS. They suggest policies be implemented to govern EUC that include standards for procurement, documentation, and testing. Rittenberg and Senn (1993) also state that while user groups are suggested as a means of partnering IS and end users, they have found them to be ineffective unless there is strong leadership, a willingness to partner, and allocated resources to support the user groups within the IS and end user organizations. Jenne (1996) also supports creating a policy for managing end user development and suggests that it would be more effective if end user developed systems were grouped into various risk categories with IS development standards applied based on the risk category. Amoroso (1988) supports the use of end user policies to manage end users but suggests control must remain with the end user organization and not IS. Cheney, Mann, and Amoroso (1986) found that corporate policies controlling EUC were necessary to increase the likelihood of EUC success.

References

REFERENCES

Adelakun, O. & Jennex, M.E. (2002). Stakeholder process approach to information systems evaluation. The Eighth Americas Conference on Information Systems, AMCIS, AIS.

Alavi, M. & Weiss, I. (1986). Managing the risks associated with end-user computing. Journal of Management Information Systems, 2(3), 5-20.

Amoroso, D.L. (1986). Effectiveness of end-user developed applications in organizations: An empirical investigation. Unpublished Doctoral Dissertation, University of Georgia.

Amoroso, D.L. (1988). Organizational issues of end-user computing. Data Base, 19, 34, 49-58.

Amoroso, D.L. & Cheney, P.H. (1992). Quality end user-developed applications: Some essential ingredients. DataBase, 1-11.

Amoroso, D.L, McFadden, F., & Breitton-White, K. (1990). Distributing realities concerning data policies in organizations. Information Resources Management Journal, 3(2), 18-27.

Beheshti, H.M. & Bures, A.L. (2000). Information Technology's Critical Role in Corporate Downsizing. Industrial Management and Data Systems, 100(1), 31-35.

Benjamin, R.I. (1982). Information technology in the 1990s: A long range planning scenario. MIS Quarterly, 6(2), 11-31.

Cale Jr., E.G. (1994). Quality issues for end-user developed software. Journal of Systems Management, 45(1), 36-39.

Cheney, P.H., Mann, R.I., & Amoroso, D.L. (1986). Organizational factors affecting the success of end-user computing. Journal of Management Information Systems, 3(1), 65-80.

Davis, G.B. (1982). Caution: User Developed Systems Can Be Dangerous to Your Organizations. MISRC Working Paper #82-04, University of Minnesota.

Dodd, J.L. & Carr, H.H. (1994). Systems development led by end-users. Journal of Systems Management, 45(8), 34-44.

Dodson, W. (1995). Harnessing End-user Computing within the Enterprise. Online: http:/ /www.theic.com/dodson.html

Edberg, D. T. & Bowman, B. J. (1996). User-developed applications: An empirical study of application quality and developer productivity. Journal of Management Information Systems, 13(1), 167-185.

Grindley, K. (1995). Managing IT at Board Level. FT Pitman Publishing.

Jenne, S.E. (1996). Audits of end-user computing. The Internal Auditor, 53(6), 30-34.

Jennex, M., Franz, P., Duong, M., Haverkamp, R., Beveridge, R., Barney, D., Redmond, J., Pentecost, L., Gisi, J., Walderhaug, J., Sieg, R., & Chang, R. (2000). Project report: Assessment of IT usage in the engineering organizations. Unpublished Corporate Report.

McBride, N. (2002). Towards user-oriented control of end-user computing in large organizations. Journal of End User Computing, 14(1), 33-41.

McGill, T. (2002). User-developed applications: Can users assess quality? Journal of End User Computing, 14(3), 1-15.

McLean, E.R. (1979). End users as application developers. MIS Quarterly, 3(4), 3746.

McLean, E.R. & Kappelman, L.A. (1992). The convergence of organizational and end-user computing. Journal of Management Information Systems, 9(3), 145155.

Miric, A. (1999). The Hidden Risks of Spreadsheets and End User Computing. KPMG Virtual Library, http://www.itweb.co.za/office/kpmg/9908100916.htm

Munkvold, R. (2002). End user computing support choices. Proceedings of the 2002 Information Resource Management Association Global Conference (pp. 531-535). Idea Group Publishing.

O'Donnell, D.J. & March, S.T. (1987). End-User Computing Environments: Finding a Balance Between Productivity and Control. Information and Management, 13(2), 77-84.

Palvia, P. (1991). On end-user computing productivity: Results of controlled experiments. Information and Management, 21(4), 217-224.

Panko, R. (1988). End User Computing: Management, Applications, and Technology. John Wiley & Sons.

Rittenberg, L.E. & Senn, A. (1993). End-user computing. The Internal Auditor, 50(1), 35-42.

Rockart, J. & Flannery, L. (1983). The management of end-user computing. Communications of the ACM, 26(10), 776-784.

Sumner, M. & Klepper, R. (1987). Information systems strategy and end-user application development. Data Base, 18(4), 18-30.

Taylor, M.J., Moynihan, E.Y., & Wood-Harper, A.T. (1988). End-user computing and information system methodologies. Information Systems Journal, 8, 85-96.

Wagner, C. (2000). End users as expert system developers? Journal of End User Computing, 12(3), 3-13.

Wetherbe, J.C., Vitalari, N.P., & Milner, A. (1994). Key trends in systems development in Europe and North America. Journal of Global Information Management, 2(2), 5-18.

AuthorAffiliation

Murray E. Jennex, San Diego State University, USA

AuthorAffiliation

Murray E. Jennex is an assistant professor at San Diego State University and president of the Foundation for Knowledge Management (LLC). Dr. Jennex specializes in knowledge management, system analysis and design, IS security, and organizational effectiveness, and is the editor-in-chief of the International Journal of Knowledge Management. He has managed projects in applied engineering and business and information systems development and implementation. His industrial and consulting experience includes nuclear generation, electrical utilities, communications, health services, and governmental agencies. Dr. Jennex is the author of numerous publications on knowledge management, end user computing, international information systems, organizational memory systems, and software outsourcing. He holds a BA in chemistry and physics from William Jewell College, an MBA and MS in software engineering from National University, and an MS in telecommunications management and PhD in information systems from the Claremont Graduate University. Dr. Jennex is also a registered professional mechanical engineer in the state of California.

Subject: Case studies; Engineering firms; Information technology; End users

Classification: 9110: Company specific; 8370: Construction & engineering industry; 5220: Information technology management

Publication title: Journal of Cases on Information Technology

Volume: 7

Issue: 2

Pages: 67-81

Number of pages: 15

Publication year: 2005

Publication date: Apr-Jun 2005

Year: 2005

Publisher: IGI Global

Place of publication: Hershey

Country of publication: United States

Publication subject: Business And Economics--Computer Applications

ISSN: 15487717

Source type: Reports

Language of publication: English

Document type: Business Case

Document feature: tables references

ProQuest document ID: 198739244

Document URL: http://search.proquest.com/docview/198739244?accountid=38610

Copyright: Copyright Idea Group Inc. Apr-Jun 2005

Last updated: 2011-07-21

Database: ABI/INFORM Complete

Document 53 of 100

Enterprise System Development in Higher Education

Author: Chae, Bongsug; Poole, Marshall Scott

ProQuest document link

Abstract:

This paper reports a case in which a major university system in the US attempted to develop an in-house enterprise system. The system is currently used by more than 4,000 individual users in almost 20 universities and state agencies. This case offers a historical analysis of the design, implementation and use of the system from its inception in the mid 1980s to the present. This case indicates that ES design and implementation in higher education are quite challenging and complex due to unique factors in the public sector - including state mandates/requirements, IT leadership/resources, value systems, and decentralized organizational structure among other things - that must be taken into account in planning, designing and implementing ES (Ernst, Katz, & Sack, 1994; Lerner, 1999; McCredie, 2000). This case highlights (1) the challenges and issues in the rationale behind "one system for everyone" and (2) some differences as well as similarities in IT management between the private and public sectors. It offers some unique opportunities to discuss issues, challenges and potential solutions for the deployment of ES in the public arena, particularly in higher education. [PUBLICATION ABSTRACT]

Full text:

Headnote

EXECUTIVE SUMMARY

"One system for everyone" has been an ideal goal for information technology (IT) management in many large organizations, and the deployment of such systems has been a major trend in corporate world under the name of enterprise systems (ES) (Brown & Vessey, 2003; Davenport, 2000; Markus, Petrie, & Axline, 2000). Benefits from ES use are claimed to be significant and multidimensional, ranging from operational improvements through decision-making enhancement to support for strategic goals (Shang & Seddon, 2002). However, studies (Hanseth & Braa, 2001; Rao, 2000; Robey, Ross, & Boudreau, 2002) of the deployment of ES in private sector organizations show that the ideal is difficult to accomplish. This paper reports a case in which a major university system in the US attempted to develop an in-house enterprise system. The system is currently used by more than 4,000 individual users in almost 20 universities and state agencies. This case offers a historical analysis of the design, implementation and use of the system from its inception in the mid 1980s to the present. This case indicates that ES design and implementation in higher education are quite challenging and complex due to unique factors in the public sector - including state mandates/requirements, IT leadership/resources, value systems, and decentralized organizational structure among other things - that must be taken into account in planning, designing and implementing ES (Ernst, Katz, & Sack, 1994; Lerner, 1999; McCredie, 2000). This case highlights (1) the challenges and issues in the rationale behind "one system for everyone" and (2) some differences as well as similarities in IT management between the private and public sectors. It offers some unique opportunities to discuss issues, challenges and potential solutions for the deployment of ES in the public arena, particularly in higher education.

Keywords: academic administration IS; enterprise IS; information system implementation; organizational culture

ORGANIZATIONAL BACKGROUND

The Land Grant University System (LGUS) is one of the more complex systems of higher education in the nation. Currently, LGUS consists of nine universities, eight State agencies and a medical science center that serves over 100,000 students and reaches more than four million people each year through its service outreach mission. Research projects underway by system universities and research agencies total roughly $400 million. The system employs more than 23,000 faculty and staff members located throughout the state and serves all counties in the state. The annual budget for the LGUS is approximately $2.0 billion.

The state established its first college in 1876, and this marked the beginning of LGUS. During the 1970s and 1980s, LGUS experienced tremendous growth in terms of its major activities of teaching, research, and public service. The system experienced a 27% growth in its student population, and more growth was expected. In 1986, the system achieved recognition as one of the top 10 National Science Foundation (NSF) ranked research universities in the US. In addition to teaching and research, LGUS provided significant services to the citizens of the state through practical application of research-based knowledge.

At the outset of our case, in October 1988, LGUS consisted of four universities and seven associated agencies:

1. Central System Administrative Office (HQ) - the university system's headquarters;

2. Big Campus;

3. West Campus;

4. Southeast Campus;

5. South Campus;

6. Agricultural Research Station (ARS);

7. Agricultural Extension Service (AXS);

8. Veterinary Extension Service (VXS);

9. Engineering Research Station (ERS);

10. Engineering Extension Service (EXS);

View Image -   Table 1: The Land Grant University System

11. Forest Service (FS); and

12. Transportation Research Station (TS).

In 1989, LGUS experienced another period of significant growth when three universities joined the system. In 1990, another university (Northwest Campus) joined the system. The growth continued, and in 1996, four additional institutions joined the system (two universities and two research agencies). In 1999, a medical center (MC) was established.

The LGUS itself is relatively new in comparison to many systems of higher education in the US. Many of the system's universities had long histories before joining LGUS, but have been part of the system for a decade or less. The units in LGUS also vary greatly in mission and purpose. Each unit has its own goals, traditions, and culture. The system values diversity and honors the principle that "one size doesn't fit all". Traditionally, there has been a decentralized culture within the system. Even though every unit is under a single umbrella, each is regarded as different and desires to maintain its uniqueness and independence.

SETTING THE STAGE

In the 1980s, three currents of change - technological, institutional and organizational - were gaining momentum in LGUS as well as in the US higher education as a whole. Together, the three forces set the stage for the emergence of the University System-Wide Management Information System (USMIS).

Technological Currents

The USMIS project cannot be properly understood without considering events in the computing industry in the 1980s. During this period, a number of new concepts and technologies, including model-oriented Decision Support Systems (DSS), query and reporting tools, On-line Analytical Processing (OLAP) and Executive Information Systems, emerged and were adopted by many organizations. These were all very attractive to organizations and their management, since they seemed to promise an increase in productivity and efficiency. In the 1980s these computer systems were mainframe-based. Building on the concept of Manufacturing Resource Planning (MRP) that was developed in the 70s and mid 80s, the idea of enterprise-wide software, today called ERP, spread rapidly through the vendor community, and SAP, Baan, JD Edwards, and PeopleSoft, among others, introduced major offerings in this area. The development of the SQL relational database management system in the late 1970s fostered the emergence of the concepts of enterprise-wide integration and enterprise software, which become popular among users that included private businesses and institutions of higher education. One vendor in particular, SCT, was prominent in the higher education sector. Established in 1968, SCT marketed a commercial student records system for higher education. In the 1980s, SCT began to promote the concept of enterprise software for higher education, and in 1989, SCT integrated an ERP system on RDBMS-Banner.

The initial sponsors of USMIS - top officials of Big Campus and the HQ who later served on the IT steering committee - were aware of these technology trends and planned to develop an enterprise information system. The system was intended to support not only financial management but also other administrative functionalities, including contracts and grants management, purchasing, office automation and communication, cashiering, requests for travel advances, enterprise and departmental accounting, state interfaces, ad hoc reporting, and information management. They also planned to create a centralized staff (later called the MIS project team) to develop and maintain this ERP so that each unit would no longer need to dedicate computer/information systems personnel to support its financial information systems. The initial sponsors believed that, with centralized IT staff, modification of LGUS accounting systems to respond to environmental changes such as new state laws and regulations could be handled efficiently and uniformly. This would eliminate multiple, difficult-to-integrate versions created by each unit, as was required by fragmented pre-USMIS systems. One large-scale information system for all units was a very attractive idea to the senior administrators of LGUS.

Calls for increased efficiency and productivity had found expression in a variety of changes in many college and university business and finance programs and practices (Jonas et al., 1997). The LGUS IT plan submitted to the state in 1984 stated:

The application of modern automated information systems' technologies to the solutions of fiscal and administrative problems ... LGUS will continue to take advantage of new technologies to increase efficiency and effectiveness in fiscal operations, administration, programming, and communication.

Prior to the USMIS project, there had been two major IT initiatives: BPP and SIMS. The Budget/Payroll/Personnel (BPP) System is an integrated data management system for human resources, payroll, and personnel operating budgets. The primary users are the administrative functions supported by the LGUS. The design concept for the BPP system was developed in the mid-1970s, with full implementation occurring on July 1, 1979. The BPP system was developed using COBOL and IBM's Information Management System (IMS) data management software. Data from BPP could be electronically transmitted to the State Comptroller's office in batch mode, thus offering the state better oversight of LGUS. By 1986, the Student Information Systems (SIMS) project had also been implemented. The SIMS supports administrative processing of student records for Big Campus and South Campus. The system uses Software AG's ADABAS as the main database system. The main development languages are COBOL and NATURAL. The SIMS later played an important role in USMIS design.

Organizational Currents

During the two decades from 1970 to 1990, the LGUS grew rapidly, attaining an annual budget of $800 million. The LGUS Board of Regents and system administrators felt a pressing need for consolidated information to facilitate coordination and control among (and over) member institutions. However, the existence of separate financial management systems supporting diverse accounting rules and practices throughout LGUS created a major barrier to enterprise-wide integration. In the mid-1980s, the business offices of the 11 units of LGUS were employing 11 different financial accounting systems. Most were modified versions of an in-house accounting information system developed by Big Campus in the 1970s. Departments within each unit had also developed or purchased their own departmental accounting systems. These functioned as shadow information systems, running in parallel with the main financial systems in each unit.

In the mid-1980s, the President and financial officers of Big Campus initiated a project to develop a large-scale fiscal and administrative information system with capabilities for decision support, executive reporting, online purchasing, budgeting and planning, investment management, and streamlined integration across departments and colleges, among other functions. Initially their idea was to develop this system solely for Big Campus. LGUS administration was impressed by this plan and decided to expand its scope to include all units of the system. One highly-placed administrator at Big Campus commented that this was the most significant change in the history of USMIS. It was a change that later created many political issues and fostered resistance from other units.

Two considerations drove this change in scope. First, there was the issue of development cost. The initial acquisition cost for the Big Campus information system was expected to be over $1 million. At the time, this seemed too high to justify for only a single university. An enterprise system that would serve all units in LGUS was an appealing idea to Big Campus because it would enable the cost to be distributed among all units. Second, the development of an "integrated large-scale fiscal and administrative information system" was part of LGUS's strategic plan, and the expanded enterprise system was viewed by LGUS administration and the Board of Regents as a means of pursuing this plan.

Institutional Currents

Institutional forces also influenced the development of USMIS. In general, public organizations have more legal restrictions on their actions than those in the private sector (Guy, 2000). During the 1980s and through the 1990s, state after state mandated more stringent reporting requirements and accountability for higher education (Ernst et al., 1994). And such a mandate seemed necessary for LGUS. In the early 1980s, State auditors found that several units in LGUS had not followed proper fiscal procedures and that there were inconsistencies in the way the various units reported financial transactions on their annual financial reports.

The use of automated information systems by governmental bodies had strong support in both the legislative and executive branches of the state. Information systems were viewed as a means to improve productivity and efficiency. Financial information systems in particular were regarded as a means to improve coordination, integration and control. Legislators and administrators also believed that a uniform information system could help ensure that state-mandated changes in accounting and other procedures were implemented quickly and uniformly and followed faithfully throughout the state.

In 1987, the legislature mandated the State Comptroller's office to develop a Unified Statewide Accounting System (USAS) for the collection and reporting of statewide payroll and personnel data. The USAS was intended to meet state agencies' general accounting requirements and thus reduce the number of separate accounting systems. In fact, the ideal scenario would be to have a single financial information system based on USAS which would replace all current financial information systems. However, cooler heads recognized that in reality this was not feasible because of the variability among state agencies in terms of their size and the diversity and uniqueness of their needs. Thus, the Comptroller's office proposed two approaches for state agencies: Either use USAS or maintain your own information systems and interface them with USAS. The latter approach was selected during discussions between the USAS development team and LGUS. This requirement offered a compelling reason to replace existing in-house computer systems with a large-scale fiscal and administrative information system. The USMIS project was welcomed by the USAS project team since it was expected to provide the Comptroller's office with a single channel to communicate with all LGUS units.

These technological, organizational, and institutional currents led the LGUS Board of Regents and chancellor to recognize the strategic role information systems would have in the future of LGUS. They delivered a directive for the development of USMIS that was aimed to insure compatibility and consolidation of accounting and fiscal information, analysis, and reports from all system units. The challenge now was to build it.

CASE DESCRIPTION

Overview

First introduced in 1990 for Fiscal Year 1991, USMIS is an enterprise information system that incorporates financial regulations applicable to the units of LGUS. It integrates 30 databases that function as a unit across five independent modules or subsystems, including a financial accounting system, a purchasing system, a fixed assets management system, a system for sponsored research accounting, and annual financial reporting. The MIS project team has been responsible for the development and support of USMIS since the late 1980s. This team reports directly to the Department of Information Resources (DIR) within the central system administration office (HQ), the DIR in turn reports to the Office of the Vice Chancellor for Business Services who is under the Chancellor, the highest ranking officer of LGUS.

Design Process

The director of the MIS project was hired in October 1987. In November 1987, a survey questionnaire was distributed to all of the units of LGUS and the major departments within each unit to solicit input on their management information system needs. The survey demonstrated wide agreement on the need for substantial improvements in financial accounting management information within LGUS. In March 1988, an implementation team to work on the development of the USMIS was formed. The core members of the team were four senior systems analysts, three of whom had worked on SIMS project since 1979 and one of whom worked for the CIS department at Big Campus.

View Image -   Table 2: Options for System Design

The team's first task was to interview approximately 75 key users. The interviews resulted in the compilation of a Needs Inventory, the baseline requirements for LGUS. Ten alternative approaches to satisfy these requirements were investigated (Table 2).

The team made site visits to other universities and conducted detailed evaluations of existing information systems. Option #10 was selected on the basis of functionality, risk, time to implementation, flexibility, LGUS policy, interface/state, user involvement and technology. According to the former director, the MIS project team was asked to complete the project in one year, which was regarded as a reasonable time frame. The team was required to make regular progress reports to the steering committee, which consisted of 11 top administrators representing the units of LGUS and the Board of Regents.

In June 1988, the team prepared a requirements document which formed the basis of the Request for Proposal (RFP). In October 1988, the team submitted a 300+ page Advanced Certification Document for the USMIS to the state's Automated Information and Telecommunications Council (AITC) for approval. In the same month, the RFP was finalized, and in November, the team received the state AITC approval to purchase a software package.

Following the evaluation of vendor proposals, a contract was signed in 1989 with Information Associates for the Software AG NATURAL/ADABAS version of the Financial Records System (FRS), a popular financial information system among colleges and universities. This represented a three-way agreement among LGUS, Information Associates, and Software AG. LGUS requested this agreement in order to acquire a NATURAL/ADABAS version of the COBOL-based FRS. It was redesigned and re-engineered using NATURAL, Software AG's fourth generation language and the ADABAS data management systems. The redesign of NATURAL/FRS was completed in 1991.

This redesign of FRS was necessary in order to bring it into line with existing information systems and the Big Campus computing environment. As previously noted, in the mid-1980s, Big Campus made two major information system procurements to support administrative computing: SIMS (the Student Information Management System) and an IBM 3090-200E mainframe. The system underlying SIMS was purchased in 1984 and implemented by 1986. It included processes supporting admissions, registration, student financial aid, billing, grading, transcripts, degree audit, and loan repayment. The system employed Software AG's ADABAS as the principal database system and COBOL and NATURAL as development languages. This procurement cost over $1.6 million. The project was also committed to NATURAL because its system analysts and programmers were trained and experienced in NATURAL from their work on the SIMS project. USMIS also had to utilize the IBM 3090-200E mainframe computer, which was purchased and installed in August 1987 and cost over $8.2 million. This commitment was further solidified by an upgrade to an IBM 3090-400E, planned for 1992. Existing information systems served as critical constraints on the project.

These commitments combined with time pressure from the Board of Regents and the steering committee to produce a rather restrictive development environment. The former project director noted that:

... [p]eople (users) had little tolerance for changing. Flexibility does not mean much to users. It is not something what users want. They want what they are familiar with, so we tried to do as few changes possible ... IS implementation has to be fast. A reasonable time for system implementation to me is one year. Why? Because key players leave and are changed. That's a big problem. You lose focus and then give up.

In late 1988, the administrators of LGUS, Big Campus, and other units grew concerned about delays in the implementation of USMIS. This increased time pressure on the MIS team. Final vendor selection, completed in April 1989, increased confidence that USMIS would be implemented in a meaningful way. After modification of the purchased software package, USMIS went live with the FRS subsystem for three units - Big Campus, HQ, and VXS - in September 1990 for the fiscal year 1991. In September 1990, the Sponsored Research (SPR) subsystem went live with limited functionality. In September 1992, the Fixed Assets (FFX) subsystem went live for four campuses and two research agencies. In 1993, the purchasing system went live for LGUS, and in 1998, the Annual Financial Reporting (AFR) system went live. Following are some of the major milestones for the project:

* 03/88 - Hiring of four Senior Systems Analysts for the Project;

* 06/89 - Contract signed with Information Associates for the Software AG NATURAL/ADABAS version of the software;

* 09/89 - Hiring of four entry-level programmers;

* 11/89 - Initial code delivered;

* 09/90 - System went live with FRS (Financial Record System) and FAR (Accounts Receivable) for three units;

* 09/90 - SPR (Sponsored Research) module went live with limited functionality;

* 09/93 - Commence implementation of first phase of purchasing module at Big Campus Purchasing Department (Requisitioning and Purchase Orders); and

* 02/98 - Commence Budget Module implementation.

Implementation Process

Implementation turned out to be the most difficult task in the development of USMIS. At the outset, the MIS project team and the initial sponsors expected that full implementation of USMIS would take four years. The initial projection assumed an implementation schedule as follows:

* Year 1 - Implementation in Big Campus (Fiscal Year 1990-91);

* Year 2 - Implementation in a second university and one research agency;

* Year 3 - Implementation in a third university and a second research agency; and

* Year 4 - Implementation in the entire LGUS.

As this schedule indicates, the goal was for USMIS to be implemented in all units of LGUS. The advanced certification document explicitly stated the importance of the "full implementation" to realize substantial savings and the many benefits that would follow from USMIS. The initial position - set by the chancellor and Board of Regents of LGUS - was that no waivers of this requirement would be allowed and that no other option for financial management would be offered other than use of USMIS.

In pursuit of this goal, the MIS project team visited each member's institution and informed them of the mandatory nature of implementation for all units of LGUS. However, when Chancellor Jones left LGUS, his successor, Chancellor Smith, decided that implementation of USMIS would be optional, rather than mandatory. Changes in implementation policy, discussed in more detail in the following text, undercut the MIS project team's ability to hold to the schedule. Additional complications were introduced by local politics, leadership changes, resistance from some units, state-mandated rule and policy changes, user requests regarding system maintenance and enhancements, and lack of resources. The diffusion of USMIS through LGUS actually occurred as depicted in Figure 1.

Several of the issues faced by the MIS team have much in common with the experiences of enterprise system development in private sector organizations (Brown & Vessey, 2003; Davenport, 1998; Robey et al., 2002). However, the contexts of IS management in the public sector and in higher education pose unique challenges and also intensifies some traditional private sector problems. Research on public organizations and management indicates that there are some differences between public and private sector organizations in terms of goal complexity, authority structure, accountability, and the role of rules and regulations (Allison, 1983; Guy, 2000; Rainey, Backoff, & Levine, 1976). Research on IT in the public sector also indicates differences in IT management and planning between private and public sectors (Dufner, Holley, & Reed, 2002; Gauch, 1993; Mohan, Holstein, & Adams, 1990; Rocheleau & Wu, 2002). Furthermore, research on strategic planning and IT management in higher education indicates that the contexts of IS planning, development, implementation and use in higher education differ from those in private entities (Ernst et al., 1994; Lerner, 1999; McCredie, 2000). Interviews pointed to four major categories of challenges and issues that have significantly affected the USMIS over the years.

View Image -   Figure 1: USMIS Transition Schedule

1. Politics and Organizational Resistance to Change: The Battle

The value system in higher education differs from that of the business arena. The guiding principle of the university - long term investment in the educating of citizens - is different from the business's bottom line approach. Unlike the business model, which generally emphasizes a management-driven approach, university management is based on shared governance by faculty and administrators that is for the most part temporarily drawn from the ranks of faculty. A university is a loosely-coupled system in which units and employees recognize the need to work together for a mutually beneficial future, but understand that their differences will often create tensions (Lerner, 1999).

Initially, units of LGUS had two sorts of reactions to USMIS. The smaller universities and agencies, which lacked computer and financial resources, were relatively favorable toward USMIS, since it provided them with an interface with the State's Comptrollers' office, a legislated requirement. However, other units were more negative. Despite the fact that they realized the need for consolidated reports for system level management, they preferred to use their own financial systems and interface them with USMIS.

For example, one campus had just developed a new student information system and a financial information system and did not want USMIS. Two research agencies - Engineering Research Station and Engineering Extension Service - were strongly against USMIS adoption. They advocated the need for maintaining their own information systems based on two arguments. First, they pointed out functional deficiencies in USMIS to support their needs for contract and grant management and other research related functionalities. Their second argument was that as engineering agencies they differed from other units in LGUS.

The Engineering Research Station in particular rejected the vision of "one system for everyone" and expressed concerns about USMIS. Top administrators and the IT manager of engineering research argued that USMIS was inferior to their own computer system, which was based on the Oracle database. During vendor selection in 1988, the MIS project team was less interested in a brand new system, but searched for a system compatible with existing information infrastructure (Star & Ruhlender, 1996), including SIMS, NATURAL, ADABAS and IBM 3090-200E. Engineering research had advocated a different alternative, SCT using Oracle DB. The MIS team argued that SCT was a riskier choice than Information Associates, exhibiting an attitude toward IT planning characteristic of the public sector. In general, public sector organizations tend to be more cautious and more concerned with rules and regulations, whereas private organizations tend to be more comfortable with risk (Bozeman & Kingsley, 1998). Competition is much less significant in the public sector, which tends to be concerned with service delivery and continuity, as well as with protecting the public interest (Rocheleau & Wu, 2002). The view of IT in private and public organizations also tends to be different. For the public sector IT is not a proprietary resource to be exploited for competitive advantage (Dufner et al., 2002), but more often is regarded as a cost-cutting device, a way of doing more with the same number of staff (Rocheleau & Wu, 2002). Risk avoidance is evident in public IT management (Mohan et al., 1990).

Engineering research also argued that the MIS team and steering committee initially designated research (e.g., research contract and grant management subsystem) as a low priority in the implementation plan. A top administrator of the engineering research agency insisted that "we will be asked to pay for a system we do not need nor want. We will be asked to pay for a system that at the very best will be mediocre." A top administrator of a different research unit emphasized the importance of autonomy and distinctiveness in LGUS in a memo to the HQ:

It is important to clarify the directives of the LGUS Board of Regents ... Centralization seems to be effective in smaller state systems with less diversity of missions. But the size and complexity of LGUS make centralization a formidable task at best ... Traditionally, the HQ had maintained a very workable interpretation of its role by providing overview and governance where a global perspective is necessary and where shared services reap benefits to the LGUS members. But the autonomy of the System members to exercise their authorities and means in order to do a good job is one that members have long cherished. In my opinion, the current USMIS philosophy threatens the traditional role of the HQ and threatens to share service even when such services are costly to some system members. Such a change in philosophy could not be implemented overnight. If such as a change was in order, then it should be communicated as such and simply not be the results of the [USMIS] initiative ... the autonomy of the LGUS members is their strength and their means of attaining their goals.

Most respondents recognized the conflict between these agencies and the MIS project team and HQ over the issue of USMIS adoption. They referred to it as "The Battle". The result of The Battle was that in 1995 two units, engineering research and engineering extension, and the newly joined Northwest Campus were officially allowed to establish an interface with USMIS rather than adopting it as their primary system.

2. Top Management Commitment: Leadership and Politics

The Battle was tightly interwoven with changes of leadership in the system. Among many events in the history of USMIS, the resignation of the former director of the MIS project team had significant impacts on the process of USMIS implementation. The former director had been in charge of the MIS team from the beginning in 1987 and left LGUS on July 1991. His resignation caused serious problems in the continuation of USMIS implementation. A second leadership related event compounded the difficulty of USMIS implementation. One of the initial sponsors of USMIS, the Executive Deputy Chancellor, left LGUS. This loss of two key sponsors led to a loss of direction in the implementation effort. These departures made it more difficult for the MIS team and LGUS leadership to resist the efforts of units that wanted to opt out of USMIS.

Another complicating factor was change in chancellors. From 1986 to present, there have been five chancellors. Each chancellor had different visions for USMIS, and these had significant impacts on USMIS implementation (Table 3). One interviewee noted that "Every time a new chancellor is in office, things change. USMIS shifts depending on who the chancellor is at that time. The vision of chancellor is a powerful influence."

The MIS project was officially established during Chancellor Smith's regime. The chancellor and the board were very supportive of USMIS design and implementation. He strongly supported a mandatory policy for USMIS implementation. In 1990, three units implemented the USMIS as it went live.

In 1991, Chancellor Jones, formerly the Deputy Chancellor for Engineering of Big Campus, assumed office. One of the initial sponsors of USMIS noted that:

Chancellor Jones initially saw USMIS as bad, and I had to convince him not to stop what we had done so far. After becoming the chancellor, he changed his view a little bit and put his foot on both sides (us and engineering). He tried to take a neutral position but understood the engineering side more. That's why the two research agencies could avoid using USMIS.

Unlike the first chancellor who advocated USMIS, Chancellor Jones was not as strong an advocate of USMIS, and this weakened pressure for implementation. During Chancellor Jones's term implementation of USMIS was widely regarded as optional. However, the HQ and the MIS team continued to push for adoption. In 1991, six more units of LGUS became users of USMIS, and in 1992, three units implemented it.

View Image -   Table 3: Policy of USMIS Implementation and Change of Leadership

The optional status for USMIS implementation changed dramatically when Chancellor Brown, formerly President of Big Campus, took over. Brown had been on the steering committee of the original MIS project at Big Campus and thus was very supportive of USMIS. He made implementation mandatory again and announced that all units must be on USMIS. This led to conflict between HQ and the MIS project team and those units that wanted to avoid using USMIS. A top IT administrator at one university campus recalled that "it was not a happy time for everyone".

However, Chancellor Brown's term lasted for only one year. In 1994, the Board of Regents appointed the president of the newly added Northwest Campus as the fourth chancellor during the period of LGUS implementation. Chancellor White stressed the importance of uniqueness and autonomy of each university and agency in LGUS. While White was not against USMIS implementation, he decided that units could choose not to use USMIS. Notwithstanding, acceptance of USMIS continued to spread. During Chancellor White's term of office, all units except the two engineering agencies and the chancellor's former university implemented USMIS as their primary financial and accounting system.

This led a number of those involved in the development and implementation of USMIS to believe that USMIS implementation was very "political." Several respondents said, "If you want to understand USMIS implementation you need to see how politics has played over time in the history of USMIS ... A lot of local politics was played in USMIS adoption ... Politics was very powerful in the implementation of USMIS."

While the importance of top management commitment for large IT projects in the private sector can never be overstated (Brown & Vessey, 2003), the complex, often discontinuous, and fragmented power and leadership structure intensifies the challenge in obtaining continuous top management commitment in the public sector (Watson, Vaught, Gutierrez, & Rinks, 2003). In the private sector, the process of setting objectives and carrying them out are closely integrated, whereas in the public sector these processes are loosely coupled (Rocheleau, 2000). The loosely-coupled structure of public organizations impedes consideration of operational issues at the time objectives are established. For example, an objective might be "management information systems that will insure compatibility and the ability to consolidate accounting and fiscal information, analysis, and reports from all system units". When elected top administrators negotiate to set objectives such as these, feasibility and operations aspects may not be fully considered (Dufner et al., 2002). Detailed IT issues and related topics have often not been considered relevant for consideration by university presidents or chancellors (Ward & Hawkins, 2003). Experience with developing EIS shows that "In the private sector, once the chief executive wants an EIS, it will move. In the public sector, wanting is not enough. Movement can stop at any of a number of stages" (Mohan et al., 1990).

3. Rules and Regulations from a Public Constituency

Public organizations have many legal restrictions on their actions and operate under public scrutiny (Guy, 2000). Higher education faces calls for increased accountability and regulations imposed by multiple social institutions and governing bodies, including legislators and Generally Accepted Accounting Principles (GAAP) (Ernst et al., 1994; Jonas et al., 1997).

In the 1980s and 1990s, several state audits had shown deficiencies in LGUS and other universities, and many new rules and policy changes were mandated by the state. These were very influential in the design and implementation of USMIS. The USAS that went into effect on September 1, 1993 for a number of small state agencies has been influential in the maturity stage of USMIS implementation. Since this date, all units of LGUS had to report information to the central USAS database daily. This database, controlled and managed by the State Comptroller's office, was designed to maintain accounting data consistent with GAAP and National Association of College and University Business Officers (NACUBO) standards. The system provides accounting services to all state agencies using a uniform chart of accounts. Also, USAS reflects any changes in the state legislatures and policy. Thus, in the implementation and maintenance of USMIS, priority had to be given to processing requirements and maintenance requests that were mandated by law or policy changes.

For instance, in 1999, the Governmental Accounting Standards Board (GASB) Statements No. 34 and No. 35, "Basic Financial Statements" and "Management's Discussion and Analysis for State and Local Governments and Public Colleges and Universities," were issued. For the first time, accrual accounting was required for all government activities and all capital assets had to be depreciated. Starting in fiscal 2002, the state is required to implement these new rules. In response to this requirement, USMIS had to develop depreciation capabilities to report the depreciation of fixed assets. Priority had to be given to these sorts of mandated requirements and policy changes rather than user requests.

USMIS was also required to respond to state auditors' recommendations of management controls. The sate audit report in 1995 pointed out that USMIS did not provide useful information at the departmental level. USMIS responded to the audit's recommendations in a number of ways. Immediately after the state audit the MIS team began the implementation of departmental download capability. LGUS finalized licensing agreements for a software package that allowed end users to download USMIS data to their microcomputer environments so that data could be processed to meet the end user's needs. In 1998, USMIS began the implementation of budget and automated Annual Financial Report (AFR) subsystems. Recently, there has been an effort to convert the BPP system to the same processing environments (ADABAS) as the USMIS system in order to develop the interface between the two systems.

4. Diversity of Internal Constituencies and Their Needs: No CIO?

Like other public organizations (Guy, 2000; Rainey et al., 1976), LGUS serves a large number of constituencies whose goals and needs are diverse and sometimes even compete with one another. As the original objective of USMIS - one IS for everyone - indicates, USMIS was directed by a desire for centralization. The Board of Regents and the initial sponsors of USMIS believed that one IS for all units in LGUS was desirable and could be realized. However, as the design and implementation were proceeding, the size and diversity of LGUS emerged as a critical issue.

Every unit had its own chart of accounts, and the accounting practices throughout LGUS were very diverse. Few wanted to change their accounting. Some feared losing control. USMIS had to adapt to the diversity of their accounting practices. Also each unit had different priorities. For example, the research agencies required contracts and grants/research accounting capabilities in order to administer programs and to assure compliance on sponsored research projects. Big Campus, which had initially made a significant investment in the acquisition of the software package for USMIS, used this leverage to request that many other functionalities and subsystems (e.g., purchasing, department-level accounting, and administration) be added into USMIS.

The diversity of needs and requests and their sheer number resulted in problems in attaining the full design and implementation of USMIS. According to the state audit report in 1996, as of 1995 there was a backlog of over 250 user requests for system maintenance and enhancement, some of which dated back to 1990 and 1991. From September 1995 until June 1996, the USMIS support staff had completed 219 service requests. During the same period, an additional 271 maintenance items were identified by various system users. Similar to the situation in the broader public sector (Mohan et al., 1990; Rocheleau & Wu, 2002), most academic institutions have a shortage of IT related resources and skills for user-support and system maintenance (Ernst et al., 1994).

Needs at the top of LGUS also forced the MIS team to adapt. One of the original objectives of USMIS was to provide the capability of executive information systems to meet the information needs of system-level users, such as the Board of Regents and the Central System HQ. However, the 1996 state audit of management controls at LGUS pointed out the lack of a comprehensive management information system. The report recommended that:

System management should reevaluate the overall intent and purpose of USMIS and how best to meet the management reporting needs of the board and executive management. Consideration should be given to the depth of accounting functions that USMIS will provide, including general ledger, project accounting, and management reporting. Alternative methods for meeting management reporting needs should be fully identified and evaluated.

To respond to the recommendation that alternative methods be adopted, LGUS initiated the data warehousing project to develop an executive information system, rather than altering USMIS. This system went into operation in 2000. The system is loosely-coupled with USMIS and other systems at Big Campus and the system-level. Also, there are several other needs that USMIS does not support such as departmental financial management and reporting. Thus different parts of LGUS had developed or purchased "shadow information systems" to make up for the deficiencies of USMIS to meet their specific, local needs.

Until 1991, the 11 -person steering committee, composed of members from universities' fiscal management, system units, and the MIS team, set priorities for development. Starting in late 1991, a different committee consisting of the five top administrators from the university fiscal management, HQ and the USMIS team, took on this task and tried to set priorities for USMIS. However, the complex and interwoven elements in USMIS design and implementation made it difficult for the group to perform this task. This is partly because every unit in LGUS, including Big Campus, wanted their project to be the top priority. However, it was difficult to manage prioritization because the group did not have the same authority as a CIO in the corporate world. Public managers tend to have less authority over subordinates and less decision-making autonomy (Rainey et al., 1976). A top IT administrator in LGUS commented:

Higher educational institutions differ from the private sector as far as IS is concerned. The university is governed by committees so the attitude is "convince us" of why we need such an information system. Therefore design and implementation become tougher. There is a lot less commitment by members.

Since 1991, the MIS team's position has been that priority was to be given to those projects that result in improved reporting and/or processing for all users of USMIS. With the recognition of the diversity of LGUS the MIS team adopted a "customer-oriented" rather than "enforcing" approach and tried to accommodate different needs of different members. The diversity of LGUS led the MIS project team to design an "average" system for all units, no matter whether they were large or small universities or research agencies, while different parts maintained "shadow systems" to meet local needs not satisfied by USMIS. The research agencies over that USMIS is for universities, not for them, while the smaller universities say it is too big for them. Reflecting on this, a key initial sponsor of the project commented "one system for everyone is nothing for nobody."

CURRENT CHALLENGES & PROBLEMS FACING THE ORGANIZATION

As finally-realized, USMIS diverges considerably from the grand vision of the project initiators and the Board of Regents. The final system is not the fully integrated large-scale information system the MIS team set out to build, but it has certainly served critical functions for LGUS. After more than a decade of service, USMIS is now regarded as an aging legacy system. Currently LGUS and the MIS project team face the same three sets of forces - technological/functional, organizational and institutional - which demand important decisions and actions on the future of USMIS. The critical question is whether USMIS needs to be replaced or extended; if extended, in what way; if replaced, when is the right time and by what?

Technological Issues

Aging administrative, financial information infrastructure is one of the most critical challenges to universities today (McCredie, 2000). Functional pressures that raised doubts about the instrumental value of USMIS came from both inter-organizational and environmental levels. At the inter-organizational level, different user groups had pointed out functional deficiencies with USMIS. At a more general level, users complained that USMIS was not user friendly, did not utilize advanced databases, and had slow response time. At the environmental level, the emergence of new technologies such as GUI, fourth generation programming languages, and client-server architecture led to functional pressures. More recently, there have been some other functional pressures due to changes in the environment. For example, the industry has clearly moved to embrace SQL as the standard query language. SQL databases like Oracle and Microsoft SQL Server are becoming much more popular than ADABAS. Also it is very difficult to find programmers familiar with ADABAS. Currently LGUS is engaged in an effort to replace SIMS, the payroll system, and the human resource system with an ERP, which is expected to cost approximately $35 million. This project is becoming another source of technological/functional pressures to either replace USMIS with an ERP or significantly enhance it through utilizing web technologies. Most recently, the project team is considering the utilization of middleware technologies such as the EntireX Broker for web-based services for USMIS.

Organizational Issues

Given the state of the US economy in 2003, the number-one IT-related issue in higher education is funding (Crawford & Rudy, 2003). LGUS is no exception. Considering the magnitude of the ERP project, LGUS has concluded there is no way to replace USMIS in the short term. Key decision makers noted that people agree that "USMIS plays a large role in reporting to the state ... USMIS works." However, a backlog of requests for functional improvements from departmental and individual user groups and cumbersome user interfaces ("Green Screens") are acknowledged as major issues. Currently, the organization has decided to keep the legacy system, but the remaining question is for how long? And how can the USMIS be extended and renewed to meet new users and business requirements? Another issue may arise when LGUS decides to replace USMIS in the future. A top administrator commented:

Some people have been talking about the replacement of USMIS, but they don't know what they are talking about. In my opinion, they have no idea of the complexity and scope of USMIS. If they knew it they would never talk about the replacement of USMIS. You know what? USMIS cannot be easily pulled back. It has its own life!"

In the late 1980s and early 1990s, USMIS was recognized as an alternative to the individual systems running in different units of LGUS. However, USMIS is now perceived to be part of the installed base, something that is exogenously given and resistant to willful change.

Institutional Issues

Institutional pressures have come from the state and the higher education community. Over the last decade, the state audit reports pointed out several limitations of USMIS, including lack of departmental support and reporting capabilities. They have questioned the appropriateness of further developing and maintaining USMIS since the mid-1990s. As an example, the state audit report of 1996 recommended that:

System management [of LGUS] should reevaluate the overall intent and purpose of USMIS and how best to meet the management reporting needs of the Board and executive management ... Implementation of USMIS at other system components should continue to be delayed until decisions are reached about the overall intent and purpose of USMIS ...

In addition to the state, the recent trend of deploying ERP in higher education is another powerful institutional pressure. Today information technology is increasingly becoming important for higher educational institutions to remain competitive (McCredie, 2003). ERP implementations are among the single largest investments in dollars and resources ever made by higher education institutions. Almost half of the major universities are using ERP systems. Of those that have not implemented an ERP, 10% are currently or will implement in a year, and an additional 25% are expected to do so within the next three years (King, 2002). A member of the steering committee for replacing SIMS with an ERP estimates that the replacement of USMIS will cost almost $50 million.

References

REFERENCES

Allison, G. T. (1983). Public and private management: Are they fundamentally alike in all unimportant respects? In J. L. Perry & K. L. Kraemer (Eds.), Public Management: Public and Private Perspectives (pp. 72-92). Palo Alto, CA: Mayfield.

Bozeman, B., & Kingsley, G. (1998). Risk culture in public and private organizations. Public Administration Review, 58, 109-118.

Brown, C. V., & Vessey, I. (2003). Managing the next wave of enterprise systems: leveraging lessons from ERP. MIS Quarterly Executive, 2(1), 65-77.

Crawford, G., & Rudy, J. A. (2003). Fourth annual EDUCAUSE survey identifies current IT issues. EDUCAUSE Quarterly, 12-26.

Davenport, T. H. (1998). Putting the enterprise into the enterprise system. Harvard Business Review, July/August, 121-131.

Davenport, T. H. (2000). The Future of enterprise system-enabled organizations. Information Systems Frontiers: Special Issue of the Future of Enterprise Resource Planning Systems Frontiers, 2(2), 163-180.

Dufner, D., Holley, L. M., & Reed, B. J. (2002). Can private sector strategic information systems planning techniques work for the public sector? Communications of AIS, 8, 413-431.

Ernst, D. J., Katz, R. N., & Sack, J. R. (1994). Organizational and technological strategies for higher education in the information age. CAUSE Professional Paper Series #13.

Gauch, R. R. (1993). Differences between public and private management information systems. Paper presented at the Proceedings of the 1993 conference on Computer personnel research, St. Louis, Missouri, USA.

Guy, M. E. (2000). Public management. In J. M. Shafritz (Ed.), Defining Public Administration (pp. 166-168). Boulder, CO: Westview Press.

Hanseth, O., & Braa, K. (2001). Hunting for the treasure at the end of the rainbow. Standardizing corporate IT infrastructure. The Journal of Collaborative Computing, 10(3/4), 261-292.

Jonas, S., Katz, R. N., Martinson, L., Plympton, M. F., Relyea, S. W., Rennie, E. D., Rudy, J. A., & Walsh, J. F. (1997). Campus financial systems for the future. The National Assocation of College and University Business Officers and CAUSE.

King, P. (2002). The promise and performance of enterprise systems in higher education. EDUCAUSE Quarterly.

Lerner, A. (1999). A Strategic planning primer for higher education. Online: http:// www.des.calstate.edu/strategic.html

Markus, M. L., Petrie, D., & Axline, S. (2000). Bucking the trends: What the future may hold for ERP packages. Information Systems Frontier: Special Issue of on The Future of Enterprise Resource Planning Systems, 2(2), 181-193.

McCredie, J. (2003). Does IT matter to higher education? EDUCAUSE Quarterly.

McCredie, J. W. (2000). Planning for IT in higher education: It's not an oxymoron. EDUCAUSE Quarterly, (4), 14-21.

Mohan, L., Holstein, W. K., & Adams, R. B. (1990). EIS: It can work in the public sector. MIS Quarterly, December, 435-448.

Rainey, H., Backoff, R., & Levine, C. (1976). Comparing public and private organizations. Public Administration Review, 36(2), 233-244.

Rao, S. S. (2000). Enterprise resource planning: Business needs and technologies. Journal: Industrial Management & Data Systems, 100(2), 81-88.

Robey, D., Ross, J. W., & Boudreau, M. (2002). Learning to implement enterprise systems: An exploratory study of the dialectics of change. Journal of Management Information Systems.

Rocheleau, B. (2000). Prescriptions for public-sector information management: A review, Analysis and Critique. American Review of Public Administration, 30(4), 414-435.

Rocheleau, B., & Wu, L. (2002). Public versus private information systems: Do they differ in important ways? A review and empirical test. American Review of Public Administration, 32(4), 379-397.

Shang, S., & Seddon, P. B. (2002). Assessing and managing the benefits of enterprise systems: The business manager's perspective. Information Systems Journal, 12, 271-299.

Star, S., & Ruhlender, K. (1996). Steps towards an ecology of infrastructure: Design and access for large scale information spaces. Information Systems Research, 7(1), 111-134.

Ward, D., & Hawkins, B. L. (2003). Presidential leadership for information technology. EDUCAUSE Review, May/June, 36-47.

Watson, E., Vaught, S., Gutierrez, D., & Rinks, D. (2003). ERP implementation in state government. Annals of Cases on Information Technology, 5.

AuthorAffiliation

Bongsug Chae, Kansas State University, USA

Marshall Scott Poole, Texas A&M University, USA

AuthorAffiliation

Bongsug Chae (PhD, 2002, Texas A&M University) is an assistant professor of management information systems at Kansas State University. His current research interests are in the area of large-scale information system and information infrastructure, knowledge management, technology adaptation, decision support systems, and ethics and social theories for IS research. His work also appears in Decision Support Systems, OMEGA: The International Journal of Management Science, Information Resource Management Journal, Electronic Journal of Information Systems for Developing Countries, International Journal of Information Technology and Decision Making, Journal of KMCI and others.

Marshall Scott Poole (PhD, 1979, University of Wisconsin) is a professor of information and operations management and of communication at Texas A&M University. He has conducted research and published extensively on the topics of group and organizational communication, conflict management, computer-mediated communication systems, implementation of information systems, and organizational innovation. He has co-authored or edited 10 books including Communication and Group Decision-Making, Research on the Management of Innovation, Organizational Change and Innovation Processes: Theory and Methods for Research, and Handbook of Organizational Change and Innovation.

Appendix

APPENDIX

* Information Associates: The Information Associates software, a company based in New York State, is now owned by the SCT Corporation (www.sct.com) since 1992.

Software AG NATURAL/ADABAS: Launched in 1979, NATURAL now has an installed base of more than 3,000 corporations. It was designed specifically for building mission-critical applications. Natural applications support many leading platforms and can be integrated with many major database systems (ADABAS, DB2, Oracle, etc.). Developed in 1969 by Software AG, ADABAS is a popular database management system, which is currently installed on many organizations including FBI, EPA's Office of Information Resources Management, UPS, Merrill Lynch, and University of Texas.

Subject: Case studies; Colleges & universities; Information technology; Historical analysis

Location: United States, US

Classification: 9110: Company specific; 8306: Schools and educational services; 9190: United States; 5220: Information technology management

Publication title: Journal of Cases on Information Technology

Volume: 7

Issue: 2

Pages: 82-101

Number of pages: 20

Publication year: 2005

Publication date: Apr-Jun 2005

Year: 2005

Publisher: IGI Global

Place of publication: Hershey

Country of publication: United States

Publication subject: Business And Economics--Computer Applications

ISSN: 15487717

Source type: Reports

Language of publication: English

Document type: Business Case

Document feature: tables graphs references

ProQuest document ID: 198739029

Document URL: http://search.proquest.com/docview/198739029?accountid=38610

Copyright: Copyright Idea Group Inc. Apr-Jun 2005

Last updated: 2011-07-21

Database: ABI/INFORM Complete

Document 54 of 100

IT-Business Strategic Alignment Maturity: A Case Study

Author: Sledgianowski, Deb; Luftman, Jerry

ProQuest document link

Abstract:

Both information technology (IT) and business leaders are continually looking for management practices to help them align their IT and business strategies. Alignment seems to grow in importance as companies strive to link IT and business in light of dynamic business strategies and continuously evolving technologies. Importance aside, what is not clear is how to achieve and sustain harmony among business and IT, how to assess the maturity of alignment, and what the impact of misalignment might be on the firm. This case study describes the use of a management process and assessment tool that can help to promote long-term IT-business strategic alignment. The Strategic Alignment Maturity (SAM) assessment (Luftman, 2000) is used as a framework to demonstrate the evolution of an international specialty chemicals manufacturer's IT-business alignment practices to enable the achievement of their corporate goals. Major insights from their experience and SAM best practices are highlighted. [PUBLICATION ABSTRACT]

Full text:

Headnote

EXECUTIVE SUMMARY

Both information technology (IT) and business leaders are continually looking for management practices to help them align their IT and business strategies. Alignment seems to grow in importance as companies strive to link IT and business in light of dynamic business strategies and continuously evolving technologies. Importance aside, what is not clear is how to achieve and sustain harmony among business and IT, how to assess the maturity of alignment, and what the impact of misalignment might be on the firm. This case study describes the use of a management process and assessment tool that can help to promote long-term IT-business strategic alignment. The Strategic Alignment Maturity (SAM) assessment (Luftman, 2000) is used as a framework to demonstrate the evolution of an international specialty chemicals manufacturer's IT-business alignment practices to enable the achievement of their corporate goals. Major insights from their experience and SAM best practices are highlighted.

Keywords: business/IT strategy alignment; business strategy; case study; change management; cross-functional teams; global IT management; information services organization; IS/IT planning; IT alignment; multinational corporations; steering committees; strategic IT management; strategic planning

ORGANIZATIONAL BACKGROUND

The organization discussed in this case study is an international specialty chemicals developer and manufacturer. From here on, this organization is referred to as the 'Company'. Except where noted, the content is adapted from documents and interviews internal to the organization.

Specialty chemicals are chemicals that are added during the blending process of finished products which enhance the products' performance, appearance, or some other quality. At the initial time of this case (May 2001), the global specialty chemicals market was valued at around $76 billion and consisted of approximately 40 market segments.

The specialty chemical industry and the company have several notable external influences and competitive threats:

* a weak global economy resulting in decreased demand for specialty chemicals;

* highly volatile currency exchange rates have an adverse effect on profitability margins; and

* high growth market potential in Asia but increased competition from Asian suppliers.

The company's customers range across many industries from automotive, electronics, plastics, coatings, petrochemicals, paper and mining, to textiles for fashions and the home, to wide-ranging products for hair and skin care. Specialty chemicals are frequently made-to-order for a customer's specific manufacturing requirements and often are patented; this may result in increased switching costs to the customer due to limited substitution of alternative products. This usually necessitates a close relationship between the specialty chemicals provider and their customer.

The company generated sales of around $5.4 billion in 2001 and employed over 20,000 people worldwide, with sales in 117 countries, 58 production sites in 29 countries, and research centers in 10 countries. The company's merger and acquisition activity as well as their global expansion from their European headquarters into countries all over the world had resulted in multiple and duplicate IT infrastructures throughout the organization.

At the end of the case time frame (July 2003), after the implementation of the "Aligning for One" business program, the company was well positioned to launch the next phase of their business strategy, the "Aligning for Growth" program. The effect of the "Aligning for One" program resulted in headcount reductions down to about 18,500 people worldwide (Figure 1), with sales in 120 countries, 60 production sites in 23 countries, and research centers in 11 countries. The company's free cash flow increased by 50%, their cash and cash equivalents doubled, and their net debt was cut by more than half (Figure 2).

View Image -   Figure 1: The Company's Headcount - Years 2000-2003
View Image -   Figure 2: The Company's Cash Development - Years 2000-2003

SETTING THE STAGE

A New Business Strategy Program: Aligning for One

On the heals of the company's collapsed merger plans and less than expected returns from a major acquisition of a chemical treatment business, Chairman of the Board Alvin Joseph (a pseudonym) took over as chief executive officer (CEO) in early 2001, with the company facing very competitive global market conditions and negative currency effects. Shortly thereafter, Joseph announced a new corporate vision, a new mission, and new business initiatives. He launched the company's "Aligning for One" business strategy, steering the company strategically and structurally to its customers' industries and the challenges ahead.

With the new "Aligning for One" business strategy, Alvin Joseph reorganized the company from its divisional structure comprised of three divisions with nine business units, into a new structure of five business segments, without the division layer (Figure 3). Each business segment was given responsibility for its marketing, research and development, technology, production, and sales. Non-operational core support functions such as supply chain replenishment and distribution, finance, and human resources were grouped and provided through central support services on a global basis.

An important aspect of the "Aligning for One" program was that best practices and systems would be taken from the previous organizational structure of nine decentralized business units and integrated into one set of best practices utilized by the entire company.

Best practices are examples of the best way to perform a process or management practice which results in optimal performance using minimal resources. Identifying and implementing best practices should increase efficiency by streamlining and simplifying processes organization-wide.

View Image -   Figure 3: Company's Old and New Organizational Structures

The "Aligning for One" program aimed to provide:

1. Increased speed of decision-making by eliminating the divisional structure.

2. Centralized support services to allow the new business segments to focus on their respective markets and provide "one face to the customer".

After the new business strategy was accepted by the executive committee, each executive committee member called a meeting with his or her senior management team. Since the information technology functions ultimately reported to the CFO, David Bailey, he was responsible for centralizing the disparate IT functions and aligning them with the business. The new IT structure was announced at the CFO's senior management meeting (Figure 4).

With a goal of the restructuring to simplify processes and with the core IT infrastructure now centralized, it soon became apparent that the integration of disparate information systems, and its resulting reduction in expenses, was a key to achieving the business strategy.

At the CFO's senior management meeting, Jean Felder's thoughts were in fast motion. As head of Global Supply Chain Services and a senior business manager, Jean knew that for the "Aligning for One" program to work, the company would need to leverage the capability of their information technology. She thought to herself, "we can change the structure all we want, but if we can't properly leverage information technology to help coordinate and control the new streamlined structure, then our decisionmaking capability is not going to get any faster."

View Image -   Figure 4: IT and Supply Chain Services Reports to the CFO

Meanwhile, Ramesh Chandra, Head of Corporate Information Technology (CIT) and a senior IT manager at the company, was thinking of how they could actually get the business to buy into all of the IT changes that would be necessary to implement "Aligning for One". It was a big plus to the company that the changes were being endorsed by the CEO, but still, better communication and partnership between business and IT would be necessary to pull this off. Ramesh glanced over at Jean Felder. Their eyes locked in a look of acknowledgment; they both knew that the IT and business functions needed to work together to achieve joint goals, but now with the new changes, alignment would be key. Jean leaned over and whispered to Ramesh, "I could barely get the division's IT staff to understand our business needs when we were decentralized with our own IT department, now with this new centralized support services structure, it's going to be even more important to make sure our goals are aligned." David Bailey overheard Felder and took this as a cue to tell them, "Jean, I am glad that you and Ramesh are brainstorming ideas because I was just about to tell you that Alvin Joseph asked me to put together a team to assess what needs to be done to implement the initiatives necessary for the "Aligning for One" program to succeed. I'll be the sponsor for the IT and supply chain services initiatives for the program but we want you two to act as cochampions; we think you're the ones who can best motivate the staff to implement the "Aligning for One" strategy."

IT-Business Alignment Assessment Process

Implementation of the company's "Aligning for One" business strategy required alignment with their IT strategies. For an organization to successfully align its IT strategies with its business strategies, specific management practices and strategic IT choices should be considered that help facilitate integration. Luftman, Bullen, Liao, Nash, and Neumann (2004, pp. 89-90) discuss a six-step process (Figure 5) to assess strategic alignment.

View Image -   Figure 5: Strategic Alignment as a Process

Jean and Ramesh decided to implement this IT-business alignment assessment process to understand the current IT-business alignment and to use this information as a roadmap to implement improvements. They used the SAM assessment questionnaire as a tool for their analysis. Details of the company's assessment are described in the case Description section. The company's SAM assessment team used the results of the questionnaire to converge on an overall assessment level of the maturity for the firm. After the initial maturity level was established, the company used this as a baseline to determine best practices for facilitating alignment. They used the SAM assessment items that are identified as being more mature alignment management practices as a guideline to management practices they would like to implement. In addition, the SAM assessment team used their internally identified best practices as guidelines for their desired IT-business alignment maturity level. The discrepancies between the organization's current management practices and the desired management practices were identified and then prioritized. Tasks were assigned by the team to the appropriate owners, with clearly defined deliverables and time frames for each of the prioritized discrepancies.

CASE DESCRIPTION

The Company's IT-Business Alignment Maturity

The SAM assessment undergone by the company consisted of a questionnaire comprised of 42 items measuring the degree to which specific management practices and strategic IT choices were demonstrated within the organization. The SAM framework classifies the assessment items into six criteria (Communications, Competency/ Value Measurement, Governance, Partnership, Scope and Architecture, and Skills), each with five levels of alignment maturity ranging from a maturity of Level 1 (Initial/Ad hoc) to a maturity of Level 5 (Optimized) (Luftman et al., 2004, pp. 70-71):

1. Initial/Ad Hoc Process is the lowest level of alignment whereby business and IT are not aligned and any practices in place to facilitate alignment are ad hoc in nature.

2. Committed Process pertains to the existence of a commitment by the organization to promote IT-business alignment.

3. Established/Focused Process refers to the existence of an established alignment process in place that is focused on business objectives.

4. Improved/Managed Process refers to the existence of a strong alignment process that emphasizes the concept of IT as a creator of value for the firm.

5. Optimized Process refers to a strategic alignment process that is fully integrated and co-adaptive between business and IT.

The SAM assessment instrument is based on best practices for IT-business strategic alignment derived from literature reviews of academic research, practitioner input, and evaluation of management practices and strategic choices employed by over 50 Global 2000 organizations. Information explaining the assessment items in more detail is provided in Luftman et al. (2004, pp. 73-77).

The SAM assessment questionnaire was used by the SAM assessment team to assess the company's strategic alignment maturity both before the "Aligning for One" initiatives were implemented, to provide a baseline measure, and afterwards, to provide a longitudinal perspective of their IT-business strategic alignment maturity evolution. The original assessment was conducted in May of 2001 with the SAM assessment team, consisting of seven senior IT and business executives, with Ramesh Chandra and Jean Felder as the team leaders. After best practices were determined and a gap analysis performed to determine differences between their AS-IS state where they presently stood and their TO-BE state of where they wanted to be, action plans were developed and implemented to execute the "Aligning for One" program. A follow-up assessment was conducted in January of 2003 to measure whether the SAM level was sustained.

The company's maturity assessment results are listed in Table 1. Overall maturity (which is an average of the 42 individual assessment items) increased by one maturity level since the initial assessment. There were across-the-board maturity increases in all criteria, with the greatest increase in the scope/architecture and the skills criteria.

View Image -   Table 1: Company's Initial and Follow-Up Maturity Assessments

The following section describes some of the key management practices and IT choices of the company that demonstrate their evolution from an overall alignment maturity of Level 2 to an overall of Level 3, helping facilitate the IT-business strategic alignment that was necessary to implement their "Aligning for One" initiatives. Included in the descriptions are "Major Insights" summarizing key aspects of what the company learned while improving their alignment maturity and "SAM Best Practices" which are management practices from the assessment instrument indicating higher levels of maturity.

Communications

The SAM assessment describes Communications as the sharing of information for mutual understanding between the IT and business functions, and the methods used to promote this. Communication has long been associated with IT-business alignment. Rockart, Earl and Ross (1996) suggest that communication ensures that business and IT capabilities are integrated into the business effectively. Luftman, Papp, and Brier (1999) reported that IT understanding the business was considered by senior executives to be one of the top three enablers of alignment. Reich and Benbasat (2000) found that shared knowledge of IT and business and communication between IT and business managers positively influence alignment.

The areas that comprise the Communications component are:

1. mutual understanding of the IT and business environments;

2. inter/intra-organizational learning;

3. communication protocol rigidity;

4. knowledge sharing; and

5. liaison breadth/effectiveness.

Prior to the "Aligning for One" program, the company's SAM assessment team determined their strategic alignment maturity for Communications was at a Level 2. The company's IT-business communications were primarily at the divisional level. There was a limited understanding of what IT can do for the business, resulting in information systems being underutilized. No formal knowledge sharing mechanisms existed.

The follow-up assessment of the company's strategic alignment maturity revealed an increase to a Level 3 for Communications. The organization demonstrated some strong improvements in their business communications process, which is now systemic throughout the organization, to increase communication and share knowledge. Since taking office as CEO, Joseph has advocated a culture change to value frequent and open communication. His recent worldwide tour of the organization's facilities and his recurring intranet column "Ask Alvin" were well received by the organization's employees. Additionally, regular "town hall" meetings conducted by regional leaders provide state-of-the-art business information, and question-and-answer opportunities. Face-toface informal communication with supervisors and department heads occurs regularly. Twice a year, performance reviews and regular staff meetings occur where both business and IT initiatives are discussed. Frequent e-mail communiqué are distributed to both business and IT employees, to update them on the objectives, status, and achievements of major IT projects and initiatives.

The company's intranet was recently redesigned to provide a global tool for intraorganizational communication and knowledge sharing. Informative memos, presentations, and documents are posted providing details of strategies and projects related to both IT and business. Corporate policy mandates periodic review of web page to ensure that displayed information is kept up-to-date and that the page owner is identified in case further inquiry is necessary.

Competency/Value Measurement

The SAM assessment describes Competency/Value Measurement as the management practices and strategic IT choices an organization makes when determining the importance and contribution of IT to the firm. Measures of IT's contribution to the business should go beyond traditional, one-dimensional technical considerations and include measures of cost efficiency, cost effectiveness, and human-related measures (Luftman, 2000; Van Der Zee & De Jong, 1999). Measures of business contribution should be multidimensional (Maltz, Shenhar, & Reilly, 2003) and IT and business measures should be integrated (Luftman et al., 2004, p. 382; Van Der Zee & De Jong, 1999).

The areas that comprise the IT Competency/Value Measurement component are the:

1. focus of metrics and processes to measure IT's contribution;

2. pervasiveness and orientation of integrated measures;

3. pervasiveness of service level agreements;

4. frequency and formality of benchmarking practices;

5. frequency and formality of assessments/reviews; and

6. pervasiveness of continuous improvement practices.

The company's assessment for the Competency/Value Measurement criterion did not substantially change from a Level 2 after the "Aligning for One" program. The company has service level agreements (SLAs) between the IT function and business for both global and regional services. They apply a portfolio of services to indicate agreements with the business owners of the service. Supporting the SLAs are operational level agreements (OLAs), which are technical performance measurements. The service levels and operational levels are monitored and reported through a service level management process.

Benchmarking has been used by organizations to compare management practices and objectives (Drew, 1997) and to identify best practices in order to replicate them (Daft, 1998, p. 542). The IT groups at the company are required to measure the performance of the service they provide against the expectations of their customers (customer satisfaction) and against similar services provided in other companies (internal and external benchmarking of selected services).

Major insight

Include business-related metrics, such as user satisfaction and IT's responsiveness to the business, with technical SLAs, such as computer response time and minimum downtime, to help form more of a partnership between IT and the business. Additionally, measurements like contribution to profits, quality, and productivity improvements should be applied whenever possible.

SAM best practice

Have periodic formal assessments and reviews of SLAs with both IT and business representation to mandate continuous improvement of SLAs and the attainment of business objectives.

Evaluation of IT investments, including formal and regular reviews, has been found to be positively related to IT-business alignment (Tallon, Kraemer, & Gurbaxani, 2000). The company utilized a SAM best practice of frequent and formal assessments by instituting a policy calling for post implementation audit procedures to be undertaken for each major IT project, to confirm that all key aspects of the project are in place and being used effectively (e.g., business processes, enhancements, common data, associated financial processes, and IT infrastructure and support). These assessments also ensure that the expected business benefits have been realized.

SAM best practice

Have frequent and formal assessments and reviews of IT investments with a formal process in place to make changes based on the results of the assessments. When possible, include business partners in the process. Share the knowledge gained across the organization.

Governance

Governance is the choice organizations make when allocating decision rights for IT activities such as selecting and prioritizing projects, assuming ownership of technology, and controlling budgets and IT investments (Henderson, Venkatraman, & Oldach, 1996; Luftman, 1996).

The areas that comprise the Governance component are the:

1. pervasiveness of business strategic planning with IT involvement;

2. pervasiveness of IT strategic planning with business involvement;

3. structure of the IT organization;

4. reporting level of the CIO;

5. IT budgeting;

6. IT investment management;

7. frequency, formality, and effectiveness of steering committees; and

8. integration of project prioritization.

Prior to the 2001 "Aligning for One" program, the company's Governance was assessed at a low Level 2. Their IT organization utilized a decentralized structure at the business unit level. This meant the individual business units owned, funded, and determined the priorities of their IT departments. Each business unit and geographic region had its own supply chain system. Worldwide, there were 87 BPCS enterprise resource planning (ERP) systems and five SAP R/3 ERP systems. IT researchers (Brown & Magill, 1994; Sambamurty & Zmud, 1999) suggest that organizations comprised of multiple business segments should utilize a federated IT structure, whereby a corporate IT unit (or other central unit) has primary responsibility for architecture, common systems, and standards decisions, while each business segment unit has primary authority for application resource decisions. This structure leverages the advantages of economies of scale and IT standardization while providing responsiveness to the segment's needs and priorities.

Since the "Aligning for One" program, the company's SAM assessment for Governance approached Level 3. The new information technology structure is centralized and IT was given an expanded role to provide 24x7 global support. An important change was centralizing supply chain systems including the reduction in number of systems to 33 worldwide provided by one ERP vendor.

To oversee all significant decisions of the centralized IT structure, an IT steering committee was formed, led by the head of Corporate IT, reporting to the CFO, who acts as the committee sponsor. The committee is comprised of the heads of the global IT organizations (Figure 4).

SAM best practice

Existence of an IT steering committee increases the alignment of IT and business strategies (Raghunathan & Raghunathan, 1989).

Partnership

Partnership refers to how each of the IT and business functions perceive the contribution of each other. It includes the trust that develops among the participants, and the sharing of risks and rewards. The areas that comprise the Partnership component are the:

1. business perception of IT value;

2. role of IT in strategic business planning;

3. integrated sharing of risks and rewards;

4. formality and effectiveness of partnership programs;

5. pervasiveness of trust and value; and

6. reporting level of business sponsor/champion.

Giving IT the opportunity to have an equal role in defining business strategies is obviously important. However, how each organization perceives the contribution of the other, the trust that develops among the participants, ensuring appropriate business sponsors and champions of IT endeavors, and the sharing of risks and rewards are all major contributors to mature alignment. The IT-business partnership should evolve to a point where IT both enables and drives changes to both business processes and strategies.

The company's SAM assessment for Partnership, initially assessed at a high Level 2, improved slightly, to a low Level 3. At the operational level, they utilize champions to act as a link between their e-business platform, their local office, and their customers. The company's e-champions are used to help their global organization to understand local e-business needs and to roll out global projects quickly. All countries and regions have an e-champion. The champions are responsible for collecting and communicating new customer requests, communicating e-business initiatives and enhancements, and coordinating training and education programs both internally and to external customers and business partners. Having executive level sponsors and champions for projects is important to strategic fit and understanding of the business aspects of a project (Koen, 2000). Major innovations benefit from executive champions who allocate resources and provide vision (Papadakis & Bourantas, 1998).

Major insight

Use global champions to both locally promote IT initiatives and act as global liaisons.

Some of the key IT initiatives that were launched to support the "Aligning for One" business initiatives and to realize the benefits of the restructuring into five business segments were (a) a global project introduced to streamline the supply chain systems and standardize processes and documents to show "one face to the customer", (b) the global project implemented to provide straightforward access to key supply chain data through standard reporting, using a single global data warehouse, and (c) the global project implemented to provide a system for global replenishment and inventory planning.

The fact that these three major information technology initiatives were implemented as a result of the "Aligning for One" business initiatives attests to the importance that the business places on the value of IT. Information technology is being used to enhance business processes, thus enabling the organization's "one face to the customer" business strategy. Each of the three projects is sponsored by the CFO, a member of the business executive committee. Also, each project has a senior regional sponsor and champion from the business.

Sharing of risks and rewards is equivalent among the business and IT function at the company in that all employees share in variable incentives consisting of an annual bonus when specific business targets are achieved. Johnston and Carrico (1988) found that organizations in which IT is integral to the company had compensation and reward systems that induced IT managers to take risks. Long-term partnerships are sustained when: (a) partners perceive mutual benefits, (b) partners share commitment to the partnership through common goals and incentive systems; and (c) partners exhibit trust and positive attitudes toward the potential contributions of the other (Henderson, 1990).

SAM best practice

IT should be a teammate with the business that co-adapts and improvises with their business partners in bringing value to the firm and meeting strategic objectives.

Scope & Architecture

SAM defines Scope and Architecture as the management decisions and strategic choices an organization makes when allocating resources toward its information technology infrastructure, including its reach and range. It includes the extent to which IT is able to assume a role supporting a flexible infrastructure that is transparent to all business partners and customers, evaluate and apply emerging technologies effectively, enable or drive business processes and strategies as a true standard, and provide solutions customizable to customer needs. The areas that comprise the Scope and Architecture component are the:

1. technological and strategic sophistication of primary systems/applications;

2. pervasiveness of integrated standards;

3. pervasiveness of architectural integration;

4. pervasiveness of infrastructure transparency and flexibility; and

5. management of emerging technologies.

Scope and Architecture has become one of the company's most mature alignment facilitators since the "Aligning for One" initiative was launched. They have demonstrated a high level of strategic alignment maturity in their global integration initiatives of supply chain replenishment and inventory planning. Their implementation of an integrated IT infrastructure provides the pervasive transparency and flexibility necessary to enable this global integration. The use of global integrated standards for hardware and software solutions enabled standardized processes that facilitated the "one face to the customer" business strategy. IT standards facilitate connection among technology components and allow their integration, allowing easier integration and information access across business units (Weill & Broadbent, 1998, p. 58) and enable organizations to more easily share information with their business partners (Edwards, Peters, & Sharman, 2001).

Major insight

A single one-company solution with common processes, data and systems provides a common language to facilitate common understanding across countries, functions, and segments resulting in significant cost savings for both Customer Order Desks and IT.

Additionally, the company has demonstrated more mature strategic alignment, as demonstrated by their use of emerging technologies and e-business models by participating in Elemica, the chemical industry neutral network marketplace that establishes system links between chemical companies and their trading partners to facilitate order processing and supply chain management of chemical transactions.

According to Andrew Liveris, Business Group President of Performance Chemicals at The Dow Chemical Company (Liveris, 2002):

Elemica is the first e-commerce company to commercialize what many consultants have called the "holy grail" of e-commerce: "ERP-to-ERP" connectivity. Using standards developed by the members, Elemica connects each member company's enterprise planning system - whether SAP, Baan or other- to the hub to automate confidential transactions. Rather than 1-to-1 EDI connections, with Elemica you connect once and interact with many. (¶7)

SAM best practice

Leverage IT assets on an enterprise-wide basis to extend the reach (the IT extrastructure) of the organization into supply chains of customers and suppliers.

Skills

Skills refer to the management practices and strategic IT choices an organization makes concerning IT human resource considerations such as the cultural and social environment it cultivates. The areas that comprise the skills component of strategic alignment maturity are:

1. pervasiveness of an innovation culture;

2. pervasiveness of integrated locus of power;

3. formality of management style;

4. pervasiveness of change readiness culture;

5. pervasiveness of opportunity for skills enrichment through job transfer, cross-training, and job rotation; and

6. hiring and retention.

Prior to the "Aligning for One" program, the company's SAM assessment team determined their strategic alignment maturity for the Skills criteria was at a high Level 1. As an inventor of specialty chemicals, innovation has long been part of their culture, but at the business unit level. A global management program, implemented as an extension of "Aligning for One", has been launched to push out a process for innovation to all positions within the company. Each employee is required to participate in a workshop where everyone takes personal responsibility and ownership for growth. Goals of the workshops are to produce innovative growth projects in all areas, including both the information technology and the business functions of the organization, and to encourage continuous innovation awareness. This program represents a more mature IT-business alignment by encompassing an organization-wide scope.

Skills development opportunities that were recently implemented that have contributed to their increased maturity in Skills include:

* On-the-job training: a person works full-time in a position designed for development, for example, a project manager becomes a product manager to learn marketing and commerce.

* Rotation: a person takes a temporary assignment for three to six months in a new field, for example, a systems analyst goes into the field with a sales person.

* Job enrichment: a person takes over the responsibility for a special project within a job, for example, a marketing manager develops a customer information system.

* International assignment: selected candidates are placed in positions in other countries to gain broader international experience, perform a defined task, learn to make decisions in an international context, and enlarge their leadership experience.

IT research has found that professionals moving to non-IT business unit jobs may lead to increased knowledge of IT by the business (Reich & Kaarst-Brown, 1999). Job rotation enables employees to learn and perform the different tasks associated with multiple functions (Watad & DiSanzo, 1998). Fuchs, Mifflin, Miller, and Whitney (2000) suggest that collaboration between the business and IT functions is facilitated when employees develop relationships with their counterparts in other departments through job rotation.

Major insight

Provide multiple methods for development of IT and business managers, including methods of on-the-job training, job rotation, job enrichment, and international assignment.

CURRENT CHALLENGES/PROBLEMS FACING THE ORGANIZATION

Identifying and implementing best practices should increase efficiency by streamlining and simplifying processes organization-wide.

The "Aligning for One" program aimed to provide:

1. increased speed of decision-making by eliminating the divisional structure; and

2. centralized support services to allow the new business segments to focus on their respective markets and provide 'one face to the customer'.

The company achieved decisive success with the "Aligning for One" business program, with substantial improvements in cash development and headcount reductions resulting from eliminating the divisional structure and centralizing support services. However, they cannot rest on their laurels. So, a new initiative has been launched for the years ahead to focus on profitable growth. The "Aligning for Growth" program is a logical continuation of the "Aligning for One" program with an aim to generate a culture of performance and successful implementation of new ideas that will generate profitable growth. A primary component of the "Aligning for Growth" program is the implementation of key projects identified by the executive committee to promote growth. These key growth projects include plans to leverage cross selling among the newly structured business segments and market expansion to geographic regions showing high growth potential, such as a new research facility in Guangzhou, China providing expeditious customer solutions directly to this market.

Additionally, one of the key projects is to conduct workshops to engage all employees in developing and implementing growth projects. Some of the growth projects, suggested during the workshops, that are being considered for implementation by the Company include:

1. development of an IT process education program to strengthen cross-departmental communication and training;

2. worldwide implementation of a standardized client environment on all PCs and notebooks (the company needs to consider the pros and cons to a standardized client solution and possible alternatives); and

3. development of a method to involve the company's business partners in decisionmaking related to the management practices and strategic choices that facilitate IT-business alignment.

The company's executive committee is putting to task Jean Felder, Ramesh Chandra, and the rest of the SAM assessment team to help lead the way to aligning IT with the new "Aligning for Growth" business strategy and to consider the feasibility of the growth projects generated from the employee workshops. Moving forward, the SAM assessment team and the company should consider what is required to further improve ITbusiness alignment and what specific management practices and strategic IT choices the company can implement to further improve its IT-business alignment to ensure the success of the new "Aligning for Growth" program.

Sidebar
References

REFERENCES

Brown, C. V., & Magill, S. L. (1994). Alignment of the IS functions with the enterprise: Toward a model of antecedents. MIS Quarterly, 18(4), 371-403.

Daft, R. L. (1998). Organization Theory and Design. Cincinnati, OH: South-Western College Publishing.

Drew, S.A.W. (1997). From knowledge to action: The impact of benchmarking on organizational performance. Long Range Planning, 30(3), 427-441.

Edwards, P., Peters, M., & Sharman, G. (2001). The effectiveness of information systems in supporting the extended supply chain. Journal of Business Logistics, 22(1), 1-27.

Fuchs, P. H., Mifflin, K. E., Miller, D., & Whitney, J. O. (2000). Strategic integration: Competing in the age of capabilities. California Management Review, 42(3), 118-148.

Henderson, J. C. (1990). Plugging into strategic partnerships: The critical IS connection. Sloan Management Review, 31(3), 7-18.

Henderson, J. C., Venkatraman, N., & Oldach, S. (1996). Aligning business and IT strategies. In J. Luftman (Ed.), Competing in the Information Age (pp. 21-42). New York: Oxford University Press.

Johnston, H. R., & Carrico, S. R. (1988). Developing capabilities to use information strategically. MIS Quarterly, 12(1), 37-50.

Koen, P. A. (2000). Developing corporate intrapreneurs. Engineering Management Journal, 12(2), 3-8.

Liveris, A.N. (2002, April 9). The journey of Elemica: An E-commerce Consortium. Retrieved January 29, 2004: http://www.dow.com/dow_news/speeches/ 20020409_liveris.htm

Luftman, J. N. (1996). Applying the strategic alignment model. In J. Luftman (Ed.), Competing in the Information Age (pp. 43-69). New York: Oxford University Press.

Luftman, J. (1997). Align in the sand. Computerworld, February 17.

Luftman, J. (2000). Addressing business-IT alignment maturity. Communications of the Association for Information Systems, 4(14), 1-50.

Luftman, J. N., Bullen, C. V., Liao, D., Nash, E., & Neumann, C. (2004). Managing the Information Technology Resource. Upper Saddle River, NJ: Prentice-Hall.

Luftman, J. N., Papp, R., & Brier, T. (1999). Enablers and inhibitors of business-IT alignment. Communications of the Association for Information Systems, 1(11), 1-33.

Maltz, A. C., Shenhar, A. J., Reilly, R. R. (2003). Beyond the Balanced Scorecard: Refining the search for organizational success measures. Long Range Planning. 36,187-204.

Papadakis, V. & Bourantas, D. (1998). The chief executive officer as corporate champion of technological innovation: An empirical investigation. Technology Analysis & Strategic Management, 10(1), 89-110.

Raghunathan, B. & Raghunathan, T. S. (1989). Relationship of the rank of information systems executive to the organizational role and planning dimensions of information systems. Journal of Management Information Systems, 6(1), 111-126.

Reich, B. H. & Benbasat, I. (2000). Factors that influence the social dimension of alignment between business and information technology objectives. MIS Quarterly, 24(1), 81-114.

Reich, B. H. & Kaarst-Brown, M. (1999). Seeding the line: Understanding the transition from IT to non-IT careers. MIS Quarterly, 23(3), 337-364.

Rockart, J. E, Earl, M. J. & Ross, J. W. (1996). Eight imperatives for the new IT organization. Sloan Management Review, Fall, 43-55.

Sambamurthy, V. & Zmud, R. W. (1999). Arrangements for information technology governance: A theory of multiple contingencies. MIS Quarterly, 23(2), 261-290.

Tallon. P. P., Kraemer, K. L., & Gurbaxani, V. (2000). Executives' perceptions of the business value of information technology: A process-oriented approach. Journal of Management Information System, 16(4), 145-173.

Van Der Zee, J. T. M. & De Jong, B. (1999). Alignment is not enough: Integrating business and information technology management with the Balanced Business Scorecard. Journal of Management Information Systems, 16(2), 137-156.

Watad, M. M. & DiSanzo, F. J. (1998). Transforming IT/IS infrastructure and IS personnel issues. Business Process Management Journal, 4(4), 322-332.

Weill, P. & Broadbent, M. (1998). Leveraging the New Infrastructure: How Market Leaders Capitalize on Information Technology. Boston: Harvard Business School.

AuthorAffiliation

Deb Sledgianowski, Hofstra University, USA

Jerry Luftman, Stevens Institute of Technology, USA

AuthorAffiliation

Deb Sledgianowski is an assistant professor for the Department of Business Computer Information Systems and Quantitative Methods in the Zarb School of Business, Hofstra University. She earned an MBA at Pace University and a PhD in information management at Stevens Institute of Technology. Prior to joining Hofstra University, she was an information systems practitioner with various responsibilities ranging from programming, systems analysis, database administration, SAP basis administration, and project management, accumulating more than 20 years of professional experience. Dr. Sledgianowski's research interests include IT-business strategic alignment, strategic uses of IT, supply chain management, and database management.

Jerry Luftman is a distinguished professor at Stevens Institute of Technology, School of Management, and executive director of Stevens' information systems programs. In this capacity, Dr. Luftman manages and conducts projects, research, and executive programs about businessIT alignment. Prior to his work at Stevens, Dr. Luftman worked at IBM as a program manager at the Advanced Business Institute, where he played a significant role in defining and introducing IBM's Management Consulting Group. His framework for assessing strategic alignment maturity is fundamental in helping clients achieve the management, technology and business process changes required to achieve improved IT-business integration.

Subject: Strategic planning; Case studies; Information technology; Multinational corporations; Best practice

Classification: 2310: Planning; 9110: Company specific; 9510: Multinational corporations; 5220: Information technology management

Publication title: Journal of Cases on Information Technology

Volume: 7

Issue: 2

Pages: 102-120

Number of pages: 19

Publication year: 2005

Publication date: Apr-Jun 2005

Year: 2005

Publisher: IGI Global

Place of publication: Hershey

Country of publication: United States

Publication subject: Business And Economics--Computer Applications

ISSN: 15487717

Source type: Reports

Language of publication: English

Document type: Business Case

Document feature: graphs charts tables references

ProQuest document ID: 198652186

Document URL: http://search.proquest.com/docview/198652186?accountid=38610

Copyright: Copyright Idea Group Inc. Apr-Jun 2005

Last updated: 2011-07-21

Database: ABI/INFORM Complete

Document 55 of 100

Cross-Cultural Implementation of Information System

Author: Law, Wai K; Perez, Karri

ProQuest document link

Abstract:

GHI, an international service conglomerate, recently acquired a new subsidiary in an Asian country. A new information system was planned to facilitate the re-branding of the subsidiary. The project was outsourced to an application service provider through a consultant. A functional manager from another subsidiary in the country was assigned to assist the development of specifications. The customized information passed numerous benchmarking tests, and was ready for implementation. At that point, it was discovered that the native users at the rural location of the new subsidiary could not comprehend any of the user interfaces programmed in the English language. A depressed local management team, with a depleted technology budget, must reinvent all operating procedures dependent on the new information system. [PUBLICATION ABSTRACT]

Full text:

Headnote

EXECUTIVE SUMMARY

GHI, an international service conglomerate, recently acquired a new subsidiary in an Asian country. A new information system was planned to facilitate the re-branding of the subsidiary. The project was outsourced to an application service provider through a consultant. A functional manager from another subsidiary in the country was assigned to assist the development of specifications. The customized information passed numerous benchmarking tests, and was ready for implementation. At that point, it was discovered that the native users at the rural location of the new subsidiary could not comprehend any of the user interfaces programmed in the English language. A depressed local management team, with a depleted technology budget, must reinvent all operating procedures dependent on the new information system.

Keywords: communication gap; globalization of IS; implementor/user relationship; IS implementation approaches; IS project failures; organizational culture; user/ analyst interaction; user interface requirements analysis; user needs analysis

ORGANIZATIONAL BACKGROUND

GHI was an international service conglomerate operating globally in more than 500 locations with established clienteles in high-value-added markets. As a member of a highly competitive industry, the business found success in carefully nurtured brand images of quality and consistent services. GHI has been a strong leader in its industry and earned a respectable ranking among the Fortune 1,000 companies. In recent years, GHI has grown its annual revenue substantially beyond the billion-dollar mark. As part of an ongoing strategy, GHI aggressively sought opportunities to improve performance of undervalued business operations, through the introduction of better and more efficient management techniques and practices, including the injection of capital through ownership and contracts. GHI valued its workforce of more than 100,000 as a key asset in retaining loyalty from corporate clients as well as individual customers. The corporate values of GHI emphasized a passion for excellence, promoting cultural diversity; encouraged innovation and changes; and fully committed to serve communities where GHI maintained business interests.

Recent GHI business strategy included a goal to improve operating efficiency through the increased use of technology. A small corporate IT team coordinated numerous projects to deploy technology throughout its global locations. GHI relied heavily on technology providers outside of the company to construct information systems (Best, 1997), with developmental projects to integrate systems from the various vendors. A challenge was to centrally control the flow of information through uniform technology platform, a practice with significant benefits, as GHI attempted to provide consistent services to its customers who rapidly entered global market locations.

GHI insisted on the implementation of corporate systems to collect and analyze transaction data and customer demographics. This centralized reporting requirement allowed GHI to detect trends, allowing the corporate office to adjust its global strategies according to dynamic economic conditions, and identifying potential problems that required corporate attention. For example, capital budget could be planned for common needs for capital improvement. At the same time, the company realized cost reduction through purchasing economies in business services, supplies, capital goods, telecommunication services, and technology. A senior IT official emphasized the benefits of removing technology decisions from the local level, eliminating the duplication of efforts in acquiring and deploying packaged software. Standardization also reduced the challenges of data communication through an assortment of technology platforms (Aggarwal, 1993).

GHI also pursued a strategic goal to expand e-business applications to improve sales and services. In 2002, a Web-based Customer Relationship Management (CRM) system was deployed to formalize the delivery of customer services. In the past, individual locations devised their own system to manage customer service problems, often as scribbled notes informally trickled through the corporate communication channels. The new system provided a tool to spot problem areas, and provided a way to expedite problem resolution while customers were being served. The managers gained real-time visibility on service activities, while the corporation could use the tool to promote and enforce uniform customer satisfaction levels across its many locations. The system was also instrumental in employee training, and for empowering front-line service personnel to mitigate service deficiencies. CRM enabled GHI to provide fast, convenient, dependable, and consistent service to its customers. The systems were tested in locations in North America with satisfactory results.

CRM was also employed to enhance sales and marketing (O'Brien, 2002). GHI anticipated growth in demand for its quality services, especially from its loyal customers. The integration of its regional propriety customer databases represented an effort to enhance the consistent delivery of services to its customers throughout the world. Centralized established information standards facilitated the sharing of data, and promoting uniform practices of data analysis and data-supported decision making. The new information systems provided a personal touch, targeting the needs of the customers at the right time, with the right offer. At the same time, GHI hoped to increase sales per customer through selling additional products and services to existing customers, improving revenue, and creating additional marketing opportunities. The elaborate data analysis and environmental scanning identified new business opportunities and helped to maximize the utilization of the highly perishable service capacities.

The information system was also a valuable tool for inducing desirable behavioral change, especially in newly established subsidiaries affected by organizational changes (Parker, 1996). GHI anticipated the need for the powerful global information network to maintain corporate standards in their expanding network of service sites (KroacKakabadse and Kouzmin, 1999). The disciplined use of data in decision making also opened opportunities for GHI to market its management services.

SETTING THE STAGE

The weakened North American and European economies, combined with political and economic instabilities in South America, prompted strategic adjustment with increasing attention to emerging markets. The recent economic turmoil in the Asia Pacific region presented numerous attractive investment opportunities. Businesses severely affected by the economic downturn began to seek external assistance to improve business value. In 2001, GHI acquired interest in a major business in an Asian country as its subsidiary. There were over 1,500 workers employed by the organization at the time of the acquisition. The new subsidiary had historically focused on the domestic market, with established clienteles. The subsidiary has been highly regarded by business analysts and the local community. The GHI management planned to convert the new acquisition into one of its leading subsidiaries in Asia. As a gesture of cultural sensitivity, the local management team and the entire workforce were retained in employment as part of the acquisition agreement to smooth the transition. A transitional management team was sent, including trainers experienced in cultural diversity, differences in language, customs, rituals, and ceremonies (Bjerke, 1999).

The GHI Asian regional office was tasked with re-branding the new subsidiary to attract a more diversified customer base. The regional management was confident of the assignment, with successful experience operating other subsidiaries in the country. A one-year transitional period was planned for the re-branding process, which included extensive training of the workforce and indoctrination of the new corporate values. A well-designed information system could assist the reshaping of work behavior of the workforce (Davenport, 1997), and the new location must comply with the corporate expectation of central data reporting, uniform software platform, and sharing data with other locations.

An information system was currently in use at the new subsidiary. The information system was developed locally through an in-house IS staff with contracted services from local technical vendors. The local information system was providing adequate support for client and human resource information, and for retail transaction supports. The local system lacked features for customer service supports, central reporting, and data sharing, but it handled transactions for a substantial retail business, which was a new business experience for the corporation.

The management must decide between developing the information system locally and bringing in a brand new information system. In consideration of a tight budget, a short conversion deadline, and the central preference for standardized system, the regional management decided to implement a new turn-key system, and leave the existing system in place until the delivery of the new information system. The logical choice was to bring in a version of the information system already implemented in the other locations (Gwynne, 2001). However, the simple importation of technical solutions designed under different cultural contexts could be a fruitless effort (Al-Abdul-Gader, 1999). Precautions were made in hiring a consultant to monitor the project, and assigning an experienced user of the corporate system to serve as the user liaison officer (Oz, 1994).

CASE DESCRIPTION

With successful information systems at other subsidiaries in the country, the regional management expected a routine system development process, especially with opportunities to learn from the systems usage experience of many subsidiaries in other Asian cities. An IT consultant was hired to manage the system development project and bid out the project to a contractor. The fact that the consultant had recently completed an information system project for GHI could add weight to the selection process. A functional manager from a major subsidiary in the same country was relocated to the project site to serve as the user liaison, allowed benchmarking against a successfully implemented information system (Parker, 1996). The transferred employee was supposed to contribute first-hand experience as a user and trainer on a similar information system successfully implemented in a major international city. A 12-month target was set for the completion of the new information system.

Evidently, the local management and IS staff were not consulted concerning the new information system (Sahraoui, 2003). It was an acceptable practice since the local culture discouraged the questioning of decisions by superior officers (Gannon, 2001). Although the local technical vendors were contacted, the consultant selected an application service provider (ASP) from another country. The consultant did not realize that the failure to involve the local technical vendors was a cultural blunder that would greatly diminish the chance of gaining their assistance at a later stage (Gannon, 2001).

It was agreed that as a condition for a low bid on the project, the ASP would be allowed to develop the new system off-site and relieved of the responsibility of local language needs, including a user manual in the local language. The consultant promised to handle the translation work for the user manual. The consultant was to provide system specifications, including user interface requirements. The consultant followed specifications of similar corporate systems implemented in other global locations, and relied on the user liaison for specifications on appropriate local adjustments.

It turned out that both the consultant and the ASP had limited experience working in the Asian country. The consultant stayed at the project site, but seemed to interact mainly with the user liaison. Since very few of the employees at the new subsidiary understood English, the consultant relied on the user liaison to review prototypes throughout the various stages of the system development process. Beside the language and cultural barriers, the tight project schedule gave the consultant more reason to limit personal contact with the locals. As it turned out, the local people had a long tradition of demanding the establishment of a good personal relationship prior to a cooperative working relationship. Exhibit 1 illustrates the special arrangement under which the ASP was allowed to work exclusively with the consultant and the user liaison, due to the cultural and language barrier.

The ASP was from a nation less recognized for technology achievement. It would have been difficult for the locals to accept the technical merits of the ASP, and the language barrier would have created immense problems during system analysis. The ASP was relieved to be able to omit on-site interviews with the local end-users. As a result, the ASP never visited the new subsidiary until the delivery of the new information system. The savings in travel expenses were also substantial due to the rural settings of the project site. Project cost was the primary concern for GHI, and the people and the location of programming the new information system were not considered important. The coding of the information system proceeded smoothly and on time.

As the information system delivery date approached, the ASP contacted the management at the subsidiary to schedule a training workshop for the employees of the organization. The service contract stipulated that the ASP was to provide a system manual, and to provide initial training for system usage at the time of system delivery. It was at that point that the ASP realized that the local end-users could not understand the user interface programmed in English, the international language (Wallraff, 2000) chosen for the new information system. To make it worse, no one at the subsidiary could comprehend the system manual written in English (Regan and O'Connor, 1994). The ASP was greatly puzzled since the user liaison approved the new system. When confronted, the user liaison explained to the ASP, in fluent English, that English was the primary language used at his subsidiary since a majority of their customers at the branch spoke English. As a result, their employees must possess strong language skill in English. He assumed that English would also be the primary language after the re-branding process by GHI, which was well established in the western world. He thought his temporary assignment to the project was to facilitate the implementation of a similar information system. The newly coded system would be working fine at the subsidiary he came from. The consultant was surprised too, since English was the corporate language and the standard language used in the corporate information system. The consultant had relied solely on the input of the user liaison to finalize specifications, and did not bother to verify local user environments. He knew that the corporation was bringing another team to train the local employees, and assumed language training would be part of the rebranding process. He saw his role as certifying the quality of services from the ASP, and the user liaison was supposed to represent the needs of the user (Oz, 1994). To the best knowledge of the consultant, English has been the standard language used in the information systems of GHI. There was no indication that GHI would deviate from the western management protocols in this new subsidiary (Elin-Dor, Segev, and Orgad, 1993). The language and cultural issues they tried very hard to avoid finally surfaced as a huge issue (Bischoff and Alexander, 1997; Gannon, 2001).

The ASP reminded the consultant of the promise to obtain a local translation of the user manual. The consultant turned to the local training manager for assistance with two copies of the English manual. The consultant was shocked when the request to translate the system manual into the native language was declined. The consultant was told that it was impossible to find anyone locally to translate the highly technical terms in the manual, especially on short notice. The local technical vendors were not interested in the translation work, possibility due to feelings of humiliation for being excluded from the system development. Other local language translators claimed lacking knowledge of the highly specialized technical terms in the manual.

View Image -   Exhibit 1: Special Arrangement for System Development at the New Subsidiary

The effort to construct a user-interface in the local language was also unsuccessful. The consultant was told that the new information system could not support the native language and culture (Kersten, Kersten, and Rakowski, 2002). Similarly, the request to add native translation to the user screen was rejected. Some claimed that a new system in the native language would be needed. Other reasons included the conflicting layout formats between the native language and English, data representation and storage problems, translation problems for data in the native language for sharing with other locations, and service support information linked from other locations. There was little hope of soliciting local support to salvage the new information system. Unwilling to breach the contractual term, the ASP went ahead with the system delivery and presentation of the new information system, in English.

During the initial system training session, a native-speaking audience sat silently throughout the presentation of the new information system. No one could comprehend any of the PowerPoint slides prepared in English. The audience felt humiliated when they found out that the ASP was from a nation lesser known for technical achievement, while they had developed a fully functional information system locally. They were further humiliated when the ASP failed to demonstrate any knowledge of local customs and the role of the information system in providing services to the customers. Anger flared and panic set in (Gallois and Callan, 1997). The local management was upset at the hastily delivered training in a foreign language. The failure to seek consensus to resolve this difficult problem was unacceptable in the local culture. Handicapped by the language barrier, the ASP could not explain the internal coding of the system. There was little assistance that the consultant, the user liaison, or the in-house computer group could offer without immediate knowledge of the computer programs. The consultant was from a small nation, and failing to build relationship with the locals, contributed little to earn the trust of the locals for cooperation (Gannon, 2001). The consultant was not familiar with information processing in the native language. The user liaison would soon return to his prior post. The local IS staff had little experience with the corporate information system in the English language. The local management recognized that there was no money to fix the problem. The ASP insisted that a functional information system had been delivered according to the contractual terms. After spending close to a million dollars on the new information system, the local management and IS staff suddenly realized that they had inherited a customized information system that was completely inappropriate for the user environment.

There was little hope that the ASP would provide any further assistance to make the information system usable. Most of the employees at the subsidiary had limited experience with the western culture, and it was doubtful that even a small fraction of them would ever learn English as a second language. On the other hand, it would be extremely difficult to replace the current workforce with English-speaking workers from outside the rural area. Most importantly, even the corporate management intended to internationalize the operation of the subsidiary, since a majority of the customers would be natives of countries with poor command of the English language. To make matters worst, the corporate office expected customer and operation data from the local management through the new information system, and the usage of the old system was disallowed with the delivery of the new information system, especially with the many new operational practices. Many locals wondered the wisdom of hiring, from a remote land, an ASP that could not even "explain" how the system worked, when there were capable native-speaking contractors who must now be recruited to fix the information system!

CURRENT CHALLENGES/PROBLEMS FACING THE ORGANIZATION

Depressed, the local management realized that it would be difficult to request additional budget to correct the information system problem. The different layouts and orientations of the native language comparing to the English language made it difficult to perform simple language conversion of the user interfaces. Neither the ASP nor the IT consultant had the required language skills to construct a user interface in the native language. Besides, the ASP was not interested in building an information system or system components in the native language. The local technical vendors that created the previous information system were not eager to work on a user interface for the new system. The local technical staffs, although keeping their jobs in the subsidiary, had little to contribute to the project. The user liaison had returned to his prior position after the delivery of the ill-fated information system. The local management was left to make the best use of the new information system.

The immediate need was to devise methods for the workers to use the information system on a daily basis. Since all sale transactions must be processed through the new information system, workers were provided with cue cards for the interface screens, and corresponding translation in the native language. The process was slow and tedious. It was more challenging when handling customer payments. It was culturally desirable to show a customer an itemized bill with full explanation of all charges. This way, the customer could verify or question charges before making payment. The new information system printed all the invoices in English, which was not comprehensible by most workers and customers. Workers had to use dictionaries and politely explain all charges to each customer in the native language. The time-consuming activity tested the patience of everyone! The management did not return to using the old information system despite all the difficulties with the new system. In the meantime, GHI announced additional Phase II business expansions that were to be completed in the next 12 months. The new information system was expected to support these new business developments.

One year later, many local managers had departed from the subsidiary for other career opportunities. These were unusual practices in the local culture in which long-term loyalty to an organization would be expected and rewarded. Although few would comment on their career changes, most of these people had expressed frustration towards the thoughtless and unconcerned way of the corporation, since the delivery of the new information system (Kroac-Kakabadse and Kouzmin, 1999). The cultural conflicts triggered by the handling of the new information system continued to manifest and erode the organizational cohesiveness.

The local management, realizing the damaged relationships with the local technical vendors, was able to acquire a native language user interface, mainly for supporting the retail transactions. The new user interface utilized Web-based technology, including the use of ASP.NET. A native IT solution provider from another city was hired to provide periodic technical support for the user interface. With the new user interface, the new information system seemed to be providing adequate support for the retail operations.

Despite the intent design of the new system to support data sharing with other locations, the new system remained disconnected from the corporate system. Thus, the information system had fallen short of its initial goals to support central data reporting, uniform software platform, and data sharing for supporting sales and service developments. This should not be a surprise to the management of GHI since it has been estimated that only about 10% of the businesses implementing Web content management systems have successfully delivered content to their global users (Voelker, 2004).

The local managers would not comment on how they handle customer satisfaction with the new information system, but they acknowledged that they have abandoned the plan to use the new system to support the new Phase II business developments that would be completed in the near future. On the other hand, the corporate office seemed to be satisfied with the implementation of the native language interface, and continued to retain the service of the IT consultant!

References

REFERENCES

Aggarwal, A. (1993). An end user computing view: Present and future. Journal of End User Computing, 5(4), 29-33.

Al-Abdul-Gader, A.H. (1999). Managing Computer Based Information Systems in Developing Countries: A Cultural Perspective. Hershey, PA: Idea Group Publishing.

Bjerke, B. (1999). Business Leadership and Culture: National Management Styles in the Global Economy. Cheltenham, UK: Edward Elgar.

Best, J. D. (1997). The Digital Organization. New York: John Wiley & Sons.

Bischoff, J., & Alexander, T. (1997). Data Warehouse: Practical Advice from the Expert. Upper Saddle River, NJ: Prentice Hall.

Ein-Dor, P., Segev, E., & Orgad, M. (1993). The effect of national culture on IS: Implications for international information systems. Journal of Global Information Management, 1(1), 33-45.

Gallois, C., & Callan, V J. (1997). Communication and Culture: A Guide for Practice. Chichester, UK: John Wiley & Sons.

Gannon, M. J. (2001). Understanding Global Cultures: Metaphorical Journeys through 23 Nations. Thousand Oaks, CA: Sage Publications.

Gwynne, P. (2001). Information systems go global. MIT Sloan Management Review, 42(4), 14.

Davenport, T. (1997). Information Ecology: Mastering the Information and Knowledge Environment. New York: Oxford University Press.

Kersten, G.E., Kersten, M.A., & Rakowski, W.M. (2002). Software and culture: Beyond the internationalization of the interface. Journal of Global Information Management, 10(4).

Korac-Kakabadze, N., & Kouzmin, A. (1999). Designing for cultural diversity in an IT and globalizing milieu some real leadership delimmas for the new millennium. The Journal of Management Development, 18(3), 291.

O'Brien, J.A. (2002). Management Information Systems: Managing Information Technology in the E-Business Enterprise. New York: McGraw-Hill.

Oz, E. (1994). When professional standards are lax: The CONFIRM failure and its lesson. Communications of the ACM, 37(10), 29-37.

Parker, M. (1996). Strategic Transformation and Information Technology: Paradigms for Performing While Transforming. NJ: Prentice Hall.

Regan, E.A., & O'Connor, B.N. (1994). End-User Information Systems: Perspectives for Managers and Information Systems Professionals. New York: Macmillan Publishing.

Sahraoui, S. (2003). Editorial preface: Towards an alternative approach to IT planning in non-western environments. Journal of Global Information Technology, (6(1), 1-7.

Voelker, M. (2004). Web content management: Think globally, act locally. Transform Magazine, 13(4), 16-21.

Wallraff, B. (2000). What global language? The Atlantic Monthly, 286(5), 52-66.

AuthorAffiliation

Wai K. Law, University of Guam, Guam

Karri Perez, University of Guam, Guam

AuthorAffiliation

Wai K. Law (wlaw@uog.edu) is associate professor at the School of Business and Public Administration, University of Guam. He received his PhD in strategy & policy, and MS in computer science, both from Michigan State University. Dr. Law's research interests are in the areas of strategic information systems, public sector information management, information resources development, and information technology education.

Karri Perez (kperezini@yahoo.com) has a PhD in human and organizational development from the Fielding Graduate Institute. Her research interests include human resources management, intercultural communications, and workplace adaptation. Dr. Perez is vice president of human resources at a financial institution, and has also served as an adjunct professor in human resources at the University of Guam and the University of Phoenix.

Subject: Case studies; Information systems; International; Subsidiaries; Corporate culture

Classification: 9110: Company specific; 9180: International; 5240: Software & systems; 2500: Organizational behavior

Publication title: Journal of Cases on Information Technology

Volume: 7

Issue: 2

Pages: 121-130

Number of pages: 10

Publication year: 2005

Publication date: Apr-Jun 2005

Year: 2005

Publisher: IGI Global

Place of publication: Hershey

Country of publication: United States

Publication subject: Business And Economics--Computer Applications

ISSN: 15487717

Source type: Reports

Language of publication: English

Document type: Business Case

Document feature: diagrams references

ProQuest document ID: 198671620

Document URL: http://search.proquest.com/docview/198671620?accountid=38610

Copyright: Copyright Idea Group Inc. Apr-Jun 2005

Last updated: 2011-07-21

Database: ABI/INFORM Complete

Document 56 of 100

The Rise and Fall of a Software Startup1

Author: Davis, Alan M; Zweig, Ann S

ProQuest document link

Abstract:

Omni-Vista, Inc., an IT startup based in Colorado Springs, Colorado, was born in 1998 and died in 2002. This is the story of how events surrounding this company unfolded. The paper describes the business opportunity targeted by the company, how the company positioned itself relative to the competition, and the evolution of the IT product/service it intended to provide to its growing client base. It also shows how tightly coupled the IT product must be relative to marketing, finance, and personnel. The objective is to help better understand the intricacies of managing a software startup, and hopefully enable readers to lead a startup and make fewer mistakes than were made at Omni-Vista. [PUBLICATION ABSTRACT]

Full text:

ABSTRACT

Omni-Vista, Inc., an IT startup based in Colorado Springs, Colorado, was bom in 1998 and died in 2002. This is the story of how events surrounding this company unfolded. The paper describes the business opportunity targeted by the company, how the company positioned itself relative to the competition, and the evolution of the IT product/service it intended to provide to its growing client base. It also shows how tightly coupled the IT product must be relative to marketing, finance, and personnel. The objective is to help better understand the intricacies of managing a software startup, and hopefully enable readers to lead a startup and make fewer mistakes than were made at Omni-Vista.

Keywords: IT Startup, IT Marketing, IT Finance

INTRODUCTION

On September 22, 1997, Al Davis was leading a discussion at Storage Tek in Colorado. Around 25 employees including a few senior project managers were present in the room. Davis had just finished talking about the importance of verifying that a requirements baseline is consistent with the available schedule and resources, when one of the project managers in the room asked whether commercially available estimation tools could be used to verify such consistency. Davis explained that many such tools used feature- or function-points [1][12] to create an estimate and that these tools could tell you what a good schedule and a good budget would be for any given set of requirements. The project manager said, "but how would I know what would happen to my schedule if I removed a requirement?" Davis drew a picture on the whiteboard something like that shown in Figure 1. He had no idea what either of the axes meant. He simply wanted to indicate that when you have a desired schedule (the vertical bar), you'd like it to reside close to some optimal point (the low point in the center of the smooth graph). If you are right on the low point, the project's requirements and the desired schedule are perfectly compatible with some historic database of projects, and the further away from the center point the vertical bar appears, the less compatible the requirements are with desired schedule. Davis stewed on this idea for about a month after returning to his office.

View Image -   Figure 1. The Initial Concept

In October 1997, Davis started drawing a set of graphs similar to Figure 1 that showed various kinds of optimality that should be considered when agreeing to a set of requirements. Thus, in addition to the original "how close are we to an optimal schedule," there was "how close are we to an optimal set of resources," "how close are we to describing a system that would produce an optimal return on investment," and so on. At around the same time, he was growing increasingly dissatisfied with the engineering school in which he was a professor. So, he walked into the office of one of his graduate students, Ann Zweig, to tell her that he was going to start a company to sell products using these ideas. The intent was to get some feedback from Zweig concerning whether she thought it was a good idea - from business viability and personal perspectives. To Davis's surprise, Zweig's response was simply, "Okay, I want to join the company."

Davis and Zweig knew they had some great product ideas, but lacked marketing and financial know-how. Davis quickly turned to a respected colleague, Rob Geller of Boulder, Colorado, an expert in financing strategies for early-stage, fast-growth companies. Geller and Davis had been co-investors and co-board members at Requisite, Inc. Geller also liked the new product ideas. Little by little, they brought in more trusted expertise and six individuals decided to become co-founders of Omni-Vista, Inc. The six were Davis, Zweig, and Geller; as well as Bob Keeley, a former venture capitalist and now professor of finance; Jay Billups, an Air Force captain (now a major) and another of Davis's graduate students with an incredibly good understanding of user interfaces; and Kemp Bohlen, a former Hewlett-Packard executive with intimate knowledge of a typical customer for the nascent product.

Omni-Vista was envisioned from the start to be an IT product company. The company filed early on for three patents to protect the intellectual property. The general idea was to build a series of IT applications, each destined for a specific vertical market [2], but all sporting a common architecture and look-and-feel. Omni-Vista would go to market with just one vertical application, and be successful in that market. Then, based on that experience and the capital acquired, it would move on to other verticals. Meanwhile, the underlying architecture could be licensed to third-party companies who could customize it for domains within their expertise. And then there was the possibility that a large company (like Microsoft or IBM, for example) might be interested in buying Omni-Vista's underlying technology outright as an extension to its existing products.

The first vertical market that Omni-Vista aimed for was the area of helping medium- to large-size companies decide what features they should incorporate into their next IT product. The pain was clear: with so many IT products failing to meet their intended customer needs [18], companies needed better tools and techniques for deciding what IT products to build, and which features to incorporate into each release of their IT products.

THE COMPETITIVE LANDSCAPE

In the beginning, Omni-Vista positioned its products and services as "helping companies select the right features for their next IT product." Later, it positioned its products and services as "requirements management light." Let's discuss the competition from these two perspectives separately.

Selecting the Right Features.

It was so easy to declare that no competition existed. It was true that no commercial tools existed that aimed for the identical vertical market. However, a thorough investigation of competition includes the enumeration of all possible alternative ways that Omni-Vista's candidate clients could select the "right" IT product or the "right" features for their next IT product. The investigation determined that most companies used no off-the-shelf tool or technique for supporting this critical business decision. Instead,

1. Many companies performed this portfolio-management decision or the feature-bundling decision via intimidation and bullying. Thus, marketing would make comments to product development such as, "If you don't build these features into the next release, our company will not achieve its first quarter revenue goals. Do you want to be the reason for our failure?" Or, product development would make comments to marketing such as, "If you force us to include these features into the next release, we will be 6 months late to market. Do you want to be the reason for our failure?"

2. Many companies followed this procedure for release planning: (1) marketing selects the features needed, (2) marketing selects the date the features are needed, and (3) too bad if the product development organization says they cannot deliver it by then.

3. Those few companies that used tools used Excel spreadsheets.

4. Those few companies that used methodologies used the balanced scorecard [13].

The lack of commercial products aimed specifically at this problem was both a positive and negative success indicator: On the positive side, here was an untapped market. On the negative side, the lack of competition could indicate that no market existed, and that companies were happy making their decisions without a tool designed specifically for this task.

Requirements Management.

The requirements management market opportunity is vast. Many reports have shown that over half the IT systems constructed today fail to meet their customers' needs and that a large majority of these failures can be traced back to inappropriate requirements practices [18]. The opportunity is to create a tool that helps product development companies maintain their requirements, control changes to the requirements, and trace requirements to each other and to their origins. In the late 1990's, a dozen or so companies offered IT requirements management tools, but three companies dominated the space (listed in decreasing order of market penetration):

* Rational Software Corporation, which sold RequisitePro, a high-end, feature-rich requirements management tool they acquired with the acquisition of Requisite, Inc., in 19972. Rational was subsequently acquired by IBM in 2003.

* StarBase, Inc., which sold CaliberRM, a high-end, feature-rich requirements management tool they acquired with the acquisition of Technologies Builders, Inc. Starbase was subsequently acquired by Borland.

* Quality Systems and Software, Inc., which sold DOORS, a high-end, feature-rich requirements management tool. QSS also offered a low-end RM tool called RequirelT that provided little capability beyond a spreadsheet. The company was subsequently acquired by Telelogic.

Note that neither of the market leaders offered "requirements management light" tools.

BACKGROUND OF THE FOUNDERS

Any startup in general, and an IT startup specifically, requires a number of fundamental components to be successful: a market, an appropriate product or service, financial sources, and a solid management team. This section discusses the management team. Before co-founding Omni-Vista, Al Davis had spent a good deal of time in both academe and industry, in both small and large companies. After receiving a PhD in Computer Science from the University of Illinois at Urbana-Champaign in 1975, he became an assistant professor at the University of Tennessee. He took his first "real" job as a member of technical staff at GTE Laboratories in 1977. After a few years and a few promotions, he became the Director of the Software Technology Center, responsible for automated tools and techniques for the GTE Corporation. In 1983, he transferred within GTE to become a Director of R&D at GTE Communication Systems. This was his first exposure to developing software products for a large commercial market. A year later, he left GTE to join Ed Bersoff at BTG, Inc., a startup where he served as Vice President for one of the divisions for 6 years. This was his first exposure to building custom solutions for individual customers. It was also his first time interacting face-to-face with actual paying customers. It was under Bersoff s tutelage that Davis learned the importance of acquiring and continuing to please customers. After BTG, Davis spent nine more years in academe (at George Mason University and the University of Colorado at Colorado Springs) before the story of Omni-Vista began. However, during these nine years, Davis became a founding member of the board of directors of another software startup in Boulder, Colorado, Requisite, Inc., which subsequently was acquired by Rational Software, which in turn was acquired by IBM. He was also a non-managing general partner in Catalyst Ventures, a venture capital company in Colorado Springs. So, in summary, he spent around 8 years in small companies, 7 years in large companies, and 11 years in academe. It was this broad and diverse background that enabled him to take on the challenge of Omni-Vista's leadership and to gain the support of the investment community.

Ann Zweig's experience was even broader than Davis's, although it spanned fewer years. After earning her undergraduate degree in biology from the University of Kansas in 1984, she became a research field biologist. After 12 years of doing this, she and her husband both decided to switch careers. He studied for and earned an MBA in finance, while she studied for and earned a master's degree in computer science in 1997, both at the University of Colorado at Colorado Springs. It was during the pursuit of her master's degree that she took courses from Davis, and was subsequently hired as his graduate research assistant to work in requirements engineering and requirements management. It was Zweig's leadership skills, natural caring for other human beings, and abundance of common sense that caused Davis to invite her to participate with him in the founding of Omni-Vista, Inc.

1998

Financing.

To help establish a corporate culture of fairness, a plan was put into place to divide the stock into three equal pools [5]. One third would be earmarked for founders, one third would be earmarked for investors, and one third would be reserved for employees as incentives. Geller and Davis created spreadsheets that showed how 3 successively higher priced rounds of financing over a period of 2 years would:

* Generate sufficient capital of around $2.5M to sustain the company until its revenues were sufficient for self-funded growth.

* Sell approximately one third of the pool of shares to the investors.

* Provide high rates of return for investors in all three rounds, with decreasing rates of return and risk for each successive round - assuming that Omni-Vista met its business goals.

Since most of those involved had had previous positive experience with angel investors, the company decided to limit fund-raising plans to angels [5]. The founders liked the open, honest, and peer-to-peer type of communication that often can be established with individual investors who are risking their own capital.

The founders purchased "founder's shares" in February 1998. With help from an attorney in Colorado Springs, Ben Sparks, Omni-Vista put together the first set of disclosures and other paperwork. A powerful business plan was created, which in retrospect was probably too long: around 100 pages. But the founders felt they had a lot to say about the exciting path they were on. The plan was to sell 400,000 shares at $1.00 per share by mid July 1998. Davis and Geller invested first. As it turned out, 18 individuals, including several of the employees, ended up investing a total of $250K. That was enough to get the company started and the plan was revised to include making significant product progress by the end of the year and accelerate round two to January 1999.

The shares sold in this and subsequent rounds represented preferred stock [15]. As opposed to common shares (e.g., those sold to the founders, and those offered as incentive stock options to employees), these shares gave the investors an advantage in the case of a poor corporate ending. In particular, when a company undergoes a "liquidity event," e.g., an initial public offering, a sale to another company, a bankruptcy, or a closure, proceeds must be distributed among various parties. First to be paid are creditors. Next are the preferred shareholders, who receive an amount equal to their original investment, and finally the remaining cash if any is distributed among all shareholders (the common and preferred shareholders combined). Thus, the preferred shareholders receive a small "kicker" because they are investing in a company in which they have no direct control. In addition, if the proceeds are relatively low, the preferred shareholders may get back all or some of their original investment, while holders of common shares may get nothing. A company could try to sell common shares to angel investors, but the probability is high that savvy angels would decline to invest.

Product Direction.

During 1998, the company spent approximately a quarter million dollars building its first product. As shown in Figure 2, the underlying technology consisted of a layered architecture [17] built around a spreadsheet, in this case, Microsoft Excel. The second layer enabled bi-directional propagation of changes to spreadsheet cells. Unlike native Excel, which could not resolve circular references, this layer allowed changes to cell x to propagate to cell y, and changes to cell y to propagate back to cell x. The patent search turned up nothing similar to this concept, and the company ended up filing for a patent, but it was denied many years later by the US Patent and Trademark Office because another patent had been filed earlier for the identical concept. The next layer was the customizable layer that enabled Omni-Vista and/or other companies to construct vertical applications. And the outermost layer was a user interface that displayed a set of user-selectable graphs simultaneously. The graphs were linked to the spreadsheet. User edits were made directly to the graphs by dragging and dropping. Any change to any graph was automatically propagated to all other graphs being displayed. The bi-directional propagation in the spreadsheet allowed users to change graph g on the screen, and have the change propagated to graph h, and allowed users to change graph h on the screen, and have the change propagated to graph g.

View Image -   Figure 2. Omni-Vista Product Architecture

The intellectual property (IP) was embedded into the first product, called Omni-Vista SP (or OVSP; "SP" for "software planning"). OVSP was to be used by software companies to select the "right" set of features to include in their next release [7]. It enabled users to find a balance among such variables as features, time-to-market, revenue, profit, market size, pricing, R&D cost, and breakeven point. Each was represented as a graph. The user could change any of these graphs, and the other graphs would display the implications instantly. This application was selected primarily because it was (a) the first market the founders had. conceived of based on the IP, and (b) for an industry that was understood by the principals.

Staffing.

The initial employees were Al Davis (with no salary for the first eight months) as CEO and Chairman, Ann Zweig as Manager of Product Development, and Jay Billups as (part time) software engineer. The company quickly hired its first non-insider, Quinn Capen, another software engineer. By the end of 1998, the company had grown to 11 people by adding:

* a vice president for marketing and sales,

* one salesperson,

* one marketing communications person, and

* four more developers.

All employees voluntarily accepted stock options in lieu of competitive salaries [5].

Meanwhile, Omni-Vista populated its board of directors with individuals who had the following qualities:

* Had an expertise lacking in the core officer team.

* Were seasoned professionals.

* Were strongly opinionated.

* Were never afraid to express their opinions.

* Had a history of mutual respect with the Omni-Vista insiders.

The initial board consisted of:

* Ed Bersoff. Founder and president of BTG, Inc. Founded BTG in 1983, and brought it public in 1992. A master at all aspects of running a corporation. Understood politics. Understood the sales process. Knew finance and accounting. Had close ties to capital. A close friend and colleague of Davis for 15+ years.

* Kemp Bohlen, co-founder of Omni-Vista, formerly head of financial operations for HP. Masterminded the split of financial functions for HP when it was split into HP and Agilent. Spent much time listening and thinking, but expressed his views vehemently when he was stirred to comment. An eight-year friend of Davis.

* Rob Geller, co-founder of Omni-Vista; president of Growth Strategies, Inc., of Boulder, Colorado. Frequent board member on startups. Expert in financing strategies that ensure fairness in equity distribution to all parties. Great communicator. Never afraid to voice his opinion. Always on top of issues, regardless of subject. Geller and Davis co-invested in Requisite, and were both board members of that company.

* Bob Keeley, co-founder of Omni-Vista, former venture capitalist, former CEO, former professor at Stanford, then professor of finance at the University of Colorado at Colorado Springs, now retired. An eight-year colleague and friend of Davis. Former MBA teacher of Zweig's husband. Relatively quiet, but very outspoken and articulate when appropriate.

* Al Davis

An active board of advisors was also established. The goal of this board was to provide product direction for Omni-Vista. It was filled with folks as distinguished as the board of directors:

* Dick Fairley was one of the world's experts at risk management and software cost estimation [3]. Now a professor at the Oregon Graduate Institute.

* Al Steiner was formerly a general manager and executive at Hewlett-Packard. A great out-of-the-box thinker, he ensured that the board of advisors did not get too carried away with technical ideas and lose sight of the real company mission. Steiner's background made him an excellent candidate for the board of directors as well.

* Ed Yourdon was one of the most famous and qualified software consultants and authors in the industry. Davis had been instrumental in bringing Yourdon onto the board of directors of Requisite. Well respected. Could easily use him as a consultant for Omni-Vista customers. Formerly CEO of Yourdon, Inc., he sold his consulting and publishing company before mergers and acquisitions became popular.

Marketing and Sales.

Omni-Vista had an interesting history concerning its marketing and sales department. In 4Q98, Omni-Vista hired its first vice president of marketing and sales. He seemed to have all the right qualifications, having been through a few successful and not so successful startups. Neither Zweig nor Davis had had much experience with hiring such a person, so they called upon two board members to assist in the interviewing and assessment. Everybody agreed that he was the best of the 3-4 finalists interviewed, and seemed to have the right skills and attitude. However, within a few months, it became clear that he was not going to work out. He came to the company with a sales and marketing "silver bullet." He believed that the only way to elicit requirements from customers was to videotape them using and commenting on the use of a prototype product. And he believed that the only way to sell software was via the use of low-paid telesales people with little or no background in the software industry [10].

Facilities.

Many start-ups start in a home's basement or garage; Omni-Vista was no exception. Its first office was in the basement of Al Davis' home. This space was occupied throughout 1998. Bursting at the seams, and with an irate neighbor threatening to call the police for violating the subdivision's covenants, Omni-Vista was forced to find new offices at the end of the year.

1999

Product Direction.

Omni-Vista learned fairly quickly that the market was not ready for OVSP. It found few companies that even estimated the size of their markets, let alone made a conscious decision to include or exclude any particular feature. Sales became missionary [10]; not only did salespeople have to convince potential customers that the product was a good product, they also needed to convince them of the need to change the way they were doing business. Almost every company visited followed the same procedure for release planning: (1) select the features needed, (2) select the date they were needed, and (3) too bad if the development organization says they cannot deliver it by then. From previous consulting, Davis knew this was the typical scenario, but he had underestimated the effort required to get them to change their practices. He thought they would welcome a solution. Instead, Omni-Vista discovered that IT product development organizations did not want a solution; they were content because they could blame marketing (for demanding an outrageous schedule) when their product delivery was late. And marketing organizations did not want a solution; they were content because they could blame development (for being late) when a product failed in the market. As long as one has a scapegoat, why fix the problem? Development and marketing organizations seemed to thrive on this "blaming mentality."

Another problem with OVSP was the need to capture the commitment of both marketing and development [16]. The alternative (which was also tried) was to sell to general management because they were the ones with the most to gain by finding product solutions that met the needs of both development and marketing, and most importantly, their customers. Unfortunately, most general managers simply passed Omni-Vista sales staff on to either their marketing or their development organizations, with a statement like, "well, if development [or marketing] won't use your product, I have no interest in it."

After OVSP failed to capture the attention of the market, Omni-Vista turned its attention to a simpler scaled-down version of the concept, called OnYourMark Pro. This product presented just three views to the user: (a) a list of annotated prospective features, (b) a graph showing the probability of making the desired schedule, and (c) a graph showing the probability of making the desired budget. These last two graphs looked basically like Figure 3, a natural and more easy to understand presentation than Figure 1. This figure shows that there is an 88% probability that the selected features can be delivered on time by the desired delivery date of November 1, 2005. In addition, OnYourMark Pro could be positioned as a "requirements light" tool [9].

OnYourMark Pro was much easier to sell than OVSP, but Omni-Vista still failed to make its revenue numbers that had been proposed to the investors.

Throughout the years that OVSP and OnYourMark Pro were sold, Omni-Vista also provided consulting and training services, delivered almost exclusively by Davis. Much of this business was just a continuation of the business (with the same customers) that Davis had run as The Davis Company before co-founding Omni-Vista. And from the very beginning, these services were easier to sell than the products.

View Image -   Figure 3. The Actual Probability Graph

Staffing.

At its peak during 1999, Omni-Vista employed thirteen people:

* Davis as chairman and CEO,

* Zweig as president and chief operating officer,

* a vice president of marketing and sales,

* 4 sales and marketing personnel,

* 5 software developers, and

* an administrative assistant.

Roger Oberg was added to the board of directors in early 1999. He was a veteran marketing and sales executive with a series of successful software startups. He had been vice president of sales and marketing with Requisite, Inc., at the time of the acquisition by Rational, and was a vice president at Rational at the time of his appointment to the board. He was unable to serve for a long time because Rational became a competitor when Omni-Vista repositioned OnYourMark Pro as a "requirements light" tool.

Marketing and Sales.

As a result of the VP of Marketing and Sales approach to selling using low-cost talent, overhead was kept low, but very few seats were sold. The potential customers were quick to ascertain that they were talking to somebody who did not understand their business or their problems. Meanwhile, the VP never understood what the product did; he thought it was a competitor of Microsoft Project. Within about six months, all parties reached a mutual decision that he should leave Omni-Vista. What followed was a period of a few months where Davis and Zweig took over sales, while the marketing communications person continued to create marketing materials, do mass-mailings, and create new leads. Revenues increased, not because Zweig and Davis were good salespeople, but because they knew the customers' environment intimately. They felt the customers' pains and could speak their language.

As Zweig and Davis spent more time in sales, less attention was being spent on corporate functions such as watching the cash, finding new investors, developing strategic partnerships, and so on. Finally, Omni-Vista needed to hire another vice president of sales and marketing.

Financing.

For the second round (in January 1999), the plan was to sell 375,000 shares at $2.00 per share, for a net of $750,000. Davis invested first. Eight of the original round-one investors were joined by 10 new investors, to create an additional $500K. Once again, Omni-Vista fell short of its fund-raising goal, but had enough cash to get it through to the next milestone if spending was kept under tight control. Notice how different angel-financed companies behave relative to their venture capitalist-financed counterparts. As a general rule, VC's like the companies to burn money at a high rate. The result is that the company can (at least in theory) hit their markets more quickly, and with good early revenue numbers, the VC's are happy to invest even more if the company starts running out of cash. Meanwhile, angels like to see their money spent carefully and in a calculated manner. The result might be a delay in hitting the market, but fewer resources squandered in the process.

Omni-Vista was close to meeting its milestones with respect to creating product, but was falling short of its revenues numbers. The lack of early marketing expertise was taking its toll.

On the other hand, revenues were steadily growing, and as cash started to dwindle, Omni-Vista prepared for a third round of investments. This time Omni-Vista wanted to generate an additional $1M with equities priced at $2.25 per share. By September 1999, ten of the previous investors and two new investors had infused an additional $1M into the company. This was used to staff up the sales and marketing engine of the company for a major product release to the market.

Acquisitions and Partnerships.

In November 1999, Omni-Vista approached a supplier of a high-end requirements management tool [11]. It seemed that they should be losing some sales because they were not offering a low-end requirements tool as some of their competitors were offering. OnYourMark Pro could be positioned as such a tool, and could be used as a door-opener for some of their potential customers. After using it for some time, their customers may be convinced to upgrade to the more powerful requirements management tool. Negotiations continued well into 2000.

In December 1999, Omni-Vista approached a key player in the project management tool space to see if they were interested in a close partnership. It seemed to everybody to be a natural fit. Omni-Vista's product planning tools would ensure that features were compatible with schedules and budgets, and then would feed that information into the project management tool. As the project progressed, and problems arose, actuals could be fed back from the project management tool into Omni-Vista tools to see what made sense next, e.g., to extend schedules or delete requirements, or add resources, or whatever. The two companies met many times and developed a good working relationship. In the end however, the other company did not see enough advantages to them. If Omni-Vista had had more revenues and customers, the other company probably would have acquired Omni-Vista and used its customer database to extend sales of their existing products. But without the ability to quantify the short-term revenue advantages to their company, they could not do the deal. Talks ceased in early 2000. Facilities.

Davis and Zweig found an office building whose owner was willing to allow them to occupy 1,800 square feet of unfinished space for a period of time for no rent prior to moving into finished space within the same building. This seemed ideal. It preserved cash short term, and allowed them to move into nicer space after they became more financially solid. They ended up staying in this unfinished space for nine months, although neither the landlord nor the employees of Omni-Vista thought it would be that long. The problem was that this unfinished space had no bathrooms. Zweig found a gym next door that had bathrooms, but only gym members could use the bathroom facilities. She had a great idea: the company could offer to pay half the club membership fees for any employees who wished to join. We made a deal with the gym that if most of Omni-Vista employees joined, they would allow all employees to use the bathrooms.

In October 1999, Omni-Vista finally moved into its new, grand 3,000 square feet of offices. It included a server room, bathrooms (great news!), a reception room, a large classroom that could double as a boardroom, a break room with kitchenette, a storage room (for future expansion), and around 10 offices. The space was not luxurious, but it was certainly very nice. They had to sign a five-year lease, and Davis was required to be a personal guarantor [14] for the full five years of rent.

2000

Financing.

In early 2000, the company was once again running low on cash. It decided to offer the same equities offered last time, again at $2.25 per share. By April, Omni-Vista had managed to scrape up only $80,000 in new investment money. Investor confidence was waning as the result of less-than-stellar revenue results and the crash of the public markets.

At the May 2000 meeting of the board of directors, it became clear that Omni-Vista was in significant financial distress. Cash was burning at a high rate, and the last round had generated almost nothing. The Board made a tough decision to:

* redirect the company toward services rather than product, in order to ride out the slow economy,

* reduce staff (and thus burn rate),

* approach a few selected external investors, as well as all current investors, for a little more sustaining cash, in order to validate the services model, and

* the Board members would make one more financial infusion in the company.

At that meeting, pledges amounting to roughly $130,000 were made by Board members and officers, and over the next few weeks, around $60,000 more was received from other parties excited about the new direction.

Staffing.

As the cash situation deteriorated, Zweig and Davis created many what-if models using Excel. In some cases, they determined that the best course of action was to reduce salaries; Zweig and Davis always took salary reductions prior to asking employees to take smaller reductions themselves. This insured that the team remained a team, and the officers never received complaints about salary cuts. Davis and Zweig also made the amounts of their salary public knowledge, so all the employees knew that they were not making excessive incomes. In some cases, they determined that the best course was to reduce the labor force, and that was done reluctantly. These cases tended to be somewhat teary-eyed; the team had all grown to be a family. Almost all of those laid off expressed the desire to work for this management team again. To this day, Davis and/or Zweig stay in close touch with these folks. In fact, they assisted most of the laid-off employees in getting good jobs elsewhere.

During the worst cash crunch of all, Zweig and Davis found they could not make payroll. They solved the problem by writing personal checks to every employee. Once again, they did what they believed had to be done to keep the team together.

Marketing and Sales.

When it became clear that Davis and Zweig could not continue to do the sales and marketing function without deleterious affects on the rest of the company, Omni-Vista retained a consultant to do the sales and marketing job. But like the former vice president, he had a philosophy of one-size fits all situations. His approach was to analyze the market to death. He made his job to understand everything he could about the potential customer. He conducted focus groups, interviewed customers who used competing tools, dredged up the customers' worst pains, and made several SWOT charts - a typical marketing analysis tool that did actually shed some light onto the customer. In short, he did everything except sell the product. He did not last long, and finally after a series of interviews by Zweig, Davis, and board members, the decision was made to hire another full-time vice president of sales and marketing.

This VP believed that the only way to sell software effectively was to hire very expensive (high base salary and high commission) seasoned sales professionals using "solution selling" [4]. The idea was that they would make contacts at the highest levels in the companies, convince them that Omni-Vista's products solved their problems, and sell large site licenses. She brought with her three individuals, two of whom had worked for her in previous jobs. These folks were caricatures of salespeople. For around a year, all kinds of "lines" were used, and one salesman actually tried to send a dozen roses to the female president of a prospective customer! (That did not go over well with Davis or Zweig, and went over even worse with the recipient. And no, the prospect did not buy the product.) Expenses skyrocketed, and sales plummeted. Davis and Zweig were not happy, and their frustration with how the sales process was progressing was apparently clear to the VP. After nine months, the VP finally resigned, and her staff followed her out the door.

Once again, Davis and Zweig took over the sales function, and revenues went back on the increase, slowly but surely. As successes grew, so did their confidence, and they finally had to admit that they actually were not that bad at selling. It was clear that selling the Omni-Vista products took someone who really understood the customers and their pains.

Acquisitions and Partnerships.

The negotiations with the high-end requirements management tool continued through most of 2000. By late 2000, this company had gotten to the point of performing a serious due-diligence on every aspect of Omni-Vista's business. As they got closer to the likelihood of acquiring Omni-Vista, they started running into cash problems of their own. In the middle of negotiations, they were themselves acquired by a much larger company. And that company had no interest in a low-end requirements tool.

In August 2000, Omni-Vista was approached by a website-development division of a large corporation. This division specialized in providing custom websites to other very large corporate clients. To be more competitive, they wanted to be able to present a business case to their prospective clients. The business case would use OVSP to show them how they would achieve a positive and quick return on investment from a new website. The two companies wined and dined each other for a couple of months, and then the other company had a massive layoff. All of Omni-Vista's contacts there were terminated. Discussions ceased. Six months later, the division was closed, and a year later the parent company folded.

In September-October 2000, Omni-Vista approached a Fortune 100 company about buying Omni-Vista. They had recently started a venture capital arm that had the mission to invest in promising high-technology companies that could eventually be folded into the larger parent company. Many hours were spent with these folks, telling them about products and their capabilities. They had decided that they wanted to have internal capability in the area of requirements; one of their desired core competencies. After careful analysis of Omni-Vista products, the other company finally hired Omni-Vista as a consultant to them to help them evaluate Omni-Vista's competitors' products. Although it was clear at this point that they were not going to help Omni-Vista in the long-term, at least they were a source of short-term revenue.

2001

Product Direction.

Late in the life of the company, as Omni-Vista was forced to reduce development staff dramatically. The business plan was rewritten so that the company turned to the services business as its sole revenue generator. The sales force was retrained to focus on selling IT services instead of IT products. The hope was that the services could sustain the company through the economic downturn that started in 2000, but the poor economy also reduced demand for services.

Staffing.

During the final 12 months of the company's existence, when it had moved to a services-only model, all employees were on commission-only. Basically, if you were a salesperson and sold something, you received a commission. And if you delivered a revenue-generating service to a customer, you were paid a percent of the revenues. Otherwise, you were not paid. These were lean times. Many employees continued to hang around for the ride.

Marketing and Sales.

Toward the end of Omni-Vista, when the business strategy was changed from products toward services, it once again hired a VP of sales and marketing. This VP was a close friend of both Davis and Zweig. His strength was that he (like Zweig and Davis) understood the customers' environment and needs intimately. With a couple of commission-only salespeople under his tutelage, he was able to effectively sell IT consulting and training services. Expenses once again came under control, and revenues continued to increase. Omni-Vista was even profitable during its last few months in existence.

Financing.

By summer of 2001, it was clear that the economic downturn had taken its toll. Few customers were buying anything but the most essential items. Cost of sales was skyrocketing; cash was just about depleted; the R&D staff had been decimated; the officers were taking no wages. It seemed the end had arrived.

The dream had been to create a company that could by acquired by another. The dream was not to be. Zweig and Davis tried to find any alternative to closing down the company, in the vain hope of providing the investors with some return. But they were not being paid salaries, and as common shareholders, they knew they would receive nothing if they remained with the company.

They knew that the likelihood or a turnaround was miniscule, but they still wanted to try. Davis and Zweig crafted a proposal to the entire family of shareholders telling them that the company was at its end. They proposed to transform the company into a life-style company, which could keep a few individuals employed as the Requirements Management Institute, with no plans for dramatic growth. Meanwhile, it would hold onto its intellectual property, which could perhaps be sold to another company sometime over the next few years. This would enable Omni-Vista to provide some return for its investors. But there was absolutely no reason for the two officers as individuals to stay with the company under the current terms. They proposed to the shareholders to convert all shares to common shares on a one-to-one basis. This would dissolve the preferred shareholders' preferences, but would at least enable them to get something out of the company. This proposal was embraced by most, but not all, of the Board members, and represented a clear demarcation point for the company: no longer were the employees, investors, and other shareholders one big family dedicated to a common cause.

All the shareholders that voted (some abstained) chose to accept the proposal. With all the shares now converted to common, and the share price devalued to just five cents per share, $50,000 was raised, mostly from a few of the current shareholders. The effect of this was to further dilute the other investors' stakes, but they were also afforded the opportunity to buy more shares at this new low price and most declined to do so.

Acquisitions and Partnerships.

During the first quarter of 2001, Omni-Vista principals met extensively with a vendor of software tools concerning the acquisition of Omni-Vista. They wanted desperately to have a tool in the requirements space. Things looked real good, but they were in the middle of huge internal crisis; their board of directors was deeply divided on some issue and was considering firing the president and/or tearing the company into two pieces. Omni-Vista's contacts were associated with major players on one side of this argument. When the issue was finally resolved, the company kicked out the president and changed its direction considerably. Our contacts lost their jobs as well. And neither of the resulting entities was in a healthy enough position to consider an acquisition. In February 2001, Omni-Vista approached a successful government contractor whose primary expertise was project- and program-management. The goal was to sell them the intellectual property so they could augment their services to the government with up-front ROI analyses. After 4 months of negotiation, Davis learned that the president really liked the way his company worked currently. He liked the life-style it afforded, and could not see any reason to change the company's business much. The two companies ended up with a strong partnership agreement however. This resulted in some effective cross-marketing, and numerous referrals of customers in both directions.

Facilities.

After a year in the nice office space, with cash dwindling, and the company's need to reduce staff, it was clear that they needed to get out of the lease. But where would they move to? And what about Davis's personal guarantee for the rent for all five years? Zweig and Davis discussed this at length and decided they needed to simply present the dilemma to the landlord and see if they could reach some mutually agreeable termination terms. Davis stewed for a couple of days before finally getting up enough nerve to approach the landlord. He woke the next morning with the plan to call the landlord and discuss this sensitive matter. Davis expected the worst. He rehearsed his words from 6am to 8am that morning. At 8 am, the phone rang; the landlord was calling Davis! The landlord explained that he had something very awkward to discuss with Davis and would like to meet with him right away. Later that day, the landlord explained to Davis that he had another tenant in the building who needed more space, and he would like to "buy out" the OmniVista's lease. Would Omni-Vista be willing to vacate the space within thirty days? Davis agreed. The landlord made the departure quite pleasant, and released Davis's personal guarantee. Sometimes, things do go right!

From there, Omni-Vista moved into much smaller, and less pleasant office space in downtown Colorado Springs. Here they had a 6-month lease (once again, with a personal guarantee from Davis, but for just 6, rather than 60, months rent), and the ability afterwards to extend it month-by-month. They were considerably downsized at this point, and they crammed themselves into the crowded space. They stayed in this space for about a year, and finally used it for their farewell "garage sale."

THE END

In May 2002, Omni-Vista had its last shareholder meeting. Only one issue was to be discussed and voted upon: the recommendation by the officers and directors of the company to dissolve the company. Just three individuals attended: the CEO, Alan M. Davis; the president, Ann S. Zweig; and Ben Sparks, the corporate counsel. The proxies were counted. The decision among the voters was loud and clear: close the company.

In June 2002, all shareholders and interested parties were notified of the availability of all corporate assets, both physical and intangible. Bids were received for almost all assets, and they were distributed. A garage sale was held to sell off the remaining pieces of furniture and office supplies. The doors were permanently closed.

In the end, Omni-Vista was able to pay off all its creditors. And the remaining cash was distributed to the shareholders on a pro rata basis, returning approximately 15 cents on the dollar.

1 An earlier version was published in Davis, A., Great Software Debates, New York: John Wiley and Sons, 2004.

2 One of the founders of Omni-Vista, Al Davis, had been a principal at Requisite, Inc.

REFERENCES

[1] Albrecht A. J. and Gaffney J. E., "Software Function, Source Lines of Code, and Development Effort Prediction", IEEE Transactions Software Engineering, vol. SE-9, 1983, pp. 639 - 647

[2] Best, R., Market-Based Management, Upper Saddle River: Prentice Hall, 1997.

[3] Boehm, B., and R. Fairley, "Software Estimation Perspectives," IEEE Software, 17, 6 (November-December 2000), pp. 22-26.

[4] Bosworth, M., Solution Selling, New York: McGraw Hill, 1994.

[5] Bygrave, W., and A. Zacharakis, eds., The Portable MBA in Entrepreneurship, 3rd edition, New York: John Wiley and Sons, 2004.

[6] Calvin, R., Entrepreneurial Management, New York: McGraw Hill, 2002.

[7] Davis, A., Just Enough Requirements Management, New York: Dorset House, 2004.

[8] Davis, A., "The Art of Requirements Triage," IEEE Computer, 36, 3 (March 2003), pp. 42-49.

[9] Davis, A. and A. Zweig, "Requirements Management Made Easy," PM Network Magazine, December 2000, pp. 61-63; reprinted in Davis, A., Great Software Debates, New York: John Wiley and Sons, and Los Alamitos, California: IEEE Computer Society Press, 2004.

[10] Enis, B., Personal Selling: Foundations, Process, and Management, Santa Monica, CA: Goodyear Publishing, 1979.

[11] Hammer, T., and L. Hoffman, "Automated Requirements Management - Beware HOW You Use Tools: An Experience Report," Third International Conference on Requirements Engineering, Los Alamitos, California: IEEE Computer Society Press, 1998.

[12] Jones C., Applied Software Measurement: Assuring Productivity and Quality, 2nd ed. New York, McGrawHill, 1997.

[13] Kaplan, R., and D. Norton, "The Balanced Scorecard - Measures that Drive Performance," Harvard Business Review, January-February 1992 pp. 71-79.

[14] Lambing, P., and C. Kuehl, Entrepreneurship, Third edition, Upper Saddle River, New Jersey: Prentice Hall, 2003.

[15] Mann, R., and B. Roberts, Smith and Roberson's Business Law, Tenth edition, Pacific Grove, California: West Publishing, 1997.

[16] Mitchell, A., "Is There Such a Thing as a Single Customer View?" Precision Marketing, 16, 6 (February 2004), pp. 1-4.

[17] Shaw, M., and D. Garlan, Software Architecture, Upper Saddle River: Prentice Hall, 1996.

[18] The Standish Group, The Chaos Report, www.standishgroup.com. 1995.

THE AUTHORS

Alan M. Davis is professor of information systems at the University of Colorado at Colorado Springs. He was a member of the board of directors of Requisite, Inc., acquired by Rational Software Corporation in February 1997, and subsequently acquired by IBM in 2003. Previously, he was

* Chairman and CEO of Omni-Vista, Inc. in Colorado Springs.

* Vice President of Engineering Services at BTG, Inc., which went public in 1995, and was acquired by Titan in 2001.

* a Director of R&D at GTE Communication Systems. GTE was acquired by Verizon in 1999.

* Director of the Software Technology Center at GTE Laboratories.

He was Editor-in-Chief of IEEE Software from 1994 to 1998. He is an editor for the Journal of Systems and Software (1987-present) and was an editor for Communications of the ACM (1981-1991). He is the author of Software Requirements: Objects, Functions and States (Prentice Hall, 1st edition 1990; 2nd edition 1993), the best-selling 201 Principles of Software Development (McGraw Hill, 1995), Great Software Debates (Wiley and IEEE CS Press, 2004), and Just Enough Requirements Management (Dorset House, 2005). Dr. Davis has published 100+ articles in journals, conferences and trade press, and lectured 500+ times in over 20 countries. Much of his current research centers around discovering "just enough" ways of performing requirements engineering, specifically "the largely unexplored middle ground between the requirements purists and the requirements cowboys." [Tom DeMarco] He has been a fellow of the IEEE since 1994, and earned his Ph.D. in Computer Science from the University of Illinois in 1975.

Ann S. Zweig is in business for herself in Santa Cruz, California, creating innovative websites for not-forprofit organizations, most recently www.rmbl.org. She has 19 years experience working in the software and biology industries. She was president and Chief Operating Officer of Omni-Vista, Inc., a Colorado corporation dedicated to helping companies prevent software disasters through improved requirements management, product planning, and project management. Ann has consulted for many organizations including Compaq, Jones Knowledge, Mitre, Modus Operandi, NetPro, Robbins-Gioia, Software Productivity Solutions, and the U. S. Army Communications & Electronics Command.

Previously, she was a requirements engineering researcher at the University of Colorado at Colorado Springs, a biological researcher at the Rocky Mountain Biological Laboratory, a biologist with The Nature Conservancy, and a teacher with the Peace Corps in the Kingdom of Tonga. She earned her M.S. in Computer Science from the University of Colorado in 1997 and her B.S. in Biology from the University of Kansas in 1984.

Alan M. Davis

University of Colorado at Colorado Springs

College of Business and Administration

adavis@uccs.edu

Ann S. Zweig

Independent Consultant, Santa Cruz, California

annz@baymoon.com

The Rise and Fall of a Software Startup

Research Note

Like any startup, the success of an IT startup is dependent on the alignment of a number of key factors: the business opportunity, the team, and resource availability. Business opportunity exists only when there exists

* a market for the IT product or service,

* sufficient demand within that market for the product or service,

* an offer (e.g., price) aligned with that demand,

* sufficient differentiators between you and your competitors.

The team must cover all necessary aspects of running a business, including

* an inventor

* leadership

* technical skills (to create the IT product or provide the service)

* marketing and sales

* finance and accounting.

And finally, sufficient resources (time, people, and money) must be available to enable the team to reach the market with its product or service.

In a study conducted in 1998-2002 [1], startups in the information technology arena had the highest failure rate among 9 industries studied, with 55% of all IT startups closing their doors within 4 years.

One of the first studies of the factors influencing startup failure was performed by Larson and Clute [2]. In that study, the found the most significant factors were:

* Poor decision-making characteristics of the management team.

* Insufficient management training.

* Poor financial analysis skills.

Clearly, this study was trying to correlate team characteristics with company failure. Peterson, et al., [3] confirmed these results with their study. Later, in 1988, Keats and Bracker [4] expanded this work into a conceptual model that enumerated a broader set of factors most influential in startup success/failure:;

* Entrepreneurial Intensity. Characteristics of the team of founders.

* Task Motivation. The degree to which the team is motivated to achieve the corporate goals.

* Environmental Influences. The way the company responds to influences outside of their immediate control.

* Strategic Sophistication. The degree to which the team understands and practices strategic planning activities.

* Task Environment Factors. The state of the industry and the market.

The most extensive reporting of the team-related causes of startup failure was performed by Lussier and Corman [5]. In that study, the authors analyzed 15 variables offered by 20 earlier studies, and found that just four variables were significant differentiators between success and failure. These were the degree of planning, the availability of professional advisors, level of education, and staffing adequacy.

Soon after the close of Omni-Vista's doors, Forbes ran an article by their publisher, Rich Karlgaard [6], which lamented the failures of so many software startups. Although not backed by empirical data, the author (based on his personal experience) made the following suggestions for would-be software entrepreneurs:

* Don't use the expression "mission critical." The reason is simple. The CIO's of the companies in the market are not going to stake their futures (i.e., their missions) on software from a startup.

* Don't use the expression "return on investment." The reason here is also simple. Every software vendor is claiming so much ROI for the customers that CIO's see it as just more noise and marketing hype.

* Define your success in terms of the customers' success. Interesting advice and rarely practiced.

* When the company is small, send the CEO on sales calls. It raises the likelihood of a close, and it demonstrates high level of commitment by the CEO to the customer.

* Put your software in escrow. That way, larger clients will be less worried about what happens if your company closes its doors.

* Don't compete on price. We have all heard this from so many management gurus that it should sink in by now. Unfortunately, many startups still try to compete as the low cost provider.

* Get an okay from customers before using them as a referral account.

Roure and Keeley [7] generated the simplest of all models of causative agents of new business failure. They state that there are three classes of causes: management ability, the company's strategy, and the competitive environment. Within the bounds of these three classes, they generated a list of eleven specific attributes strongly correlated with corporate success.

REFERENCES

[1] Brandow Company, Inc., 2002 Startup Business Risk Index: Major Industry Report, 2002.

[2] Larson, C.M., and R.C. Clute, "The Failure Syndrome," American Journal of Small Business, 4 (October 1979), pp. 35-43.

[3] Peterson, R.A., et al., "Perceived Causes of Small Business Failures: A Research Note," American Journal of Small Business, 8 (Summer 1983), pp. 15-19.

[4] Keats, B., and J. Bracker, "Toward a Theory of Small Firm Performance: A Conceptual Model," American Journal of Small Business, 12 (Summer 1988), pp. 41-58.

[5] Lussier, R., and J. Corman, "There Are Few Differences Between Successful and Failed Small Businesses," Journal of Small Business Strategy, 6, 1, pp. 21-33.

[6] Karlgaard, R., "Can Software Startups Succeed," Forbes, 171, 2 (January 20, 2003), p. 33.

[7] Roure, J., and R. Keeley, "Predictors of Success in New Technology Based Ventures," Journal of Business Venturing, 5, 4 (July 1990), pp. 201-220.

Subject: Startups; Computer service industry; Information technology; Competition; Marketing management

Location: United States, US

Company: Omni-Vista Inc

Classification: 7100: Market research; 9190: United States; 8302: Software & computer services industry; 9520: Small business

Publication title: Journal of Information Technology Case and Application Research

Volume: 7

Issue: 2

Pages: 31-48

Number of pages: 18

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Ivy League Publishing

Place of publication: Marietta

Country of publication: United States

Publication subject: Computers--Data Base Management, Computers

Source type: Scholarly Journals

Language of publication: English

Document type: Feature, Business Case

Document feature: Graphs Charts References

ProQuest document ID: 214896884

Document URL: http://search.proquest.com/docview/214896884?accountid=38610

Copyright: Copyright Ivy League Publishing 2005

Last updated: 2011-09-01

Database: ABI/INFORM Complete

Document 57 of 100

CREATING CUSTOMER VALUE AT ROCKY MOUNTAIN FIBERBOARD

Author: Lawrence, John J; Haines, Doug; O'Neill, Michele

ProQuest document link

Abstract:

Rocky Mountain Fiberboard (RMF) produced particleboard out of bluegrass straw. It was established in 1999 as a joint venture between a processor of bluegrass seed and a Northwest American Indian Tribe. RMF was created to help solve the problem of waste bluegrass straw and was also part of the Tribe's effort to diversify the economic base of its reservation. RMF, however, experienced significant difficulties. It had lost $1.9 million in 2001, had $4.5 million in debt, and had no real working capital. Its Tribal owners were putting $42,000/month into the company to keep it going. While a pending grant application with the U.S. Department of Agriculture offered hope of reducing its significant debt burden, the business was also experiencing difficulties attracting and retaining customers and was experiencing significant quality problems. Luke Waterman, a trusted Tribal member who was in the process of completing a business degree at a nearby university, had recently taken over as general manager and was faced with the task of overcoming the considerable financial, marketing, and production problems the business faced. Luke was considering three options: (i) identifying additional funds to undertake a focused marketing effort and to implement process improvements in production; (ii) acquiring equipment and licenses to produce another product - wall panels - that would use RMF's strawboard; or (iii) declaring bankruptcy. [PUBLICATION ABSTRACT]

Full text:

Headnote

CASE DESCRIPTION

The primary subject matter of this case concerns strategic planning, strategy formulation, and the alignment of functional strategies with the overall business strategy. Secondary issues examined include the incorporation of societal & environmental needs into business decisions, the strategic issues associated with staying focused, and bankruptcy. The case has a difficulty level of five. It is best suited for use in graduate level or advanced undergraduate courses given the scope of the difficulties the company faces and the complexity of the situation described. It is ideally suited for use in a capstone strategic management class because it requires the student to deal with strategic marketing, production and financial issues in an integrated manner. The case could also be used in a capstone marketing course, a small business management course, or in an entrepreneurs hip course. The case has been designed to be taught in 75 to 90 minutes and is expected to require four to five hours of outside preparation given the detailed financial analysis that can be done.

CASE SYNOPSIS

Rocky Mountain Fiberboard (RMF) produced particleboard out of bluegrass straw. It was established in 1999 as a joint venture between a processor of bluegrass seed and a Northwest American Indian Tribe. RMF was created to help solve the problem of waste bluegrass straw and was also part of the Tribe's effort to diversify the economic base of its reservation. RMF, however, experienced significant difficulties. It had lost $1.9 million in 2001, had $4.5 million in debt, and had no real working capital. Its Tribal owners were putting $42,000/month into the company to keep it going. While a pending grant application with the U.S. Department of Agriculture offered hope of reducing its significant debt burden, the business was also experiencing difficulties attracting and retaining customers and was experiencing significant quality problems. Luke Waterman, a trusted Tribal member who was in the process of completing a business degree at a nearby university, had recently taken over as general manager and was faced with the task of overcoming the considerable financial, marketing, and production problems the business faced. Luke was considering three options: (i) identifying additional funds to undertake a focused marketing effort and to implement process improvements in production; (ii) acquiring equipment and licenses to produce another product - wall panels - that would use RMF's strawboard; or (iii) declaring bankruptcy.

INSTRUCTORS' NOTES

Recommendations for Teaching Approaches

The case can be used to illustrate a number of business principles and accomplish a number of teaching objectives. These include:

** Illustrate the problems that can arise when a new business venture does not adequately research the assumptions upon which its strategy is based.

* Highlight the need for alignment between key business decisions (across all functions) and a firm's intended business strategy, and illustrate the problems that can occur when such alignment does not occur.

* Show why a business established to satisfy societal/environmental needs still needs to be built on a market-driven strategy that creates value for customers.

* Show how the analysis of financial and production data can lead to a better understanding of the strategic capabilities of a business.

* Illustrate the need for a firm to understand its competitive environment and the basis upon which it might build a competitive advantage within this environment.

* Provide the basis for a discussion of the pros and cons of staying focused. One alternative in the case would shift the focus of the business and add complexities to the management of the business but make limited contribution toward solving core business problems.

* Provide a context to discuss what bankruptcy really involves and when bankruptcy should be considered as a serious option.

* Illustrate both the integrated nature of the different business functions and the need for business problems to be addressed cross-functionally. Doing this highlights the importance of a general manager being able to understand finance, marketing, and production issues.

The following questions are designed to take the class through a discussion of the case. Answers and some teaching suggestions are provided for each question.

1. What are the major challenges that RMF faces currently?

* few remaining customers;

* market does not appear to perceive that product differs significantly from traditional wood particleboard;

* inability to obtain premium price for product while simultaneously costs exceed those of competitor;

* lost $1.9 million on sales of $1.7 million last year;

* production equipment is old, low volume and less automated than competitors;

* $4.5 million in long-term debt, of which $950,000 is current, plus over $800,000 in payables;

* quality problems lead to downgrading as much as 20% of certain product types;

* significant loss of a raw material, straw, during storage;

* business requires cash infusion each month from the Tribe to operate;

* the organization has been forced to lay off the majority of its employees;

* the organization currently has no marketing/sales manager;

* there appears to be a need for significant investment to refurbish basic production equipment;

2. Describe how RMF has presently positioned itself and its product. Identify and contrast the strategy RMF intended to follow with the strategy that eventually evolved.

Question #1 starts the discussion off by identifying the current challenges facing the firm. Question #2 is designed to clarify the current strategy for the students and establish why the firm faces the challenges that it does. Two important strategic lessons can be brought up in this discussion. The first lesson is that the assumptions upon which a strategy is built need to be tested to insure their validity. Otherwise, faulty assumptions can easily lead to a weak strategy. The second lesson is that the firm must take care to take actions and decisions consistent with its intended strategy. If this does not occur, the strategy that emerges from these actions and decisions will differ from the strategy it intended to follow.

RMF was formed to produce strawboard to provide bluegrass growers an outlet to sell straw refuse as well as to diversify the Tribe's economic base. The original, intended strategy was to sell strawboard as a high-quality "green" product. RMF planned to capitalize on its location in the Northwest and believed that a small plant would allow it to be more flexible and have lower costs than traditional wood particleboard producers. The case indicates that RMF expected it could find customers because strawboard plants in North Dakota and Kansas consistently sold out of product and there were no plants in the Pacific Northwest. It viewed itself primarily in competition with wood particleboard plants and viewed its product as being a superior substitute to wood particleboard. The case also states that RMF's original informal business plan called for initially pricing at a discount and then raising the price to a premium level after gaining market share, broadening its acceptance, and proving the product to be of high quality.

Yet, the case states the original business plan was quickly developed, indicating that no time was invested in conducting market research to fully understand the industry, product fit, or potential customer base. In essence, RMF assumed, without research, that to-be-identified customers would understand and value strawboard's unique characteristics and would be willing to pay a premium for "green" boards. It also assumed that this premium would cover operating and financial costs, neither of which was well understood. As a result, the company invested significant money without an adequate business plan nor an understanding of the risks involved.

While basic research would have shown that at least some of these assumptions were faulty (e.g., that costs would be lower than those for particleboard or that potential customers would easily understand and value strawboard's unique characteristics), it is unclear whether this intended strategy could have succeeded because many decisions seemed to have been made without an understanding of their strategic significance. For example, RMF purchased smaller, less automated, less flexible production equipment than competitors', hired a production manager with little managerial experience or training, and failed to adequately plan for the effective storage of its basic raw material (i.e., straw). All of these decisions contributed to lower product quality and higher production costs. Likewise, RMF hired a general manager with no business experience and hired a series of marketers with no experience in selling non-commodity, new-to-market products. As such, the company experienced ongoing difficulties adequately differentiating its product from its competitors and establishing a consistent, high quality brand image.

As a result of decisions like these, the resulting emergent strategy directed the firm away from introducing and producing a high-quality product for which it could charge a premium price and towards producing, in a costly manner, a commodity of inconsistent quality. The emergent strategy lacked focus and consistency. Decisions were made and actions taken without an understanding of what needed to be accomplished for the firm to be successful; thus, there was no opportunity for a hierarchy of strategies to develop that supported the intended strategy. For example, the decision to purchase the older, lower volume production equipment was made based on its availability and low price, rather than on its capabilities relative to achieving certain goals. (Additional details on the issue of "Intended" vs. "Emergent" strategies can be found in Hill and Gareth (1998).)

Once students identify the intended and emergent strategies, and understand the differences between them, they can better appreciate what type of firm RMF has become and the type of product it is actually producing. This provides students a foundation upon which to determine what RMF has to offer the marketplace presently, in spite of its intended goals.

3. Conduct partial "Common Size" analyses with the various financial statements. What do the analyses indicate about the situation in which RMF finds itself?

Questions #1 and #2 are designed to help students understand the qualitative issues surrounding the case. This question is meant to help students methodically break down the factors underlying the financial problems. By doing so, students will not only become familiar with financial statement analysis, but also form sound financial reasons upon which to develop any action plans.

Asking students to calculate relative percentages for various accounts (a form of Common Size analysis, in which accounts for a given financial statement are made percentages of one other account) will help them begin to determine which elements of the business are contributing to the current financial situation. As a result, the students will have identified those elements that need to be changed, and how, when they analyze each of the options before Luke.

Exhibit TN- 1 presents five different analyses that could be conducted. First, students are asked to develop ratios with each of the raw materials as a percentage of Direct Materials Used using the Cost of Goods Manufactured statement. For example, resin's ratio would be calculated as {(beginning inventory + purchases - ending inventory)/ Direct Materials Used = ($37,440+$560,928-$0)/$l, 154,748}. This allows the students to determine relative raw material-to-input costs and shows, contrary to possible expectations, that the cost of straw is not the biggest element. Second, using the same statement, students are asked to develop ratios with each of the three major cost inputs as a percentage of Cost of Goods Manufactured. When done in conjunction with the first analysis, this deepens understanding of the role that the raw materials play by showing how the cost of direct materials drives the overall cost of manufacturing relative to the costs of direct labor or manufacturing overhead. Third, students are asked to use the Income Statement and calculate the components of Operating Expenses as percentages of all operating expenses. Operating Expenses are purposely separated into four categories, rather than collapsed into the commonly used catch-all account, Selling and Administrative Expenses, to emphasize the disparity between expenses going towards administrative accounts (88% of Operating Expenses) instead of selling or marketing or research efforts. Fourth, students must determine the relative percentages of the component accounts under Current Assets on the Balance Sheet, and this highlights additional issues. Of RMF's Current Assets, almost 59% are tied up in inventories. Finished Goods accounts for 55% of Current Assets and, as mentioned in the case, this inventory is composed mainly of downgraded shop and utility boards for which there are no customers. Lastly, comparable analysis on the Current Liabilities shows that looming debt payments are a concern.

View Image -   Exhibit TN-I  Partial Common Size Analyses

4. Conduct a breakeven analysis for RMF. What types of changes would have to occur at RMF to reach these levels of breakeven performance (be as specific as possible and include, but don't limit yourself to, issues of pricing, quality, material cost, and labor)?

Having students conduct a breakeven analysis will help them realize how serious the problems are that the company faces. Students will need to use the 2001 Income Statement and the Cost of Goods Manufactured statements provided in the case to do this analysis and will be required to use their judgment to make some assumptions about what would be considered fixed costs and what would be considered variable costs. Exhibit TN-2 shows the assumptions that are used in this instructor's note.

View Image -   Exhibit TN-2  Assumed Classification of Costs as Fixed or Variable for Breakeven Analysis

This exhibit shows that for 200 1 , RMF's total variable costs were $2, 1 98,397 and total fixed costs were $715,543. Total sales were $1,767,435 (from Exhibit 2 of case). This figure includes freight charges of $354,601. RMF priced its boards FOB factory, then arranged transportation of the boards for those customers who wanted delivery included and added this cost to the bill. As such, it is deducted from the sales figure for purposes of conducting a breakeven analysis, giving an adjusted total sales figure of $1,412,834. Students should recognize from this that RMF could not solve its problems simply by increasing volume, as variable costs exceed sales levels by $785,563 or by 56%. From this analysis, it is clear that RMF needs to find a way to significantly reduce costs and/or significantly increase prices to have any chance of reaching breakeven. The instructor can then press the students to critically evaluate RMF's situation to assess what it would take to reduce costs or increase price. Basically this discussion forces the students to consider what types of functional strategies the business should pursue in operations and marketing if it hopes to break even producing and selling basic strawboard. These issues (costs & prices) can be addressed in either order, but both sides of the equation need to be addressed to fully appreciate RMF's situation.

Starting on the cost side, the Cost of Goods Manufactured and the detailed description of the production process provided in the case provide students a good opportunity to dig into the cost side of the equation. Further, the Common Size analysis completed in Question #3 provides students with a better understanding of the relative importance of the different manufacturing costs. One approach to carrying out this discussion is to attempt to develop a list of changes that would allow RMF to reduce its costs to where it could at least cover all of its variable costs. One such scenario is shown in Exhibit TN-3. Clearly students will not be able to know the exact percentages of improvement that are possible, but the point is to explore both the opportunities that exist and the magnitude of change needed.

View Image -   Exhibit TN-3  One Scenario That Allows RMF to Cover Variable Costs
View Image -   Exhibit TN-3  One Scenario That Allows RMF to Cover Variable Costs

The instructor might want to start by discussing the high cost of the quality problems experienced in production and what might be done to address these quality problems. As shown in Exhibit TN-3 (items 1-3), the combination of rejected raw material (due to straw deterioration) and rejected finished product (due to 10% of boards that are downgraded on average) cost RMF $285,872 (i.e., $63,802+$212,502+$9,568) in 2001. This represents a source of significant savings if quality problems can be addressed. A portion of the Sales Returns and Allowances expense on the 2001 Income Statement would also likely disappear with significant improvements in quality. The case provides numerous examples of process upgrades that are needed to reduce quality problems. For example, new press platens ($100,000 for both lines), new cold plates ($30,000), better straw storage and/or delivery arrangements (no cost estimate given) and an upgrade for the sanding equipment (no cost estimate given) would help significantly to improve quality. Further, students might suggest that more formal production procedures would help (e.g., the case indicates that when product density is found to be too high or low, the operator "might" adjust the process to try to compensate). Also, more training is needed (i.e., $4,000 in training for a company of this size seems low, particularly given the quality and productivity challenges the company faces). The annual savings ( $285,000) that would result from these investments in better quality would likely cover the costs of the investments in less than a year.

This discussion of quality naturally leads into a discussion of labor productivity. The same informality and lack of investment and training and equipment associated with the quality problems also would suggest that labor productivity could probably be improved significantly. Students might also suggest additional training for Rich or the hiring of a new production manager with more management experience or training. It is also worth looking at labor costs as a percentage of sales. Direct labor costs are $675, 7 12/$ 1,4 12,834= 47.8% of sales. This is an incredibly high percentage for a product that is essentially a commodity. Labor as a percentage of sales for businesses located in the U.S. is more typically 5%-l 5%. Products with such high labor content are usually either high end, "hand-crafted" items or are moved offshore where labor costs are lower. Labor productivity clearly needs to be improved for the company to reach breakeven.

From discussing quality and labor productivity, the instructor could move on to discussing the issue of purchasing. In terms of straw, the case states that there is an abundance of straw available and going to waste in growers' fields. While BGI clearly entered this venture to recover costs associated with baling bluegrass straw off growers' fields, it seems unlikely that RMF would have to pay this much if it sought competitive bids on straw and treated the company as an arm's length supplier. One could argue that RMF would be doing a service by removing straw from a grower's field and should be able to obtain the straw for what it costs to transport it to the factory. An even higher cost to RMF than straw is resin. The case indicates that MDI resin is three to five times more expensive than the urea- formaldehyde resin used in conventional wood particleboard, and this puts strawboard manufacturers industry-wide at a cost disadvantage. There are, however, three alternatives to MDI that are expected to become available within the next six months and have the potential to reduce resin costs for strawboard manufacturers. In the very short term, these alternatives might give RMF added bargaining power vis-à-vis BASF. In the longer term (i.e., 3-6 months out), these alternatives might provide RMF a significant cost reduction. Switching to soy-based resins, for example, could reduce resin costs by as much as 75% if it is indeed priced comparable to urea- formaldehyde resins that are on average four times more expensive than MDI. Because of uncertainties about the timing and the effectiveness of these new resins, the potential cost savings associated with them have not been incorporated into TN-3.

Looking at Exhibit TN-3, one can see that reaching profitability through cost cutting alone is not going to be easy. RMF would have to eliminate all of its quality problems, reduce the price it pays for straw by 50%, reduce the price it pays for other inputs by 15%, reduce equipment breakdowns by 50%, and improve labor productivity by 25% just to get to the point where it can cover its variable costs. Even still, these drastic improvements would not begin to cover the $715,543 in fixed costs nor provide any operating profit to cover the $359,866 interest expense, let alone pay back outstanding loans. Further, achieving these levels of improvement would be unlikely to occur without additional capital for needed process improvements, which would increase liabilities. A little further out in time though, a switch to a new resin (e.g., soy-based resins) could further reduce variable costs by as much as $378,000 {(.75)(.90)(560,928)}. This, in turn, would provide RMF with some contribution to begin to cover fixed costs and/or interest expense.

In addition to cost cutting, students must also consider the possibility of increasing price to reach breakeven, even if they decide it is not possible. Strawboard appears to be a commodity product as it is a substitute for wood particleboard, which is already marketed as a commodity product. This presents an opportunity to discuss the pricing implications for commodity versus differentiated products. It is difficult to make a case for getting much of a premium for strawboard over particleboard. Environmental benefits are the primary additional benefit of strawboard versus particleboard, and one could lead a discussion about the challenge of convincing customers to pay more to support a cleaner environment. The case provides data on the green marketplace suggesting that the current premium of around 20% is about the most that RMF can expect to obtain unless it is able to further differentiate its product. The Wall Panel alternative does provide an opportunity to include strawboard in a value added, differentiable product. Note, however, that strawboard still does not have any unique property in this application compared to the more economical particleboard except that it is a "green" product.

5. Based on the preceding analysis and the industry and market information in the case, how might RMF create a competitive advantage for itself?

Questions #1 and #2 provide students with an overview of the current situation and an understanding of RMF's current strategy and how it came about. Questions #3 and #4 require students to do a detailed analysis of the production and financial data to better understand what RMF needs to do to get its revenues and costs more in line with each other. Question #5 is intended to provide a bridge between the detailed Common Size and breakeven analyses and the consideration of alternatives. That is, it asks students to synthesize the analyses, clarifying RMF's strategic strengths and weaknesses relative to competitors, in order to understand the basis upon which RMF might be able to build a competitive advantage.

Competitive advantage derives from creating superior value for customers, and this can be done by either driving costs down or by differentiating products sufficiently from competitors so that customers value them more.

The analysis completed so far indicates that RMF cannot compete on cost with particleboard manufacturers. These competitors have significant scale economies and significantly lower resins costs, not to mention much deeper pockets to fund investment. New resins coming on the market, plus improvements in manufacturing and purchasing, however, do offer RMF some opportunity to reduce its costs so the cost difference between RMF and these large producers is not as great.

RMF's potential as a competitor to particleboard manufacturers, then, must come from how it is able to differentiate itself from its competitors in ways that customers value. Strawboard does have differences compared to particleboard, but the problem for RMF is that it has been unsuccessful at finding customers who value the differences and/or educating customers about the value of those differences. As Luke's research in the case indicates, this has been an issue for the strawboard industry overall.

Compared to other strawboard manufacturers, the cost picture is less clear (and was less clear to Luke and RMF). RMF's manufacturing costs are likely higher than those of other strawboard manufacturers because of its relatively small size (i.e., it lacks the scale economies of its strawboard competitors) and the inefficiencies in its production process as discussed in the preceding question. Improving operations offers the potential to significantly reduce this cost disadvantage. RMF, however, does have one significant source for a cost advantage compared to other strawboard manufacturers - lower shipping costs to the Pacific Northwest region by virtue of its location. While it is unclear whether this currently gives RMF or its competitors an absolute cost advantage (i.e., lower shipping costs that more than offset scale and efficiency advantages of competitors), students can determine that shipping costs are quite significant in the industry because RMF's freight charges are 20% of total sales. With improved manufacturing efficiency and improved purchasing practices, RMF might be able to achieve a cost advantage compared to other strawboard manufacturers for sales to the Pacific Northwest.

Finding a basis for differentiation compared to other strawboard manufacturers would likely be more difficult, as the product sold is physically so similar to the product of other strawboard competitors. RMF's smaller size might allow it to respond more quickly to customers or be more flexible than competitors, but there is no evidence in the case that RMF has found a way yet to capitalize on this. RMF might be able to gain short-term advantage over strawboard competitors by more quickly moving to one of the new resins coming on the market, which would give RMF both lower costs and a differentiated product (particularly if it switched to the soy-based resins).

In summary, then, RMF's basis for competitive advantage likely lies in its ability to better differentiate itself from particleboard manufacturers and its ability to provide its product to customers in the Pacific Northwest at a lower cost (and possibly with shorter lead time) than other strawboard manufacturers can.

6. What are the pros and cons of each of the alternatives Luke is considering?

Exhibit TN-4 provides a summary of the pros and cons of each of the alternatives that Luke is considering. Two important concepts should be emphasized when discussing these alternatives. One, RMF does not want to repeat its earlier mistakes. Specifically, the instructor should ask students whether an option is built on a foundation of pursuing RMF's intended strategy and creating value for an identified customer. Two, the instructor should raise the issue of focus. That is, does a suggested option broaden or narrow RMF's focus, and as a result, does that help or hinder RMF's efforts to be successful?

View Image -   Exhibit TN-4  Summary of Pros and Cons of Options Under Consideration
View Image -   Exhibit TN-4  Summary of Pros and Cons of Options Under Consideration

Discussion of the pros and cons can begin by using the earlier analyses of the current financial, production, and marketing situations, which suggest that simply producing the strawboard and finding new customers (e.g., furniture manufacturers) may not be enough to achieve profitability.

The discussion can then focus on the strategic benefits of changing the product offering by partnering with another organization to create a more differentiated value-added product. It is recommended that students be questioned as to whether the existing problems need to be solved before the company is in a position to move toward the Wall Panel options. It is unclear whether the Wall Panel option simply adds greater complexity to the current situation without addressing the underlying causes of the current difficulties. To some extent it seems to follow the original motivation of trying to create a product (albeit a different one) out of the bluegrass straw residue, rather than being based on a careful evaluation of how RMF could create value for its customers. Further, this option represents an attempt to address the problem primarily from the sales side without providing a clear solution to the production problems. In addition, this option really doesn't address the market's apparent view that strawboard is, at best, comparable to traditional particleboard. Thus, the option would need to be viable at price levels that customers would expect if the wall panels were made from traditional wood particleboard.

Students also need to recognize that the first two options will require time to implement before they can deliver any real return to RMF's original investors. As such, if RMF pursues either of these options, it will need to work with its lenders and those it owes money to in the form of payables if there will not be new investment from some source (e.g., the Tribe, Bluegrass Growers, Inc., or an outside investor) to cover the liabilities.

The discussion of options can be concluded with a discussion of the consequences of and alternatives to bankruptcy. Although RMF was pro-active in seeking modified lending terms with Northwest Farm Credit Service, if the grant conversion request presented to the USDA is not approved, RMF could consider filing for bankruptcy under Chapter 1 1 provisions. Bankruptcy law is separated into "chapters." Under Chapter 11, a business petitions the court to approve a reorganization plan that it develops describing which creditors will be paid, how they will be paid, and how much will be paid. A firm has 120 days under which to get a reprieve from its creditors and develop the plan. After this six-month process, not only must both the judge and the creditors approve this plan, but also every business decision and cash flow movement thereafter must be approved by the judge and creditors. Moreover, obtaining approval for filing Chapter 1 1 bankruptcy requires RMF to show that in a reorganized form it could become a profitable business. This would be a difficult case to make given the results of the financial analysis outlined in discussion Questions #3 and #4 above. RMF would also need to have enough cash (typically $5,000-$20,000) to pay up front all legal fees associated with the bankruptcy proceedings. Chapter 1 1 bankruptcy is a long and difficult process if granted (fewer than 25% of Chapter 1 1 filings are approved). Reorganization experts say it should be a last option.

A Chapter 1 1 type reorganization can also be accomplished informally with creditors in what is commonly referred to as a workout. In such a workout, RMF would need to meet with all of its creditors collectively and try to present a plan that these creditors can collectively accept. Workout plans involve a restructuring of debt where creditors agree to either an extension of debt terms (i.e., interest and or principal payments are postponed) and/or a partial reduction of claims by the creditors (i.e., either accepting a lower principal amount, a lower interest amount, or taking equity in exchange for debt). Typically a firm would present several scenarios to creditors in such a meeting (including a scenario of simply selling off all assets and closing the business) in an effort to convince creditors that accepting a debt restructuring is in their best interest. Creditors are at times willing to work out informal reorganizations like these because they tend to return more to creditors and can be completed more quickly than Chapter 1 1 reorganizations. Workouts are usually preferable to the firm involved because it allows for more managerial freedom (i.e., management does not need to have key decisions approved by the courts) and avoids the publicity and stigma associated with formal filings. The biggest challenge with informal filings is getting all creditors to agree to the plan. Because of this, informal reorganizations are most common among firms with only a few creditors. In this respect, RMF would be a good candidate for an informal reorganization given its limited number of creditors. The challenge, of course, would be developing a plan that would allow RMF to generate sufficient contribution to pay off at least a portion of its debt in the future.

Whether accomplished informally or through a Chapter 1 1 filing, reorganizations typically involve the following actions (Brigham & Daves, 2002, p. 844): (i) debt maturities are usually lengthened, interest rates may be lowered, and some debt is usually converted into equity; (ii) a new management team is given control of the company; (iii) obsolete or depleted inventories are replaced; (iv) plant and equipment is sometimes modernized; (v) improvements are made in production, marketing, advertising, and other functions; and (vi) new products or markets are sometimes developed to enable the firm to move from areas where economic trends are poor into areas with more potential for growth. Such reorganizations usually require an infusion of new money, often from a new investor. It is quite possible that all of the listed actions would need to be taken for RMF to win support for a re-organization. Through discussion of these issues, students should realize that a Chapter 1 1 (or informal) reorganization is not simply a case of taking the easy way out of the situation.

An alternative to re-organizing in this fashion is a simple liquidation. As in the case of reorganization, liquidation can be accomplished either informally or through the bankruptcy courts. An informal liquidation is usually accomplished through a process known as assignment, where the title to assets are given to a third party (i.e., a trustee or assignee) who is responsible for selling the assets and distributing the resulting money to creditors. Creditors can also force a firm into liquidation via Chapter 7 bankruptcy provisions. In fact, the vast majority of firms that apply for Chapter 1 1 protection are denied and instead forced into following Chapter 7 provisions. Under Chapter 7, the court closes the firm, liquidates its assets, and uses proceeds to pay off the creditors. IfRMF does not resolve its operating problems shortly, creditors could choose to try to convince a bankruptcy court judge that liquidating the firm is the only recourse and force a Chapter 7 filing. Sufficient information is provided in the case for students to realize that the sale of RMF's assets would generate insufficient cash to pay off all creditors.

For instructors less familiar with the details of bankruptcy, many intermediate financial management books provide some coverage of this topic. Several useful references are also included at the end of this document that deal with the issue of bankruptcy in more detail. The American Bankruptcy Institute website is a particularly valuable resource. Instructors may wish to point out to students skeptical about the importance of understanding bankruptcy that over 38,000 U.S. businesses either filed for or were forced to bankruptcy by their creditors in 2002.

7. What would you recommend Luke do? Why? How exactly would he do it?

The analyses in Questions #3 and #4 indicate that it would be extremely difficult for the plant to break even by continuing to produce strawboard, even if new customers could be found. Some students may support this option on the basis that core problems related to the strawboard business should be solved before the business attempts to create new products from the strawboard. In addition, some students may fall prey to "escalation," which arguably happened with RMF. That is, students may identify with Luke (a University student trying to help a small company) and be unwilling to give up on this venture, instead arguing for more time and resources. Students advocating this approach need to recognize that radical change and funding are required to make this option viable, escalating the financial commitment even more.

The Wall Panel option holds a little more hope for RMF because it provides the business with a more differentiated product that would justify a somewhat higher price and margin. RMF, however, lacks fundamental market and production data for either of these options to know just how much higher a price and margin are achievable. This raises the issue of "risk" and could lead to a discussion of whether RMF ever really considered whether it expected to earn a return on its project commensurate with the risk it was undertaking. Further, the Wall Panel option is potentially viable without RMF's strawboard (i.e., through the use of regular OSB).

Students who support the Wall Panel option should be challenged to make a case for why they would even use RMF strawboard in the product. In 200 1 , excluding freight, RMF produced $1,412,834 worth of strawboard. It spent, excluding freight and interest expense, $2,913,940 (fixed costs plus variable costs) to produce this much strawboard. The case states that OSB, the current material used to produce wall panels, is cheaper than strawboard. Students can be presented with the scenario of a wall panel business needing as many boards as RMF produced in 2001. If that business owned RMF's processes and used RMF strawboard, it would spend $2,913,940 (and be saddled with $4.5 million of debt and over $800,000 in payables) to obtain those boards. Instead, if it simply bought OSB by competitive bid, it would spend somewhat less than $1,412,834, for a savings of approximately $1.5 million (again excluding debt). Students then must answer the question of why they would spend $1.5 million more to acquire an input material. Going through this scenario will make it clear to students that RMF can not escape addressing its current problems simply by incorporating its strawboard into another product.

This line of discussion may also cause students to ask why Quickstart would be interested in RMF. This is a good question, and takes the discussion back to the risk/return issue. Wall panels represent a relatively new product without an established market, and as such there is significant risk associated with them. The case indicates that Quickstart hired Stanford Financial to help it find an investor. Stanford Financial, in turn, approached the Tribe, knowing that the Tribe was looking for ways to create business diversity on its reservation and that it had money to invest in such ventures. The logical inference is that Quickstart is looking for an investor willing to take a significant risk. RMF, the Tribe and BGI need to assess whether the potential return is worth the risk.

This brings the discussion to bankruptcy and business objectives. Bankruptcy will be the easiest case for students to make, but this result fails to achieve either BGI's objective of finding a solution for dealing with leftover bluegrass straw or the Tribe's objective of adding to the diversity of the reservation's economy. One might legitimately argue that given the owners' objectives, the business need not achieve profitability. While this is true, the business does need to at least approach breakeven to satisfy the owners' objectives over the long-term.

It is interesting to consider both of these objectives in the context of the current financial situation. In 2001, RMF lost $1.9 million and ended the year over $5 million in debt including payables. This provided Bluegrass Growers, Inc. less than $425,000 in economic return for its straw (less because of straw purchases from Oregon Hay) and the Tribe with jobs on the reservation that generated a payroll of $740,000 {$630,000 (production labor) + $1 10,000 (office salaries)}. In total, the financial equivalent of these other benefits ($1,165,000) was well below the $1.9 million loss. Clearly this calculation does not include other intangible benefits associated with the venture (e.g., manufacturing experience gained by employees, the environmental value of putting the straw into a useful product instead of the landfill). However, it does make clear that the strawboard business is an expensive way to achieve these objectives. It is also interesting to note that two of the major areas suggested for improving RMF's financial picture - improved labor productivity and better straw purchasing practices - both reduce the achievement of these other objectives.

TEACHING PLAN

The discussion questions have been developed so that the instructor can use them in the order presented to lead the class through the case. The first question is designed to quickly engage the class and have students see the significance of the current problems that RMF faces. Question #2 is designed to clarify the current (emergent) strategy for the students and establish why the firm faces the challenges that it does. In a 90-minute class, we suggest spending about 20 minutes on these first 2 questions. Questions #3 and #4 send students into the detailed analysis and ask them to draw strategic conclusions from these analyses. Going through this discussion in the context of the financial statements forces students to quantify their thinking. Question #4 will require significantly more time to discuss, and instructors should be prepared for the fact that students will have made a variety of assumptions in attempting to understand what it will take for RMF to reach breakeven. We suggest allotting about 30 minutes of the class to these two questions. Question #5 helps focus the class on strategy as the discussion transitions from the quantitative analyses in Questions #3 and #4 to the evaluation of alternatives, and it should be allotted about 5-10 minutes.

We think it is worthwhile having this "ordered" discussion to more fully understand RMF's situation before discussing the alternatives. Students will probably offer statements early on in the discussion favoring one or another of the alternatives. However, delaying discussion of the alternatives allows the instructor to make the following point: the company would be likely to repeat its past mistakes unless it understands why it is in its current situation and what changes it would take to turn it around.

This leads to a discussion of the alternatives in Question #6. In discussing the alternatives, the instructor should make a point of going back to the cause of RMF's current predicament - whether decisions have been made that supported the intended strategy and created value for the customers. A related and central component of this discussion should be whether RMF must have a viable strawboard business model before trying to integrate forward into the production of wall panels. Time can also be spent discussing the option of bankruptcy generally. The case provides students opportunity to consider some of the issues involved with filing for bankruptcy.

Finally, the discussion should conclude with concrete recommendations and action plans for Luke. This discussion should include the non-financial motivations of the owners mentioned earlier, but by waiting until the end to really introduce these, students will be in a better position to evaluate the costs associated with these non- financial motivations. We suggest allotting about 25-30 minutes to discussing these final two questions.

It should be noted that fairly specific discussion questions have been provided. Some instructors may want to use the case with somewhat less specific questions, particularly if working with more advanced students. The following three questions represent a greatly simplified set of preparation questions that might be appropriate for an advanced MBA class:

Identify and contrast the strategy RMF intended to follow with the strategy that eventually evolved.

Based on the financial, production, industry and market data in the case, what is RMF's potential as a competitor?

What would you recommend Luke do? Why? How exactly would he do it?

EPILOGUE

On April 30, 2002 RMF announced it was closing its strawboard business. RMF was continuing to evaluate the proposal to partner with Quickstart Building Systems to build wall panels, either out of strawboard or through the purchase of OSB. Interestingly, after informing its lone remaining customer about the move, the customer expressed willingness to pay RMF a higher price for strawboard if it re-opened.

RESEARCH METHODOLOGY

The case describes a real company and a real situation. The actual names of the company and the individuals affiliated with that company, however, have been disguised at the request of the company. This case was prepared based primarily on field interviews with the general manager of the organization - in the case, Luke. Information for the case was also obtained from interviews with the production manager and the president of the board of directors, as well as from some library research to obtain relevant industry and competitor information.

References

INSTRUCTOR'S MANUAL REFERENCES

American Bankruptcy Institute website - www.abiworld.org.

Brigham, E.F. & P.R. Daves (2002). Bankruptcy, Reorganization, and Liquidation. Intermediate Financial Management, 7th edition. London: Southwestern Thomson Learning, 834 - 855.

Fitts, P. (1991). Bankruptcies, Workouts, and Turn-Arounds: A Roundtable Discussion. Journal of Applied Corporate Finance, 4(2), 34-61.

Hill, C.W.L. & GR. Jones (1998). Strategic Management: An Integrated Approach. Boston, MA: Houghton Mifflin Company. (For information on Intended vs. Emergent strategies.)

Sandlund, Chris. (2001, September). Born Again. Entrepreneur Magazine, 71-74. (For information on bankruptcy.)

CASE REFERENCES

Christianson, R. (1999, November). Wheat Field of Dreams. Wood & Wood Products, 21-25.

Gorzeil, K.E. (November, 2001). Finding an Economic and Environmental Balance to the Technology of Producing Building Materials from Agricultural Crop Residue. Presented at 2001 ASAE Annual International Meeting.

Green Gauge Report. (2000). New York: Roper Starch Worldwide.

McCoy, M. (2001, May 28). Dow Picks Up Plywood Stand-in. Chemical & Engineering News, 11.

Potlatch 10-K405 report, year ended December 31, 2001, filed March 27, 2002.

Sellers, T. (2001). Wood Adhesive Innovations and Applications in North America. Forest Products Journal, 57(6), 12-22.

Yost, P. (2001). Getting the Right Stuff: A Guide to Building Material Retailers. Environmental Building News, J0(4), 1-3.

AuthorAffiliation

John J. Lawrence, University of Idaho

Doug Haines, University of Idaho

Michele O'Neill, University of Idaho

Subject: Strategic planning; Integration; Debt management; Business models; Marketing management; Case studies

Location: United States--US

Classification: 2310: Planning; 9190: United States; 3100: Capital & debt management; 7000: Marketing; 9130: Experimental/theoretical

Publication title: Journal of the International Academy for Case Studies

Volume: 11

Issue: 2

Source details: SPECIAL EDITION, INSTRUCTORS' NOTES

Pages: 1-21

Number of pages: 21

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 10784950

Source type: Reports

Language of publication: English

Document type: Business Case, Feature

Document feature: Tables References

ProQuest document ID: 216275799

Document URL: http://search.proquest.com/docview/216275799?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-13

Database: ABI/INFORM Complete

Document 58 of 100

PORTFOLIO PENSION PLANNING AND ASSESSMENT PROCESS

Author: Lashgari, Malek

ProQuest document link

Abstract:

Portfolio management, while still an art, has greatly benefited from recent developments in financial theory. The fruits of empirical evidence provide a useful tool to both active and passive money managers. For example, small investors may be able to obtain a reasonable return on investment, in a cost efficient manner, by investing in an index fund. Investors with more capital may benefit from active security selection, such as investments in value and growth stocks. This case provides two simple designs, employing both active and passive strategies, for managing small and medium size retirement portfolios. It also utilizes a number of tools developed in modern portfolio theory to provide an estimation of portfolio return and risk. While the utmost important criterion for measuring performance is reaching desired goals, a risk adjusted measure of performance is also provided. [PUBLICATION ABSTRACT]

Full text:

Headnote

CASE DESCRIPTION

The primary subject matter of this case is to demonstrate an application of modern portfolio theory in construction and measurement of performance of an investment portfolio. The secondary subject matter concerns issues in performance presentation standards. This is an evaluative case, intended to gain familiarity with procedures that should be followed in designing, monitoring, and evaluating an investment portfolio. The task of a portfolio manager is to search for an investment vehicle that would allow clients to reach their objectives, while managing risk. This case illustrates one way of formulating expectations regarding the likely outcome of an investment portfolio. In addition, this case presents simple guidelines for establishing a statement of investment policy for clients. The case has a difficulty level of four, appropriate for senior level.

CASE SYNOPSIS

Portfolio management, while still an art, has greatly benefited from recent developments in financial theory. The fruits of empirical evidence provide a useful tool to both active and passive money managers. For example, small investors may be able to obtain a reasonable return on investment, in a cost efficient manner, by investing in an index fund. Investors with more capital may benefit from active security selection, such as investments in value and growth stocks.

This case provides two simple designs, employing both active and passive strategies, for managing small and medium size retirement portfolios. It also utilizes a number of tools developed in modern portfolio theory to provide an estimation of portfolio return and risk. While the utmost important criterion for measuring performance is reaching desired goals, a risk adjusted measure of performance is also provided.

INSTRUCTORS' NOTES

Learning Objectives

This case provides simple guidelines for constructing and monitoring investment portfolios that are in line with the theory and practice of asset management. The students are introduced to alternative criteria in portfolio building and performance measurement and are guided through a completed example. The teaching notes provide clarification and documentation regarding the case.

ANSWERS TO DISCUSSION ISSUES

a) Juniper, a member of the investment committee, while in favor of Lloyd's recommendations, suggests that the weight associated with the growth fund for the medium size retirement portfolios should increase to 35 percent (from 25 percent) and bonds to 15 percent (from 25 percent). Provide a critique of her comments by using the chart in Exhibit 13.

Juniper's comments are well taken. Investing a higher percentage in growth stocks of 35 percent seems to be better than 25 percent. On the other hand, one should note that an index fund such as S&P 500 is somewhat dominated by growth stocks. Thereby, the original weights are still satisfactory. Exhibit TNl shows the results for Juniper's strategy. As shown in Exhibit TNl, there is an increase in both return and risk of this portfolio, producing a Sharpe ratio of 0.74. Thereby, Juniper's approach while generating a slightly higher return than those provided in Exhibit 6, does not produce a better risk adjusted return.

View Image -   EXHIBIT TNl  Pilot Portfolio, a 25 Percent Weight for Value and Stock Index Funds, 35 Percent for Growth Stocks and 15 Percent for Bonds
View Image -   EXHIBIT TNl  Pilot Portfolio, a 25 Percent Weight for Value and Stock Index Funds, 35 Percent for Growth Stocks and 15 Percent for Bonds

b) Lloyd's father asks whether exchange traded funds should be employed instead of index mutual funds (See Exhibit 14). Provide comments on the merits of this suggestion.

Lloyd's father is considering a hot topic regarding the use of exchange traded funds.These funds are available in the market with various names. As a unit investment trust, Spiders have been trading since 1 993 . These are depository receipts based on S&P 500, designed by member firms of the American Stock Exchange, and are priced at 1/1 0th of S&P 500. If S&P =1400, then a share of Spiders (SPY) = $140. DIAMONDS (DIA) are based on the Dow Jones 30 industrial companies' index. And have been traded since early 1998. If DJIA=I 1000, then DIA = $110.

Exchange traded funds trade like stock and can be sold at any time during the trading hours. In contrast, mutual funds can only be bought or sold at the 4:00 p.m. closing prices. Some advantages of exchange traded funds are that you can buy them on margin (borrowing up to 50 percent), place limit orders, and sell them short at any time since they are not subject to the up-tick rule. A short sale of a security takes place when a particular exchange traded fund is expected to decline in price. One can thereby borrow the exchange traded fund and sell it. When or if the price declines, you would buy it at a lower price and complete the short sale process. Put and call options are available on some of these funds such as Spiders. Compared to regular mutual funds, exchange traded funds are considered tax efficient since they do not produce and distribute as much realized gains or losses on a year by year basis.

Lloyd feels that these long-term retirement plans cannot gain much from exchange traded funds. This is because of the long-term, passive nature of their holdings and their tax-free status. Exchange traded funds may entail higher transaction costs than Vanguard Index 500.

c) Iris, a member of the investment committee would like Lloyd to replace the Vanguard Index 500 with the Vanguard Extended Market Index. Among her reasons are that more attention should be paid to the entire market portfolio including small capitalization stocks. Provide a response to this comment. See Exhibit 15 to help develop your answer.

Following Iris's view, information regarding the use of a broader index fund can be found in Exhibits TN2 through TN4. As shown in Exhibits TN2 through TN4, performance of S&P 500 index differs from the extended market since S&P 500 index represents more of a larger capitalization companies. However, the growth fund that is included in Lloyd's pilot study would also represent smaller capitalization companies. Thereby, there appear to be no need to increase the weight for small capitalization stocks in the pilot portfolios.

View Image -   EXHIBIT TN2  Performance Results for Vanguard Extended Market Index  EXHIBIT TN3  PERFORMANCE RESULTS FOR VANGUARD EXTENDED MARKET INDEX  EXHIBIT TN4  Performance Results for Vanguard Extended Market Index Statistical Results: past 3 Years Through 09-30-2001

In Exhibits TN2 through TN4 Sharpe Ratio provides a measure of risk-adjusted return. Higher values for the Sharpe ratio represent better performance. Beta denotes a measure of risk relative to the market. A beta value of one represents portfolio risk similar to the market. Higher values for beta are an indication of greater volatility in portfolio return. Alpha is a measure of performance in the context of the capital asset pricing model. It represents excess return above the required return. Sale charges are a one- time fee. Management fees are annual fees charged by those that design and monitor the investment portfolios. 12b-l fees are annual charges imposed by the fund administration for mailing, advertising and compensation to the independent selling groups.

d) Todd, an active money manager, dislikes the idea of indexing, since he feels that during good market conditions it is tantamount to "buy high, sell low." Comment on the validity of his argument.

Todd's comments are quite to the point in that an index fund such as S&P500 is dominated by about 50 large companies. As the market rises, the weights of these stocks would rise in the index. The index mutual fund would thereby have to buy more of the same high flyers at a higher price. The reverse would take place in a market decline. That is, you would have to sell those shares at continuously lower prices. This is in contrast to buying at lower prices and selling at higher prices. However, Lloyd has also included value stocks that are typically bought at a lower price and sold at a higher price.

e) Alan, a senior portfolio manager and a long-time member of the firm, states that clients have been attracted to the firm because of their special talents in stock selection. Thereby, such clients may dislike Lloyd's new approach. Provide a response to these issues.

Alan's comments are well taken. Diversification among styles is necessary. An active approach to stock selection should be included as well as indexing. Note that the Dreman High Return Fund is selected for its active value style and concentration on small and mid capitalization stocks. However, empirical evidence shows that about 75 percent of money managers appear to perform somewhat less than market indexes. Therefore, indexing should be a part of the portfolio. At any rate, the firm should inform the respective clients about the change in portfolio manager, his philosophy, and style of investing.

AuthorAffiliation

Malek Lashgari, University of Hartford

Subject: Performance evaluation; Portfolio investments; Retirement planning; Estimating techniques; Case studies

Location: United States--US

Classification: 3400: Investment analysis & personal finance; 9190: United States; 9130: Experimental/theoretical

Publication title: Journal of the International Academy for Case Studies

Volume: 11

Issue: 2

Source details: SPECIAL EDITION, INSTRUCTORS' NOTES

Pages: 23-28

Number of pages: 6

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 10784950

Source type: Reports

Language of publication: English

Document type: Business Case, Feature

Document feature: Tables Equations

ProQuest document ID: 216292130

Document URL: http://search.proquest.com/docview/216292130?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-13

Database: ABI/INFORM Complete

Document 59 of 100

ST. LOUIS CHEMICAL: THE ACQUISITION

Author: Kunz, David A

ProQuest document link

Abstract:

St. Louis Chemical is a regional chemical distributor, headquartered in St. Louis. Don Williams, the President and primary owner, began St. Louis Chemical ten years ago after a successful career in chemical sales and marketing. The company reported small losses during it first two years of operation but has since reported eight consecutive years of increasing sales and profits. The growth has required the acquisition of additional land, equipment, expansion of storage capacity and more than tripling the size of the work force. St. Louis Chemical has become the leading distributor in the St. Louis area. Williams plans to open a new facility in Memphis, Tennessee to expand its geographic market. The company was in the process of acquiring the necessary land and equipment when Williams received a telephone call from Frank James, St. Louis Chemical's sales manager. James indicated that First Chemical, a Memphis based chemical distributor was on the market. James wanted to know if Williams was interested in investigating the possibility of acquiring First Chemical. Williams was interested but was uncertain of how to determine a fair value for First Chemical. [PUBLICATION ABSTRACT]

Full text: _TVM:UNDEFINED_

Subject: Business valuation; Acquisitions & mergers; Distributors; Case studies; Chemical industry

Location: United States--US

Classification: 4120: Accounting policies & procedures; 9190: United States; 2330: Acquisitions & mergers; 8640: Chemical industry; 9130: Experimental/theoretical

Publication title: Journal of the International Academy for Case Studies

Volume: 11

Issue: 2

Source details: SPECIAL EDITION, INSTRUCTORS' NOTES

Pages: 29-42

Number of pages: 14

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 10784950

Source type: Reports

Language of publication: English

Document type: Business Case, Feature

Document feature: Tables

ProQuest document ID: 216277318

Document URL: http://search.proquest.com/docview/216277318?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-13

Database: ABI/INFORM Complete

Document 60 of 100

KIRKLAND'S, INC.

Author: Lane, Wilburn; McCullough, Mike

ProQuest document link

Abstract:

This case is about Kirkland's Inc., a specialty retailer that began with one store in the late 1960s, and today has close to 300 stores with annual sales of over $350 million. Also, it is adding about 30-40 new stores per year. Kirkland's began as a gift shop but has evolved into a home décor/accessories retailer. It has adjusted its product mix to meet the changing demands of consumers and because of some moves made by its competitors. The case includes a very detailed analysis of the home décor/accessories industry, a history of Kirkland's, the current status of Kirkland's (including its strategy and corporate culture), and a detailed description of its major competitors. Some detailed financial information is provided in the case, and current websites are referenced for additional financial information. [PUBLICATION ABSTRACT]

Full text:

Headnote

CASE DESCRIPTION

In this case the authors tell the story of the founding and impressive growth of Kirkland's Incorporated. The story is one of niche marketing perfected through a deep understanding of product acquisition and merchandise display by a management team that has stayed together for decades. The case is suitable for an upper division undergraduate marketing strategy or business strategy course, perhaps even as a capstone project. The case is designed to be taught in one fifty to seventy-five minute class period, with about thirty to forty-five minutes of reading and preparation time on the students' part, prior to class.

CASE SYNOPSIS

This case is about Kirkland's Inc., a specialty retailer that began with one store in the late 1960s, and today has close to 300 stores with annual sales of over $350 million. Also, it is adding about 30-40 new stores per year. Kirkland's began as a gift shop but has evolved into a home décor/accessories retailer. It has adjusted its product mix to meet the changing demands of consumers and because of some moves made by its competitors. The case includes a very detailed analysis of the home décor/accessories industry, a history of Kirkland's, the current status of Kirkland's (including its strategy and corporate culture), and a detailed description of its major competitors. Some detailed financial information is provided in the case, and current websites are referenced for additional financial information.

INSTRUCTORS' NOTE

The Kirkland's Inc. case would be useful in several different types of courses. First, this would be a very good case to use in a Strategic Management class. The industry analysis gives the reader enough information to clearly understand the home décor/accessories industry. Each of the major competitors is discussed in detail and financial data on Kirkland's and its competitors is presented both in the case and through referenced websites. The information about the company illustrates several topics covered in a Strategic Management class. First, it is a good case to show a firm moving from the entrepreneurial stage to the administrative stage. When you have a few stores, you can take more risk. As you get large and go public, you cannot take as many risks. Second, the case shows how firms can be successful in different positions in the industry. Kirkland's is one of the smallest players in the industry, but they are not only surviving-they are thriving. They have used flanking and guerrilla strategies to be successful against their larger competition. Kirkland's strategy has allowed them to leverage themselves with their suppliers and with their landlords. Third, the way in which they tweak their strategy illustrates how important it is to be on a path of continuous improvement.

The second type of course in which you might use this class is a strategic marketing class. Kirkland's has very loyal customers. They keep their merchandise fresh, and they adjust their product categories in response to what their competitors do. Kirkland's is definitely a follower, but it is they way they adjust the individual items in the product categories that makes them so successful. It is unusual to specialty retailers survive nearly forty years-Kirkland's has done so through adaptation. They clearly embody the positioning strategy concept proposed by Trout and Ries. The strategies they have employed are excellent examples of some of the strategies discussed in Trout and Ries book on Marketing Warfare.

Third, this case could be used in a retailing class to show students how companies differentiate themselves by location, product assortment, presentation of merchandise, and price. Kirkland's and their competitors show how differentiation based on one or more of these areas can make even a small retailer successful.

POSSIBLE CLASS DISCUSSION QUESTIONS

1. Why has Kirkland's been able to survive and thrive so long?

The have done several things that have allowed them to survive. First, they have adapted. They changed from being a gift shop to being a home décor/accessories shop. Second, they kept their product fresh-creates customer loyalty. Third, they have been a tough negotiator when it comes to price. Fourth, the way they have managed their real estate allows them to move out of a location with much more ease than most of their competitors. Fifth, they have been consistent-this is probably because of the tenure of key employees. Sixth, they do not try to go head on against bigger companies in the industry. They take what the other companies give them and do a job with it.

2. Why does Kirkland's have higher sales per square foot than most of their competitors, especially since they have lower price points than their competitors?

There are probably two reasons for this. First, they keep the merchandise fresh. If it does not sell they discounted it and get it out the door. They are always looking for new trends, and they are constantly changing the merchandise. Second, mall stores tend to have higher sales per square foot than out-of-mall stores.

3. What impact would the loss of key executives have on the company?

This would be devastating to the company. Carl Kirkland has led this company through a variety of situations. He knows the business and he know what customers want. The CEO Robert Alderson has tons of experience in finding and developing new products. Reynolds Faulkner is the only one in the company who is capable of being a CFO. Chris LaFont is the man behind the merchandising. He is very hands-on in selecting the merchandise, and he has been doing if for nearly 20 years.

4. As companies like Cost Plus-World Markets further expand east and Kirkland has more expansion to the west, how do you think this will impact the companies?

Kirkland's does not compete with Cost Plus-World Markets as much as Pier 1 competes with Cost Plus-World Markets. Kirkland's has shown that it can compete with Bombay, Pieri and Bed, Bath, and Beyond. They do so by trying to have different merchandise.

5. Do you think Kirkland's should go international?

Eventually they may, but by their own estimations they should be able triple the number of stores they have in the U.S. Geographic expansion within the U. S. makes more since for now.

6. Many of the competitors have segmented the market (especially the kids market), should Kirkland's have a Kids' Kirkland?

At this time, with all the geographic expansion they have going own, they should probably not try to segment the market in that way. If there is merchandise that fits their concept and designed for Kids-maybe they could have a "Kids Korner."

7. Do you think Kirkland's is doing enough in e-commerce?

No. I realize that a lot of their business is people browsing through malls, but if they plan to compete in the future they need a stronger web presents and they need to begin a serious data mining program on their customers. That is some thing that could significantly increase sales without having to open new store locations. They could sell direct. Williams-Sonoma does this very well.

8. Since they are looking at non-mall stores, do you think they should do more advertising?

Yes! Currently their advertising budget is 1A0Zo of sales. As they move out of malls, the destination stores are not going to be there to generate traffic for them. They must let people know where they are located, business hours, merchandise assortment, and price. If they do not do this, they may know have very good sales in non-mall locations.

9. The perceptual map at the end of the case was provided by Kirkland's. How accurate do you think the map is at this time?

The perceptual map probably over rates the quality of Kirkland's products. They do keep the merchandise fresh, and they do have lower costs.

10. Do you see any external threats for Kirkland's?

Yes! Kirkland's is very dependent on product from China and India. If anything happened that would impact the relations between the U. S. and these countries, it could impact their supply of merchandise.

11. Discuss the competition relevant to Kirkland's.

Bombay-same locations, but pricier.

Bed, Bath, and Beyond-huge store, but sells a lot of things Kirkland's does not sell.

Linens N' Things-similar to Bed, Bath and Beyond, but not as successful.

Pier 1 -Strong competitor on some items. Larger and a little more upscale than Kirkland's.

Cost Plus, Inc. -not geographically as competitive as Pier 1, but would compete on the same items that Pier 1 might.

Williams-Sonoma-Big player in many venues. Has the second largest annual sales. Pricey, but segments market well. Has great catalog and web business.

12. How do you think becoming a public company has changed Kirkland's?

They have had to be organized and meet profit goals quarterly.

They have to be risk averters.

13. How well do you think Kirkland's is or can do related to the driving forces in the industry?

Value focused-Kirkiand's matches up well here because they have the lowest prices and are tough price negotiators.

Changing shopping patterns- As more people shop outside the mall, Kirkland's will continue to open more non-mall locations.

Information Systems-Kirkiand's recent investment in this area should continue to bring them cost savings.

Centralized Distribution-Khkland's freight and transportation costs should continue to go lower as more and more products are handled through the distribution center.

On-line Shopping-Kirkland's is probably a laggard in this area. They really should devote some resources to this area and establish a good customer data-mining program. They have loyal customers, and they need to continually be in tough with those customers.

Globalization-Khkland's does not see the need for this right now because they think they need to expand in the U. S. That is true, but they need to be careful to totally disregard some of the very fertile international markets.

Segmenting by age-Given the size of Kirkland's stores, it will be difficult for them to segment the market by age.

14. Kirkland's plans to finance their store expansion out of operating capital. Do you think they can do this?

Yes. They have no debt so they can take the money that they would have to spend on interest and invest it in opening other stores. Also, it only costs them about $300,000 on the front end to open a store. Currently, their payback is two years.

15. About 40% of sales and 80% of profit comes in the fourth quarter. What could Kirkland's do to level out sales and profits?

They may need to do more promotions at certain times of the year (such as Mother's Day) and for special occasions (such as birthdays and anniversaries). They might also consider having a bridal registry.

16. Ask the student to compare the financial positions of the firms in this industry to Kirkland's.

Bombay has more stores and sales, but has considerably less net profit margin.

Bed, Bath, and Beyond is the major player when it comes to sales and profit. They also have the largest profit margin. They have a lot going for them.

Cost Plus, Inc. is a relatively small player, but they are growing fast and expanding east into Kirkland's major markets. Their net profit is less than Kirkland's. Their sales per square foot are less, and their turnover rate is less.

Linens N' Things is a major player in sales volume, but their net profit margin is less than half that of Bed, Bath and Beyond. Their turnover rate is low, and they have the lowest sales per square foot in the industry.

Pier 1 is huge simply because they have so many stores. They are more upscale than Kirkland's, but they do not have as good a turnover rate. Also, while their sales per square foot are good, it is not as high as Kirkland's.

Williams-Sonoma is a major player because they have so many different types of stores and are in so many different types of retail venues. Their sales were second only to Bed, Bath, and Beyond. Their sales per square foot were the highest in the industry, and they have a high turnover rate.

Kirkland's is very small compared to most of its competitors. It has the lowest total sales, and the second lowest net income. However, it has a very high turnover rate and it has the second highest sales per square foot. Also, it has the lowest prices.

17. Kirkland's has been in business for 36 years. Do you think they will be in business for another 36 years?

This could be argued either way. Not many small specialty shops have been in business for 72 years. On the other hand, Kirkland's has been good at adapting. They have changed their focus and they have changed their product mix. The answer to this question lies in how well they understand the customer's needs and adapt to them.

AuthorAffiliation

Wilburn Lane, Lambuth University

Mike McCullough, University of Tennessee at Martin

Subject: Strategic management; Business growth; Case studies; Competition; Success factors; Industry analysis; Retail stores

Location: United States--US

Company / organization: Name: Kirklands Inc; NAICS: 442299, 444110

Classification: 8390: Retailing industry; 9130: Experimental/theoretical; 9190: United States; 2310: Planning

Publication title: Journal of the International Academy for Case Studies

Volume: 11

Issue: 2

Source details: SPECIAL EDITION, INSTRUCTORS' NOTES

Pages: 43-48

Number of pages: 6

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 10784950

Source type: Reports

Language of publication: English

Document type: Business Case, Feature

ProQuest document ID: 216309373

Document URL: http://search.proquest.com/docview/216309373?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-13

Database: ABI/INFORM Complete

Document 61 of 100

NEW CREDIT PROGRAM AT THE DISCOUNT WINDOW

Author: King, Amanda S; Parker, Darrell; Yang, Bill Z

ProQuest document link

Abstract:

The Federal Reserve employs three monetary policy tools: the required reserves, the open market operation (which affects the federal funds rate) and the discount policy. Traditionally (i.e., before January 9, 2003), the Fed set the discount rate below the targeted market federal funds rate, but prohibited banks from using the discount window. As a result, the volume of outstanding discount loans was normally small even though the discount rate is cheaper than the federal funds rate. On January 9, 2003, the Federal Reserve introduced new lending programs, which are different from their predecessors in several aspects. The most significant changes are (1) the discount rates are now set above the prevailing federal funds rate, and (2) banks face very few restrictions on their use of primary credit. The proposal to make such changes is based on the following beliefs. First, it will eliminate the existing incentive for banks to borrow from the window to exploit the positive spread, and hence reduce the administration necessary for each discount loan. Second, as a result, it should help encourage banks to turn to the discount window only when the reserve markets tighten significantly and thereby the window serves as the last resort and a backup source of liquidity for individual depository institutions. Third, the discount rate will become an improved safety valve for releasing significant market pressures. [PUBLICATION ABSTRACT]

Full text:

Headnote

CASE DESCRIPTION

The primary subject matter of this case concerns the effect of the new credit program at the discount window on the behavior of the federal funds rate. The objective is to teach students how the basic demand-and-supply framework is employed to analyze the conduct of monetary policy in the reserve market. This case would be appropriate for a money and banking class, a monetary economics class, a financial economics class, an intermediate or an advance macroeconomic theory class. Level of difficulty could be at three or four. The case is designed to be discussed in one and one-half hours and should take students less than three hours of outside preparation.

CASE SYNOPSIS

The Federal Reserve employs three monetary policy tools: the required reserves, the open market operation (which affects the federal funds rate) and the discount policy. Traditionally (i.e., before January 9, 2003), the Fed set the discount rate below the targeted market federal funds rate, but prohibited banks from using the discount window. As a result, the volume of outstanding discount loans was normally small even though the discount rate is cheaper than the federal funds rate.

On January 9, 2003, the Federal Reserve introduced new lending programs, which are different from their predecessors in several aspects. The most significant changes are (1) the discount rates are now set above the prevailing federal funds rate, and (2) banks face very few restrictions on their use of primary credit. The proposal to make such changes is based on the following beliefs. First, it will eliminate the existing incentive for banks to borrow from the window to exploit the positiv e spread, and hence reduce the administration necessary for each discount loan. Second, as a result, it should help encourage banks to turn to the discount window only when the reserve markets tighten significantly and thereby the window serves as the last resort and a backup source of liquidity for individual depository institutions. Third, the discount rate will become an improved safety valve for releasing significant market pressures.

INSTRUCTORS' NOTES

The case introduces students to the application of the basic demand-and-supply framework to the analysis of conduct of monetary policy, in particular, the new credit program at the discount window adopted in January 2003 by the Federal Reserve System. Concepts involved in the case include demand and supply, reserve markets, discount rate, federal funds rate, discount window, interest rate stability, and monetary policy.

CASE QUESTIONS AND ANSWERS

1. In the reserve market, how do the Fed's restrictions on discount loans affect the supply curve? More specifically, what happens to the supply curve if the terms become more or less restrictive?

View Image -   Figure 1: The supply curves in the reserve market

The Fed can change the monetary base by using two monetary policy tools: (1) open market operations that determine the nonborrowed monetary base (Rn); and (2) discount policy that includes the discount rate and the terms on the restrictions. So, in general, the supply curve in the reserve market is kinked at the discount rate with two segments: the lower part is vertical, indicating the nonborrowed monetary base, whereas the upper part is determined by the terms specified in the discount policy. A steeper upper segment indicates more restrictive terms specified in the discount policy (panel (a) in Figure 1), and a flatter upper part reflects looser requirements for discount loans (panel (b) in Figure 1). As an extreme case, when all strings are taken away, the supply curve becomes L-shaped, see panel (c), Figure 1.

2. Why was the volume of discount loans relatively small even when the discount rate was set below the targeted federal funds rate (before January 2003)? What are the main costs under such a discount policy?

Traditionally (before January 9, 2003), the discount rate (iD) was set below the targeted federal funds rate (iff), but the terms specified in the discount policy were very restrictive. Hence, even though banks had an incentive to borrow from the discount window, they were simply not allowed to do so. As shown in Figure 2 below, the volume of discount loans remained small, since (iff - iD) was usually set pretty small and the supply curve is very steep.

View Image -   Figure 2. Equilibrium in the reserve market when i^sub ff^ > i^sub D^

The main costs when the discount rate is set below the prevailing federal funds rate are transaction costs in administration. When the discount rate is below the federal funds rate, banks do have an incentive to borrow from the discount window so as to make some profit from re-lending the funds to the reserve market. If everyone could do it, then the discount window would no longer serve as the last resort for urgent funds. Very demanding restrictions that the Fed put on the discount loans essentially behave like credit rationing. The approval or disapproval of an application involves high administrative costs such as credit checking, proof of exhaustive sources from other opportunities, paper work, etc. As a result, banks are discouraged and may choose not to borrow from discount windows even when they really need to borrow for urgent cases. Thus the traditional restrictive discount policy would negatively influence the intended primary function of the discount window as the lender of last resort.

3. Before January 9, 2003, the discount rate was set below the federal funds rate. From then on, the Fed set the discount rate above the federal funds rate. Given a relatively stable demand on the same day in the reserve market, how did the Fed accomplish such a change if the federal funds rate were targeted unchanged? Are any other policy tool(s) involved?

The discount rate can be set administratively, while the federal funds rate can only be targeted indirectly through open market operations. The following figure shows how open market purchases must be done so as to keep iff unchanged wile the (new) discount rate (iD1) is reset above it.

View Image -   Figure 3. A comparison

4. When the discount rate is set above the targeted federal funds rate, do you expect the aggregate volume of discount loans (primary credit) to be high or low? Why? What is the difference between your answer here and that in question 2?

When the discount rate is set above the prevailing market interest rate, the volume of discount loans would be very low, unless the demand for reserves rises unexpectedly. However, unlike the answer given in question #2, the small volume of discount loans is not because the Fed does not lend at the low discount rate; rather, it is because banks have no incentive to borrow at a rate higher than what they can borrow from the federal funds market.

5. Compare the policies before and after January 9, 2003. Which policy makes the discount window serve as a better marginal source of reserves for the overall banking system? Why?

The new policy serves as a better marginal source of reserves than the old one. First of all, it is incentive compatible - only those banks that really need urgent funds for liquidity purposes would come to borrow from the discount window, simply because it is more expensive than the federal funds rate. Consequently, it costs much less than in the old program to help make the discount window the last resort for banks that really need urgent funds but cannot get them in the market. To set the "price" low and to refuse to sell by rationing would increase administrative costs by screening and monitoring potential borrowers. By setting the discount rate above the targeted federal funds rate, as long as the market rate does not rocket and touch the "ceiling", in theory, a bank comes to the discount window only when it cannot easily find the source of funds in the market.

On the other hand, from banks' perspective, to set the discount rate above the federal funds rate and to take the strings away can help make the discount loans really serve as the last resort much better than otherwise. When the discount rate is set below the market interest rate, if a bank comes to the window for a discount loan, it may negatively signal its financial weakness: either it cannot afford to pay a higher interest rate prevailing in the market, or it has exhausted all other possible sources. So, to reach the window could damage the bank's market value. Rather, if the Fed has authorized in advance a group of banks to be qualified for borrowing from the discount window, a bank would go to the window whenever it needs urgent funds but cannot get them easily from the market. In this scenario, to borrow from the discount window actually positively signals its financial strength, since at least it belongs to a pre-qualified group by the standard of the Fed. This way, the discount window can really serve as the last resort for urgent funds at much lower administrative costs.

6. Under the new policy, what is the most important point for the discount window credit to act as a short-run safety valve for the overall banking system by making additional reserves available, and for the discount rate act as a rate ceiling even if demand for reserve may sometimes rocket unexpectedly?

Discount window credit acts as a short-run safety valve only if the restrictions are completely taken away as shown in Figure 4, panel (a). If there is any restriction on the application for the discount loan, panel (b) may prevail. In that case, the discount rate as a cap may be broken and hence the discount window may not act well as the short-run safety valve.

View Image -   Figure 4. Discount rate as a rate ceiling
References

REFERENCES

Hubbard, R. G (2001). Money, the financial system and the economy, 4th edition, Addison Wesley

Madigan, B. F. & W. R. Nelson. (2002). Proposed revision to the Federal Reserve's discount window lending programs, Federal Reserve Bulletin, July, 2002, 3 14-319 (http://www.federaheserve.gov/pubs/bulletin/2002/07021ead.pdf)

Mishkin, F. S. (2004). The economics of money, banking and financial markets, 7th edition, Pearson Addison Wesley

Stevens, E. (2003). The New Discount Window, Economic Commentary, Federal Reserve Bank of Cleveland, May 15, 2003 (http://www.clevelandfed.org/Research/com2003/0515.pdf)

AuthorAffiliation

Amanda S. King, Georgia Southern University

Darrell Parker, Georgia Southern University

Bill Z. Yang, Georgia Southern University

Subject: Federal Reserve monetary policy; Discount rates; Case studies; Banking industry

Location: United States--US

Classification: 9190: United States; 1120: Economic policy & planning; 9130: Experimental/theoretical; 8100: Financial services industry

Publication title: Journal of the International Academy for Case Studies

Volume: 11

Issue: 2

Source details: SPECIAL EDITION, INSTRUCTORS' NOTES

Pages: 49-54

Number of pages: 6

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 10784950

Source type: Reports

Language of publication: English

Document type: Business Case, Feature

Document feature: Graphs References

ProQuest document ID: 216291952

Document URL: http://search.proquest.com/docview/216291952?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-13

Database: ABI/INFORM Complete

Document 62 of 100

PREDICTING A BANK'S FAILURE: A CASE STUDY OF A MINORITY BANK

Author: Nijhawan, Inder P; Taylor, Ulysess

ProQuest document link

Abstract:

The case study describes the trials and tribulations of a minority owned bank that was established to provide loans to African American consumers who were underserved by other financial institutions. From its inception, the bank had a checkered history. The bank went through several management changes. On three separate occasions, the bank received an unsatisfactory audit from the federal regulators. There was a steady deterioration in bank's basic performance indicators: capital adequacy, ratio of non-performing loans, net charge off loans, net interest margin and rate of return on its assets and equity. The bank was finally acquired by another financial institution and restored to solvency though a variety of meticulously planned performance improvement strategies. [PUBLICATION ABSTRACT]

Full text:

Headnote

CASE DESCRIPTION

The primary objective of this case study is to identify indicators that can predict a bank's failure. The secondary objectives are to highlight strategies to restore the financial health of a bank and evaluate the strengths and weaknesses of a bank's performance measures. The case has a difficulty level of three, appropriate to junior level students in money and banking, commercial bank management, strategic management and business policy courses. The case is designed to be taught in three class hours and is expected to require at least three hours of preparation.

The case study provides students ample opportunity to study the selected financial data, compute the critical ratios, analyze the trends in critical ratios, understand a bank's exposure to credit and investment risks, assess the strengths and weaknesses of bank's basic performance indicators and evaluate strategies to restore to health a dying financial institution

CASE SYNOPSIS

The case study describes the trials and tribulations of a minority owned bank that was established to provide loans to African American consumers who were underserved by other financial institutions. From its inception, the bank had a checkered history. The bank went through several management changes. On three separate occasions, the bank received an unsatisfactory audit from the federal regulators. There was a steady deterioration in bank's basic performance indicators: capital adequacy, ratio of non-performing loans, net charge off loans, net interest margin and rate of return on its assets and equity. The bank was finally acquired by another financial institution and restored to solvency though a variety of meticulously planned performance improvement strategies.

INSTRUCTORS' NOTES

DISCUSSION QUESTIONS

1 Define and explain the following:

Capital Adequacy Ratio

Loan Charge Offs Ratio

Net Interest Income

Net Interest Margin

Return on Assets

Return on Equity

Capital Adequacy Ratio is the ratio of equity capital to total assets. Capital adequacy ratio is often used as one of the measures of the risk of bank's failure. A steady decline in bank's adequacy ratio indicates a decline in the ability of a bank to absorb a loss in asset value without defaulting on its liabilities.

Loan Charge Offs Ratio is the ratio of the provision for loan losses to total receivable loans. The loan charge offs ratio measures precisely the amount of loans that were "written off during the year to cover the unpaid and/or overdue loans. An escalation in the "loan charge offs" ratio is one of the indicators of the deterioration in financial health of a bank.

Net Interest Income is the difference between the total interest received and interest expense. The net interest income, aside from the other sources of income, is one of the most important indicators of a bank's profitability. A bank that has limited income from other sources cannot maintain its profitability if the net interest income steadily declines.

Net Interest Margin is simply the net interest income expressed as a percentage of the total assets. When net interest margin shrinks, it generally indicates a decline in profitability of a bank. However, with an increase in the importance of the other sources of bank's income (service charges, fees and other operating income), the decline in net interest margin by itself may not be enough to sound an alarm.

Return on Assets (ROI) is a widely used measure of profitability of a bank and is computed by expressing net income after taxes as a percentage of total assets. Again, a declining ROA is a matter of concern and can contribute to a failure of a financial institution.

Return on Equity (ROE) is a more narrow measure of a bank's success in using its equity capital. ROE is computed by dividing the net income after taxes by the amount equity capital. A steady decline in ROE can lead to a flight of capital from the bank and lead to its failure.

2. Using the selected financial data of the bank under consideration, compute for each year (1995-2000) the capital adequacy ratio, loan charge offs ratio, net interest income, net interest margin, rate of return on assets, and the rate of return on equity.

View Image -

3. Plot each of the ratios, and write three generalizations based on your analysis of the trend in these ratios. (Omit net interest income)

View Image -   Finacial Ratios (1995-2000)

4. Identify factors that may Grove's NIM to have a steady decline.

The ability of a bank to garner a high interest rate from its borrowers and pay low interest rate to its depositors is determined by the competitive strength of the bank, service to the customers, and willingness to take loan risks. Grove is a relatively small bank (as indicated by the size of its assets and deposits) and, therefore, cannot effectively compete with other banks. The bank did extend some risky loans (see a steady increase in loan charge offs since 1996) but was unable to charge sufficiently high interest rate to increase its NIM.

5. How can a bank offset a decline in its NIM? Does the financial data of Grove suggest that it has the ability to offset the decline in its NIM?

One way to offset the decline in NIM is to increase income from sources other than interest. Many banks have increased their non-interest income by charging fees for their services rendered, insurance, trading, etc. the financial data indicates that Grove did not follow this pattern; the bank's the non - interest income declined by 58 percent between 1996-1999.

6. Visit the website Federal Financial Institutions Examinations Council (FFIEC) http://www.ffiec.gov/UBPR.htm. Select search for a Uniform Bank Performance Report; type certificate number 22238 and select report date as 12/31/1999. Open page Ol and compare the 1999 ratios for the bank with its peers and draw at least two generalizations.

Generalization 1. As expected, Grove compared unfavorably to its peers in all critical ratios. For example, the net interest income ratio for the bank was only 2.89 compared to the peer average of 3.02 and the bank average total loan and lease losses were 98 percent higher than the peer average.

Generalization 2. The bank's net income ratio was below the peer average, its loan losses were substantially higher than average, and its leverage capital (or capital adequacy) ratio of-1.31 was significantly lower than the peer average of 9.02. The situation was further exacerbated by the fact that the bank's growth rate of assets was negative (-25.16 percent) compared to a positive growth rate of 6.44 percent for the peers.

7. Refer to question #2. What ratios do you consider as the most significant in predicting a bank's failure and why?

The Loan Charge Off ratio and the Net Interest Margin are significant indicators of a bank's trouble when it's non-interest income contributions to total income is negligible or small. Whereas the former ratio is reflective of the past bad loans, the latter is indicative of the spread between the interest charged and interest received which determines the profitability of the bank

8. Read the performance strategies discussed in the case study and identify the two strategies that you consider to be the most significant. Explain why?

The most significant performance improvement strategies were (1) the establishment of a new loan committee and formulation of new guidelines for loan approval and (2) efforts to improve the quality of the current loan portfolio and the hiring of additional personnel to collect loans.

9. How are the performance strategies you identified in question number 8 related to the ratios you identified to be the most significant in question # 7.

Performance strategies #1 and #2 (see response to question # 8) are designed to decrease loan charge offs ratio and increase NIM respectively.

10. Compare the critical ratios for the period 1996-1999 to the critical ratios for the year 2000 (see your answer to question #2) and write at least two generalizations.

Generalization 1: Between 1996-1999, there was a marked deterioration in the loan charge offs ratio, capital adequacy ratio, net interest margin, return on assets and equity.

Generalization 2: The year 2000 was a watershed in the history of the bank. As a result of the implementation of the performance improvement strategies, all the critical ratios except capital adequacy ratio showed a significant improvement.

11. In your opinion did the management succeed in reversing the failing financial condition of the bank?

Yes, it halted the increasing trend in loan charge offs ratio, and improved the net interest income and NIM, and increased the return on assets and equity.

12. What additional measures would you suggest to improve the performance of the bank?

Increase the quantity and quality of business loans, offer more attractive rate and services to improve deposits, develop more aggressive marketing strategies, increase visibility in the business community, and establish correspondent relationship with major banks in and outside North Carolina to access broader markets in search of higher rate of return. The bank must eventually reduce its dependence on the deposits as a major source of funds because low cost bank deposits are shrinking. The bank should tap other sources of funds such as raising money over the Internet or through the subsidized Federal Home Loan Bank System.

AuthorAffiliation

Inder P Nijhawan, Fayetteville State University

Ulysess Taylor, Fayetteville State University

Subject: Minority banks; Business metrics; Business failures; Turnaround management; Case studies

Location: United States--US

Classification: 2310: Planning; 9190: United States; 8100: Financial services industry; 9521: Minority- & women-owned businesses; 9130: Experimental/theoretical

Publication title: Journal of the International Academy for Case Studies

Volume: 11

Issue: 2

Source details: SPECIAL EDITION, INSTRUCTORS' NOTES

Pages: 55-60

Number of pages: 6

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 10784950

Source type: Reports

Language of publication: English

Document type: Business Case, Feature

Document feature: Tables Graphs

ProQuest document ID: 216309218

Document URL: http://search.proquest.com/docview/216309218?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-13

Database: ABI/INFORM Complete

Document 63 of 100

THE SEDUCTION OF ARTHUR THOMPSON: AN INSTRUCTIONAL CASE ON ETHICS IN THE ACCOUNTING WORKPLACE

Author: Henage, Richard T

ProQuest document link

Abstract:

The myriad of news stories that have dominated the financial press at the outset of the 21st century have demonstrated, more than ever, the need for higher ethical standards among professional accountants. Unfortunately, teaching ethics in the classroom does not always translate into higher ethics among graduates. Barriers to adopting classroom ethics in the marketplace center on two facts: 1) that real-world pressures influence ethical decisions; and 2) that most ethical dilemmas involve the gradual "graying" of standards rather than the radical overthrow of such standards. This case is a portrayal of a real-world situation where the main character was subjected to a series of ever-increasing ethical choices, while faced with severe financial consequences. Although the names and setting have been changed, the presented events mirror the challenges faced by the main character: Arthur Thompson. The case allows students to place themselves in the position of the main character, to make decisions, and to weigh the consequences of their actions. Each of the three ethical dilemmas faced by the main character is followed by instructional questions that help the students identify the differences between legal and ethical issues, create a framework for making ethical decisions, and recognize the impact of competing motivations. [PUBLICATION ABSTRACT]

Full text:

Headnote

CASE DESCRIPTION

This case focuses on ethics in the workplace - principally on the types of ethical issues facing an employee dealing with the financial management of a business. It was designed to help the student realize the implications of decisions regarding ethics and to recognize the difference between legal issues and ethical issues. This case is not highly technical and would be appropriate for inclusion in an introductory accounting or finance course. The case was designed to be presented over a single one-hour class period with only minimal preparation outside of class.

CASE SYNOPSIS

The myriad of news stories that have dominated the financial press at the outset of the 21st century have demonstrated, more than ever, the need for higher ethical standards among professional accountants. Unfortunately, teaching ethics in the classroom does not always translate into higher ethics among graduates. Barriers to adopting classroom ethics in the marketplace center on two facts: 1) that real-world pressures influence ethical decisions; and 2) that most ethical dilemmas involve the gradual "graying" of standards rather than the radical overthrow of such standards.

This case is a portrayal of a real-world situation where the main character was subjected to a series of ever-increasing ethical choices, while faced with severe financial consequences. Although the names and setting have been changed, the presented events mirror the challenges faced by the main character: Arthur Thompson. The case allows students to place themselves in the position of the main character, to make decisions, and to weigh the consequences of their actions. Each of the three ethical dilemmas faced by the main character is followed by instructional questions that help the students identify the differences between legal and ethical issues, create a framework for making ethical decisions, and recognize the impact of competing motivations.

INSTRUCTORS' NOTES

This case was written with the intent that each section of the case be handed out and studied individually. After the section is read, the students should take the time to discuss the questions

before proceeding to the next section. Particular attention should be given to the differences between legal standards and ethical standards, and on the consequences of each potential choice. Encourage the students to come up with their own creative choices.

After reading the conclusion of the case, take time to focus on the transformation of the main character from someone of high integrity, to someone who had compromised his standards. With perfect hindsight, should Artie have made a different decision at the first indications of unethical behavior? If so, at what point should a person quit his or her job in protest against unethical or illegal behavior? It is important for the students to understand that these are not easy choices.

To get the full impact of the case, it is important that the students realize that the events in the case are true; only the names and locations have been changed to protect the identities of the participants. The students must realize that they will face ethical dilemmas in the workplace. Further, the choices they make are not sanitary choices between right and wrong where the only consequence is whether or not their integrity is sacrificed. In the real world, such choices may have severe effects on the victim's career, family and financial condition.

Further, note that never once did Artie receive financial reward for sacrificing his integrity. Many students have the false impression that individuals engage in fraudulent activities to secure unearned financial rewards. In reality, many frauds are perpetrated just to allow employees to maintain their job, even when their performance is such that the job is deserved and the compensation received is fair given the labor performed.

One of the key points of this case is that what is legal and what is ethical are frequently two separate issues. It is very possible to be involved in activities where a person's moral or ethical standards are severely violated, even though no legal liability may be incurred. There is also a wide range of choices where contractual arrangements might be violated, but no criminal liability was incurred.

For example, while Artie may have a legal obligation to not participate in a scheme to defraud the 1RS by not reporting cash sales, since he has no concrete evidence of the violation, is not signing any tax returns, is not preparing the tax returns, and is not receiving any monetary benefit from the alleged fraud, odds are good that the 1RS would not pursue Artie in any type of fraud investigation. Although it might be pointed out that the 1RS offers a finder's fee for help in detecting tax fraud, there are other potential consequences of being a whistle-blower. For example, in many cases, it has been difficult for a whistle-blower to secure further employment. Further, what would be the consequences if the 1RS was notified and it was determined that no tax fraud had occurred?

In the second part of the case, it is obvious that cheating the drivers and paying them below the agreed-upon rate is a violation of contract as well as being unethical. However, it should be pointed out that it is unlikely that the violation would result in any criminal prosecution, even for those who intentionally defrauded the drivers. This incident would most likely result in a breach of contract civil lawsuit against the firm and it is unlikely that Artie would be individually included in such a lawsuit.

In some cases, making the "ethical" choice may have adverse consequences not only on the perpetrator, but also on the victims. If information that the company had been cheating its drivers became known, odds are that the trust relationship between drier and company would have been destroyed, that the drivers would have left the firm en masse, and that the company could have been thrown into bankruptcy. Consequently, revealing to the drivers that they were being cheated could have potentially resulted in all of them losing their livelihood.

The third part of the case is the only portion with clear-cut choices. Not only would lying in a court of law be unethical, but there are also criminal penalties for perjury. Most students recognize the legal implications of the third decision and determine to leave the company rather commit a felony.

It is naïve to believe that there are no consequences if only ethical standards and not legal requirements are violated. One of the real consequences suffered by the main character in this account is the erosion of his personal standards and the accompanying loss of self-esteem and self-identity. Further, dishonesty can lead to severe financial consequences, even if no criminal liability is incurred.

Finally, the most important point of the case is that the deterioration of ethical standards is a gradual process of seduction. Every time standards are lowered, it becomes just that much easier to take the next step. It is unlikely that any of the major fraud cases began with an employee embezzling hundreds of thousands of dollars in his or her first criminal act. Most of these individuals probably began with small acts, such as padding expense accounts, taking unnecessary sick days, or stealing office supplies.

It is important that every employee have clearly marked lines of ethical behavior. It is recognized that such standards must be personally set, as each individual must feel a firm conviction to not compromise such standards. The students must recognize that the day will come when they will be faced with ethical challenges. The time to set their limits is now.

It is recommended that the students write a thought paper at the conclusion of this case to explore their own ethical limits. Recognize that the standards will vary radically from one student to the next. Encourage the students to be as open and honest as possible with their thoughts and feelings. Let the students know that they will be graded on the rational development of their own ethical framework, rather than on a naive commitment to never engage in any unethical behavior. The fact that the instructor will read the paper may censure what the student feels free to discuss and admit. It might be helpful to find a blind review format where the papers are submitted to an independent third party where the name might be removed. The paper is then graded by the instructor, based on the development of the ideas, without knowing the identity of the student. Finally, the instructor returns the paper to the third party who records the grades only on a grade sheet.

AuthorAffiliation

Richard T. Henage, Utah Valley State College

Subject: Accountants; Work environment; Case studies; Business ethics

Location: United States--US

Classification: 2410: Social responsibility; 9190: United States; 4110: Accountants; 9130: Experimental/theoretical

Publication title: Journal of the International Academy for Case Studies

Volume: 11

Issue: 2

Source details: SPECIAL EDITION, INSTRUCTORS' NOTES

Pages: 61-63

Number of pages: 3

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 10784950

Source type: Reports

Language of publication: English

Document type: Business Case, Feature

ProQuest document ID: 216298057

Document URL: http://search.proquest.com/docview/216298057?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-13

Database: ABI/INFORM Complete

Document 64 of 100

POWER PLAY IN A BUYER-SELLER AGREEMENT: A CASE OF EXTREME COMPETITION

Author: Esqueda, Paul; Ogden, Denise T

ProQuest document link

Abstract:

Set in the context of a renegotiation of a sale agreement for equipment, this negotiation exercise explores the dynamics of two companies with power asymmetries. The role play activity highlights the difficulties of negotiating when there are changes occurring in the external and competitive environment. Several other concepts are illustrated including the effect of customer demands on price, time constraints involved in the negotiation and the contrast between distributive and integrative negotiation strategies. [PUBLICATION ABSTRACT]

Full text:

Headnote

CASE DESCRIPTION

The primary subject matter of the case concerns power asymmetries in negotiation. Secondary issues examined include the effect of customer demands on price, time constraints involved in the negotiation and the contrast between distributive and integrative negotiation strategies. The case has a difficulty level of four. The case is expected to be taught in two hours with additional student preparation time of 30-45 minutes. Student preparation may be done inside or outside of the classroom. The case could be used in a strategy course, or as part of a conflict/negotiation module of a general course in business management.

CASE SYNOPSIS

Set in the context of a renegotiation of a sale agreement for equipment, this negotiation exercise explores the dynamics of two companies with power asymmetries. The role play activity highlights the difficulties of negotiating when there are changes occurring in the external and competitive environment. Several other concepts are illustrated including the effect of customer demands on price, time constraints involved in the negotiation and the contrast between distributive and integrative negotiation strategies.

INSTRUCTORS' NOTES

This case was written by: Paul Esqueda, Professor of Engineering, Division Head for Engineering, Business and Computing, Perm State Berks-Lehigh Valley College and Denise T. Ogden, Assistant Professor of Marketing, Perm State Berks-Lehigh Valley Collage. Both professors have experience in practice and teaching negotiation techniques. This case is based on an actual business situation and the story has been slightly changed for pedagogical reasons and to preserve the anonymity of the parties. Following are learning objectives, operational needs and operating procedures for implementing the case in a course. Lecture ideas, discussion questions and an explanation of what happened in the real-life negotiation are also included.

Learning Objectives

* To understand and gain practice in a conflict in which asymmetries in power exist

* Consider whether integrative potential exists in a negotiation that has distributive features

* Explore the role of power and alternatives in negotiation

* Understand the effect of time demands on price

* Demonstrate the potential for entrapment in a negotiation

* To explore some of the dynamics of trust and suspicion between groups

* Explore the role of ethics in a negotiation situation

OPERATIONAL NEEDS

Group size: Two small groups are used to role-play the company teams involved in the negotiation.

Time required: About 30-45 minutes to read the case and prepare for the negotiation; 60 minutes to role-play; 50-60 minutes to discuss and summarize and discuss key principles.

Materials: The case must be copied for the class in which the case is to be taught. The instructor should make one copy of each case for each student. Copies are also needed for the confidential information given to each team member participating in the role-play.

Physical Requirements: A room that is big enough where the teams can discuss strategy privately within their teams. Where possible, two "break-out" rooms can be used for maximum privacy.

OPERATING PROCEDURE

* Choose two teams (3 to 5 members/team). Each team will role-play either the management team of Fresh Water Mining Co. or the management team of the Dutch Royal Fluorescence X-Ray B. V. company. The teams should sit far enough from each other to allow private meetings. If possible, a breakout room should be used to ensure privacy.

* Have students read the background information for case and answer any preliminary questions. Next, hand out each team's "confidential information" sheets that provide additional information for the exercise.

* Allow each team to read and discuss their negotiation strategy (20-30 minutes).

* Have the teams conduct the role play in front of the rest of the class.

* Class debriefing and discussion of the negotiation exercise will take anywhere from 30-75 minutes, depending on the depth and sophistication of the discussion.

LECTURE CONCEPTS

This case provides the opportunity to illustrate many concepts that occur in negotiation that can be highlighted during discussion:

Power - The case illustrates the idea that power in negotiation is a function of alternatives.

Relationships - Past negotiating relationships set the context for the current negotiation.

Time Pressure - Time plays a role in this case because FWMC has placed pressure on Royal X-ray. If Royal X-ray does not agree to the demands, the parties will have to resort to alternatives.

BATNA (Best Alternative to a Negotiated Agreement) - When one party has an alternative, the dynamics of the negotiation can change. In this case, FWMC has been approached by a competitor who is willing to do whatever it takes to win their business.

Anchoring and Adjustment - The initial price set an anchor by which subsequent adjustments in price are measured during the negotiation. Due to changes in the external environment, FWMC is attempting to adjust the price.

Entrapment - There may be some pressure for FWMC to "settle at all costs." This perspective may lead to entrapment. In this scenario, Royal X-ray feels compelled to give in to FWMC demands regardless of potential losses. The time and effort already invested in the deal makes it more difficult for FWMC to back out.

Ethics - In many negotiation situations both parties practice bluffing. Although this practice is widely practiced and accepted, some believe this is lying and this practice may raise ethical questions.

LECTURE MATERIAL

Several models may be applied to this situation, suggestions are as follows:

* Integrative vs. Distribution Negotiations - This case provides an opportunity to discuss distributive vs. integrative negotiations and the mixed-motive characteristics of a negotiation.

Thompson, L. (1998). The mind and heart of the negotiator. Upper Saddle River, New Jersey: Prentice Hall.

* Seven Elements of Successful Negotiation - The seven elements as described by Fisher and Ertel are interests, options, alternatives, legitimacy, communication, relationship and commitment. A lecture is appropriate and can be done before of after the role-play.

Fisher, R. and Ertel, D. (1995). Getting ready to negotiate: The getting to yes workbook. New York: Penguin.

* Five Forces Analysis - The analysis of Porter's five forces that drive competition can be used as a basis for discussion:

Threat of new entrants

Threat of substitute products or services

Bargaining power of suppliers

Bargaining power of buyers

Rivalry among existing firms

Porter, M. E. (1980). Competitive strategy, techniques for analyzing industries and competitors. New York: The Free Press.

* Ethics - Wokutch and Carson view analyze bluffing from an economic gain perspective. Reitz, Wall and Love describe questionable negotiation tactics and ethical criteria. Both articles provide a base for an ethics-based discussion.

Wokutch, R. E.& Carson, T. L. (1981). The ethics and profitability of bluffing in business. Westminster Institute Review, 7(2), 77-83.

Reitz, HJ., Wall, JA. & Love, M.S. (1998). Ethics and negotiation: Oil and water or good lubrication? Business Horizons, (41), 5-14.

DISCUSSION QUESTIONS

The following discussion questions may be used for discussion:

1 . What potential problems did Royal X-ray identify prior to the negotiation? What problems emerged during the negotiation?

2. What did each side bring to the negotiation as factors with which to negotiate?

3. How effectively did the Royal X-Ray team approach the negotiation?

4. How effectively did Fresh Water Mining Company team approach the negotiation?

5. What are the interests, goals, and alternatives of the parties? What is each party's BATNA (best alternative to a negotiated agreement)?

6. What effect did competition have on the dynamics of the negotiation?

7. How did asymmetries in the power relationship between the two companies effect the negotiation?

8. Was this an integrative negotiation or a distributive negotiation? Why? Were there any attempts at creative problem solving?

9. Did you reach an agreement in this negotiation? If so, how satisfied are you with the price? If not, is there anything that could have been done to reach agreement?

10. If you reached a settlement, how does the settlement price compare to the initial contract agreement? Who "won" in this exercise?

11. What areas involved ethics in the negotiation? Is bluffing an accepted practice? When does bluffing cross the line into unacceptable behavior?

EPILOGUE

This case is based on an actual business situation and the story has been slightly changed for pedagogical reasons and to preserve the anonymity of the parties. The main outcome of the meeting between FWMC and Royal X-Ray after the latter won the bid was that Royal X-Ray conceded to all the requests made by FWMC with very little gain for the Royal X-Ray negotiating team. Royal X-Ray opted for a strategy of preserving such an important customer at all cost in light of a very aggressive competition. In essence, Royal X-Ray accepted changes in the order that resulted in a drastic reduction in their profit margin.

The general manager of Royal X-Ray for the Latin American region was highly distressed by the outcome of this negotiation. Although, he understood the entrapment situation, he questioned the negotiating skills of his sales force. As a consequence of his disappointment, Royal X-Ray organized a one-day negotiation workshop during the three-day annual meeting for its Latin American sales force in Amsterdam. This simulation case was commissioned to one of the authors of this paper and it was given to the participants during that workshop as a final case.

Three teams (A, B and C) of six negotiators were set up to negotiate the same case. The teams were further subdivided so that both FWMC and Royal X-Ray had three negotiators. Table 3 summarizes the results of the simulation.

View Image -   Table 3: Summary of agreements between FWMC and Royal X-Ray

It is evident from these results that the party with the upper-hand exercised all its power, despite both parties having full knowledge of the outcome of the real-life situation. Royal X-Ray conceded in all three simulations with slightly different gains in cash flow in each group for the whole project.

The general manager had been assigned the role of FWMC in one of the negotiating tables (A) since he had complained bitterly about the outcome of the real-life negotiation. During the debriefing period of the simulation, he was asked why he had not been more magnanimous to Royal X-Ray and he replied that they had not made a compelling case. In the real situation it could have been an issue of not framing the negotiation properly. The similarity of outcomes in the three cases reveals that an excessive power asymmetry provides strong leverage and allows the dominant party to impose its will upon the other. In this particular case, the power asymmetries arise from FWMC being the dominant customer in that market and for having a solid BATNA (Japanese X-Ray).

References

ADDITIONAL READING RESOURCES

Bazerman, M. & Neale, M. (1992). Negotiating rationally. New York: Free Press.

Bowen, D.D., Lewicki, RJ., Hall, D.T. & Hall, F. H. (1997). Experiences in management and organizational behavior, (Fourth Edition). New York: John Wiley.

Brockner, J., Shaw, M. C, & Rubin, J. Z. (1979). Factors affecting withdrawal from an escalating conflict: Quitting before it's too late. Journal of Experimental Social Psychology, 15, 492-503.

Fisher, R. & Ertel, D. (1995). Getting ready to negotiate: The getting to yes workbook. New York: Penguin.

Kristensen, H. & Garling, T. (1997). The effects of anchor points and reference points on negotiation process and outcome. Organizational Behavior and Human Decision Processes, 71, 85-94.

Lax, D. A., & Sebenius, J. K. (1986). The manager as negotiator: Bargaining for cooperation and competitive gain. New York: Free Press.

Rubin, Jeffrey Z. (1981). Psychological traps. Psychology Today, (March), 55- 61.

Staw, B. M. (1981). The escalation of commitment to a course of action. Academy of Management Review, 6, 577-587.

Teger, A. I. (1979). Too much invested to quit: The psychology of the escalation of conflict. New York: Pergammon Press.

AuthorAffiliation

Paul Esqueda, Penn State Berks-Lehigh Valley College

Denise T. Ogden, Penn State Berks-Lehigh Valley College

Subject: Competitive advantage; Negotiations; Vendor supplier relations; Influence; Case studies

Location: United States--US

Classification: 5120: Purchasing; 9190: United States; 9130: Experimental/theoretical

Publication title: Journal of the International Academy for Case Studies

Volume: 11

Issue: 2

Source details: SPECIAL EDITION, INSTRUCTORS' NOTES

Pages: 65-71

Number of pages: 7

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 10784950

Source type: Reports

Language of publication: English

Document type: Business Case, Feature

Document feature: Tables

ProQuest document ID: 216292938

Document URL: http://search.proquest.com/docview/216292938?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-13

Database: ABI/INFORM Complete

Document 65 of 100

A TALE OF TWO AIRLINES: WESTJET AND CANADA 3000

Author: Martin, Bernadette; Feils, Dorothee J; Allen, Grace C

ProQuest document link

Abstract:

Over the last twenty years, shareholders, financial institutions, and the general public who associate with the airline industry have seen a battlefield littered with airline casualties. All airlines, from large international carriers such as United Airlines, Swiss Air, and Air Canada to small short haul carriers such as WestJet have faced enormous risks in their operations. The Gulf War and the War in Iraq, high oil price volatility, the threat of terrorism, and lately SARS all have had a negative impact on airlines around the globe. Many airlines have seen losses, reduced capacity, and large layoff. However, a few exceptional airlines have been able to stay profitable even in such a demanding business environment. In this case study we explore two Canadian airlines: WestJet and Canada 3000. The former is an example of an airline that is thriving despite the hostile business environment while the later is an example of an airline that failed shortly after September 11, 2001. Why did this happen? Both airlines were of similar size and initially followed a similar strategy. However, one succeeded, one did not. The major factors that explain WestJet's success and Canada 3000's failure are examined. While we use two Canadian airlines for the analysis, the lessons learned are applicable to airlines in other countries as well. [PUBLICATION ABSTRACT]

Full text:

Headnote

CASE DESCRIPTION

The primary subject matter of this case is concerned with the financial risks in the Canadian Airline Industry. Secondary issues examined include financial structures and utilization of capital within airline companies. The case has a difficulty level of three and should be appropriate for undergraduate and graduate courses in financial and strategic management. The case is designed to be taught in one to two class hours, with three hours of outside preparation by students.

CASE SYNOPSIS

Over the last twenty years, shareholders, financial institutions, and the general public who associate with the airline industry have seen a battlefield littered with airline casualties. All airlines, from large international carriers such as United Airlines, Swiss Air, and Air Canada to small short haul carriers such as WestJet have faced enormous risks in their operations. The Gulf War and the War in Iraq, high oil price volatility, the threat of terrorism, and lately SARS all have had a negative impact on airlines around the globe. Many airlines have seen losses, reduced capacity, and large layoff. However, a few exceptional airlines have been able to stay profitable even in such a demanding business environment. In this case study we explore two Canadian airlines: WestJet and Canada 3000. The former is an example of an airline that is thriving despite the hostile business environment while the later is an example of an airline that failed shortly after September 11, 2001. Why did this happen? Both airlines were of similar size and initially followed a similar strategy. However, one succeeded, one did not. The major factors that explain WestJet's success and Canada 3000's failure are examined. While we use two Canadian airlines for the analysis, the lessons learned are applicable to airlines in other countries as well.

INSTRUCTORS' NOTES

Recommendations for Teaching Approaches

This case presents numerous opportunities for analysis and discussion. Students can initially work on the case individually but it is a nice case for discussion among small groups or as a class led by the instructor.

The teaching objectives for this case are:

1. Introduce students to the business model of the airline industry.

2. Illustrate the difficulties of being a consistently profitable airline.

3. Determine the key characteristics to being a successful and profitable airline.

4. Determine the risk involved in leasing vs. purchasing.

5. Use financial ratios to determine leverage and profitability.

6. Examine the pitfalls of rapid expansion and mergers.

SUGGESTED QUESTIONS

1. Both Canada 3000 and WestJet were profitable airlines in 2000. Examine their strengths and weaknesses and what factors led to Canada 3000's demise and WestJet's prosperity.

WestJet is an innovative airline modeled after the highly successful, no frills, Dallas-based Southwest Airlines and other low cost carriers with similar structures including Ryan Air and Air Tran. Their flights are considered inexpensive and their staff is known to be young and upbeat. This has allowed the airline to woo, from cars and busses, a new type of air passenger. Although the frequency of flights is less than the traditional airline and the airports used are often smaller than those used by most airlines, the nonbusiness, value-seeking flyer is willing to trade convenience for savings. WestJet educates their current and future passengers on economical air travel and stimulates demand by providing the service at the lowest possible price. In terms of operations, the company only expanded when the company was profitable. Therefore, the majority of their aircrafts were purchased through raised share capital and some long-term debt. The company's use of debt was limited and capital leases regarding aircrafts were very few in number.

2. Canada 3000 began as a holiday charter airline for vacationers, transforming itself into a major and profitable low-cost airline in early 2000. Unlike WestJet, Canada 3000 leased most of its airline fleet putting a major burden on its cost structure. After becoming a successful competitor in the low-cost market, Canada 3000 began a major expansion campaign in an effort to compete with Canada's premier airline, Air Canada, and other rivals. The foundation of its expansion included the acquisitions of its charter rivals Royal Aviation Inc. for $84 million and CanJet Airlines for $7 million. Prior to the acquisitions, Royal Aviation had not seen a profit for two years and CanJet was most likely headed for bankruptcy. These acquisitions did provide additional routes and staff in Eastern Canada; however, the additional aircraft from the merger doubled Canada's 3000 fleet creating a fleet that was hodgepodge in nature leading to major increases in maintenance bills as well as additional lease obligations. As a result of the acquisitions, Canada 3000 veered away from its original business plan, as a discount carrier, to an airline offering different classes of service and frequent- flyer points to lure business travelers. This would be considered the cost structure of a premium-priced carrier, not that of a discount carrier.

Canada 3000 leased the majority of its aircraft. WestJet purchased the majority of its aircraft leasing only a small percentage. How does leasing affect the financial structure of a firm? Why would a firm decide to lease vs. purchase?

A lease agreement can be a capital lease or an operating lease. If it is a capital lease, it is included in the body of the balance sheet with the leased property being an asset and the lease obligation being a liability. An operating lease is disclosed only in the footnote of the balance sheet. Canada 3 000' s leased aircraft were operating leases and thus do not appear on the balance sheet potentially misleading analysts, creditors and investors about the true amount of financial leverage that Canada 3000 really had.

There are various reasons why a firm would decide to lease an asset instead of purchasing the asset. In the case of Canada 3000, it seems that the operating leases were a way to acquire the needed aircraft without using large amounts of capital. The firm would need capital, either debt or equity, to purchase the aircraft. Canada 3000 was already highly leveraged and most likely unable to borrow substantial amounts of additional capital. Although the leases did not increase the traditional measure of leverage for Canada 3000, they did create large fixed costs negatively impacting the firm's bottom-line and even its ability to stay solvent.

3. Compare the financial ratios for both WestJet and Canada 3000 in the areas of financial leverage and profitability.

WestJet' s and Canada 3 000' s financial ratios are very different. Looking at liquidity, leverage and profitability it is easy to see the financial strength of WestJet compared to Canada 3000.

View Image -

It is important to note that although Canada 3 000' s net income for 2001 was positive with an increase of approximately 100% over 2000 the number is misleading as well as the ratios based on number. The year-end for Canada 3000 was April 2001. The income number reflects Canada 3000 prior to the two acquisitions and 9/11. It is interesting that the firm went from such good financial performance to bankruptcy in a matter of seven months.

4. Presume you are an entrepreneur and are interested in starting a new airline. What are the major factors that you feel can make an airline successful. What factors make it difficult for any airline to be successful?

If we examine the airlines that have been consistently profitable such as Southwest Airlines, Morris Air and WestJet we see similarities. Some are:

* Have a well defined business plan and stick to it

* Low-cost provider

* Have niche markets

* Expand slowly and only when profitable

There are many factors that make it difficult for an airline to prosper. Some are:

* High fuel costs

* Volatility of demand

* Large fixed costs of aircraft

5. If you were the CFO of Canada 3000 before its demise, what would you have done differently in order to avoid bankruptcy?

An astute CFO may have been able to convenience the management team of Canada 3000 that it was about to make two obvious blunders. The first was its veering away from its original business plan as a discount carrier to a premium-priced carrier in order to compete with Air Canada in the fiercely competitive domestic market. The other was the misguided expansion. The acquisitions of Royal Aviation Inc. and CanJet were poor investment decisions. Neither airline was showing a profit nor are most mergers in the airline industry successful (out of 18 mergers in the US airline industry during the 1980s only one was successful).

The economy was also beginning to slow which usually has a negative impact on the airline industry and thus is a bad time for a company to expand and incur more debt. Unfortunately it would have taken a crystal ball to know that September 1 1 was just around the corner.

6. Why do you feel the management of Canada 3000 decided to purchase Royal Aviation Inc. and CanJet Airlines?

The fierce desire to expand and compete with Canada's largest airline, Air Canada, as well as WestJet. Purchasing the airlines would give Canada 3000 a stronger presence in Eastern Canada, more aircraft and additional airport slots. All of these factors would seem positive for an airline with a desire to expand. However, with any capital budgeting decision, cost of the investment is a major consideration. Management will frequently overpay for an acquisition which results in a dilution of shareholder wealth. In the case of Canada 3000 acquiring two failing airlines, it appears that shareholder wealth was diluted to zero.

7. What other Airlines have declared bankruptcy? Why do you feel a large percent of airlines are not profitable?

There are many casualties in the airline industry. Some firms that have declared bankruptcy or Chapter 1 1 protection are American Airlines, US Airways, United Airlines, Continental Airlines and Air Canada (see epilogue).

The airline industry is a very difficult industry in which to operate and prosper. The financial risk for most airlines is high. The industry is highly capital intensive and thus most airlines are highly leveraged. Many have both financial leverage (due to borrowing to purchase assets) and operating leverage (due to leasing assets), compounding the effects of leverage. High leverage increases interest costs and/or leasing costs thus impacting profitability not to mention viability.

The airline industry is also plagued with business risk, those risk associated with the business itself. A very large expense for airlines is fuel. With the cost of fuel very volatile and in recent years very high this impacts the ability of the airline to turn a profit as well. Demand is also volatile. When the economy is slow airline travel slows and so do airline revenues. It is detrimental for a firm to operate with high financial risk in an industry with a high degree of business risk. Most of the airlines that have prospered have developed and followed a comprehensive business plan emphasizing low-cost and niche markets and a financial model that focuses on low financial leverage.

EPILOGUE

Canada 3000 flew its' last flight in November of 2001 leaving behind Air Canada and WestJet flying the skies. In just over two years, Air Canada declared bankruptcy. The skies have been much brighter for WestJet. As Air Canada was declaring bankruptcy, WestJet posted its' 28th consecutive profitable quarter and was awarded Canada's Most Respected Corporation for 2003. In 2004, WestJet is expanding its operations with new routes into the United States, thus becoming an international air carrier.

AuthorAffiliation

Bernadette Martin, University of Alberta

Dorothée J. Feils, University of Alberta

Grace C. Allen, Western Carolina University

Subject: Airline industry; Risk management; Financial management; Case studies

Location: Canada

Company / organization: Name: WestJet Airlines Ltd; NAICS: 481111; Name: Canada 3000 Airlines Ltd; NAICS: 481111

Classification: 3100: Capital & debt management; 9172: Canada; 8350: Transportation & travel industry; 9130: Experimental/theoretical

Publication title: Journal of the International Academy for Case Studies

Volume: 11

Issue: 2

Source details: SPECIAL EDITION, INSTRUCTORS' NOTES

Pages: 73-78

Number of pages: 6

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 10784950

Source type: Reports

Language of publication: English

Document type: Business Case, Feature

Document feature: Tables

ProQuest document ID: 216292821

Document URL: http://search.proquest.com/docview/216292821?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-13

Database: ABI/INFORM Complete

Document 66 of 100

THE CASE OF 'FOR A FEW DOLLARS MORE'

Author: Holland, Rodger G; Moore, Tom C

ProQuest document link

Abstract:

The most obvious suspect in the highly publicized murder is the spouse, as is often the case. And the spouse appears to have the opportunity to commit the crime, and the means (a letter opener) is not an issue, but she has no apparent motive to commit the murder. A conviction is usually a function of means, motive, and opportunity. It takes an accountant to solve the case, convict the spouse, and implicate her most recent lover. [PUBLICATION ABSTRACT]

Full text:

Headnote

CASE DESCRIPTION

This case starts with a nasty divorce, but shifts to an apparently amicable ending with the husband agreeing to give his wife all of the joint assets. But he ends up murdered the day before he intends to sign the papers. With the wife set to receive all of the assets through the divorce, and since there are no children and no will to provide alternative beneficiaries, the question becomes who benefits by his death.

CASE SYNOPSIS

The most obvious suspect in the highly publicized murder is the spouse, as is often the case. And the spouse appears to have the opportunity to commit the crime, and the means (a letter opener) is not an issue, but she has no apparent motive to commit the murder. A conviction is usually a function of means, motive, and opportunity. It takes an accountant to solve the case, convict the spouse, and implicate her most recent lover.

INSTRUCTORS' NOTES

In the majority of states (such as Georgia), equitable division rules govern property transactions between spouses at times of divorce or death. In Georgia, for instance, if a husband and his wife bought Microsoft stock in 1980 for $2 and saw it grow to 1,000,000- if the husband died and left his share to the wife, his basis in the stock would be stepped up to $500,000. The wife would continue to have a $1 Basis for her half and would acquire the stepped up basis for the inherited share. If she sold the stock, she would have a gain (1,000,000 - 500,00 1)=499,999. She would pay 15% capital gains tax and owe $75,000 in taxes.

Community property states (California, La, Texas) have been granted a further tax "loophole" by the Code when dealing with inherited property from a spouse. In these states, if a spouse dies, the LIVING SPOUSE' s tax basis is also adjusted upward in addition to her deceased husbands. For instance, in the example above, the wife would have a full basis of 1,000,000 and could sell the stock and not have to pay any capital gain taxes. Thus, it is a great thing to be a California widow(er). From a tax point of view, a couple with appreciated portable assets may even consider moving to a community property state if one party becomes terminally ill.

In this case, if Anita obtained Edward's shares through gift, the $100,000 basis would continue, and she would have a large gain ($99,900,000) upon which she would have to pay taxes at some point. However, with his death there is no gain because of the increased basis. The savings will be $99,900,000 times the capital gains tax rate. Note that in all states there are still "financial incentives" to commit murder, but the incentives are magnified in states such as California.

AuthorAffiliation

Rodger G. Holland, Georgia College and State University

Tom C. Moore, Georgia College and State University

Subject: Divorce; Murders & murder attempts; Estate taxes; Case studies; Community property

Location: United States--US

Classification: 9190: United States; 4220: Estate planning; 9130: Experimental/theoretical

Publication title: Journal of the International Academy for Case Studies

Volume: 11

Issue: 2

Source details: SPECIAL EDITION, INSTRUCTORS' NOTES

Pages: 79-80

Number of pages: 2

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 10784950

Source type: Reports

Language of publication: English

Document type: Business Case, Feature

ProQuest document ID: 216309494

Document URL: http://search.proquest.com/docview/216309494?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-13

Database: ABI/INFORM Complete

Document 67 of 100

THE USE OF BUILDING MORATORIA TO CONTROL GROWTH IN RURAL COMMUNITIES

Author: Molloy, James L; Olson, Howard G

ProQuest document link

Abstract:

Today, many rapidly growing communities find that their infrastructure is not capable of keeping up with the pace of development. Imposing building moratoria gives communities time to plan without the pressure of impending growth, however their legality is often aggressively challenged. This case addresses the issue from a legal and public policy perspective and examines when, and under what circumstances, municipalities may legally employ this planning tool. [PUBLICATION ABSTRACT]

Full text:

Headnote

CASE DESCRIPTION

The primary subject matter of this case concerns Business Law and Real Estate. Secondary issues examined include issues commonly experienced by local governments and real estate developers. The case is appropriate for junior level. The case is designed to be taught in two to three class hours and is expected to require three to five hours of outside preparation by students.

CASE SYNOPSIS

Today, many rapidly growing communities find that their infrastructure is not capable of keeping up with the pace of development. Imposing building moratoria gives communities time to plan without the pressure of impending growth, however their legality is often aggressively challenged. This case addresses the issue from a legal and public policy perspective and examines when, and under what circumstances, municipalities may legally employ this planning tool.

INSTRUCTORS' NOTES

Case Overview

The Town of Pleasant Oaks faces a problem that many local governments must deal with as they encounter growth pressure from real estate developers. While the local government attempts to plan for its community's future, it may be flooded with requests from those who seek to develop land under the current, relatively lax, laws that in many instances encourage random, unplanned development. To prevent such a flurry of development activity, the local government may often be able to take advantage of a planning tool that will allow it some breathing room in its efforts to effectively plan for desired growth. This tool is often called an interim development control or an uncompensated development moratorium (hereinafter referred to as "moratorium").

TEACHING OBJECTIVES

The teaching objectives of this case are to provide students with a background for:

1 . Correctly identifying and appreciating the tension between local government planning and real estate developers' interest in growth

2. Demonstrating an understanding of the legal cases and a legal tool that may be used by local governments to temporarily delay development and provide for the opportunity to plan for growth

3. Interpreting, evaluating and analyzing the legal materials to determine if the moratorium may be used in this particular case

4. Recommending a solution to the local government that provides for orderly growth and development

QUESTIONS/ANSWERS

1. Does pleasant Oaks have a solid legal foundation for stopping all development, and would such action be considered a regulatory "taking", requiring compensation to the landowners being temporarily denied the right to develop their property?

The United States Supreme Court in Tahoe-Sierra Preservation Council, Inc. ? Tahoe Regional Planning Agency, 122 S Ct 1465 (2002) has recently approved of the use of moratoria, at least under certain circumstances. In this landmark case, the local planning organization imposed a 32-month moratorium on development in a specific geographical area under its authority, while it sought to create a comprehensive plan to provide for orderly and environmentally sound growth. The developers claim that the moratorium on development, ordained by the local government, constituted a taking of their property without compensation in contravention of the Constitution of the United States (Fifth and Fourteenth Amendments).

The Court analyzed this case by first noting the distinction between the physical taking of property by the government (compensable) and a regulatory taking of the property by the government (not necessarily compensable). The court stated in Tahoe at 1478-1480:

The text of the Fifth Amendment itself provides a basis for drawing a distinction between physical takings and regulatory takings. Its plain language requires the payment of compensation whenever the government acquires private property for a public purpose, whether the acquisition is the result of a condemnation proceeding or a physical appropriation. But the Constitution contains no comparable reference to regulations that prohibit a property owner from making certain uses of her private property.17 Our jurisprudence involving condemnations and physical takings is as old as the Republic and, for the most part, involves the straightforward application of per se rules. Our regulatory takings jurisprudence, in contrast, is of more recent vintage and is characterized by "essentially ad hoc, factual inquiries," Penn Central, 438 US, at 124, 57 L Ed 2d 631, 98 S Ct 2646, designed to allow "careful examination and weighing of all the relevant circumstances." Palazzolo, 533 US, at 636, 150 L Ed 2d 592, 121 S Ct 2448 (O'Connor, J., concurring).

When the government physically takes possession of an interest in property for some public purpose, it has a categorical duty to compensate the former owner, United States ? Pewee Coal Co., 341 US 114, 115, 95 L Ed 809, 71 S Ct 670 (1951), regardless of whether the interest that is taken constitutes an entire parcel or merely a part thereof. Thus, compensation is mandated when a leasehold is taken and the government occupies the property for its own purposes, even though that use is temporary. United States ? General Motors Corp., 323 US 373, 89 L Ed 31 1, 65 S Ct 357 (1945), United States ? Petty Motor Co., 327 US 372, 90 L Ed 729, 66 S Ct 596 (1946). Similarly, when the government appropriates part of a rooftop in order to provide cable TV access for apartment tenants, Lor etto ? Teleprompter Manhattan CATV Corp., 458 US 419, 73 L Ed 2d 868, 102 S Ct 3164 (1982); or when its planes use private airspace to approach a government airport, United States ? Causby, 328 US 256, 90 L Ed 1206, 66 S Ct 1062 (1946), it is required to pay for that share no matter how small. But a government regulation that merely prohibits landlords from evicting tenants unwilling to pay a higher rent, Block ? Hirsh, 256 US 135, 65 L Ed 865, 41 S Ct 458 (1921); that bans certain private uses of a portion of an owner' s property, Village of Euclid ? Ambler Realty Co., 272 US 365, 71 L Ed 303, 47 S Ct 114 (1926); Keystone Bituminous Coal Assn. ? DeBenedictis, 480 US 470, 94 L Ed 2d 472, 107 S Ct 1232 (1987); or that forbids the private use of certain airspace, Penn Central Transp. Co ? New York City, 438 US 104, 57 L Ed 2d 631, 98 S Ct 2646 (1978), does not constitute a categorical taking. "The first category of cases requires courts to apply a clear rule; the second necessarily entails complex factual assessments of the purposes and economic effects of government actions." Yee ? Escondido, 503 US 519, 523, 1 18 L Ed 2d 153, 1 12 S Ct 1522 (1992). See also Loretta, 458 US, at 440, 73 L Ed 2d 868, 102 S Ct 3164 Keystone, 480 US at 489, ? 18, 94 L Ed 2d 472, 107 S Ct 1232.

This longstanding distinction between acquisitions of property for public use, on the one hand, and regulations prohibiting private uses, on the other, makes it inappropriate to treat cases involving physical takings as controlling precedents for the evaluation of a claim that there has been a "regulatory taking," 18 and vice versa. For the same reason that we do not ask whether a physical appropriation advances a substantial government interest or whether it deprives the owner of all economically valuable use, we do not apply our precedent from the physical takings context to regulatory takings claims. Land-use regulations are ubiquitous and most of them impact property values in some tangential way - often in completely unanticipated ways. Treating them all as per se takings would transform government regulation into a luxury few governments could afford. By contrast, physical appropriations are relatively rare, easily identified, and usually represent a greater affront to individual property rights.19 "This case does not present the 'classi[c] taking' in which the government directly appropriates private property for its own use, "Eastern Enterprises ? Apfel, 524 US 498, 522, 141 L Ed 2d 451, 1 18 S Ct 2131 (1998); instead the interference with property rights "arises from some public program adjusting the benefits and burdens of economic life to promote the common good," Penn Central, 438 US, at 1 24, 57 L Ed 2d 63 1 , 98 S Ct 2646.

The Court then went on to indicate that while, Lucas ? South Carolina Coastal Council, 112 S Ct 2886 (1992), requires the local government to compensate landowners, where the regulation denies all economically beneficial or productive use of land, it does not follow that compensation is always required whenever a government imposes a moratorium on development. Again, in Tahoe at 1482-1483, the Court stated:

Similarly, our decision mLucas is not dispositive of the question presented. Although Lucas endorsed and applied a categorical rule, it was not the one that petitioners propose. Lucas purchased two residential lots in 1988 for $975,000. These lots were rendered "valueless" by a statute enacted two years later. The trial court found that a taking had occurred and ordered compensation of $1,232,387.50, representing the value of the fee simple estate, plus interest. As the statute read at the time of the trial, it affected a taking that " was unconditional and permanent." 505 US, at 1012, 120 L Ed 2d 798, 1 12 S Ct 2886. While the State's appeal was pending, the statute was amended to authorize exceptions that might have allowed Lucas to obtain a building permit. Despite the fact that the amendment gave the State Supreme Court the opportunity to dispose of the appeal on ripeness grounds, it resolved the merits of the permanent takings claim and reversed. Since "Lucas had no reason to proceed on a 'temporary taking' theory at trial," we decided the case on the permanent taking theory that both the trial court and the State Supreme Court had addressed Ibid.

The categorical rule that we applied in Lucas states that compensation is required when a regulation deprives an owner of "all economically beneficial uses" of his land. Id., at 1 0 1 9, 120 L Ed 2d 798, 1 12 S Ct 2886. Under that rule, a statute that "wholly eliminated the value" of Lucas' fee simple title clearly qualified as a taking. But our holding was limited to " the extraordinary circumstance when no productive or economically beneficial use of land is permitted." Id., at 1017, 120 L Ed 2d 798, 1 12 S Ct 2886. The emphasis on the word "no" in the text of the opinion was, in effect, reiterated in a footnote explaining that the categorical rule would not apply if the diminution in value were 95% instead of 100%. Id., at 1019, ? 8, 120 L Ed 2d 798, 1 12 S Ct 2886. 24 Anything less than a "complete elimination of value" or "a total loss," the Court acknowledged, would require the kind of analysis applied in Penn Central. Lucas, 505 US, at 1019-1020, ? 8, 120 L Ed 2d 798, 1 12 S Ct 2886.25

Instead, the Court in Tahoe at 1486-1487, suggested that:

Unlike the "extraordinary circumstance" in which the government deprives a property owner of all economic use, Lucas, 505 US, at 1017, 120 L Ed 2d 798, 1 12 S Ct 2886, moratoria like Ordinance 81-5 and Resolution 83-2 1 are used widely among land-use planners to preserve the status quo while formulating a more permanent development strategy. 32 In fact, the consensus in the planning community appears to be that moratoria, or "interim development controls" as they are often called, are an essential tool of successful development. 33 Yet even the weak version of petitioners' categorical rule would treat these interim measures as takings regardless of the good faith of the planners, the reasonable expectations of the landowners, or the actual impact of the moratorium on property values.34

The interest facilitating informed decision-making by regulatory agencies counsels against adopting a per se rule that would impose such severe costs on their deliberations . Otherwise, the financial constraints of compensating property owners during a moratorium may force officials to rush through the planning process or to abandon the practice altogether. To the extent that communities are forced to abandon using moratoria, landowners will have incentives to develop their property quickly before a comprehensive plan can be enacted, thereby fostering inefficient and ill-conceived growth.

The Court concluded in Tahoe at 1485, that "fairness and justice" will be best served by relying on the familiar Penn Central Transportation Co. ? City of New York, 98 S Ct 2646 (1978) approach when deciding cases like this, involving what is commonly referred to as "partial taking", rather than by attempting to craft a new categorical rule. In Penn Central at 2659, the Court stated:

In engaging in these essentially ad hoc, factual inquiries, the Court's decisions have identified several factors that have particular significance. The economic impact of the regulation on the claimant and, particularly the extent to which the regulation has interfered with distinct investment-backed expectations are, of course, relevant considerations. See Goldblatt ? Hempstead, supra, 369 U.S., at 594, 82 S Ct, at 990. So, too, is the character of the governmental action. A "taking" may more readily be found when the interference with property can be characterized as a physical invasion by government, see, e.g., United States ? Causby, 328 U.S. 256, 66 S Ct 1062, 90 L.Ed. 1206 (1946), than when interference arises from some public program adjusting the benefits and burdens of economic life to promote the common good.

Thus, the court gave the green light to local governments to use moratoria in their efforts to provide sensible and controlled growth; of course states may also have their own takings law. In Wisconsin, for example, Article I, Subsection 13 of the Wisconsin Constitution states, "the property of no person shall be taken for public use without just compensation thereof." Interpreting this provision in Buhler ? Racine County, 33 Wis 2d 137, 143, 146 NW 2d 403, 406 (1966), the Wisconsin Supreme Court stated, that to establish a regulatory taking the regulation must be one that, "practically or substantially renders the land useless for all reasonable purposes." Clearly, Wisconsin and Federal law are in harmony.

In the event that Pleasant Oaks does impose a temporary moratorium on development, what would the duration of the moratorium be, and is it necessary during the moratorium to develop a comprehensive land use plan, or is it sufficient to amend existing plans or ordinances?

While the Tahoe case (and perhaps state law) gives state and local government constitutional permission to use the uncompensated development moratorium tool, at least under certain circumstances, for a local government to enact such an ordinance, it must be either expressly or impliedly authorized by state law. For example, in Wisconsin, the use of moratoria is expressly provided for by Wis. Stats. Sect 62.23 (7) (da), "Interim zoning. The common council of any city which has not adopted a zoning ordinance may, without referring the matter to the plan commission, enact an interim-zoning ordinance to preserve existing uses while the comprehensive zoning plan is being prepared. Such ordinance may be enacted as is an ordinary ordinance but shall be effective for no longer than two years after its enactment." This express authority, however, is apparently only available when the local government is adopting a comprehensive zoning ordinance. What does this mean for the Town of Pleasant Oaks and other communities in Wisconsin? If the community is seeking to enact a moratorium before a comprehensive zoning ordinance is established, it has express statutory authority to adopt a moratorium, but it seeks to enact a moratorium after it has developed a comprehensive zoning plan, then this statute doesn't directly apply. Can the municipality use this statutory authority anyway? Perhaps the local government could rely on implied authority if express authority does not exist. For example, Wisconsin has given to local governments a general subdivision approval authority, Wis. Stats. Sec. 236.45. Can this general authority offer implied support for what the Town of Pleasant Oaks seeks to do? Are there any cases in Wisconsin or other states that may aid them in deciding whether express or implied authority exists to aid this local government in its endeavors? For example, see Lake Bluff Housing Part, ? South Milwaukee, 1997 Wis 2d 157, 540 NW 2d 189 (1995). How would other states handle this situation?

Given that the sewer plant is at or near capacity, is there sufficient cause and legal basis to deny "any new development resulting in additional load to an already overloaded sewer?" Is it mandatory or reasonable that a community exceed the capacity of its infrastructure if the development may endanger the health and welfare of its citizens?

Interestingly, the law in Wisconsin is obviously unsettled on whether or not authority exists for the Town of Pleasant Oaks, or other communities, to enact a moratorium ordinance in this case. Perhaps, the local government's reasons for enacting the ordinance, as set out in the facts of this case, might be persuasive should this matter be brought to the attention of the courts. Obviously, the Town would want to consider their planning needs, anticipate possible threats to public health or safety, consider the consequences of development if the moratorium weren't enacted, determine the shortage of or the overburdening of public facilities as a result of development, provide for adequate public notice and hearings on the ordinance, and limit the scope and duration of the ordinance as much as possible.

The issues presented here are universal in nature. With some modifications, this case can be used to provide insight and instruction on the law to students in Real Estate/Business Law in any jurisdiction.

AuthorAffiliation

James L. Molloy, University of Wisconsin- Whitewater

Howard G. Olson, University of Wisconsin- Whitewater

Subject: Community development; Moratoriums; Rural areas; Area planning & development; Public policy; Case studies

Location: United States--US

Classification: 4300: Law; 9190: United States; 1200: Social policy; 9130: Experimental/theoretical

Publication title: Journal of the International Academy for Case Studies

Volume: 11

Issue: 2

Source details: SPECIAL EDITION, INSTRUCTORS' NOTES

Pages: 81-87

Number of pages: 7

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 10784950

Source type: Reports

Language of publication: English

Document type: Business Case, Feature

ProQuest document ID: 216298127

Document URL: http://search.proquest.com/docview/216298127?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-13

Database: ABI/INFORM Complete

Document 68 of 100

MUTUAL FUNDS' BEFORE- AND AFTER-TAX RETURNS: THE CASE OF TAX CLIENTELE

Author: Boes, Richard; Frischmann, Peter J; Davidson, Abby

ProQuest document link

Abstract:

This case introduces students to the tax issues related to a major player in the investment and retirement savings market-mutual funds. It also emphasizes the importance of considering after-tax rates of return in the investment decision. The case examines the interplay between tax rules and mutual fund rates of return by comparing pre- and post-tax rates of return for eleven common mutual funds over a two-year period, 1999 - 2000, which includes both bull and bear markets. The concept of tax clientele is introduced, for without a specific clientele, meaningful after-tax rates of return cannot be computed. Furthermore, basic differences in the taxation of capital gains and ordinary income as well as basic differences in the tax consequences of holding funds versus individual stock portfolios are examined. After completing this case students should be able to (1) calculate pre- and post-tax mutual fund returns; (2) rank funds based on a tax client's tax rates and after-tax returns; (3) understand the long-term effect of taxes on mutual funds returns; (4) develop strategies to maximize the investor's after-tax return; and (5) identify characteristics of tax-efficient funds. The case is appropriate for assignment in undergraduate accounting and finance classes as well as for an exercise in graduate classes studying tax strategy. Several possible teaching approaches can be used to present this case and to extend the basic requirements. In its simplest form, by covering just the basic requirements, the case is an introduction to mutual fund taxation and mutual funds in general. It also serves as an exercise to enhance spreadsheet skills. In a more advanced setting, the basic requirements in the case can be used to motivate class discussion of the conceptual issues related to tax clientele and the importance of comparing after-tax returns in investment choice. [PUBLICATION ABSTRACT]

Full text:

Headnote

CASE DESCRIPTION

The primary subject matter of this case concerns the taxation of mutual funds. Secondary issues examined include the concept of tax clientele, basic differences in the taxation of capital gains and ordinary income, basic differences in the tax consequences of holding mutual funds versus individual stock portfolios, and the characteristics of tax-efficient mutual funds. The case has a difficulty level of four, most appropriate for senior level students. It could also be used at the advanced junior level or beginning graduate level. The case is designed to be taught in one class period (approximately 75 minutes) and is expected to require 3-5 hours of outside preparation by students depending upon whether the advanced requirements are assigned.

CASE SYNOPSIS

This case introduces students to the tax issues related to a major player in the investment and retirement savings market-mutual funds. It also emphasizes the importance of considering after-tax rates of return in the investment decision. The case examines the interplay between tax rules and mutual fund rates of return by comparing pre- and post-tax rates of return for eleven common mutual funds over a two-year period, 1999 - 2000, which includes both bull and bear markets. The concept of tax clientele is introduced, for without a specific clientele, meaningful after-tax rates of return cannot be computed. Furthermore, basic differences in the taxation of capital gains and ordinary income as well as basic differences in the tax consequences of holding funds versus individual stock portfolios are examined. After completing this case students should be able to (1) calculate pre- and post-tax mutual fund returns; (2) rank funds based on a tax client's tax rates and after-tax returns; (3) understand the long-term effect of taxes on mutual funds returns; (4) develop strategies to maximize the investor's after-tax return; and (5) identify characteristics of tax-efficient funds.

The case is appropriate for assignment in undergraduate accounting and finance classes as well as for an exercise in graduate classes studying tax strategy. Several possible teaching approaches can be used to present this case and to extend the basic requirements. In its simplest form, by covering just the basic requirements, the case is an introduction to mutual fund taxation and mutual funds in general. It also serves as an exercise to enhance spreadsheet skills. In a more advanced setting, the basic requirements in the case can be used to motivate class discussion of the conceptual issues related to tax clientele and the importance of comparing after-tax returns in investment choice.

INSTRUCTORS' NOTES

The purpose of the case is twofold. First, it introduces students to the tax issues related to a major player in the investment and retirement savings market, mutual funds. Second, it emphasizes the importance of considering after-tax rates of return in the investment decision. The SEC has recognized the importance of this second objective and has recently required that mutual fund prospectuses report the impact of taxes and sale charges on fund returns. Prior to these new rules, most funds reported their performance results without taking taxes into account. Unfortunately, these new disclosures will generally appear only in the fund prospectus. The new disclosures are not required to appear in advertising unless the fund is presented as a tax-efficient fund. Additionally, the new disclosures can be confusing since the new rules require that the fund prospectus include not one, but two standardized measures of after-tax performance. The new measures also assume that gains are taxed at maximum federal rates. (Wall Street Journal, April 12, 2002, Cl).

Even with this disclosure requirement, accounting students (or financial advisers) need to know how to calculate a fund's after-tax rate of return for the following reasons: (1) many investors are unlikely to carefully read a fund prospectus, (2) not all taxpayers are at the top marginal tax rates which the new disclosures assume, and (3) not all investors have the same goals or objectives. Thus, advisers need to be able to help prospective clients whatever their financial goals may be.

The case is appropriate for assignment in undergraduate accounting and finance classes as well as for an exercise in graduate classes studying tax strategy. Several possible teaching approaches can be used to present this case and to extend the basic requirements. In its simplest form, by covering just the basic requirements, the case is an introduction to mutual fund taxation and mutual funds in general. It also serves as an exercise to enhance spreadsheet skills. In a more advanced setting, the basic requirements in the case can be used to motivate class discussion of the conceptual issues related to tax clientele and the importance of comparing after-tax returns in investment choice. Instructors may wish to assign the relevant chapters of texts such as Scholes et. al. (2002) or Stern (2002) as background reading. Used in this way, the students are asked to conduct the basic analysis prior to the class session. The instructor can then lead a one class period discussion of the case, including a detailed discussion of tax clientele and after-tax returns. With the more advanced readings noted above, discussion could include non-tax costs, risk, and other fees and expenses. Especially in the graduate setting, consideration should be given to more thorough study of non-tax issues such as risk, loads, 12b-l fees, administration expenses, fund portfolio composition, and liquidation strategies for mutual fund shares. Good sources to assign students for additional reading on these and other case related issues include the following: Chitwood (1998), Franecki (1998), Fried (1998), and Nave (1993).

An alternative approach for covering the material in the case employs "Team Learning" techniques (Johnson et al. 1991 and Warfield 1997). If small groups are already being employed within the course, the case materials can be used effectively as a "mini-test" in which students are graded individually and in groups on case requirements. On an individual basis and prior to class, students can be assigned the basic requirements. During the class period, groups of 4-5 students can be formed and assigned additional (advanced) case requirements to work through during the class period. A lively discussion should ensue as student groups present and are asked to defend their solutions. The instructor can help guide the discussion and introduce the more advanced concepts as the discussion unfolds.

STUDENT REQUIREMENTS

Basic requirements

1. From the data in Exhibit 1, calculate and rank the 1999 and 2000 pre-tax returns for each fund. The return is calculated by dividing the total investment return, which includes change in net asset value (NAV), dividends, and gains distributed to shareholders, by the NAV of the fund at the beginning of the stated fiscal year. Consider preparing a spreadsheet for this purpose. For computations, assume all dividends are paid in cash at year-end.

The calculation of pre-tax returns appears in Exhibit 2. It should be noted to the students that the assumption of all dividends being paid at year-end is a simplifying one. To be technically correct, dividends received at times other than year-end should be treated as immediately reinvested and compounded at the fund' s rate of return. Exact dates of dividend distributions can be found in publications such as the Mergent Dividend Record.

A more advanced class could be asked to recompute selected returns on both a before- and after-tax basis (requirement 3 below) by identifying the exact date of dividend receipt and reinvesting the dividends on that date, thereby compounding them at the fund's rate of return from the dividend payment date forward. This computation requires gathering dividend amounts and fund NAV data on dividend distribution dates. An assumption also needs to be made regarding the timing of tax payments. Support exists for taxing dividends at one of three points: (1) upon receipt, if the taxpayer is making tax payments through salary withholding; (2) on the due date of quarterly estimates, if the taxpayer is making estimated payments; and (3) at the end of the year, if the taxpayer's dividends are not a significant portion of income, or the taxpayer is otherwise protected from underpayment penalties.

2. Can total distributions be used to predict pre-tax rates of return? Perform a regression analysis for 1999 using total distributions as the independent variable and pre-tax rates of return as the dependent variable. Is there correlation between these variables? Are rankings based on pre-tax rates of return significantly different from your client's ranking based solely on distributions made?

The regression data are shown in Figure 1. The regression is significant (p = .058), but as a practical predictor of pre-tax returns, distributions are weak. This is shown by an adjusted R^sup 2^ = .27 and the residual plot.

3. For each of the years 1999 and 2000, calculate the current year after-tax return (on a pre-liquidation basis). This means that you assume your client holds and does not sell the fund shares at year-end. The taxpayer is taxed on all realized distributions, which are broken into ordinary income (dividend distributions and short-term capital gains), as well as long-term capital gains. Make your after-tax return calculations under the following two independent circumstances:

a. Assuming the client is in the 40% tax bracket for ordinary income.

b. Assuming the fund is held in a Roth IRA or a tax-exempt pension fund. (Deposits to a Roth IRA are made with after-tax dollars. Returns from a Roth IRA are tax exempt (IRC~408A)).

c. What are the implications of the above results for both fund managers and

investors in circumstances (a) and (b) above?

The purpose of question 3 is twofold. First, it teaches students how to compute after-tax returns. Second, it introduces the concept of tax clientele by asking students to compute after-tax returns for both the highest tax rate taxpayer and the tax exempt Roth IRA or pension fund. Students should note that taxes only make a difference in case (a), the taxable investor. Computation of rates of return for both cases appears in Exhibit 2.

The numerical results in this question suggest the formation of tax clientele for both fund managers and investors. All else equal, high tax funds should attract tax-exempt investors such as Roth IRA holders, pension plans, and tax-exempt organizations (universities, churches, etc.). Low tax funds should appeal more to fully taxable investors such as wealthy individuals. Fund managers should take note of their potential clientele in their promotional activities. For example, in 1999, a taxable investor in the MSDW Capital Growth B Fund saw 34.38 percent of the fund's return eroded by taxes, moving it down three ranks from seventh to tenth in pre- to post- tax return. On the other hand, the tax-exempt investor was unaffected. Numerous other examples such as this can be found in the data.

To enrich the case experience and reduce opportunity for collusion among students, the instructor might consider assigning different tax rates and/or different mutual funds to students. Assigning different tax rates not only reduces opportunity for students to copy answers from each other, but adds a flavor of tax policy to the assignment. This is very relevant in light of the latest tax law giving preferential treatment to dividends over wage and salary income. Assigning different mutual funds adds an additional level of complexity to the case, but if the funds are those of interest to the student, the increase in reality could be worthwhile.

4. Can pre-tax rates of return be used to predict after-tax rates of return? Perform a regression analysis for 1999 using pre-tax rates of return as the independent variable and after-tax rates of return as the dependent variable. Is there correlation between these variables?

The regression data are shown in Figure 2. The regression is highly significant and adjusted R2 for the pre-and post-tax rates of return is .92 so there is high correlation between pre-and post-tax rates of return as the graph of the residuals also demonstrates.

5. For each fund year, using a 40% tax rate for ordinary income and a 20% tax rate for capital gains, calculate both the amount and the percentage of return lost to taxes. For example, assume that fund XYZ has a 24 percent pre-tax return. You calculate that the amount of the return lost to taxes is 3 percent, leaving an after-tax return of 21 percent. Of the total return, 3/24 or 12.5 percent of the return is lost to taxes.

Another way to look at the impact of taxes is to analyze what is lost to taxes, both in terms of the percentage of return lost to taxes and the amount of return lost to taxes. These calculations also appear in Exhibit 2. In performing the analysis, one must be mindful not to fall into the trap of rating the fund with the smallest loss to tax as the best fund. For example, the Vanguard Index 500 Fund has the least loss to taxes in the two years but the Fidelity Retirement Growth Fund has a larger loss to taxes, and a higher after-tax return than the Vanguard Index 500 Fund for these years. The objective is to maximize after-tax returns, not minimize taxes.

However, tax losses are helpful as indicators to understanding management's track record with respect to tax status, but not necessarily overall return. Note also that analyzing the amount of return lost to taxes, as opposed to the percentage of return lost to taxes is particularly helpful for bad years such as 2000 when the denominator return is so small that percentage change can be difficult to interpret. For example, to disclose that Fidelity Retirement Growth lost a return of 4.77% to taxes is much more meaningful than the disclosure that the fund lost 352% of its return to taxes. Likewise, stating that MSDW Capital Growth B lost a return of 4.28% to tax is more meaningful than the statement that the fund lost 820% of its return to taxes.

6. For each year, rank the funds in the following three ways: (1) by pre-tax return, (2) by after-tax return (using the calculations for a 40% tax rate for ordinary income and a 20% tax rate for capital gains), and (3) by return lost to taxes (also using the 40%/20% ordinary/capital gains tax rates). Comment on your rankings. Are rankings based on pre-tax rates of return significantly different from rankings based on after-tax rates of return?

Ultimately, it is the after-tax return that is the most important of the three rankings appearing in Exhibit 2. Comparing the before-tax and after-tax returns shows numerous ranking shifts, most of which are reversals of two funds with similar pre-tax returns. The inclusion of more funds with similar pre-tax returns would make these ranking changes even more striking. As noted above, for the tax-exempt investor, only the pre-tax rankings have meaning, since these funds all sell at NAV (therefore, no implicit tax effects are impounded in the price) and the tax-exempt investor, obviously, will never be impacted by the taxability of the distributions. Finally, as discussed in (5) above, ranking funds by return lost to tax without also considering after-tax returns is akin to the mistake of making minimizing taxes rather than maximizing after-tax return a primary planning goal.

All else equal except taxes, funds that do well minimizing taxes would be preferred over those that do not do well minimizing taxes. Therefore, analyzing return lost to tax is important. For example, MSDW Capital Growth B shares lost a return amount of 9.64 percent to taxes in 1 999 (approximately three quarters of the stock market's long run average pre-tax yield). Over the 22 fund-years in Exhibit 2, 6 fund-years lost a return amount of greater than four percent to taxes. A tax savvy investor would need an explanation for such performance. On the other hand, however, numerous examples exist in this small sample that indicate the fallacy of only minimizing taxes. In fact, selecting the top five after-tax return funds in each year, 7 of the 10 fund-years have the amount of returns lost to taxes above three percent.

7. Using your data from part 6, group the mutual funds into pairs for each year based on their pre-tax rates of return. That is, take the mutual fund with the highest pre-tax rate of return and pair it with the mutual fund with the second highest pre-tax rate of return. Group the mutual fund with third highest pre-tax rate of return with the fund having the fourth highest pre-tax rate of return and so forth. Do not include the Vanguard Index 500 in the pairs. Now compare the pre-tax rate of return to the aftertax rate of return for each of these pairs. Comment on your findings.

Exhibit 3 shows the paired rankings. In half of the cases, there is a reversal or change in the rankings of the fund pairs. For example, in 1999, MSDW American Opportunities B (which had the highest pre-tax rate of return) was paired with Growth Fund of America (which had the second highest pre-tax rate of return). When after-tax rates of return were examined, these funds had reversed position; that is, Growth Fund of America had the highest after-tax rate of return while MSDW American Opportunities B had the second highest after-tax rate of return. The data again point out the importance of calculating aftertax rates of return for taxable investments rather than relying on pre-tax rates of returns for investment decisions.

Advanced requirements

8. Over a long period of time, efforts to minimize taxes can provide a handsome payoff. Consider a $100,000 investment and a 10-year decision horizon. What is the effect of taxes on this investment if it has a 10 percent pre-tax return and a 7 percent after-tax return? (Note that many of the mutual funds in Exhibit 1 (11 of 22 fund-years) lose more than a 3 percent per-year return to taxes.)

Over a 10-year horizon, a $100,000 investment yielding 10 percent will accumulate to $259,374, while the same principal yielding 7 percent will accumulate to $196,715, leaving a difference of $62,659. The formula for the accumulation is: i(l +r)^sup n^ where i is the initial investment, r is the rate of return, and ? is the time period. This is an example of the effect of a 30 percent annual tax rate on an investment. (At current ordinary income tax rates and capital gain tax rates, a combined rate of 30 percent is not unusual.) In discussion, one might think of how this difference in final accumulation (over 24 percent) might impact the well being of a retiree. A concrete example such as this helps solidify the importance of the impact of taxation on mutual fund returns.

9. Many investors prefer to invest individually in stocks because they can choose when to sell their shares based on their personal financial position and the current state of the market. Mutual fund investors, however, are subject to the decisions of the fund managers regarding the fund's sale and/or purchase of individual stocks. As a result, many funds have large unrealized stock appreciation in their portfolios. (This could be seen by an increase in NAV from the beginning to the end of the year. Note the change in NAV for the funds in Exhibit 1.) How might this unrealized appreciation impact the following clientele:

a. Old shareholders?

b. Future shareholders?

c. Portfolio managers?

Unrealized stock appreciation in fund holdings represents potential future tax liability for fund shareholders. Tax-sensitive shareholders, however, value a fund that is not constantly realizing its gain and passing the taxable distributions through to the shareholders. Consequently, existing shareholders (part a) would prefer a fund that holds the appreciation indefinitely so that the unrealized gains are never realized for tax purposes (unless the investor chooses to sell the fund shares). If the fund follows this strategy, a large unrealized gain "overhang" will develop in the fund's portfolio. Investors who have been in the fund since the overhang's inception would prefer that it never be reduced.

New shareholders (part b) will be looking for funds that do not have large unrealized gains "overhang." For example, if the fund realizes gains early in the year, it will be passed through to shareholders at the date of record (usually late in the year). Any shareholder on the date of record, regardless of whether they were owners of the fund when the overhangs were realized or recognized, will be subject to a taxable gain on the distribution. By targeting funds with few unrealized gains, the investor is limiting his/her potential tax exposure from reductions in the overhang.

Fund managers (part c) must strike a balance between distributing gains and keeping a reasonable overhang. For example, if fund managers wish to attract tax-conscious investors, they may attempt to keep the overhang as low as possible to appeal to these new investors. On the other hand, funds that continually distribute large gains to investors will develop reputations of being high-tax funds, which may discourage new tax-conscious investors. Often, the fund description and type will inform investors of the fund manager's strategy.

10. Recently, some mutual funds have advertised that they are managed in a way to minimize their investors' tax liabilities. What factors would you use to try to identify mutual funds that are more "tax-managed" than others?

Several factors can be used to identify a mutual fund's tax efficiency. Historical after-tax return data can be indicative of future returns; however, it is possible that a fund may change its strategy and distribute more gains than in previous years. One of the most common measures of tax-management is the turnover rate, which measures the fund's sales volume, or how many times the fund has turned over its portfolio. Turnover rate alone, however, may be misleading since a low turnover rate coupled with a high taxable distribution may result if stocks with large unrealized gains have been sold, such as Coke or Microsoft (Franecki 1998). Turnover rate may also be misleading if taxable gains are a result of dividend distributions or short-term capital gain taxed at ordinary income rates. Investors should investigate what types of capital gain and dividend distributions the funds distribute, rather than relying solely on the turnover rate (Fried 1998). Reading about the fund manager's strategy or the fund's objectives may indicate future fund behavior.

All else equal, investors should remain in funds that are closed to new investors. The managers of these funds may focus on minimizing gain distributions to existing shareholders since they have no motivation to attract new investors. New investors might look for funds with a low capital gain overhang, so as to limit the potential for large gain distributions.

Funds that have recently switched to new fund managers also may leave investors with large gains. New fund managers tend to re-design the fund portfolio by selling the old holdings and buying new ones to reflect their own strategies. This may lead to large gain realizations being distributed to shareholders without regard for the shareholder tax positions or a possible overhang strategy of the previous fund manager (Dreman 1998).

Fund investors should also be wary of "tax-managed" fund imposters. A bullish market coupled with new investors continually joining the imposter funds, thereby growing the asset base, allows them to spread the gain distributions over many new investors, diluting the tax impact on old investors (Franecki 1998). Instead, investors should look for tax-managed funds that use tax-efficient strategies. Many of these funds buy and hold securities to create gain overhangs, buy securities paying little or no dividends, and attempt to offset losses with gains (Franecki 1998). Investors can often discover this strategy through reading the fund' s prospectus and discussions of the fund's management strategy.

Finally, investors should look for naturally tax-managed funds. Growth stocks generally have much lower dividend yields (taxed as ordinary income until the 2003 Tax Act), and more capital appreciation (taxed as capital gain). Value stocks generally have a higher component of return from dividend income rather than capital gain (Siegel 1997). Index funds are naturally tax efficient. These funds rarely turnover their portfolio unless the underlying index undergoes a change. This results in infrequent change, large overhangs, and fewer gain distributions to shareholders (Chitwood 1998).

11. In 2000, the market dramatically fell impacting all mutual fund portfolios. How might mutual investors end up paying a huge tax bill while experiencing a decline in the NAV of their fund investment? Do you see any evidence of this in your calculation of 2000 before- and after-tax returns for the mutual funds in Exhibit 1? (HINT: How might investor redemptions caused by poor fund performance force a mutual fund to increase its taxable income and therefore pass larger dividends on to its remaining shareholders?)

This requirement begins with an understanding of the Investment Company Act of 1940, which requires (for tax exemption) a mutual fund to distribute at least 90% of its taxable income, net capital gains, and net tax-exempt income to shareholders by the time it files its federal income tax return. A mutual fund is thus allowed to pass through to investors the fund's income and capital gains without income tax at the fund level. Calendar year mutual funds must distribute by December 3 1 at least 98% of any tax-basis capital gains earned through October 31, and tax-basis ordinary income earned through December 31 to avoid a 4% excise tax (Nave 1993). These requirements provide the explanation for fund distributions of realized capital gains and dividends.

Mutual funds can be redeemed at any time, at their current NAV, through the same channels in which they are purchased. The mutual fund investor does not need to rely upon another investor to purchase his/her shares. Even if the fund is experiencing a bad year or a bear market, the fund is required to cash out their investors who choose to redeem their shares. If the fund does not have a sufficient cash base to redeem the shares, it must sell some of its holdings to generate enough cash to pay the redemptions. Consequently, the fund's market price per share may decline, resulting in a decrease in return on investment for existing shareholders, while at the same time, the fund must sell its appreciated holdings which will result in realized taxable income. This realized taxable income, per the 1 940 Act distribution requirements, must be distributed to existing shareholders resulting in a potential capital gains tax liability to them. For example, the Artisan Small Capital Fund finished its 1998 third quarter with a return of -23.3%, yet was forced to distribute capital gains equal to 9% of the fund's NAV (Damato 1998). Once its shareholders realized the fund was not performing well, some shareholders quickly redeemed their shares. This forced the fund to sell some of its holdings and distribute the gains to its existing shareholders.

One potential advantage of a market decline is selling funds that are not performing well, and incurring losses to offset capital gains for the year. Mutual funds can only offset losses on security sales with gains, but not pass excess losses on to shareholders. Thus, net capital losses (and the resulting decrease in NAV) can only be recognized when shareholders sell their shares. Shareholders should be wary when contemplating selling shares to recognize a capital loss, being certain the basis of their shares sold is higher than the current market price.

12. Obtain an article discussing the requirement for disclosures of mutual fund after-tax returns. One likely source for this information is the CCH Internet Tax Research Network, which is available at most university libraries. Comment on the strengths and weaknesses associated with this requirement.

This requirement is self explanatory. At a minimum, students should identify and discuss (1) the importance of requiring after-tax numbers and (2) the difficulty of getting the proper after-tax numbers for each unique client. Consideration might also be given to having the students compute after-tax return exactly as defined by the Securities and Exchange Commission.

CONCLUSIONS

This case examines the interplay between tax rules and investment returns in a current and increasingly popular setting, mutual funds. It exposes students to some of the nuances of mutual fund investing, comparing pre- and post-tax rates of return for common mutual funds for 1999 - 2000. The concept of tax clientele is introduced, for without a specific clientele, meaningful aftertax rates of return cannot be computed. Furthermore, basic differences in the taxation of capital gains and ordinary income as well as basic differences in the tax consequences of holding funds versus individual stock portfolios are examined. Finally, the impact of non-tax costs on rates of return can be introduced. In short, the case allows students the opportunity to develop tax accounting and financial analysis tools and directly apply them to a relevant setting.

View Image -   EXHIBIT 1  Selected Mutual Funds
View Image -   EXHIBIT 2  Financial Results
View Image -   EXHIBIT 3  Financial Results-Paired Funds
View Image -   FIGURE 1  Total Distributions Vs. Pre-Tho Return
View Image -   FIGURE 2  Pre-Tax Return Vs. Post-Tax Return
References

REFERENCES

AICPA. (1976). Code of professional ethics. New York, New York: AICPA.

Baumol, William, et al. (1990). The economics of mutual fund markets: Competition versus regulation. Norwell, Massachusetts: Kluwer Academic Publishers.

Brooker, Katrina. (1998). The many new faces of mutual funds. Fortune, July 6.

Chitwood, Patrick. (1998). After-tax mutual fund returns. Journal of Accountancy, June, 83-85.

CDA/Wiesenberger. (2000). Wiesenberger mutual funds update. Rockville, MD: CDA Investment Technologies.

Damato, Karen. (1998). Market turmoil slams fund investors; stock funds plunge, bond funds gain." The Wall Street Journal, October 5.

Dreman, D. (1998). Two costly mistakes. Forbes, April 20.

Franecki, David. (1998). Pocket protectors. Barron's, April 6.

Fried, Carla. (1998). Beat back fund taxes. Money, January, 88-94.

IRS. (1998). Federal tax guide. IRS.

IRS. (1997). Mutual fund distributions: Sales, exchanges, and redemptions, publication 564. IRS.

Johnson, D. W., Roger T. Johnson and Karl A. Smith. (1991). Active learning: Cooperation in the college classroom. Edina, MN: Interaction Book Company.

Kahn, Virginia Munger. (1996). All reward, no risk. Financial World, June 17.

Mergent. (2001). Mer gent dividend record. New York: Mergent FIS.

Nave, V. (1993). Mutual funds: It's time for better reporting. Journal of Accountancy, July.

Scholes, M.S., MA. Wolfson, M. Erickson, E.L. Maydew, and T. Shevlin. (2002). Taxes and business strategy: A planning approach. Englewood Cliffs: Prentice Hall.

Siegel, H. (1997). Creating tax-efficient investment portfolios within a framework of strategic asset allocation. The CPA Journal, February, 68-70.

Smith, David. (1998). Be specific: Calculate your gains carefully. Management Accounting, March.

Stern, J. (2002). Tax concepts and analysis. Bloomington, Indiana: Baugh Enterprises.

U.S. Securities and Exchange Commission. (1994). Invest wisely: An introduction to mutual funds. Washington D.C.

Warfield, T.D. (1997). Team learning in intermediate financial accounting, in D. Kieso and J.J. Weygandt, Intermediate accounting (9th Edition), Instructor's manual. New York: John Wiley & Son.

AuthorAffiliation

Richard Boes, Idaho State University

Peter J. Frischmann, Idaho State University

Abby Davidson, University of Denver

Subject: Mutual funds; Rates of return; Investment plans; Tax returns; Case studies

Location: United States--US

Classification: 3400: Investment analysis & personal finance; 9190: United States; 4230: Personal taxation; 9130: Experimental/theoretical

Publication title: Journal of the International Academy for Case Studies

Volume: 11

Issue: 2

Source details: SPECIAL EDITION, INSTRUCTORS' NOTES

Pages: 89-106

Number of pages: 18

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 10784950

Source type: Reports

Language of publication: English

Document type: Business Case, Feature

Document feature: References Tables Graphs

ProQuest document ID: 216304377

Document URL: http://search.proquest.com/docview/216304377?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-13

Database: ABI/INFORM Complete

Document 69 of 100

MCDOLLARS MOVES TO MOTHER ROOSHKA

Author: Barkacs, Craig B; Schneider, Gary P; DeWeese, Nicholas M; Puca, Zachary G

ProQuest document link

Abstract:

This case takes place in fictional foreign nation of Rooshka, which for purposes of this case will be regarded as a former Soviet republic. One may properly infer that the fictitious Rooshka strongly resembles Russia, but Russia specifically is not used in order to avoid stereotyping real people and to avoid potential mistakes regarding Russian culture. Thus, while Rooshkan culture is intended bear some similarilty to Russian culture (and in fact may be portrayed, for purposes of this exercise, as what some may regard - fairly or not - as stereotypical Russian culture), Rooshkan culture nevertheless exists exclusively within the confines of this exercise.

Full text:

Headnote

CASE DESCRIPTION

The purpose of this case is to provide an international negotiation exercise, derived from a specific setting adapted from a real situation, that tests the ability of students to overcome narrow thinking and cultural obstacles and structure an integrative and mutually beneficial agreement. The case is appropriate for junior or senior undergraduate students or first year graduate students, depending upon the depth with which the instructor wishes to explore the case and the instructor 's comfort level with the issues included in the case. The negotiation exercise is designed to take about two hours (including the debrief, although more time may be spent on it. The case requires that students devote approximately one hour to preparation of the case, but this time can be spent outside class if necessary.

CASE SYNOPSIS

This case is based in a very general way on the circumstances surrounding McDonalds efforts to begin operations in the former Soviet Union.

This negotiation exercise is set in the fictitious nation of Rooshka. Rooshka certainly resembles Russia, but the use of the country 's name directly in the case is avoided to reduce student tendencies to stereotyping real people and to avoid potential errors introduced by students who have knowledge of Russian culture. Thus, Rooshkan culture is intended bear some similarity to Russian culture (and in fact may be portrayed, for purposes of this exercise, as what some may regard as stereotypical Russian culture -fairly or not - on steroids!), but Rooshkan culture can only be truly explained by the materials in this exercise.

The negotiation helps students learn to negotiate in a more integrative fashion. Because the exercise is not scored quantitatively based on outcomes, the situation can lead to the use of creative collaboration in an unexpected venue. The Cohen quote above illustrates a common perception of Cold War relations with Russia before the fall of the Soviet Union. The marriage of McDollars, which is the literal embodiment of capitalism, to a struggling post-communist state seems counterintuitive by its very nature. The odd-couple dynamic in this negotiation exercise, however, actually creates possibilities that can be beneficial to both parties. In the case of McDonalds, these possibilities were beneficial to both parties. Thus, this negotiation puts students in an adversarial mind set, which they must work beyond to reap the collective benefits of an agreement. We hope that the students will be drawn toward this understanding through analyses of their own best alternative to a negotiated agreement (BATNA) because both sides lose if the parties fail to reach an agreement.

In addition to testing students' understanding of BATNAs, the McDollars negotiation challenges students to decide between two drastic extremes. On the one hand, they will be tempted by profit motives and corporate advancement. On the other, they have the chance to promote social welfare among an impoverished people. The universal tension between public good and private gain is played out at both the individual level and the broader societal level in this negotiation exercise, given the situational conflict between communism and capitalism, collectivism and individualism, and every other difference between Soviet and U.S. culture. This case is built on a bargaining position template developed by Barkacs and Barkacs (2004).

ROLE FOR FRENCHY FRYE, FOUNDER AND SENIOR CHAIRPERSON OF MCDOLLARS ROOSHKA

This case takes place in fictional foreign nation of Rooshka, which for purposes of this case will be regarded as a former Soviet republic. One may properly infer that the fictitious Rooshka strongly resembles Russia, but Russia specifically is not used in order to avoid stereotyping real people and to avoid potential mistakes regarding Russian culture. Thus, while Rooshkan culture is intended bear some similarilty to Russian culture (and in fact may be portrayed, for purposes of this exercise, as what some may regard - fairly or not - as stereotypical Russian culture), Rooshkan culture nevertheless exists exclusively within the confines of this exercise.

In terms of setting the stage for this exercise, the Cold War is history and political and economic change is underway in the former communist regimes of Eastern Europe. Currently in Rooshka, capitalism is emerging - providing a more enticing landscape for foreign direct investment. With the Rooshkan economy still struggling and in transition, and with some of citizens starving and freezing, Rooshka has gradually begun to westernize. The concepts of glasnost dina per e stroika (meaning "openness" and "economic restructuring," respectively) are prominent features of the political and economic reform in Rooshka. To the Rooshkans, who were behind the Iron Curtain for almost a century, such concepts are quite understandably extraordinary and revolutionary.

Soviet propaganda and encul turati on, however, have created a lasting negative image of Capitalists, specifically Americans, as greedy, power hungry beasts. A major problem for American investors is trying to overcome this perception. With a culture dominated by Socialist sentiment, which promises food and heat for all its citizens, the Rooshkan general public is wary of western business infiltration, and its emphasis on personal gain and wealth.

The Rushkan government has begrudgingly agreed to allow some Western firms to do business in the Motherland. While such a shift in policy offers potentially lucrative business ventures for Western firms, the political and economic risks are substantial, creating tension and conflict between prospective foreign business investors and the Rushkan government.

One particular investment possibility involves McDollars, a world renowned fast food establishment based in the United States. McDollars ascended to the top tier of fast food chains when the owners streamlined the hamburger serving process, and redefined the restaurant industry forever. Since then the company has been wildly successful in its ventures, with tens of thousands of locations on six continents. The corporation employs over three million people, netted revenues in the billions last year, and has become an American branding icon with the likes of Coca-Cola and Nike. Their classic symbol, the green dollar sign ($) is universally recognized as an eating establishment of the highest quality and a beacon of profit for franchisees everywhere.

A meeting is scheduled between Frye and Yukan Kissov, the current Rushkan Minister of Commerce. With no current fast-food competition in Rushka, Frye is interested in the expansion of McDollars into the Russian market, believing that he/she will enter into it unopposed, allowing him/her to reap an incredible profit. On the other hand, Kissov is entering the negotiation with the best interests of his/her country and those he/she represents in mind. While each side has apprehensions about the other, and in light of the substantial cultural differences, Frye and Kissov nevertheless hope to meet civilly and productively.

You are the founder and Senior Chairperson of McDollars Rooshka. The only problem is that McDollars Rooshka exists merely as a concept, inasmuch as you have yet to open a single fast food restaurant in Rooshka. Your relationship with the McDollars corporation, however, is no recent development. You first met Jay Brock, the Companys mastermind, shortly after you graduated from law school, and two years later you abandoned your career in law to open your first McDollars in Eastern Canada. With remarkable speed you turned McDollars into the largest food service organization in Canada.

Even though you have yet to open a McDollars restaurant anywhere in the former Soviet Union, you have already invested 14 years of blood, sweat and tears into the cause. Years ago you first realized the potential - a region with hundreds of millions of people with a diet very similar to an Americans. Since then you have been traveling to Rooshka five to six times each year to meet with government officials and trying to cut through all of the bureaucratic red tape. This process began during the Cold War, so such excursions were not vacations, but rather arduous business trips halfway around the world. Little progress had been made until recently, when you finally received tentative approval to actually build a McDollars Rooshka in the capital city of Howscow.

Since then you have been working out the details of the agreement with government officials. Your plan is to build and operate twenty restaurants within Howscow, but you still need to work out a few matters before you can actually finalize the deal. While you had previously met and worked with primarily with local officials of Howscow, a meeting has been a arranged for you to speak directly with the Minister of Commerce, Yukan Kissov. While you have made much progress over the years, you realize that Kissov may make various demands and insist on numerous concessions before being willing to give final approval of the proj ect. Because he/she is the Minister of Commerce, you realize that he/she can walk away at any time if dissatisfied and, accordingly, leave you empty handed and with nothing to show for 14 years of effort and all the associated costs. You have always enjoyed the full confidence and support of Jay Brock, but you also know that he is obsessed with penetrating the Rooshkin market at any a cost. Losing this contract would deal a powerful blow to your self esteem and would cripple your heretofore excellent relationship with Jay Brock. You have heard rumors from corporate that failing to finalize a deal would, at the very least, result in a demotion and, at worst, lead to your forced early retirement.

Given that your corporate career hangs in the balance, you should take considerable time to thoroughly review the issues. Whether the twenty prospective restaurants within Howscow become a reality depends on your reaching agreement on following issues:

1 . The Menu: The McDollars menu is central to its identity, and has always stayed true to its basic fare of burgers, fries and McNuggets. No new restaurant has ever deviated from the same staple menu, and to do so would be seen within the corporation as blasphemous to McDollars name. The menu has come under the scrutiny of the Rooshkans, and you anticipate that Kissov will want to change it somehow to make it more Rooshkan. Changes to the menu would be against everything that is McDollars, and would certainly arouse the ire the corporate headquarters. Do you really want your brand name to be associated with cabbage soup?

2. Source Locally? As is often the case with foreign direct investment ventures, one of the main decisions to be made is whether to source locally, or to import needed ingredients and supplies. While sourcing locally is normally the low-cost answer within developing countries, Rooshka is in a class of its own. Sourcing locally would almost certainly be beneficial for the company over the long run, but you are concerned that up front costs may seem steep to corporate, even though Jay Brock has never said any such thing.

The supply chain - to the extent you can call it that - in most of Rooshka is antiquated, fragmented, and in many cases, non-existent. Farming is very low-tech and inefficient, and roads desperately need repair. Moreover, there is nowhere to process the local products in order to maintain the consistency required by corporate McDollars back home.

In order to even consider sourcing locally, a number of improvements would have to be made. For example, McDollars would have to bring in agricultural specialists from all over the world to educate the Rooshkan farmers on how to grow the products they needed (most Rooshkans do not even know of the existence of the larger Idaho potato). Somehow these specialists would have to transform old-world farms into efficient modern day agri-businesses. Given the nightmare logistical constraints in Rooshka, McDollars would also have to invest in infrastructure, such as roads to transport local goods. Finally, McDollars would have to build the behemoth McComplex, a 100,000 square foot processing plant, in a nearby suburb of Howscow in order to maintain food consistency. This complex would be a way to ensure quality control, and would include a selfcontained bakery, dairy, and meat-cutting operation facility, while employing over 400 people.

All of these projects would cost in the neighborhood of $50 million up front, making the projects significant initial investments. While these costs would easily be recouped over the years if McDollars Rooshka is a success, they might be very difficult to explain to corporate back home. After 14 years of your failure to deliver in Rooshka, however, Jay Brocks patience is wearing thin, and you know he wants a deal made sooner rather than later. You could ask Kissov to help finance these investments in infrastructure, but with Rooshka current economic situation, you doubt Kissov will be of much help.

The alternative, importing the inputs from existing European suppliers, would be at slightly higher unit costs, but would require no startup investments. The problem with this approach, however, is that it would do nothing to build up the necessary internal infrastructure in Rooshka, which both you and Jay Brock regard as crucial to the long term success of McDollars in Rooshka.

3 . Hire Locally? While most typical workers in your restaurants are likely to be Rooshkan, just who will hold management positions is something that still has not been resolved. If you hire local managers, they will not be as in tune with the McDollars corporate culture. This worries you and some at corporate headquarters because McDollars has a strong image that must always be maintained. As the first restaurant in a large new market, the Howscow McDollars must epitomize the McDollars image and values. In fact, in the United States, all managers must pass a rigorous training program at Hamburger University located at corporate headquarters. For you, American managers, at least to open the first restaurant, seem better suited for the task.

If left with no other recourse, you might consider Rooshkan managers, as long as they first attend Hamburger University, although their transportation and housing are additional costs that you would probably be asked to incur by the Rooshkans.

4. Ownership: Attempting to do business in a country with a history of communism can be awkward and cumbersome because in communist countries most business enterprises are owned by the state. All of the countries in which you have done business previously have allowed you to maintain complete ownership of your restaurants, but in Rooshka you anticipate that will not be the case. You doubt that the Rooshkans will allow you to maintain 1 00% control of the venture, but you are still interested in keeping as much ownership as possible. Allowing the Rooshkan government to control too much of the restaurant could set a dangerous and unheard of precedent, which might also be poorly received by the corporate office.

Conversely, having the government as business partner could have its advantages. The Rooshhan governments political clout could certainly help with - and in fact be of crucial importance to - certain matters, such as accessing utilities, improving infrastructure, and acquiring real estate. Besides, the more the Rooshkan government is involved the greater interest it has in making the McDollars Rooshka a success.

5 . Location: Location will be one of the most important points of your discussion with Minister Kissov, as it will greatly affect the performance of your business. You have heard rumors that three possible sites are being considered for the first McDollars. The first site is a prime real estate, located right smack in Pushpin Square, just one block from Rooshkas Lenin Memorial. This site would gain lots of attention and pedestrian traffic, allowing McDollars to prosper and, for that reason, you regard this specific location as ideal for your inaugural restaurant. Given that it is such valuable space in such a central location, however, you know that Kissov will demand a number of concessions to accommodate your strong preference for this location.

The other two locations are less appealing. One is located in a popular business district. ..popular before the Bolshevik revolution at least. Now it is mostly abandoned. The other is in a very well trafficked part of town, situated right between the Red Light District and a very historic site, an old Stalinist Gulag.

6. Currency: Currency in the republics of the former Soviet Union is always a big topic of discussion because it seen as more than just colored paper exchanged for goods; currency defines the social class of the carrier as well. The local currency, the Ruble, is nontransferable money widely circulated amongst the commoners of Rooshka. The aristocracy and foreigners, however, use hard currency, such as dollars or euros. It is illegal for common people to hold any form of hard currency, and in fact, many of the nicer shops are hard currency only, and do not permit peasantry entrance.

Beyond the class warfare issue, currency selection is also a big decision for McDollars because of the risks of the Ruble. The Rooshkan economy has been known for periods of hyperinflation, which the trigger super devaluation. Apart from the risk that the Ruble may be severely devalued, the Ruble is also a blocked currency (i.e., nontransferable), so any profit made must be kept within Mother Rooshka.

Hard currency alienates a vast maj ority of the population so many stores have started having separate lines, one for hard currency and one for Rubles. The Ruble lines are always long and slowmoving while the hard currency lines are typically quick and easy. A dual currency has its merits, as some profits could be counted on and repatriated. Even so, the separate line system is deeply resented by the common Rooshkans, and would almost certainly keep them from viewing McDollars Rooshka as a truly Rooshkan enterprise, which would lead to depressed sales, if not outright boycotts. Conversely, corporate McDollars will not like to hear that your subsidiary will not be sending any profits home, and that investments are being put at economic risk.

YOUR TASK

Represent the McDollars corporation in drafting the final agreement with Minister of Commerce Kissov on each of the listed issues.

References

REFERENCES

Barkacs, C. and L. Barkacs (2004). "Smart Growth for St. James," University of San Diego Working Paper.

Bosrock, M. (2005). "Russia: The People," College Journal from The Wall Street Journal, <http://www.collegejournal.com/countryprofiles/countryprofiles/russia.html>

Cohen, Herb (1980). You Can Negotiate Anything. New York: L. Stuart.

Fisher, R., W. Ury, & B. Patton (1991). Getting to Yes: Negotiating Agreement Without Giving In. Second Edition. New York: Penguin.

Moon, Y. and K. Herman ( 1 982). McDonalds Russia: Managinga Crisis. Cambridge, MA: Harvard Business School Press.

Saratov (2005). "Business Etiquette," Saratov, March 5. <http://www.geocities.eom/WallStreet/7 1 3 8/text_8 .htm>

Thompson, L. (2004). Mind and Heart of the Negotiator. Third Edition. Upper Saddle River, NJ: Prentice Hall.

AuthorAffiliation

Craig B. Barkacs, University of San Diego

cb arkac s@ sandi ego . edu

Gary P. Schneider, University of San Diego

garys@sandiego.edu

Nicholas M. DeWeese, University of San Diego

ndeweese@sandiego.edu

Zachary G. Puca, University of San Diego

zpuca@ sandiego.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 1

Pages: 1-6

Number of pages: 6

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192412090

Document URL: http://search.proquest.com/docview/192412090?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 70 of 100

ECAMPUS.COM: THE TURNAROUND STRATEGY

Author: Brown, Steve; Loy, Stephen

ProQuest document link

Abstract:

This case describes the revival of an e-commerce company after bankruptcy. It discusses how a successful e-business was forced into federal bankruptcy auction, was purchased and re structured by new management and is now trying to survive by going back to basic business principles of strict cost management and efficiency. It is suitable for both graduate and under graduate strategy classes and has a difficulty level of four though six depending on the depth of analysis the instructor desires. This is an e-commerce case that would be appropriate for management information systems, ecommerce or entrepreneurship classes. The students should be prepared to spend from six to twelve hours outside of class analyzing the case depending on the breadth and depth of the analysis.

Full text:

CASE DESCRIPTION

This case describes the revival of an e-commerce company after bankruptcy. It discusses how a successful e-business was forced into federal bankruptcy auction, was purchased and re structured by new management and is now trying to survive by going back to basic business principles of strict cost management and efficiency. It is suitable for both graduate and under graduate strategy classes and has a difficulty level of four though six depending on the depth of analysis the instructor desires. This is an e-commerce case that would be appropriate for management information systems, ecommerce or entrepreneurship classes. The students should be prepared to spend from six to twelve hours outside of class analyzing the case depending on the breadth and depth of the analysis.

CASE SYNOPSIS

Ecampus.com is a fully-transactional Internet electronic retailer of college textbooks that went online in 1999. Investors wanted to cash in on the hot e-commerce IPO (Initial Public Offering) market of the late 1990s. The plan was to start with a big marketing campaign to get fast market recognition, then hit the IPO market.

Investors put up $49 million to kickoff Ecampus. $20Twenty million dollars was spent on cable television advertising during its first eight months. The ads were highly effective in generating name recognition (84%) in its target market. The ads garnered a great deal of press exposure and awards forthere quality and creativity, but only generated $2 million in sales. Initially, Ecampus hadan alliance partner that handled the warehouse and order fulfillment operations. Three months after the initial startup, Ecampus purchased the distribution center from its alliance partner.

When the IPO market soured in 2000, a decision was made to delay the IPO. Meanwhile, Ecampus continued it its marketing campaigns even through sales remainedflat. By 2001, the huge personal debts of the principle investor, Wallace Wilkinson, began to worry suppliers and creditors. Ecampus needed more capital to continue its advertising campaign and operations, but investors and creditors were reluctant to put more into Ecampus. In April 2001, Ecampus laid off most its executive management, office staff and programmers. In June, Wilkinson was forced into personal bankruptcy. Within days, Ecampus was forced into bankruptcy too. The federal bankruptcy court allowed Ecampus to continue operating until it was soldat auction.

Ecampus was purchased at bankruptcy auction by a newly created company headed by its Director of Information Technology and two major creditors. The new owners drastically slashed costs and improved efficiency in advertising, operations, information systems. Now, all company offices and operations are located in distribution center building. Ecampus 'primary advantages are its state-of-the-art brick-and-mortar distribution systems and strong name recognition. The company faces a highly competitive industry with a few highly capitalized competitors and a growing number of small companies selling low-cost imports.

AuthorAffiliation

Steve Brown, Eastern Kentucky University

cbobrown@acs.eku.edu

Stephen Loy, Eastern Kentucky University

steve.loy@eku.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 1

Pages: 9

Number of pages: 1

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192412115

Document URL: http://search.proquest.com/docview/192412115?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 71 of 100

INSTALLING ERP SOFTWARE AT VALVOLINE

Author: Brown, Steve; Tabibzadeh, Kambiz; Spalding, John

ProQuest document link

Abstract:

Valvoline was well aware of the increasing competition among supply chains in the global market. There was no question about the need for an advanced information technology system. The major issue was how to upgrade its organization at both micro and macro levels. Steve Banker, director of supply chain solutions for ARC Advisory Group stated that the supply chain is more about philosophy than technology. Through research and benchmarking, Valvoline has learned that an Enterprise Resource Planning (ERP) tool cannot be installed overnight. Early in the 1990s, Valvoline started implementing new approaches in its operations such as Just-In-Time inventory, Total Quality Management, teamwork, activity-based costing, and benchmarking that provided a solid organizational foundation for more advanced installations in the future. For example, activity-based costing system was adopted in 1992. The "RAPID" internal benchmarking study was conducted in 1999. The latest integration at Valvoline involved the installation of SAP Advanced Planning System software.

Full text:

Headnote

CASE DESCRIPTION

The primary subject matter of this case concerns Enterprise Resource Planning (ERP). Secondary issues examined in this case include: supply chain management, organization design, project implementation, and organization culture. The case has a difficulty level appropriate for seniors and first year graduate students. The case is designed to be taught in one hour and is expected to require three hours of preparation.

CASE SYNOPSIS

The case addresses critical issues associated with installing an Enterprise Resource Management system. Valvoline realized their old information systems were inadequate to compete in today's business environment. They spent years and a tremendous amount of money and manhours attempting to improve the efficiency and effectiveness of their operation management information system and supply management system. They chose SAP software and supplemented it with the Fygir (Infor) Advanced Planning System. The new systems had major advantages over their old systems. However, even with all of their careful preparations, they still had difficulty and issues when installing the new system.

INTRODUCTION

Valvoline was well aware of the increasing competition among supply chains in the global market. There was no question about the need for an advanced information technology system. The major issue was how to upgrade its organization at both micro and macro levels. Steve Banker, director of supply chain solutions for ARC Advisory Group stated that the supply chain is more about philosophy than technology.

Through research and benchmarking, Valvoline has learned that an Enterprise Resource Planning (ERP) tool cannot be installed overnight. Early in the 1990s, Valvoline started implementing new approaches in its operations such as Just-In-Time inventory, Total Quality Management, teamwork, activity-based costing, and benchmarking that provided a solid organizational foundation for more advanced installations in the future. For example, activity-based costing system was adopted in 1992. The "RAPID" internal benchmarking study was conducted in 1999. The latest integration at Valvoline involved the installation of SAP Advanced Planning System software.

SOFTWARE SYSTEMS

Valvoline's senior management realized the present status of its internally developed legacy information systems had only a short life span until massive reconfiguration would be required to meet long-term competitive needs. Rather than continue maintaining and developing systems internally, the decision was made to purchase a license with the leading Enterprise Resource Planning (ERP) system in the market- SAP R/3.

The decision to make the purchase was not an easy one. Sixty full-time Ashland Oil and Valvoline employees working with external consultants needed over 15 months to fully configure the system for Valvoline's business processes. The ERP system would manage all of Valvoline's business transactions ranging from taking customer orders, completing manufacturing production, and printing invoices. Each business process was carefully scrutinized in terms of how SAP would handle the transaction. This offered opportunities to improve many business processes that over the years had been followed for the simple reason of "that's the way we have always done it." The changes also caused a great deal of anxiety, as many people had to learn new ways of doing their jobs.

The implementation teams were organized along SAP functionality modules: Sales and Distribution, Materials Management/Production Planning, Financial, Cash/Credit, Business Warehouse, and Operating System. Each team concentrated primarily on the issues within its module. The teams quickly found that with a fully integrated ERP system each module had an impact on other modules. At times, conflicts would arise, as one module's configuration would not work in another module. The Materials Management/Production Planning module had the greatest impact on the manufacturing division.

This module replaced the Valvoline Inventory and Production System, which had been in use for approximately eight years. The old legacy system was developed internally, specifically for Valvoline operations. Consequently, there was a great deal of functionality that would be very difficult for an "off-the-shelf system to match. For Valvoline's manufacturing division to be prepared for the transition, an entire new glossary of terms was provided. The terms were more in line with mainstream business rather than Valvoline's own terminology. For example, a product is now a material; a fill number is now a process order; a shipment is now a delivery.

One of the immediate benefits was a new material numbering scheme that matched the marketing number of the product rather than some randomly chosen number. This change made the recognition of materials much easier than had ever been possible. Another benefit was a vast material database that had a broad range of characterizations. Even though Valvoline had an extensive product master previously, it had become encumbered with obsolete products and inconsistent information. These changes were data changes, but the biggest impact on the manufacturing division would be the fully integrated, real-time information.

Valvoline used the Numetrix Linx software application to perform supply chain network design analysis. Information available in Valvoline legacy systems had to be: (1) downloaded from the legacy system; (2) reformatted for the Linx data structure; and (3) then imported into the Linx system. This process required a great deal of manual intervention to build the supply chain model. This difficulty in integrating the information caused the supply chain models to be used for one-time studies rather than ongoing business decisions. The Linx system failed to make inroads at Valvoline due to its lack of integration. Valvoline realized the potential of having the supply chain modeling capabilities, but integration was the key to its usefulness in continuing business applications.

Valvoline's legacy systems were all stand-alone systems that did not communicate well together. The primary weakness was the inability to see details within each system, such as inventory. The inability of viewing inventory at the time an order was placed gave the customer no assurance as to when the order would actually be received. With the SAP ERP, real-time inventory levels can be viewed by anyone anywhere. Now a customer knows whether inventory is available, and, if it is not, when the inventory will be available. For the manufacturing division, the major change was a loss of control when an order is scheduled for shipment. With SAP, the decision is made at the time the order is placed, whereas, in the legacy system, the plant made the decision after it had confirmed that it physically had the inventory.

In the legacy systems, one individual was responsible for batch processing transactions at the end of the day. This meant that any production sheets and receipts of material could be gathered and entered before the end of the day and inventory records would be intact. In the new SAP environment, a shipment cannot be processed or raw materials used without the transaction being entered into the system. This was a major change in job functions for many plants. Under the legacy system this type of transaction was batch processed by the central office. Under the SAP system, it was to be done in real time from the shop floor. The legacy system was designed for the production personnel to enter information, but the batch processing was kept in the office "to ensure accuracy."

Another benefit of the SAP system is its material requirements planning (MRP) functionality. If inventory is not available in the production system, the system will automatically plan the production and order the materials. In the past, this situation would result in a stock out. Unfortunately for SAP, the MRP system is primarily a function of the transaction system, and new production is based on fixed reorder point quantities stored in the system. The production quantities are based on current sales orders in the system with no indication of long-term customer demand and production constraints.

Valvoline's operations management team believed these limitations of the SAP ERP system would not provide enough information to optimize the system. As Valvoline's business has gotten more complicated with broader product lines, ever increasing skus, and decreasing customer lead times, making a more advanced planning system imperative. Inventory levels needed to be minimized for the lower volume products. Better utilization of production lines was also considered because of plant consolidation issues. Believing inventory investment could be decreased by 20%, Valvoline opted to implement a more advanced planning system (APS).

The advanced planning system (APS) that Valvoline chose to implement is supplied by (Infor) SCT (Systems, Computers, and Technologies) and is called Fygir. The suite of products consists of three components: Fygir Demand Planning (FDP) for forecasting, Fygir Advanced Planning (FAP) for long- to mid-term planning, and Fygir Advanced Scheduling (FAS) for finite scheduling. Each of these tools provides constraint-based analysis for fully optimizing the manufacturing system and eventually the entire supply chain. Even though these systems are used for completely different purposes they share information to allow the manufacturing process to operate efficiently. The APS system would be very difficult to maintain if it were not able to use the information that resides in the SAP system.

An overview of the SAP data requirements for the APS systems is essential to understand the interdependencies. The material master items include the description and the unit of measurement conversions (i.e., pounds, units, pallets.) Plant-specific material master items are the production rates, minimum production quantities, lot sizes, and lead-times. Plant resource information for production lines and production resources, such as tanks, are also critical. Relationships or routings of plant resources to the products that use the resources are necessary for connecting products to manufacturing equipment. The hub-and-spoke relationships of products that are manufactured and transferred to other Valvoline locations are needed for complete replenishment. Lead times are also accounted for to ensure production is planned in ample time.

INSTALLATION ISSUES

Throughout training to use the APS system, everyone from the trainers to the users was cautious about the impact of the new system. The change was dramatic when the system was finally turned on to live processing. The graphic view of production was difficult to interpret for many of the personnel that were only accustomed to looking at numbers. Even though the graphics represent warning signals that problems were imminent, trust in the information is not accepted without double-checking "the numbers".

The daily interfaces were difficult to schedule, because everyone was getting up to speed with using SAP. Processing these transactions was an adjustment, but timely processing was an even bigger adjustment. With the real-time nature of SAP, the old method of batch processing transactions was no longer applicable. However, at the beginning, batch processing was being done which misreported book inventory levels, hindered production, and stymied shipping. With SAP inventories incorrect, the interfaces were useless with the APS systems completely dependent on SAP's transactional balances. After the first couple of days, the processing of records became timelier and the interfaces began having a truer meaning.

Accurate information is absolutely necessary for the systems to work correctly. With the inaccurate inventory levels, the first production schedule was light compared to normal levels. Prior production levels being based more on floor space and less on forecasted demand could cause this. With so many other issues being addressed, this was not reviewed any further. The larger problem loomed from inaccurate master data being loaded into SAP. There was not a complete understanding by Valvoline production personnel of how the information would be used because the information had many fallacies. For example, unusually small production sizes caused by minimum production sizes set too low or product sourcing relationships not pointing to the correct transferring location caused a great deal of confusion. Review and maintenance of master data was necessary to "cleanup" the systems.

The FAP modeling also had a problem with balancing production cost and inventory cost. This caused over production of products with little or no demand. Adjustments were made to the program's solver to place a higher penalty on unnecessary production. Given the master data issues and the over production mentioned above, many of the production schedulers carefully scrutinized each planned production order before applying them to the FAS planning board. This drastically slowed down the scheduling process. Adjustments have continued to be made for more accurate production plans. After a month of using the APS system, many of production schedulers have began to understand and accept the process. On-site support from headquarters has been provided to ease fears and provide further training.

AuthorAffiliation

Steve Brown, Eastern Kentucky University

Steve.brown@eku.edu

Kambiz Tabibzadeh, Eastern Kentucky University

Kambiz.Tabibzadeh@eku.edu

John Spalding, Valvoline

johnrspaulding@ashland.com

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 1

Pages: 11-14

Number of pages: 4

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192412161

Document URL: http://search.proquest.com/docview/192412161?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 72 of 100

DIPPIN' DOTS ICE CREAM

Author: Callahan, Brian R; Eisner, Alan B; Robinson, Richard; Teasley, Russell

ProQuest document link

Abstract:

Innovation comes in many forms and in many places. Dippin Dots is an example of innovation where one might least expect it - ice cream. Experts predict ice cream has been around since the 2nd century B.C This case describes the rise of a company built on space-age ice cream. Dippin Dots is founded on a technology transferred from cryogenics into the manufacture of ice cream. Cryogenics is about super-freezing (-3650F for ice cream), and the case is about how cryogenics enabled a entrepreneurial product differentiation that has thrived amidst an industry of large, high-volume competitors.

Curt Jones, a research and engineering microbiologist by trade, was blessed with the idea to make ice cream utilizing cryogenics to super-encapsulate a unique frozen dairy product. Being pleased with the results of his idea, he founded a company called DippinDots that has grown in 15 years to revenues of over $45 million and employs 160 persons. The product is differentiated in form, process, andmarket. Its form is that of tiny roundballs, i.e. dots, servedat 10-200 below zero. Its process is cryogenic manufacture and super-cool storage and distribution. Its market is specialty retail outlets, partnerships with established distributors, and a franchisee network. Customers are those ice cream lovers willing to experience a "new thing" through dealer networks in fair, festival and commercial locations and through a new trial partnership with McDonalds.

This case is a fascinating portrayal of a niche product in a lucrative industry. It demonstrates the power of product and process innovation combined with a focused market penetration. The result is a company that has presence both in 50 states and internationally, and markets both directly and through franchisee s to a target market of 8- to 18- year-olds. DippinDots was established in 1988, opened a 32,000 sq ft production facility in 1995, added 20,000 sq. ft additional space in 1997, a 2003 20, 000 sqfl facility in South Korea, and is a regular designee in Entrepreneur Magazine.

DippinDots is a case thatwouldbe well-placed in both graduate and undergraduate classes. It describes the entrepreneur, the company's technology and founding events, and specifics about the uniqueness of the product. It offers a comprehensive overview of the ice cream industry, including an assessment of the various industry segments. The authors also share the history of DippinDots 'growth stages, and a view of its challenges for future growth. The case is appropriate for classes of Strategic Management, Marketing, and Entrepreneurship.

Full text:

ABSTRACT

Innovation comes in many forms and in many places. Dippin Dots is an example of innovation where one might least expect it - ice cream. Experts predict ice cream has been around since the 2nd century B.C This case describes the rise of a company built on space-age ice cream. Dippin Dots is founded on a technology transferred from cryogenics into the manufacture of ice cream. Cryogenics is about super-freezing (-3650F for ice cream), and the case is about how cryogenics enabled a entrepreneurial product differentiation that has thrived amidst an industry of large, high-volume competitors.

Curt Jones, a research and engineering microbiologist by trade, was blessed with the idea to make ice cream utilizing cryogenics to super-encapsulate a unique frozen dairy product. Being pleased with the results of his idea, he founded a company called DippinDots that has grown in 15 years to revenues of over $45 million and employs 160 persons. The product is differentiated in form, process, andmarket. Its form is that of tiny roundballs, i.e. dots, servedat 10-200 below zero. Its process is cryogenic manufacture and super-cool storage and distribution. Its market is specialty retail outlets, partnerships with established distributors, and a franchisee network. Customers are those ice cream lovers willing to experience a "new thing" through dealer networks in fair, festival and commercial locations and through a new trial partnership with McDonalds.

This case is a fascinating portrayal of a niche product in a lucrative industry. It demonstrates the power of product and process innovation combined with a focused market penetration. The result is a company that has presence both in 50 states and internationally, and markets both directly and through franchisee s to a target market of 8- to 18- year-olds. DippinDots was established in 1988, opened a 32,000 sq ft production facility in 1995, added 20,000 sq. ft additional space in 1997, a 2003 20, 000 sqfl facility in South Korea, and is a regular designee in Entrepreneur Magazine.

DippinDots is a case thatwouldbe well-placed in both graduate and undergraduate classes. It describes the entrepreneur, the company's technology and founding events, and specifics about the uniqueness of the product. It offers a comprehensive overview of the ice cream industry, including an assessment of the various industry segments. The authors also share the history of DippinDots 'growth stages, and a view of its challenges for future growth. The case is appropriate for classes of Strategic Management, Marketing, and Entrepreneurship.

AuthorAffiliation

Brian R. Callahan, Pace University

Alan B. Eisner, Pace University

Richard Robinson, University of South Carolina

robinson@sc.edu

Russell Teasley, Western Carolina University

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 1

Pages: 15

Number of pages: 1

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192412108

Document URL: http://search.proquest.com/docview/192412108?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 73 of 100

THE FEDERAL GOVERNMENT VS. YORK COUNTY: A TRANSFER PRICING CASE FOR MANAGERIAL ACCOUNTING STUDENTS

Author: Chambers, Valrie; DiGregorio, Dean; Royce, Abigail

ProQuest document link

Abstract:

The primary subject matter of this case concerns transfer pricing. Secondary issues examined include opportunity costs, sunk costs, the use of progressive levels of critical thinking skills, the application of classroom knowledge to real life situations, and effective communication skills. The case has a difficulty of level of two and is appropriate for sophomore-level students in managerial accounting classes. The case is designed to be taught in a 1.25 hour class and is expected to require 2.5 hours of outside preparation by students, preferably working in small groups. Alternatively, the case couldbe assigned as a project that requires minimal classroom time.

Full text:

CASE DESCRIPTION

The primary subject matter of this case concerns transfer pricing. Secondary issues examined include opportunity costs, sunk costs, the use of progressive levels of critical thinking skills, the application of classroom knowledge to real life situations, and effective communication skills. The case has a difficulty of level of two and is appropriate for sophomore-level students in managerial accounting classes. The case is designed to be taught in a 1.25 hour class and is expected to require 2.5 hours of outside preparation by students, preferably working in small groups. Alternatively, the case couldbe assigned as a project that requires minimal classroom time.

CASE SYNOPSIS

During their college experience, students are exposed to facts and theories in many different subject areas. By the time they graduate, students are expected to have developed critical thinking skills. They should be able to apply what was learned in the classroom to real life situations and be able to effectively communicate their analysis and conclusions. This case is derived from an actual situation occurring between the federal government and York County, Pennsylvania in 2003, as described on National Public Radio's Morning Edition. The case requires students to assume the role of a consultant to York County. They need to identify the conflict, consider relevant theories, analyze the situation from both parties perspectives, and suggest a reasonable solution to the conflict.

AuthorAffiliation

Valrie Chambers, Texas A & M University-Corpus Christi

vchambers@cob.tamucc.edu

Dean DiGregorio, Southeastern Louisiana University

ddigregorio@selu.edu

Abigail Royce, Texas A & M University-Corpus Christi

abby@cjw-cpa.com

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 1

Pages: 23

Number of pages: 1

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192412045

Document URL: http://search.proquest.com/docview/192412045?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 74 of 100

A CASE STUDY OF INTRINSIC VALUE, ACCOUNTING FUNDAMENTALS, AND MARKET EFFICIENCY USING AN INTERNET IPO

Author: Coffee, David; Lirely, Roger

ProQuest document link

Abstract:

The primary subject matter of this case is the relationship between financial accounting measures, intrinsic values and market values. The case provides an excellent platform for examining the basis for market valuations of equity securities of an IPO and the relationship of these market valuations to the historical and projected financial performance of the company as measured by generally accepted accounting standards. The case has a difficulty level of three or four, appropriate for junior- or senior-level accounting and finance students. The case is designed to be taught in one class hour and is expected to require between two and three hours of outside preparation by students.

Full text:

CASE DESCRIPTION

The primary subject matter of this case is the relationship between financial accounting measures, intrinsic values and market values. The case provides an excellent platform for examining the basis for market valuations of equity securities of an IPO and the relationship of these market valuations to the historical and projected financial performance of the company as measured by generally accepted accounting standards. The case has a difficulty level of three or four, appropriate for junior- or senior-level accounting and finance students. The case is designed to be taught in one class hour and is expected to require between two and three hours of outside preparation by students.

CASE SYNOPSIS

In its initial public offering in early 1999, the shares of MarketWatch.com (MKTW on NASDAQ) opened at $35, reached a high of $130 during the day and closed at 97 1⁄2 MarketWatch.com's close represented a 473.5 percent increase - one of the largest ever for an IPO. The record at the time for the largest opening-day percentage gain at closing was held by theglobe.com, which closed up 605.6 percent for its November 13, 1998 opening. Prior to that, the record was held by Broadcast.com, which closed up 248.6 percent. The MarketWatch.com IPO is used as a case study of the relationship of intrinsic values and market values of an equity security over a six year timeframe. The case provides anecdotal evidence of market inefficiency and serves as an illustration of the relationship of financial accounting measurements, intrinsic values, and market values.

AuthorAffiliation

David Coffee, Western Carolina University

Roger Lirely, Western Carolina University

lirely@wcu.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 1

Pages: 25

Number of pages: 1

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192412031

Document URL: http://search.proquest.com/docview/192412031?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 75 of 100

PROCTER & GAMBLE: THE GROWTH OF A GIANT

Author: DiVergilio, Mary Ann; Gulbro, Robert D

ProQuest document link

Abstract:

It was not until 1879 that the company's famous Ivory soap was created and marketed, but by 1890 P&G had responded to several market needs and demands, offering 30 different types of soaps. They knew how to go with the flow of a changing society, and while maintaining the "purity" of their flagship Ivory soap, they were also offering variety in colored and scented soaps; and rapidly expanding their customer base.

Products were changing and it soon became necessary to expand their geographic boundaries. In 1904 they began producing outside of Cincinnati and began to enjoy their increased production capacities. The result was the success of improved distribution and revenues.

The expansion from soaps to food occurred in 1911 with the product still well known today as Crisco, an all vegetable shortening that was a healthier alternative to animal fats and less costly than butter. This company was clearly on the cutting edge of change and willing to face it head on. Management realized that it was time to expand outside of the United States and it was in 1915 that Canada saw its first P&G facility. A Chemicals Division was created shortly thereafter and its focus was to develop new products. Not only did P&G not shrink from a changing environment, they were pursuing it with fervor. They were actively looking for ways to insure that what had originated as a two man operation of soap and candles, would continue to provide new and useful products to consumers and advance with a rapidly changing world.

Full text:

Headnote

CASE DESCRIPTION

This case study is intended for use in any business class that studies the success and failure of organizations. This case highlights the growth and advancement of a corporation that has successfully withstood, and conquered, the obstacles of change over the course of 167 years. It is suggested that the case be covered in a one-hour class period.

CASE SYNOPSIS

Procter & Gamble might never have been born had it not been for the suggestion of Alexander Norris to his two sons-in-law back in 1837. William Procter, and James Gamble, both immigrants, were married to sisters; Procter was from England and Gamble from Ireland. With an initial pledge of $3,596.47 each, they formalized their partnership and embarked on their boldnew enterprise making and selling soap and candles: Procter & Gamble. Competition was a major focus from the onset, with fourteen other similar companies vying for market share. It was not long before P&G began to learn of how change can burden, and strengthen a corporation.

In 1850 one of the staples of their product line, candles, fell in popularity with a change that would not only change their business, but life as we all know it today - the invention of the light bulb. It was the first of many changes, but only nine short years later P&G had gross sales of $l million and was employing 80 people.

P&G faced the adversity of fire in 1884, but used it to their benefit by using the latest technological advances to recreate a pleasant workplace for their employees. They utilized the challenges of the 1887 local and national labor unrest by instituting a profit sharing program for their factory workers. It was a strategic move that would become an important lifeline for this corporation for more than a century and a half of continuous change: a strong relationship with its employees. The corporation today is 25% employee owned.

Their steadfastness and perseverance withstood decades of internal, as well as external changes. Many companies have fallen by the wayside due to their inability to conquer change, but P&G has not only conquered it, they have perfected their execution of implementing it in every nook and cranny of their operations. The result to date has been a history of incredible product popularity and corporate growth.

COMPANY HISTORY

It was not until 1879 that the company's famous Ivory soap was created and marketed, but by 1890 P&G had responded to several market needs and demands, offering 30 different types of soaps. They knew how to go with the flow of a changing society, and while maintaining the "purity" of their flagship Ivory soap, they were also offering variety in colored and scented soaps; and rapidly expanding their customer base.

Products were changing and it soon became necessary to expand their geographic boundaries. In 1904 they began producing outside of Cincinnati and began to enjoy their increased production capacities. The result was the success of improved distribution and revenues.

The expansion from soaps to food occurred in 1911 with the product still well known today as Crisco, an all vegetable shortening that was a healthier alternative to animal fats and less costly than butter. This company was clearly on the cutting edge of change and willing to face it head on. Management realized that it was time to expand outside of the United States and it was in 1915 that Canada saw its first P&G facility. A Chemicals Division was created shortly thereafter and its focus was to develop new products. Not only did P&G not shrink from a changing environment, they were pursuing it with fervor. They were actively looking for ways to insure that what had originated as a two man operation of soap and candles, would continue to provide new and useful products to consumers and advance with a rapidly changing world.

P&G had not forgotten that they had made a commitment to a strong working relationship with their employees many years prior, and in 1919 the articles of incorporation were revised to include the directive that the "interests of the Company and its employees are inseparable." By deciding to change its selling strategy from wholesalers to retailers directly, P&G was able to increase its sales force by 450 salesmen. This was a crucial change that stabilized production, reduced employee layoffs and was instrumental in effecting a change in the way the grocery trade operated.

As the products became more and more popular, P&G had become a household name equated with quality and variety. However, the corporation was not content to rely solely on the customers' perception of it in the 1920s. It proactively created a market research department to delve deeper into customer wants, needs and buying habits. It was one of the first in history. P&G made good use of boundary-spanning roles to link and coordinate their organization with key elements in the external environment. Change was inherent, a way of life and a path to survival for P&G. It was sought out, embraced and encouraged.

OUTCOMES

A corporate icon, the name Procter & Gamble carries clout and provides brand recognition to households across the world. From its humble beginnings of soap and candles, to an impressive array of various product lines, including but not limited to food, drugs, paper and personal care products, P&G has become a giant in the corporate world of change.

By 2002 P&G boasted twelve billion dollar brands in their portfolio. These brands represent more than half of their sales and earnings. They learned early on that customers not only want new and innovative products, they are also fickle and need to be catered to with products and services that go beyond their expectations. P&G learned that there is no limit to its customer base and has traversed from its original small operation in Cincinnati to encompass successful global operations in every corner of the world.

This corporation, however, is not without controversy. Special interest groups, such as the Ethical Consumer Research Association, are utilizing the Internet to spotlight what they believe to be information indicating that P&G has supported repressive regimes during the apartheid years by holding a licensing agreement in South Africa. PeTA uses the forum to advertise their claims that P&G has abused animals in their product testing labs. P&G has alleged in a 1999 lawsuit that a major multi-level marketing corporation has gone so far as to spread rumors tying P&G to Satanism. The response from the defendant in this case responded that the allegation was based out of fear of the MLM's growth in Asia, something that P&G allegedly viewed as a marketing threat.

Fact or fiction, any type of negative publicity can certainly take its toll on a corporation, yet P&G has weathered these challenges and has spent considerable time and money filing lawsuits to defend themselves against the individuals who were responsible for spreading the rumors.

EXPECTATIONS FOR THE FUTURE

There is nothing to indicate that P&G would not continue to grow and enjoy the continued growth and success it has achieved over the past 167 years. Although the consumer products industry is facing challenges with the rising costs of raw materials, and industry giants like Colgate-Palmolive Company and Unilever Group are reporting sharply reduced earnings reports for the second half of this year, P&G appears to be navigating successfully through this storm and continues to thrive. Analysts indicate that this is the result of smart products and muscular marketing. P&G boasted $51 billion in sales last year, making it five times larger than Colgate-Palmolive. Size alone does not stand as the sole reason for their past, current and projected future financial success. P&G has focused on targeting higher margin areas such as beauty care. This market requires less capital spending than many of their traditional businesses such as disposable diapers.

P&G has been a giant in the arena of renewed creativity and continues to create the products that consumers crave - and with higher margins than their traditional products. With items such as the Swiffer mop, the Whitestrip Tooth Whiteners and the battery powered Crest SpinBrush toothbrush it is creating all new product categories that embellish its already impressive product line. In the last three years, P&G has updated all 200 of its product brands to remain competitive in the fickle consumer market. At present, P&G is growing market share in 70% of their businesses. While there is no guarantee that they will not begin to feel the pinch of rising costs that their big name competitors currently face, P&G's aggressive marketing techniques are increasing sales in the right areas to effectively combat any threats of rising raw material costs.

In an area that is unrelated to its marketing and operations side of the business, P&G has entered into a ten year agreement with Hewlett Packard and has outsourced its information technology infrastructure, data center operations, desktop and end user support, network management and applications development, and maintenance for P&G's operations in 160 nations. P&G's overall plan is to reduce costs and maximize profits, and is steadily signing deals to outsource parts of its operations.

DISCUSSION

How does a company grow from a small operation of soap and candles to that of a corporate giant with revenue of $53 billion annually? They did it by building a corporate culture that teaches the most important lesson of the permanence of change - and it started from the top down. P&G met both the domestic and global challenges of growth by insuring that quality products were viewed as critical success factors in their strategic performance. They built a strong foundation of team players that anticipated and sought out change. P&G looked beyond the scope of their immediate market area and realized that globalization was a crucial and strategic move that had to be made. Their inherent size has afforded them the rewards of economies of scale and has, for the current time, insulated them from the rising costs of raw materials.

Speed of development in a rapidly changing environment has given P&G a position in the market that far surpasses their competition. In a world that is unpredictable and volatile, Procter & Gamble is able to sustain continued growth and market share by insuring a wide band of products on which to present to the consuming public. With a passion for success, they sought out areas that were far removed and much riskier than their original products of soap and candles.

Entering into the arena of drugs was a key move. The beauty market offered wide margins on which to leverage other products that may have otherwise fallen prey to the higher costs of capital investment for production. P&G was quick to copy a highly successful super-concentrated detergent back in 1987 that had been introduced by a Japanese household products manufacturer. P&G modified the product and markets it under the name of Tide, a product that was originally introduced in 1946 and that had evolved into many new and improved versions over the years. Not content to settle with its limitations in different geographic areas, P&G varied the density of the formula to meet national preferences. By adding a special dosing device they created a detergent that would adapt to meet the demands of the hard water and heavy clay soil found in Europe. This is but one small example of how flexibility and responsiveness to changing market needs have helped P&G become a giant.

They cultivated and encouraged employees who knew that name recognition was key to their corporate growth and who realized that one of the best ways to achieve that was through quality products. P&G has clearly understood that a key test of quality is understanding, meeting and exceeding customers' requirements and expectations. P&G has been a supplier that customers believe has provided the greatest perceived added value and has received customer allegiance in the form of market share as a result. P&G has not been a victim of complacency and has kept up with market and technological changes over the years - a vital ingrethent to their success. Embracing the past and sitting comfortably on those successes has never been sufficient for this corporation. They have, and continue to, embrace the future by energizing their employees to focus on the "what" and the "how" of the corporation through strategic vision, thinking and planning. "What" does the corporation want, and "how" will it get there? Strategic vision, strategic thinking and strategic planning have clearly been the focus of P&G from its inception and all have been vital to their success. Strategic vision has been the guiding beacon for P&G with a focus on designing its future corporate position. Strategic thinking has been, and continues to be, used as the process used to develop the strategic vision. P&G uses the strategic planning process to develop how this corporation will reach its future operative goals.

The mission statement of their Lewisburg, Ohio facility clearly shows that P&G respects its employees and recognizes that they are key to their operation with the strong message that the corporation's values of people, safety and quality are reinforced by the plant's expectations of each employee to treat one another with dignity and respect and to remain honest. Strength in each of these areas is key to corporate success. Deficiencies are met with disconnect and failure.

CONCLUSIONS

Thus far, Procter & Gamble has withstood the test of time and the challenges presented to any corporation. Their vision and ability to execute has proven that while change can turn one company into a fatal tailspin, it can be the basis of success to the corporation that can effectively use a changing environment to its complete advantage. P&G, has survived through adaptation and an aggressive willingness to view change as a catalyst for success. Today's environment is increasingly competitive and fast moving. P&G has shown that it is capable of dealing with these challenges successfully with effective mechanisms.

P&G has thrust itself into the world of change, innovation, acquisitions, globalization, cultural evolutions and above all, continued customer satisfaction. The corporate graveyard, which has become home to many a fallen corporation over the past 167 years, should not expect to see P&G if it continues to follow the proven path for success.

References

REFERENCES

Campy, James. Reengineering Management. New York: Harper-Collins, 1995.

Daft, Richard L. Organization Theory and Design. Cincinnati: South-Western College Publishing, 2001

Kotter, John P. Leading Change. Boston: Harvard Business School Press 1996.

Moran, Robert T. and Riesenberger, John R. The Global Challenge. New York: McGraw-Hill Book Company 1994.

Websites http://cincinnati.bizjournals.com/cincinnati/stories/2004/03/15/dailyl5.html

http://www.mcspotlight.org/beyond/companies/proctor.html

http://www.rickross.com/reference/amway/amway28.html

http://www.ohnonews.com/pg.html

AuthorAffiliation

Mary Ann DiVergilio, Florida Institute of Technology

mdivergi@fit.edu

Robert D. Gulbro, Athens State University

gulbror@athens.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 1

Pages: 27-31

Number of pages: 5

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192412026

Document URL: http://search.proquest.com/docview/192412026?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 76 of 100

VALUATION OF A DREAM: RIVERSIDE COUNTRY CLUB FOR SALE

Author: Dow, Benjamin L; Kunz, David

ProQuest document link

Abstract:

Golf Corp LLC was founded in 1991 with a strategy to acquire and manage golf courses in "demand driven" markets that provide opportunities for revenue growth and margin improvement through Golf Corp's integrated marketing and operational programs. The essence of Golf Corp's strategy is to "market" each course as a separate brand with well-defined customer segments, distinctive positioning, tailored "one-to-one" programs - and responsive tracking and follow-up. Golf Corp's growth is based on its proprietary marketing information systems and high-quality customer service and course conditioning.

Golf Corp's current portfolio of 18 facilities spread over nine southeastern states reflects its orientation towards higher-end properties. The portfolio features a number of marquee daily fee and resort courses, however, Golf Corp's recent growth reflects an increasing orientation towards highlevel private clubs.

Golf Corp currently employs three financial analysts to conduct end-of-year reviews for each of its 18 facilities as well as identify potential opportunities for further investment as capital flows permit. Analysts are responsible for preparing contribution reports and making recommendations to Golf Corp's senior managers for further action. Brent Steadman was Golf Corp's newest analyst and one of his first assignments was Riverside Country Club. Historical data on Riverside showed the country club had experienced minor losses in the first two years of operation, but had been profitable ever since. After further review, Mr. Steadman concluded: 1) there was a low probability Riverside's future profits would be able to provide a return required by Golf Corp's investors and 2) changes in current market conditions allow Golf Corp the opportunity to replace Riverside with another course in order to better utilize their integrated marketing and operational programs.

After reviewing all of the internal documents presented by Mr. Steadman, Golf Corp's senior management team made a call to Tom Johnson, the head golf professional and manager of Riverside Country Club and asked him to discreetly contact local individuals who might be interested in purchasing Riverside. Tom's first call was to his brother Chris, a successful independent insurance agent and avid golfer.

Full text:

Headnote

CASE DESCRIPTION

The primary subject matter of this case concerns the business valuation process. Secondary issues examined include the challenges of valuing small, privately held businesses and determination of an appropriate discount rate. The case requires students to have an introductory knowledge of accounting, finance and general business issues, thus the case has a difficulty level of three (junior level) or higher. The case is designed to be taught in one or two class sessions of approximately 1.25 hours (depending on the level of detail covered) and is expected to require 3-4 hours of preparation time from the students.

CASE SYNOPSIS

This case describes the challenges faced by Chris Johnson, who for years has nurtured a dream of owning a golf course. As a successful insurance agency owner and accomplished golfer, Mr. Johnson hopes to one day make his dream a reality. Opportunity arises when Golf Corp LLC, a leading national golf course owner and operator in the U.S., decides to sell Riverside Country Club, an entry-level semi-private course located near Mr. Johnson's residence, in an effort to refocus its corporate strategy toward operating higher-end properties. Mr. Johnson now has an opportunity to realize his dream, but is uncertain as to the fair value of acquiring Riverside.

CASE BACKGROUND

Golf Corp LLC was founded in 1991 with a strategy to acquire and manage golf courses in "demand driven" markets that provide opportunities for revenue growth and margin improvement through Golf Corp's integrated marketing and operational programs. The essence of Golf Corp's strategy is to "market" each course as a separate brand with well-defined customer segments, distinctive positioning, tailored "one-to-one" programs - and responsive tracking and follow-up. Golf Corp's growth is based on its proprietary marketing information systems and high-quality customer service and course conditioning.

Golf Corp's current portfolio of 18 facilities spread over nine southeastern states reflects its orientation towards higher-end properties. The portfolio features a number of marquee daily fee and resort courses, however, Golf Corp's recent growth reflects an increasing orientation towards highlevel private clubs.

Golf Corp currently employs three financial analysts to conduct end-of-year reviews for each of its 18 facilities as well as identify potential opportunities for further investment as capital flows permit. Analysts are responsible for preparing contribution reports and making recommendations to Golf Corp's senior managers for further action. Brent Steadman was Golf Corp's newest analyst and one of his first assignments was Riverside Country Club. Historical data on Riverside showed the country club had experienced minor losses in the first two years of operation, but had been profitable ever since. After further review, Mr. Steadman concluded: 1) there was a low probability Riverside's future profits would be able to provide a return required by Golf Corp's investors and 2) changes in current market conditions allow Golf Corp the opportunity to replace Riverside with another course in order to better utilize their integrated marketing and operational programs.

After reviewing all of the internal documents presented by Mr. Steadman, Golf Corp's senior management team made a call to Tom Johnson, the head golf professional and manager of Riverside Country Club and asked him to discreetly contact local individuals who might be interested in purchasing Riverside. Tom's first call was to his brother Chris, a successful independent insurance agent and avid golfer.

BUYERS BACKGROUND

Chris Johnson is thirty-eight years old and has been in the insurance business since graduating from the University of Arkansas with a degree in marketing on a golf scholarship. Mr. Johnson is an accomplished golfer with statewide recognition, having won State Amateur Player of the Year awards on three different occasions. While the first few years for the Johnson Company were lean, the business has been very successful in recent years. Mr. Johnson is currently in a financial position where the potential for realizing his dream of owning a golf course is possible.

GOLF INDUSTRY

In 1990, an estimated twenty-three million Americans were classified as golfers having played 421 million rounds of golf at approximately 11 thousand courses. By 2003, the number of American golfers has grown to over 27 million and the number of rounds played increased to approximately 495 million (see Table One for a year by year comparison of growth). In addition, the number of golf courses available for play increased to just below 15 thousand by 2003. Golfers in the US spent over $24 billion in 2003 on equipment and green fees, of which $4.5 billion was allocated to equipment spending and $19.5 billion to green fees and dues. Avid golfers (classified as playing more than 25 rounds per year) account for only 23% of all golfers, but attributed to 63% of total golf spending. Finally, approximately 15% of all golfers are permanent residents of a golf course community.

The median cost of a weekend round of golf at a daily fee course is $40. An average daily fee golf course will record 30,000 rounds played per year, employ a total of 13 full-time people and generate about $992,000 in revenues.

RIVERSIDE COUNTRY CLUB

Riverside Country Club opened in 1995 as a semi-private golf course located in Maumelle, Arkansas, a growing suburb located in the greater Little Rock metropolitan area. Riverside offers an 18-hole championship golf course spread out over 151 acres along the Arkansas River, complete practice facilities, a full-service snack bar with an ability to provide catering services, and a Pro Shop offering top quality merchandise. Riverside Country Club was originally built by Golf Corp LLC to take advantage of the surging popularity of golf that occurred during the early 1990's.

THE SITUATION

Johnson decided his approach to realizing a dream should be an investment and not an emotional decision. He would apply his capital and expertise to owning a golf course as if it were a going concern with an appropriate return on investment. Johnson first contacted Golf Corp to express his interest in the possible acquisition of Riverside. After signing a confidentiality agreement, Golf Corp provided limited financial information and recent appraisals of fixed assets. Golf Corp indicated more information would be provided if Chris decided to further pursue the acquisition.

Johnson needed more information before negotiating the potential purchase of Riverside and approached Rick Scott for help. Scott is an associate with Williams Inc, headquartered in Little Rock, Arkansas. Williams Inc. is one of the largest investment banking firms off of Wall Street and has a long historical record of private company sales. Scott informed Johnson that his firm could help with the negotiations. Scott was both familiar with golf property valuations and had developed a data base containing a number of recent golf course transactions that might prove useful in valuing Riverside. Scott also stated most business valuations are more art than science and there are numerous ways to value a business, ranging from basic industry rules of thumb to discounted cash flow (DCF) analysis. The value of a business can vary significantly from buyer to buyer, depending on each buyer's own analysis and estimates. Value may vary depending on the data used, the methodologies used, the weight placed on the various methodologies and the overall interpretation of the data. However, Scott described a number of possible valuation methods.

1) Asset Based Methods:

a) Accounting Book Value: This method uses accounting values taken from the company's financial statements. This method assumes that assets values are equal to market value and the value of the firm is equal to the value of its assets.

b) Adjusted Tangible Book Value Method: This method also uses accounting values but recognizes that accounting values are based on historical information that does not always reflect market values. Fixed assets values are adjusted to reflect current market values.

2) Market Comparison Methods:

a) Direct Market Comparison Method: This method attempts to locate similar businesses that have recently sold, and uses those comparable price figures to determine an appropriate valuation, adjusting appropriately for differences.

b) Multiple of Revenue or Income: This small business valuation method estimates the price using a multiplier of revenue or income.

3) Free Cash Flow (also called Discounted Cash Flow): The free cash flow method estimates the present value of cash flows available for distribution to all of the company's investors discounted at the average rate of return required by all investors. Cash flows available for distribution are known as free cash flows and the average rate of return required by all investors is known as the weighted average cost of capital (WACC).

THE TASK

At the conclusion of the meeting, Scott suggested Johnson come back at the end of the week. Scott said he would put together a preliminary valuation report to help Johnson decide on an appropriate offering price for Riverside. Scott turned over a copy of his notes from his meeting with Johnson to a young associate with a message detailing what Scott needed for his next meeting with Johnson.

1) Discuss each valuation method. Describe the strengths and weaknesses of each?

a) Asset based methods.

i) Accounting book value.

ii) Adjusted tangible book value,

b) Market comparison.

i) Direct Market Comparisons

ii) Multiple of Revenue and Multiple of NOI

c) Free cash flow (also called the discounted cash flow method).

2) Using methods discussed in Question 1, develop values for Riverside Country Club.

3) Recommend a fair-market value for Riverside Country Club. Support your value.

References

SUGGESTED REFERENCES

Brigham, Eugene F., and Phillip R. Davis, Intermediate Financial Management, 7th Edition, South-Western/ Thompson Learning.

Fraser, Jill, "Putting Your Company On The Block", Inc., April 2001, pp. 105-106.

National Golf Foundation, www.ngf.org.

Rogers, Steven, The Entrepreneur's Guide to Finance and Business, 2003, McGraw-Hill.

Society of Golf Appraisers, www.golfappraisers.com.

Swift, E.M., "If You Build It, They Won't Necessarily Come", Sports Illustrated, November 15, 2004.

AuthorAffiliation

Benjamin L. Dow III, Southeast Missouri State University

bdow@semo.edu

David Kunz, Southeast Missouri State University

dkunz@semo.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 1

Pages: 33-36

Number of pages: 4

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192412044

Document URL: http://search.proquest.com/docview/192412044?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 77 of 100

THE WESTERN NORTH CAROLINA PLAYHOUSE

Author: Little, Philip L; Little, Beverly L

ProQuest document link

Abstract:

The primary subject matter of this case concerns cost-volume-profit analysis for a non-forprofit regional playhouse. The difficulty of the case would make it appropriate for graduate-level managerial accounting courses. The case is designed for one or two three-hour class sessions and should require six to eight hours of outside preparation by the students.

Full text:

CASE DESCRIPTION

The primary subject matter of this case concerns cost-volume-profit analysis for a non-forprofit regional playhouse. The difficulty of the case would make it appropriate for graduate-level managerial accounting courses. The case is designed for one or two three-hour class sessions and should require six to eight hours of outside preparation by the students.

CASE SYNOPSIS

This case asks students to apply cost-volume-profit analysis to a regional playhouse that is undergoing renovation. The methods familiar to students in manufacturing will be used to address questions such as how to keep the playhouse operating on a regular schedule while servicing the debt associated with the renovation, which combination of plays to produce (and how many performances) and how to raise outside contributions.

AuthorAffiliation

Philip L. Little, Western Carolina University

plittle@wcu.edu

Beverly L. Little, Western Carolina University

little@wcu.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 1

Pages: 55

Number of pages: 1

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192412094

Document URL: http://search.proquest.com/docview/192412094?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 78 of 100

ROSA

Author: Lybrook, Daniel

ProQuest document link

Abstract: None available.

Full text:

Headnote

ABSTRACT

The radio played softly in the background as Sharon carefully read the registered letter from the Equal Employment Opportunity Commission. It stated that Rosa Reyes was suing Midwest Manufacturing for discrimination because of her race, color, national origin, gender, and perceived and/or actual disability. Rosa was asking for punitive damages of $100,000, court costs, and a clean disciplinary record. EEOC extended an offer to mediate the charge. It asked Midwest to contact EEO within ten days with a response to the charges.

Midwest has a progressive disciplinary system with a possible five step procedure, depending upon the severity of the behavior. The steps are verbal warning, written warning, second written warning, suspension, and termination.

Sharon went to the personnel files and took a look at Rosa's information.

ROSA

Rosa was born in San Antonio, Texas in 1946 of Hispanic parents. She grew up in Texas and moved to the Midwest after graduating from high school to take a job in a factory in Indiana. Her uncle had moved north a few years before and had taken a job. When Rosa graduated, her uncle had gotten her a job on an assembly line where he worked. She could make more money than any job she knew about in San Antonio and so moved north. She had lived with her uncle and aunt. She was a good worker and did well. She was happy in Indiana. A few years later, she met Jose Reyes and had gotten married. When she and Jose started having children, she had stopped working.

In 1975, Rosa rejoined the workforce. She had taken a job as a gear and spline grinder at Midwest Manufacturing. This was an entry level job and the skills she needed to perform the duties of the position were provided through training at Midwest - classroom as well as on the j ob training. Rosa thrived in her new position. She was well liked and respected by both her hourly coworkers and her managers and received very good evaluations from her supervisors. Rosa realized the importance of education and enrolled in classes at the community college. She took a class or two each semester so as not to take time away from her job or family.

In 1986, Rosa was promoted to a Leadperson Setup position. This position represented an increase in responsibility and reflected the respect she had earned through her performance in the grinder position. One of her new duties was that of group leader for her department, as well as more complex machining responsibilities. She continued her studies and was accepted into the Industrial Technology department at a nearby university. Her evaluations continued to be very good.

In 1991, Rosa left the ranks of the hourly when she received a promotion to Standards Engineer. This reflected her good work for Midwest as well as the fact that she would be graduating from the university soon and Midwest wanted to retain her. As a Standards Engineer, Rosa worked with customers and the hourly operators on quality issues. She received her degree in IT from the university in May 1992. She performed well in this new position and was again promoted in 1994 to Area Manager - Non Gear. This position was responsible for quality in preliminary gear development - holes, contours, rims, etc. Rosa remained popular with the hourly and salaried employees and was highly regarded by management, getting many tough assignments and performing in an exemplary fashion on them.

2001 marked a difficult business year for Midwest that resulted in a major restructuring and downsizing in March. The reduction in force plan for salaried workers was based on skills and performance. These two factors were weighted equally in making these decisions. Rosa made the cut but ended as a Quality Area Manager, a step down from her previous position. But after 26 years with Midwest, she did still have a job!!

Another company reduction in force occurred May 2001, followed by another in November 2001. The same RIF plan was used each time with skills and performance being equally weighted. Rosa maintained her position each time.

Rosa's medical file showed no real problems or time lost. Her attendance record showed nothing out of the ordinary. And Rosa did not have any disciplinary write ups in her file except for those two most recent ones.

THE INCIDENTS

In a meeting of quality and operations managers on May 9, Rosa was observed by the other eight managers in attendance to be sleeping during the managers meeting. She was placed on notice in a disciplinary counseling session with her supervisor that sleeping during meetings or at any other time while at work is not acceptable. Any further incident such as this will lead to further disciplinary action, up to and including discharge. A disciplinary warning was written and placed in her personnel file by her manager John Jones. When she asked him why he had gone to that length for this event, John told her that the only reason he wrote her up is because the VP of HR, Henry Blodge, made him do it. During this meeting, Rosa contended that another (Caucasian, male) manager in her department had fallen asleep during a meeting and John had simply j oked about him when he called out to wake him up during the meeting. He had not written that person up. John had duly noted this in his documentation but had no comment to Rosa about this.

Rosa notified Company Nurse that she didn't come to work for 2 days, 5/11 and 5/12, for various medical reasons. She was seeing her physician and having blood tests done. The phone message to the nurse said," Plans to bring in a doctor's note. She has a medical condition that causes her to sleep during meetings."

When Rosa returned on 5/13, she had a doctor's note that "she was a diabetic and her blood sugar can affect her to make it appear that she is falling asleep." This is the first that Midwest knew about this. Rosa claimed, "On that day I was having a problem with my blood sugar. After 27 years of excellent service, my superiors know that I would NEVER intentionally misrepresent myself or this company."

On July 10, Barry Johnson, a supervisor in the same department as Rosa, initiated a 2nd documented notice. Rosa had been reported by various employees in the department to be fading in and out of alert status - closing her eyes and drooping her head during work hours while at her desk. When Barry went to her desk, that is what he saw. So he woke her up and wrote her up to serve as an example to other employees that sleeping at work is unacceptable behavior and is in violation of the Company Work Rules and Regulations. Rosa stated that she would bring in medical documentation.

At her disciplinary counseling session, Rosa thanked the company for calling to her attention to her serious medical condition. She was very grateful to Midwest for pointing this problem out because it will make her get a doctor's opinion of the problem. She stated that she did not like to go to doctors because they "only tell you to change your eating habits, quit smoking, and lose weight. I know all that stuff without having to pay to hear it!"

July 17, Rosa brought in documentation from her physician regarding a sleep disorder called sleep apnea. This condition made it difficult for Rosa to get a good night's sleep and hence left her tired and drowsy during the day. Rosa requested formally that the two documented warnings be removed from her personnel file.

On July 18, Rosa was told by John Jones that the warnings would stay in her file.

BACK TO MIDWEST

Midwest underwent another round of downsizings in August 2002. Rosa was not effected, The same criteria were used as before.

In February and March of 2003, the employee rumor mill at Midwest was full of downsizing talk. Everyone was sure there were more downsizings to come and who knew how deep or wide the next would be!! In this climate, on May 16, 2003, the company received a charge of discrimination from EEOC.

When looking at Rosa's file, Sharon also looked up some disciplinary warnings for other like circumstances. She found three recent events

7/18/2002 White, male, over 40 employee who was written up for sleeping on the job.

5/13/2002 Black, male, over 40 maintenance manager who was written up for sleeping on the job.

12/6/2000 Black, male, over 40 maintenance manager who was written up for sleeping on the job.

All three of these employees remained with Midwest at this time.

TO YOU

What do you think Sharon and Midwest should do?

AuthorAffiliation

Daniel Lybrook, Purdue University

lybrood@purdue.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 1

Pages: 57-59

Number of pages: 3

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192412271

Document URL: http://search.proquest.com/docview/192412271?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 79 of 100

THE ORANGE PEEL SOCIAL AID AND PLEASURE CLUB

Author: Patenotte, Dennis; Mechling, George W

ProQuest document link

Abstract:

The Orange Peel Social Aid and Pleasure Club located in downtown Asheville, NC is the premiere music venue in Western North Carolina. This entertainment club attracts music groups from all over the United States and the world and is reputed to have the best beer selection in town. Fans travel to the Orange Peel from all over the southeast of the United States to enj oy their favorite musicians live. The club opened in the Fall, 2002 and has become the most popular night spot in Asheville since that time. The Orange Peel's goal is to provide its customers the best convivial social atmosphere and "pop" music in a 100 mile radius.

An important revenue center for the club is its wet bar. The opportunity for the bar to generate the most revenue occurs on nights when the club has a sold-out show. Therefore, it is important on such nights that the club's manager assign its eight bartenders to the bar's six work stations so as to position the club in the best way possible to realize the bar's revenue potential. This is not a straight forward decision. Certainly, one might expect the manager to have all six of the bar's work stations staffed and the cash register at each station open. While maybe necessary, it is not sufficient to put the club in a position to realize the bar's revenue potential. This is because the revenue performance of each bartender varies from one work station to the next. Therefore, their work station assignments at the bar are crucial.

This case is about how to staff the bar so as to position the club in the best possible way to realize its bar's revenue potential. Should the club's manager wish to less than fully staff the wet bar for nights that are not sell-outs, the "Teaching Note" will consider this possibility.

Full text:

Headnote

CASE DESCRIPTION

This case provides students enrolled in management science/quantitative business methods courses the opportunity to decide how a real-world entertainment club should assign its bartenders to work stations at its wet bar so as to position itself to realize the bar's revenue potential. The bar has six work stations and the expected revenue each of the club's eight bartenders generates varies from work station to workstation. Doubling up bartenders at selected work stations is practiced. The complexity of the assignment requirements and restrictions to be programmed in this case go beyond what the "assignment" algorithms found in most student software can accommodate. Linear programming is not so limited and thus, is this case's methodology of choice. This case is valuable to students for several reasons. Its assignment restrictions and requirements reflect the reality in which this club operates and are therefore, quite realistic and practical and worth knowing how to program. Programming many of these assignment restrictions and requirements will also challenge students well beyond what they customarily encounter in most linear programming problems. It also requires students to use their intuition to some extent in order to recognize when for some assignment situations the club faces, the application of a methodology such as linear programming is not particularly necessary. Finally, students can transfer the lessons this case teaches to other business settings. This case is designed for upper class undergraduate and MBA students and to be taught in 2 class hours, with 3-4 hours of student preparation time. The instructor can modify this case to achieve more complexity. Suggestions for doing so are in the "Instructor's Note."

CASE SYNOPSIS

The Orange Peel Social Aid and Pleasure Club located in downtown Asheville, NC is the premiere music venue in Western North Carolina. This entertainment club attracts music groups from all over the United States and the world and is reputed to have the best beer selection in town. Fans travel to the Orange Peel from all over the southeast of the United States to enj oy their favorite musicians live. The club opened in the Fall, 2002 and has become the most popular night spot in Asheville since that time. The Orange Peel's goal is to provide its customers the best convivial social atmosphere and "pop" music in a 100 mile radius.

An important revenue center for the club is its wet bar. The opportunity for the bar to generate the most revenue occurs on nights when the club has a sold-out show. Therefore, it is important on such nights that the club's manager assign its eight bartenders to the bar's six work stations so as to position the club in the best way possible to realize the bar's revenue potential. This is not a straight forward decision. Certainly, one might expect the manager to have all six of the bar's work stations staffed and the cash register at each station open. While maybe necessary, it is not sufficient to put the club in a position to realize the bar's revenue potential. This is because the revenue performance of each bartender varies from one work station to the next. Therefore, their work station assignments at the bar are crucial.

This case is about how to staff the bar so as to position the club in the best possible way to realize its bar's revenue potential. Should the club's manager wish to less than fully staff the wet bar for nights that are not sell-outs, the "Teaching Note" will consider this possibility.

INTRODUCTION

The Orange Peel Social Aid and Pleasure Club is located in downtown Asheville, NC and is the premiere music venue in Western North Carolina. This entertainment club attracts music groups from all over the United States and the world and is reputed to have the best beer selection in town. Fans travel to the Orange Peel from all over in southeast United States to enjoy their favorite musicians live. The club opened fall 2002 and has become the most popular night spot in Asheville since that time.

THE CONCERN

The Orange Peel's goal is to provide its customers the best convivial social atmosphere and "pop" music in a 100 mile radius. The club's shows frequently sell out because of its popularity. This means that sell-out crowds of close to 950 excited guests on these nights look to purchase their beverages from one of eight bartenders tending the wet bar. The wet bar is one of the club's most important revenue centers and the newly-hired club manager is greatly concerned that the effectiveness of its management during sold-out shows could be improved. She knows that with the club's current success selling out its shows problems in the club's operations function are easy to overlook or ignore even though they could eventually prove to be decisively debilitating. Consequently, she shares her concern with the club's owners and general management and receives their blessing to task herself with assessing the bar's productive efficiency and submitting to them recommendations to improve the bar's revenue performance where it appears warranted.

PROBLEM SPECIFICS

The layout of the wet bar is as follows (See Figure One).

There are five work stations, each with a cash register (WS1 through WS5) behind the main bar and one work station with a cash register, work station six (WS6), at the satellite bar. Due to the layout of the bar some work stations have more traffic than others. When customers first enter the club they see WS1 and WS2 first. Therefore, the bartenders assigned to these stations usually tend to be the busiest. The bar is 20 yards long with the work stations and their cash registers evenly spaced and the bartenders walk and sell the entire 20 yards. Since most customers walk to the closest cash register the bartenders assigned to WS3, WS4, and WS5 often must walk between 10-17 yards to take a customer order. Also, many of the ingredients for mixing beverages have special placements behind the bar and require bartenders to move back and forth behind the bar to get to them. The satellite bar, W6, has its own cash register and is on the other side of the bar at a room corner.

THE ASSESSMENT

The club's manager does her assessment over several weeks of sold-out shows reviewing cash register receipts while randomly assigning her eight bartenders to different work stations and observing their performances. As a result of her assessment, the club's manager observes that the skill and efficiency with which each bartender mixes and serves drinks varies. Also, since the ingredients for mixing beverages have special placements behind the bar, some bartenders must move back and forth behind the bar more than others to get to them because of their work station assignments. Also, the satellite bar, compared to the main bar, has a low selection of products. Consequently, revenue at the satellite bar (WS6) is on average lower than at any of the other work stations at the main bar. This infers that revenue varies between bartenders and for any one bartender from work station to work station. Cash register receipts at the six work stations for the eight bartenders support this inference. Table One summarizes this variation. The club manager also observes that the bar's operation often appears to stall when the beer kegs on tap have gone empty and are being replaced by full ones. Kegs on tap are located at WS5 because of their close proximity to the keg cooler.

THE PROBLEM

Following her assessment, the club manager reports her finding and conclusions to the "Peel's" owners and general management. She concludes that a bartender's work station assignment can matter. Her problem then is to assign her bartenders so as to put the club in the best position possible to realize the bar's revenue potential. She is content for the moment to see if the effectiveness of the bar's management can be improved through making informed workstation assignments without resorting to any physical modifications.

She does however, have several considerations she must entertain that will constrain what she does. Andrew and Lori are the bar managers. The club determined early on that it needed to assign them exclusively to WSl and WS2 because these workstations are where the greatest flow of customer traffic occurs and it is from these two vantage points that those in charge of coordinating the bar's operations can best see what needs to be done. (The two bar managers are not assigned to the same workstation, however.) She agrees. The other bartenders, Sterling, Gavra, Chad, Mike, Jessica, and Leslie are part timers and report for work as needed. This will provide the club manager with some welcomed flexibility particularly when she makes assignments for less-than sell-out shows. She does want to assign Sterling, Chad or Mike (at least one of the three) to WS5 because the bartenders at that work station also have the responsibility to change out the beer kegs when they are empty. The door to the keg cooler is right beside WS5 and Sterling, Chad and Mike have already agreed to lift kegs that weigh up to 801bs. This is the club manager's way of remedying the stalling of the bar's operation when kegs have to be exchanged. And lastly, there can be no more than two bartenders assigned to any one work station and its associated cash register at the same time that is consistent with how the bar operated prior the club manager's hiring. The club's owners and general management are pleased with her recommendations because they are barely disruptive while promising to fine tune the bar's operations and increase its productivity. Assuming that the club manager has a management science background, what should she do? What results should she get? And how would she proceed if the show is not a sell-out?

AuthorAffiliation

Dennis Patenotte, Western Carolina University

George W. Mechling, Western Carolina University

gmechling@email.wcu.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 1

Pages: 63-66

Number of pages: 4

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192412105

Document URL: http://search.proquest.com/docview/192412105?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 80 of 100

MAJOR LEAGUE BASEBALL'S GLOBAL EXPANSION: IS BASEBALL IN MLB'S FUTURE?

Author: Rarick, Charles; Nickerson, Inge; Winter, Gregory

ProQuest document link

Abstract:

In March 2004, the World Series Florida Marlins played the Houston Astros in a preseason goodwill game in Mexico City. The game ended in a 2-2 tie and many of the 11,000 fans in attendance pelted the field with debris as the game came to an undecided end. While professional basketball and American football have begun to see significant increases in international interest, baseball's interest globally has remained flat. With the failure of the Montreal Expos franchise, Major League Baseball (MLB) had to find a new city for the team, and one serious contender was a city in Mexico.

Full text:

Headnote

CASE DESCRIPTION

The primary subject matter of this case concerns the strategic choice of Major League Baseball not to expand the league into Mexico. Secondary issues examined include the cross-cultural aspects marketing. The case has a difficulty level of three, being appropriate for junior level students. The case is designed to be taught in one class hour and it is expected to require four hours of outside preparation by students.

CASE SYNOPSIS

Major League Baseball had a decision to make. With the failure of the Montreal Expos, MLB was seeking to relocate the team to one of six cities. One of the strong contenders for selection was the city of Monterrey, Mexico. Monterrey has a rich baseball history and a number of advantages over its competitors. At the same time, moving into Mexico would present MLB with a number of difficulties. The case explores the choice MLB made, and looks at the unique situation presented by the prospects of moving baseball south of the border.

INTRODUCTION

In March 2004, the World Series Florida Marlins played the Houston Astros in a preseason goodwill game in Mexico City. The game ended in a 2-2 tie and many of the 11,000 fans in attendance pelted the field with debris as the game came to an undecided end. While professional basketball and American football have begun to see significant increases in international interest, baseball's interest globally has remained flat. With the failure of the Montreal Expos franchise, Major League Baseball (MLB) had to find a new city for the team, and one serious contender was a city in Mexico.

HISTORY OF BASEBALL

Baseball, as played in the United States, dates back to the mid-1700s and evolved from a very similar British game called rounders. Rounders, or "base" as it was sometimes called was played on a diamond-shaped field and had many of the characteristics of modern day baseball. Credit for the invention of baseball often goes to Abner Doubleday, a general in the U.S. Civil War. Historians now doubt Doubleday's invention of the sport and generally believe that the legend was created by A.G. Spalding in an attempt to make baseball "America's Pastime" and to sell more baseball equipment. Having a Civil War hero as the invention of an American game was good for his business.

It can be argued that American baseball was really created by Alexander Cartwright in 1845 when he created the rules of the modern game. In 1846 the first game as played between two amateur teams in Hoboken, New Jersey. It was amateurs who enjoyed the sport enough to play without compensation who first played baseball in America. As amateur teams multiplied in the U.S., travel and other expenses increased which required the charging of an admission fee to view a game. In 1869 Harry and George Wright organized the first team of paid players, the Cincinnati Red Stockings. The brothers were able to recruit the best players and won many games. The era of professional baseball had arrived.

In 1875 the National League was formed to set standards for ticket prices and to regulate player contracts. In 1901 a rival league was formed called the American League. Overtime the two leagues learned to work together and to successfully defend against new entrants. In 1922 the United States Supreme Court decided in their favor and ruled that baseball was exempt from anti-trust legislation. The National and American Leagues no longer had to worry about competition. The game grew in popularity in the U.S. and was played on a limited basis in other countries as well. Mexico was quick to follow the U.S. in appreciating the sport.

BASEBALL IN MEXICO

The origins of baseball in Mexico are somewhat unclear, however, it is generally believed that the game arrived sometime between 1870 and 1890. Many areas of Mexico claim to have been the birthplace of baseball in the country, including Mazatlan, Veracruz, and Nuevo Leon. Monterrey, Mexico in the Mexican state of Nuevo Leon developed a strong interest in baseball in the early years, and has maintained that interest up to the present. Monterrey today boasts a popular team called the Sultanes, is home to the Baseball Hall of Fame for Mexico, and is proud of the fact that its Little League team was the first non-United States team to win the Little League World Series. In 1957 Jose "Pepe" Maiz Garcia was the star player for the Monterrey Little Giants which won the World Series. Maiz is still actively involved in Mexican baseball.

The relationship between Mexico and the United States in terms of baseball goes back even earlier than the Little League World Series. In the 1940s eighteen Major League players accepted higher salaries to play for Mexican teams. Liquor dealer Jorge Pasqual offered many Major League players salaries that were often as high as five times their normal salary if they would play for Mexican teams. A number of players from the Negro Leagues accepted Pasqual's offer, as did some players from the Major Leagues. Baseball Commissioner, A.B. "Happy" Chandler did not like Major League players defecting to Mexico and threatened to ban any players who made the move. The few players who did play in Mexico found conditions to be difficult, including one playing field that consisted of a railroad track running through the outfield. Most of the players soon returned to the U.S. and attempted to get their jobs back. All the players were blacklisted and not allowed to play until they challenged the League in court and the League rescinded its ban.

By 1955 the Mexican League was struggling for survival and Anuar Canavati, president of the Monterrey Sultanes created a plan to begin working with the Major Leagues. The Mexican Leagues prospered and grew to twenty teams. Today the Mexican League consists of 16 summer teams and 8 winter teams. Roughly half of the Major League teams have working relationships with Mexican teams. In addition, a number of Mexican players have gone on to the Major Leagues.

Mexican baseball teams do not draw the same attendance figures as the Major Leagues and are closer to the Minor Leagues in revenues. Attendance for the 16 summer teams can be seen below.

Mexican League Average Attendance

2003

Saltillo Sarape Makers 11,387

Monterrey Sultanes 9,301

Yucatan Lions 4,424

Monclova Stealers 4,053

Luguna Cowboys 3,559

Puebla Parrots 3,024

Angelopolis Tigers 2,732

Cancun Lobstermen 2,604

Oaxaca Warriors 2,430

Cordoba Coffeegrowers 2,044

Reynosa Broncos 1,643

Mexico City Red Devils l,559

Tabasco Carrlemen 1,540

Veracruz Reds 1,475

Two Laredo Owls 1,351

Campeche Pirates 1,225

MONTREAL TO MONTERREY?

In 2002 the Montreal Expos were purchased by the other 29 Major League teams due to the team's inability to attract a sizable fan base in Montreal. The decision was made to relocate the team to a city that would be more supportive of a Major League team. A number of cities had expressed an interest in being the new home of the Expos including Washington, D. C, Portland, San Antonio, Las Vegas, and San Juan Puerto Rico. Monterrey, Mexico was also a strong contender for selection. Monterrey is located in Northern Mexico which puts the city within a few hours by air of many U. S. cities. The city is relatively clean, economically viable, and safe. With 3.5 million inhabitants, Monterrey exceeds the population of some U.S. cities with successful baseball programs.

Monterrey has a desert climate, making it a good choice for outdoor sports. Currently the city has a 27,000-seat stadium which is considered by many to be the best in Latin America. The stadium has an impressive view of the Cerro de la Silla Mountains and residents are excited about the prospects of Major League baseball coming to Monterrey. The MLB relocation committee visited Monterrey and declared that the stadium was suitable for Major League play. Some modifications would have to be made including the addition of 3,000 more seats. The Commissioner of baseball, Bud Selig stated, however, that the city chosen for the Expos would have to be willing to build a new stadium within five years.

Monterrey has a very supportive ownership group headed by wealthy financier Carlos Bremer and Jose Maiz of World Little League fame and the owner of the Monterrey Sultanes. MLB has been eyeing the international market since 1999, playing 60 games in Mexico, Cuba, Venezuela, Japan, Puerto Rico, and the Dominican Republic. MLB plans to start playing some games in Europe next season. The Mexican League is a member of the National Association of Professional Baseball Leagues which regulates the Minor Leagues in the United States. Mexican baseball is at present considered the equivalent of America's Triple A League. Attendance at Mexican League games increased by 4.2% in 2003. Some observers worried that moving a team to Mexico would lead to many difficulties due to language barriers and the volatility of the Mexican peso. Others felt that since over 40% of players under MLB contract are from Latin America, that it is perhaps time for a Mexican team. As Jose Maiz states: "If we had the team here (Monterrey), 104 million Mexicans could follow the team, plus 25 million Mexicans working in the States."

WASHINGTON OVER MONTERREY

While some had predicted that Monterrey would be selected as the new home of the Expos, on September 29, 2004 it was announced that Washington, D.C. had won the bid to host the team. The mayor of Washington, Anthony Williams made the announcement by stating: "After 30 years of waiting, and waiting, and waiting, and a lot of hard work and more than a few prayers, there will be baseball in Washington in 2005." The team will play its first three seasons in R.F.K. Stadium until a new $400 million stadium is built. Baseball Commissioner Bud Selig released a statement justifying the selection of Washington by stating "There has been tremendous growth in the Washington, D.C. area over the last 33 years and we in Major League Baseball believe that baseball will be welcomed there and will be a great success." Selig praised the city of Washington, D.C. for its tenacity and dedication to having baseball return to the city. Washington has been home to previous Major League teams. From 1901 to 1960 the Senators played in Washington before moving to Minnesota to become the Twins. From 1961 to 1971 Washington hosted another team called the Senators, but this team also moved, this time to Texas to become the Rangers. The Washington, D.C. area has a wealthy and growing population, however, not everyone is happy with the selection. The proposed stadium site is only 35 miles from another Maj or League team, the Baltimore Orioles, and the team's owner as expressed concerns about the possibility of Washington eroding the fan base of the Orioles. In addition, the proposed stadium will replace property currently housing homosexual strip bars, dance clubs, and adult theaters. Leaders of the District's homosexual community have vowed to fight the stadium. As MLB eyes competiting markets, the organization must not only consider the sale of pennants and hats, but also television revenue and the possible expansion into other cities and markets. While other American sports have been successfully exported to the global market, baseball has experienced limited international appeal. As MLB baseball ponders international expansion, the people of Monterrey are still hopeful that they too will soon be able to host a Major League Baseball team.

DISCUSSION QUESTIONS

1. Did MLB make a mistake in selecting Washington, D.C. over Monterrey, Mexico?

2. Should MLB establish a Mexican franchise?

3. How important is internationalization to the success of MLB?

References

SOURCES

Baxter, K. (2004). MLB eyes Mexico. Miami Herald, March 14.

Baxter, K. (2004). Extra-disappointed fans litter field with debris. Miami Herald, March 15.

Beyer, R. (2004). The greatest stories never told. New York: HarperCollins Publishers.

Dellios, H. (2004). Monterrey makes a pitch for the Expos. Chicago Tribune, February 10.

Lahman, S. (1996). Abrief history of baseball. Retrieved March 14, 2004 from www.baseball.com.

Miller, S. (2004). Gay leaders to fight proposed ballpark. The Washington Times, October 4.

Sanchez, J. (2004). History of baseball in Mexico. Retrieved March 14, 2004 from www.mlb.com.

Sandomir, R. (2004). Baseball returns to Washington as Expos move from Montreal. The New York Times, September 29.

Tayler, L. (2004). From Montreal to Monterrey? Cincinnati Post, March 12.

Ward, G. & K. Burns. (1994). Baseball: An illustrated history. New York: Alfred A. Knopf.

AuthorAffiliation

Charles Rarick, Barry University

crarick@mail.barry.edu

Inge Nickerson, Barry University

inickerson@mail.barry.edu

Gregory Winter, Barry University

gwinter@mail.barry.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 1

Pages: 67-71

Number of pages: 5

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192412041

Document URL: http://search.proquest.com/docview/192412041?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 81 of 100

THE UTAH SUMMER GAMES

Author: Roberts, Wayne A; Steed, Emmett D

ProQuest document link

Abstract:

The primary subject matter of this case concerns the development, implementation, and analysis of a real market research project. Secondary issues examined include the link between research objectives and questionnaire development, sampling and non-sampling error, and practical problems and issues that affect marketing research projects. The case has a difficulty level of four. The case is designed to be taught in one to two class hours, and is expected to required 2 to 3 hours of outside preparation by students.

Full text:

CASE DESCRIPTION

The primary subject matter of this case concerns the development, implementation, and analysis of a real market research project. Secondary issues examined include the link between research objectives and questionnaire development, sampling and non-sampling error, and practical problems and issues that affect marketing research projects. The case has a difficulty level of four. The case is designed to be taught in one to two class hours, and is expected to required 2 to 3 hours of outside preparation by students.

CASE SYNOPSIS

In 2004 the new director of the Utah Summer Games, an athletic event modeled after the Olympics that draws over 3100 athletes, is concerned about the lack of any data other than anecdotes and annual registrations. No one was sure how satisfied athletes and their families are with the athletic events, the opening and closing ceremonies, and the products, services and environment of Cedar City. They also do not know how people learn about the events. The case depicts the planning, implementation, and some results of a marketing research project developed to measure satisfaction levels regarding the community and the opening ceremonies, and to assess what other activities participants do in conjunction with the games. Manageable in scope, the case illustrates marketing research steps, has some shortcomings for students to identify, and has enough results to permit them to reach some tentative conclusions. The case is simple enough to be used in a marketing principles course. Its value is probably greatest in a marketing research course, where it can also be used as an illustrative project in the beginning, and referred to throughout the course as sampling and non-sampling error, questionnaire development, and data analysis topics arise. It could also be used as a model for semester-long student projects.

AuthorAffiliation

Wayne A. Roberts, Jr., Southern Utah University

RobertsW@suu.edu

Emmett D. Steed, Southern Utah University

Steed@suu.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 1

Pages: 73

Number of pages: 1

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192412446

Document URL: http://search.proquest.com/docview/192412446?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 82 of 100

THE MILTON HEALTH AND REHABILITATION CENTER

Author: Schwab, Robert C

ProQuest document link

Abstract:

This short case focuses on the problems of mixing religious values with a secular work environment. Fairness issues dealing with freedom of expression and prayer in the workplace, religious intimidation, discrimination and harassment are raised. The case has a difficulty level of four, and is best-suited for use in junior, senior, or graduate-level courses in human resource management or organizational behavior. This case can be presented and discussed in about one and a half hours, and is expected to require two to three hours of outside preparation by students.

Full text:

CASE DESCRIPTION

This short case focuses on the problems of mixing religious values with a secular work environment. Fairness issues dealing with freedom of expression and prayer in the workplace, religious intimidation, discrimination and harassment are raised. The case has a difficulty level of four, and is best-suited for use in junior, senior, or graduate-level courses in human resource management or organizational behavior. This case can be presented and discussed in about one and a half hours, and is expected to require two to three hours of outside preparation by students.

CASE SYNOPSIS

This case is set in a private mid-western rehabilitation center. The new owner has implemented an operating philosophy based on Biblical principles, and the born-again assistant administrator now begins all staff meetings with prayer. The situation is exacerbated when the assistant administrator persists in inviting staff to attend evangelistic meetings at his church. A few workers are concerned about this new imposition of religion in the workplace, and become more alarmed when they discover that the highest raises have been given to workers who attended some of the evangelistic meetings and who regularly volunteer to pray at the staff meetings. After an employee quits and file s a complaint with the Michigan Department of Civil Rights, an investigation discovers that a couple of worker s have felt somewhat annoyed, while the majority at the center feel the working environment has never been better. Are the new owner's religious values appropriately expressed and displayed at work, or has the work environment become one of religious discrimination, harassment and intimidation?

AuthorAffiliation

Robert C. Schwab, Andrews University

schwab@andrews.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 1

Pages: 75

Number of pages: 1

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192412288

Document URL: http://search.proquest.com/docview/192412288?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 83 of 100

CAPE TRAVEL, INC.

Author: Smith, D K "Skip"

ProQuest document link

Abstract:

Over the last three or four years, gross revenues generated by this travel agency located in a small city in rural Missouri have fallen from $3,000,000 per year to approximately half that amount. While the commissions received by this agency (10% of gross) continue to cover office overheads, they no longer provide the owner the level of compensation he desires and (because of mortgage, college tuition, car payments, and other financial obligations) needs. Students are challenged to come up with suggestions for increasing the agency's gross revenues and commissions. This short one-page case contains a bit of information about the market in which the travel agency is located, a bit of information about several of the key customer groups served by the agency, and a bit of information about the kinds of services the agency has provided its customers over the years. The teaching note includes a copy of suggestions for the owner generated by a group of students who tackled this assignment as a "live case" class project; the epilogue includes the owner's very positive comments about the suggestions he receivedfrom those students. This case is appropriate for senior-level undergraduates as well as students in MBA and/or Executive Development Programs. It is designed to be taught in a class session of 1.5 hours, and is likely to require a couple of hours of preparation by students.

Full text:

CASE OVERVIEW

Over the last three or four years, gross revenues generated by this travel agency located in a small city in rural Missouri have fallen from $3,000,000 per year to approximately half that amount. While the commissions received by this agency (10% of gross) continue to cover office overheads, they no longer provide the owner the level of compensation he desires and (because of mortgage, college tuition, car payments, and other financial obligations) needs. Students are challenged to come up with suggestions for increasing the agency's gross revenues and commissions. This short one-page case contains a bit of information about the market in which the travel agency is located, a bit of information about several of the key customer groups served by the agency, and a bit of information about the kinds of services the agency has provided its customers over the years. The teaching note includes a copy of suggestions for the owner generated by a group of students who tackled this assignment as a "live case" class project; the epilogue includes the owner's very positive comments about the suggestions he receivedfrom those students. This case is appropriate for senior-level undergraduates as well as students in MBA and/or Executive Development Programs. It is designed to be taught in a class session of 1.5 hours, and is likely to require a couple of hours of preparation by students.

CASE SYNOPSIS

Jacob Johns needs to increase the gross revenues and commissions generated by his travel agency, which is located in a small city in rural Missouri. This case is best used to stimulate discussion around the question of options which can be identified for "turning around" a company which is not doing well. As indicated above, this one-page mini-case contains a bit of information about the market served by the travel agency, the key customer groups in that market, and the sorts of services the travel agency has (over the years) been providing to those customer groups. As also indicated above, the teaching note includes suggestions generated by a group of students who tackled this assignment as a "live case" exercise, and (in the epilogue) the very positive comments Mr. Johns made regarding the insightfulness and usefulness of those suggestions.

AuthorAffiliation

D.K. "Skip" Smith, Southeast Missouri State University

dksmith@semo.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 1

Pages: 79

Number of pages: 1

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192412087

Document URL: http://search.proquest.com/docview/192412087?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 84 of 100

SOUTHEAST MISSOURI STATE UNIVERSITY

Author: Smith, D K "Skip"; Cathey, China

ProQuest document link

Abstract:

This case challenges students to consider what revisions to the current mission statement of Southeast Missouri State University (SEMO) might be appropriate. As the case indicates, last year the author was asked this question (that is, what changes in the university's mission statement might be appropriate) by an influential businessperson living within the university's service area. While the case is short, it does provide a brief overview of the history of the university, a copy of the university's current mission statement, and several characteristics of the university's 26 county service area and the individual counties within that service area. The epilogue to the case (contained in the teaching note) provides a copy of the revised mission statement prepared last year by the author and his students, plus a copy of the very positive comments about this revised mission statement made by the influential local businessperson. This case is appropriate for senior-level undergraduates as well as students in MBA and/or Executive Development Programs. It is designed to be taught in a class session of 1.5 hours, and is likely to require a couple of hours of preparation by students.

Full text:

CASE OVERVIEW

This case challenges students to consider what revisions to the current mission statement of Southeast Missouri State University (SEMO) might be appropriate. As the case indicates, last year the author was asked this question (that is, what changes in the university's mission statement might be appropriate) by an influential businessperson living within the university's service area. While the case is short, it does provide a brief overview of the history of the university, a copy of the university's current mission statement, and several characteristics of the university's 26 county service area and the individual counties within that service area. The epilogue to the case (contained in the teaching note) provides a copy of the revised mission statement prepared last year by the author and his students, plus a copy of the very positive comments about this revised mission statement made by the influential local businessperson. This case is appropriate for senior-level undergraduates as well as students in MBA and/or Executive Development Programs. It is designed to be taught in a class session of 1.5 hours, and is likely to require a couple of hours of preparation by students.

CASE SYNOPSIS

This case can be used to stimulate discussion of at least four interesting and important questions: 1) What models and/or variables can be used to assess organizational mission statements and to improve them if they are found wanting; 2) Can the models and/or variables identified in question #1 (above) be used not only in the case of mission statements of "for-profit" organizations but also with "non-profit" organizations like universities; 3) Assuming the answer to question #2 (above) is "yes," what might an updated and revised mission statement for Southeast Missouri State University look like; and 4) If the models and/or variables set forth above were applied to the mission statement of a reader's own university, what might an updated and revised mission statement for his or her own university look like? As indicated above, data in the case include: 1) Brief history of SEMO; 2) Copy of SEMO's current mission statement; and 3) Some information regarding SEMO's service area and the characteristics of the individual counties comprising that service area. Data in the teaching note include: 1) A copy of the revised mission statement prepared by the author and his students; and 2) In the epilogue, a copy of the very positive comments about the revised mission statement made by the influential businessperson whose question triggered the creation of this case.

AuthorAffiliation

D.K. "Skip" Smith, Southeast Missouri State University

dksmith@ semo.edu

China Cathey, Southeast Missouri State University

cd_cathey@hotmail.com

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 1

Pages: 81

Number of pages: 1

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192412107

Document URL: http://search.proquest.com/docview/192412107?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 85 of 100

BUSINESS ETHICS AND THE NEW EMPLOYEE: SOME PITFALLS

Author: Thomson, Neal F

ProQuest document link

Abstract:

In this article, you will be presented with several scenarios, of the type many new graduates encounter in their first year out of college. Read each case, with an eye toward ethical issues. Identify any problematic areas, and be prepared to discuss them.

Full text:

Headnote

CASE DESCRIPTION

The primary subject matter of this case concerns business ethics,. This case has a difficulty level of three to four, and is appropriate for an upper division, undergraduate level. This case is designed to be taught in one class hour, and is expected to require two to three hours of outside preparation by students.

CASE SYNOPSIS

This case presents students with several scenarios, of the type new employees could encounter, and asks them to evaluate the possible outcomes, using ethics as a primary framework. Some of the points they will have to consider include peer pressure, downward influence from their boss, social norms, and legal issues. Each scenario presents a specific instance in which an individual is asked to do something that may or may not be unethical, followed by a series of questions to encourage ethical considerations during decision making. These are geared toward the goal of critical thinking and discussion, rather than establishing a single, absolute right/wrong answer.

INTRODUCTION

Below you will be presented with several scenarios, of the type many new graduates encounter in their first year out of college. Read each case, with an eye toward ethical issues. Identify any problematic areas, and be prepared to discuss them.

1) THE INTERVIEW

Doug Johnson* recently graduated with a degree in Business Marketing. His grades and past work experience made him an attractive candidate for many companies. He was invited to interview with the AACE* Corporation, on the strength of his resume and a phone interview. As this company was not local, he was flown in for his interview, and put up in a posh downtown hotel. His interview schedule included a formal interview, during which he was asked questions about his past work experience, the courses he took in college, and his future career plans. He then had lunch with a manager from Human Resources, Tom Carpenter*, who was to then take him on a tour of the city. They had lunch at a semi-casual downtown establishment, which was apparently popular to local businesspeople, judging by the crowd size and professional attire of the customers. Doug made sure not to order anything overly extravagant, so not to appear greedy. The HR manager, on the other hand, had one of the more expensive items on the menu.

During lunch, the HR manager began to discuss the upcoming city tour. He asked whether Doug planned preferred city (apartment) housing, or suburban (single family) housing. Doug admitted he had not given it much thought. Mr. Carpenter mentioned that the quality of schools varied in different parts of the city, and asked if Doug wanted to see the areas with better schools. Doug once again admitted he had not given it much thought, as he had only recently gotten married, and had not yet had children. The discussion continued, focusing on what other points of interest Doug might want to see. Mr. Carpenter pointed out that the city had professional sports teams, theater, a zoo, and other attractions. Doug expressed an interest in seeing the sports arena, and a local theme park, which Mr. Carpenter assured him was fantastic. Mr. Carpenter went on to mention, with apparent pride, that the city had many churches, of varying denominations, and he could show Doug any that he wished to see. Doug indicated that while he had been raised Roman Catholic, he had not been to church in years, nor had his wife, so they could skip that part of the tour.

After lunch, they began their tour of the city. They drove past the AACE plants, and through the downtown area. The theme park, as promised, was impressive. Mr. Carpenter drove through several neighborhoods both city and suburban, that were within the price range that Doug said he could afford, based on his expected salary, and his wife's anticipated income. As they drove through the neighborhoods, Mr. Carpenter pointed out the house he had first lived in, when he moved to the city. He also mentioned as he went through each neighborhood, the names of several other AACE employees who lived in the vicinity. He showed Doug the school his children had attended, and pointed out that it was the best public school in the city. They finished the tour with a surprise. Mr. Carpenter told Doug he had gotten approval to use the company's box in the sports arena for the Professional Baseball game that night, and asked Doug if he would like to attend. Doug eagerly agreed.

The game was a blast. The home team won, and Doug even managed to get an autograph from one of the players. Several other company employees were in the box, and they all were friendly, and cordial. Conversation was light, and tended to be focused on the Home Team, which was favored to win a pennant, and possibly even make the World Series.

After the game, Doug was dropped back at his Hotel, and returned home the next day, to await word and hopefully a job offer.

In the above scenario, did you see anything ethically questionable? If so, what was it, and why was if potentially wrong? From a legal perspective, did you perceive any potential problems in this situation?

2) THE RESUME

Susan Thomas* recently graduated with a MBA in Accounting. Her GPA was good, although not impressive, and she found herself jobless after two months of looking. One evening, while eating at a local restaurant, she ran across one of her former classmates, Ron Doby*. Ron asked her to join him, for dinner and a drink. After eating, having a few beers, and some small-talk, their conversation turned to their professional situations. Susan mentioned her difficulty in obtaining employment. Ron expressed sympathy, and mentioned that he had relatively quickly gotten a job, with a local company. Susan silently wondered how Ron, who had barely squeaked through most of his classes, had gotten that job, when she had applied, and had been passed over. Instead of asking, she congratulated him on his good fortune. Ron, visibly tipsy by this point, laughed, and told her he had the secret to making resumes look more impressive. He went on to tell her that work experience was more important than grades. Susan expressed surprise, since she knew, from the projects they had worked on together, that Ron had not related experience.

Ron shook his head, and said "perhaps, but they don't know that". He went on to relate how he had "padded" his resume, with jobs he had never held. "It's easy" he said, "just find a company that is no longer in business, and in the same city you were living in at the time, and claim them as your employer". "That way", he assured her, "nobody could check and find out that it isn't true." Ron offered to help her "fix"her resume. He gave her his card, and then paid for their entire meal, pointing out that he was in a much better position to pay for it.

The entire way back to her house, Susan's stomach churned. She had been passed over for a job, for someone who lied on their resume. She then began to wonder how many times that had happened. Was it true, as Ron had claimed, that "everybody does it", and that she should as well. She thought about Ron's last statement "If you do the j ob well, and the company is happy with your work, what difference does it make if you fudged the resume a bit to get the job? Its a competitive market, and you do what you have to to get ahead." After paying the cab driver, Susan went into her small apartment, and collapsed into a chair at her cheap dining table. Sitting in the middle of the table, was her stack of unpaid bills.

What should Susan do? Why?

3) IF ITS BROKE, SHIP IT

Joe Landy* was thrilled. He was the first in his family to go to college, and now was a graduate, with a degree in Business Management. Even better, he had found a job in his hometown, working for the same company that his father had worked for, before retiring. Joe was the new Assistant Manager of Distribution, for Oldvent Electronics* a manufacturer of consumer electronics, such as radios, walkie talkies, and cellular devices. His homecoming was grand. His parents threw a party, and nearly all of his childhood friends showed up, to wish him well.

Joe's father was proud, knowing his son had the opportunity to move up in management, something he could never do, without a degree. He missed no opportunity to share with others his son's good fortune. Soon the whole town knew that Joe Landy was back, and working for Oldvent.

Joe's job went smoothly for several months. His department smoothly shipped every order, on time, and accurately. Customer relations, which had been pretty good before, improved even more. Then, one day, a crisis occurred. Over 1600 radios, due for shipment to the company's biggest customers, were found to be defective. A parts manufacturer had shipped flawed transistors, that burned out within hours of being turned on. Every single one of the radios that were selected for testing had failed, within 4 hours of being turned on. In a panic, Joe went to his boss Lucy Vega*. He related the problem to her, explaining that the radios were over a week's production, and failing to ship them would make the first missed shipment to those customers in years.

Ms. Vega shook her head. "Joe," she said, "its even more of a problem than you think." The revenue for those radios is supposed to be part of our third quarter financials. Without that income, we'll be well short of market expectation, which will really hit our stock price hard. Additionally, those radios are supposed to be our first shipment for the holiday season. If the retailers have no stock, during the busiest retail season, they will be seriously upset with us. "Joe", she said, putting her hand on his forearm "ship those radios."

Joe was stupefied. His boss was telling him to ship defective product, on purpose. Ms. Vega, sensing his discomfort, said "let me explain." "The radios are warrantied, and we can replace them when they fail. Plus, since most will be Christmas presents, it will be six months before we get them back. Since we know they will come back, we can plan our production rate to include the replacements." She went on to point out that, at the time the radios would be returned, the company would be hitting its slowest season, so the added work would mean layoffs would be put off a few weeks. In addition, the defective radios could be repaired, and sold as reconditioned units, basically eliminating the economic losses associated with production. However, if they were to pull and repair the units now, company policy requires that they be labeled reconditioned, so they could not be sold through the large retailers they were due to be shipped to.

Joe's mind raced. Somehow this didn't seem completely right to him. However, Ms. Vega's arguments seemed sound, and she was so sure of herself. If they ship the radios, they would get their sales, make the earnings target, and could fix the problem later. If they pull the radios, the big retailers would be out of stock during the busiest part of the season, and may not even want the radios, once replacements are made. Plus, if they miss the earnings target, then stock prices will plummet. For Joe, personally, this is not a huge problem, since he's only been in the stock plan for a few months. However, Mr. Landy, Joe's dad, has over half of his retirement savings in Oldvent stock.

To ship, or not to ship, that is the question.

AuthorAffiliation

Neal F. Thomson, Columbus State University

Thomson_Neal@Colstate.edu

Publication title: Allied Academies International Conference. International Academy for Case Studies. Proceedings

Volume: 12

Issue: 1

Pages: 85-88

Number of pages: 4

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 1948-3198

Source type: Conference Papers & Proceedings

Language of publication: English

Document type: Feature, Business Case

ProQuest document ID: 192412216

Document URL: http://search.proquest.com/docview/192412216?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-16

Database: ABI/INFORM Complete

Document 86 of 100

An Experiential Case Study in IT Project Management Planning: The Petroleum Engineering Economics Evaluation Software Imperative

Author: Davis, Charles K

ProQuest document link

Abstract:

The case covers key issues in information technology project management. It deals with developing a full set of project plans, including milestones, tasks, schedules, staffing, deliverables, and projected costs, for a complex software development project (Gido & Clements, 2003; Kerzner, 2003; Schwalbe, 2002). The essence of this case is the analyzing of a specific organizational setting with critical software needs and the developing of the needed plans. As in many similar situations, this organization is relatively complex, and the situation is not entirely clear. By reviewing the facts of the case, collecting outside information, conducting role playing interviews, analyzing requirements, and estimating schedules and costs, one can collect the information needed to develop baseline project plans for the software development envisioned in this case. [PUBLICATION ABSTRACT]

Full text:

Headnote

EXECUTIVE SUMMARY

Headnote

The case covers key issues in information technology project management. It deals with developing a full set of project plans, including milestones, tasks, schedules, staffing, deliverables, and projected costs, for a complex software development project (Gido & Clements, 2003; Kerzner, 2003; Schwalbe, 2002). The essence of this case is the analyzing of a specific organizational setting with critical software needs and the developing of the needed plans. As in many similar situations, this organization is relatively complex, and the situation is not entirely clear. By reviewing the facts of the case, collecting outside information, conducting role playing interviews, analyzing requirements, and estimating schedules and costs, one can collect the information needed to develop baseline project plans for the software development envisioned in this case.

Headnote

Keywords: accessibility; case study; cost estimation; information resource; IS costs; IS flexibility; IS implementation; IS lifecycle; IS performance; IT costs; iterative design; office technology; process improvement; risk assessment; software development; strategic information; time estimation; utility of information

ORGANIZATIONAL BACKGROUND

This case is set in the oil and gas industry, in a family-held engineering consulting firm. This firm is a leader in its markets and wants to develop and extend its competitive advantage, and profitability, by developing sophisticated applications software for its engineers to use to leverage and extend their work product.

Petroleum engineers are professional engineers who evaluate the potential yields of oil and gas properties around the world. Petroleum engineering is essentially a branch of chemical engineering in which the principles of chemistry, chemical engineering, and geology are applied to the study and understanding of discovered petroleum deposits in the ground. Because the petroleum products reside in pockets or strata in the underground rock formations called reservoirs, petroleum engineers are also often referred to as reservoir engineers.

This analysis of petroleum deposits under the ground, generally referred to as oil and gas reserves, is extremely important to the companies in the oil and gas industry. Obviously, in the petroleum business, companies view their level of reserves as a critical asset. The process of extracting the petroleum from the ground once it has been found is called producing. The value of an oil or gas field is determined by the volume of oil and gas it will produce. It is, therefore, of the utmost importance to be able to estimate with a high degree of accuracy both the rate of production over time and that point in the future when a given producing property will stop producing.

The value of an oil or gas field is a function of two factors, how much oil and gas the field will produce and prices, the price per barrel of crude oil and the price per million cubic feet of natural gas, over the life of the field. One way an oil or natural gas company can assess its economic health is by analyzing its producing properties, estimating the amount of producible reserves it has in the ground, and forecasting the selling price of these reserves in the future when they are expected to be produced. By doing this, companies can project the dollar value of their petroleum reserves, a crucial indicator of their ongoing business viability. This process is called a reserves economics evaluation.

The value of a firm's petroleum reserves affects everything from its stock price to its ability to borrow money from banks to fund the unending search for new oil fields. Clearly, the companies have a vested interest in convincing the world outside that they are holding large reserves of high value. So the pronouncements by the oil and gas companies about their levels of reserves are generally viewed skeptically by the banks and financial markets without the opinion of an objective, highly credible, outside agent that can attest to the value of the reserves on hand for a given company. This is a case about a company that provides as a service just these kinds of assessments of the economic value of petroleum reserves and its need to develop a sophisticated software system to support and enhance its work. This case focuses on the project costing, workbreakdown scheduling, and humanpower loading needed for this software system.

Hopkins & Associates is a consulting engineering firm. It consists of oil and gas reservoir engineers who provide independent evaluations of the reserves for oil and gas properties. Like a major accounting firm auditing the books of a client on the NY Stock Exchange, Hopkins "audits" the oil and gas reserves for a given company and issues an opinion as to their value. For example, if an oilman who is short on cash wants to borrow money to drill new wells, a bank might come to Hopkins to assess the oilman's properties to determine if he would be able to pay back the loans if he did not strike oil with the new wells. Or, if one company wanted to sell an oil field to another, then both would need a firm like Hopkins to determine a fair price for the property.

With offices in Houston, Denver, Calgary, and Tulsa, Hopkins & Associates is actually a small firm of less than 1,000 people, about half engineers, but this is the norm for oil and gas consulting firms of this type. In fact, Hopkins is at this time the largest petroleum consulting company in the world and is very highly regarded for its integrity and the quality of its engineering work. The firm was founded by old Mr. Hopkins in the 1930s. As a young man with a newly minted engineering degree from the University of Tulsa, he participated in the founding of "petroleum engineering" as a professional discipline. In fact, some say he invented the idea of using engineering as a tool for understanding petroleum reservoirs. A man of great integrity and honesty, he was for several decades a central figure in the oil industry in Oklahoma, Texas, Venezuela, and the Middle East. In addition to the consulting arm of his company, he also owned several producing oil fields and a small, but highly profitable gas pipeline. He also owned a drilling company that did exploration, wildcatting mostly in Texas.

SETTING THE STAGE

Old Mr. Hopkins died recently. His only son now runs the firm. The younger Mr. Hopkins ("Hoppy" to his golfing buddies and "Hop" to everyone else) is a competent reservoir engineer with tremendous resources at his disposal, but even his closest admirers say privately that "He is not the man his father was". Born and raised rich, he is the archetypical Texas oil man (think of JR Ewing in the old Dallas TV show, but much nicer). His mansion in the exclusive Preston Oaks area in Houston, a private Lear Jet always standing by, the biggest yacht in the Texas City Yacht Club, a fleet of private cars, a huge Mercedes limo, and all the rest; in many ways, he is bigger than life. But he lives under the shadow of his father's legacy. At company retreats, Hop can be heard saying things like, "I could never hope to achieve my father's stature in the oil business". Kind, generous, and paternalistic to his employees, nevertheless everyone views Hop as a wild playboy type whose wife and kids are often neglected as he pursues his various interests around the world.

Of the four Hopkins & Associates offices, the Houston office is headquarters because Hop lives in Houston. It is housed in the Hopkins Building in Greenbrier Plaza. The firm's largest office is in Tulsa, located in the Hopkins Plaza downtown, an office complex named after "the old man". The Denver and Calgary offices are tiny by comparison to the others, but they generate a lot of business for the firm.

The company consists of four divisions, all of which report to Larry Jordan, a highly respected petroleum engineer who was the older Mr. Hopkins' most trusted engineer and friend for many years before his death. He is revered within the firm and provides a sense of continuity and stability for both employees and clients now that the younger Mr. Hopkins has taken over the firm. Two of the divisions are actually incorporated as wholly owned subsidiaries of Hopkins & Associates, the pipeline company and the computer services company. Hopkins & Associates is in turn a wholly owned subsidiary of The Hopkins Companies, which is Hop's holding company for the entire enterprise.

Jack Crocket and Em Stinson are key players in this firm. They supervise the reservoir engineering and economics evaluation jobs for Tommy Smith's area. Each supervisor manages the daily activities of a couple dozen engineers. Jack is one of the "old timers" who sees computers as a necessary evil and longs for the good old days when the slide rule was king. Still, he is adaptable and a very capable manager based out of the Tulsa office. Em was a college roommate of Hop at the University of Oklahoma. Em loves to tell the story, "When me and Hop were sophomores, we got drunk and somehow Hop drove his Cadillac convertible into the middle of the OU football stadium smashing things as he went. It was 3:00 AM on a cool, starry night in October. We lounged in the back seat drinking Wild Turkey out of the bottle until it was gone while talking about living an exciting life prospecting for oil. Then we staggered back to our dorm arm-in-arm and went to sleep. Unfortunately, Hop left his car in the middle of the stadium! We were expelled by the end of the next week!" (Upsetting the football establishment at OU is unwise. A former president of OU was once quoted as saying, "We try to maintain a university here that our football team can be proud of!") That is how Hoppy became a proud graduate of the University of Texas. "Hook'em horns!"

View Image -   Figure 1:

CASE DESCRIPTION

The rapid analysis and use of information is a key innovation (Eppinger, 2001). Therefore, the engineers at Hopkins use a lot of engineering and geology software tools to model and analyze the characteristics of oil and gas reservoirs. They also use financial analysis software tools to forecast the economics for each individual oil or gas well being evaluated using discounted cash flow analysis. Because of the importance of computers in the core work of the firm, the Board of Directors established a separate company, a wholly owned subsidiary of the engineering company called Hopkins Computer Services, Inc. (or HCSI for short), to better provide the computer services needed by the firm. The computer company operates a large distributed network with a modern computer center in Houston and numerous interconnected engineering workstations at the various Hopkins offices. HCSI employs nearly a hundred people (analysts, programmers, computer operators, network specialists, managers, and support staff).

The President of HCSI is a brilliant young petroleum engineer from Louisiana named Ken Summers. Ken was an All American golfer at LSU, which is a good skill to have in the golf crazy Hopkins companies. He has Hop's trust and complete support. Ken is a good manager and an oil man through and through, but he knows little about computers or software development. Nevertheless, he has a vision. He wants to automate the entire process of generating reservoir economics for an oil field. He calls it the Petroleum Reserves Economics System, or PREsys.

Let's look at what this might mean. Essentially, Ken is talking about building several generalized computer models and linking them together into a monster integrated decision support system for petroleum engineers (Arsanjani, 2002). Ken recently met with Hop, Larry, and the rest of the Board and summarized his ideas:

"Y'all, I think we need to link together three fancy computer models into one overall model to do this. Some of you know most of these ideas; some of you know some of them; and some of you are less familiar with the economics evaluation process. So, I'll review the steps involved in doing an evaluation in terms of these three sets of activities.

The FIRST MODEL would be that for an individual reservoir under an oil field. This model would include information about the dimensions of the reservoir (from seismic data and the like). The idea is to develop a three-dimensional map of the reservoir, its geology and its chemistry. The model would include information about the porosity of the rock making up the reservoir and the type of capstone rock that overlays it. We also need to know how many wells have been punched through the capstone into the reservoir. Also, important would be information about the chemical composition of the oil in the reservoir and the viscosity of that oil as well as temperature and pressure readings associated with the wells. Other parameters would include information such as the presence of other fluids in the reservoir (such as salt water) and the amount of pressure exerted by any pumping at the wellheads.

By using the Monte Carlo simulation technique for mathematical modeling and some sophisticated reservoir engineering analysis with these kinds of parameters, a model can be constructed to mimic the behavior of the well as oil & gas migrate through the reservoir to the perforations in the well casing and up to the surface. This kind of simulation should be able to predict the flow of petroleum products from the reservoir over time and it should be able to tell us when the well will cease to produce. Production at the wellhead is generally tracked and reported on a monthly basis and the simulation would generate monthly production estimates. This is the first model and it is the only part of this that actually requires complex engineering and geology.

The SECOND MODEL deals with forecasting economics for each individual well. By using discounted cash flow analysis, it is possible to estimate how much money a producing well will generate for its owners over the lifetime of that well. This analysis is generally done quarterly. The idea is to construct a spreadsheet to net the negative cash flows from the positive ones quarter by quarter over the life of an oil or gas well until its reserves are fully depleted. [The oil industry gets a special tax break based upon the fact that petroleum reserves are depleted over time. It is called the `oil & gas depletion allowance' and is a minimum of 15% of gross income from production activities. The rationale for this tax break is that it helps the oil industry to drill for more oil, which is critical as existing wells are depleted over time. There has been some discussion of including a tax modeling component in PREsys, as well] Generally, an oil company will lose money early when the costs of drilling are incurred and begin to make money later as the steady income of a producing well overcomes the earlier high expenses.

To begin analyzing cash flows for a specific well, we need two basic sets of numbers:

The amount of crude oil and/or natural gas that the well will produce by quarter over its lifetime. Initially, this will be a high number gradually decreasing over time as the pressure in the well is dissipated in the reservoir below by the ongoing production. This is the set of estimates that come from the first model.

The price of crude oil and/or natural gas that will be in effect from quarter to quarter as the oil is brought to market. The product of the amount of petroleum produced in a given quarter and the price at that time is the amount of money the well will `bring in' in that quarter: This revenue stream is obviously the most important positive cash flow in the analysis. But it depends upon reasonably predicting the price of oil & gas over the life of the well many years into the future. This is not at all a simple task but, of course, y'all know we do it all the time. It would be good if we could forecast prices better, though.

Once we have these numbers, we can populate a spreadsheet with these quarterly cash flows. This simple cash flow analysis is a good start but it is misleading because it does not take into account the `time value of money,' meaning that one dollar received today is worth more to us than one dollar received in the future because a dollar in hand today can be invested at some interest rate. It will have earned interest and be worth more money by that time in the future when the second one dollar is received. We can also turn this idea around How much is one dollar worth today if it is to be received in the future? For example, if you get $.91 today and invest it at 10% per year, then in one year it will be worth $1. In other words, 91 cents today is the same as $1 a year from now in today's money.

Financial analysts reduce all of these ideas to the concepts of discounted cash flows and net present value. Once we have calculated the cash flows as described above, we determine the cost of money (the best annual interest rate we can get for our firm). That interest rate becomes what is called the discount rate. Then we convert that to an equivalent quarterly discount rate. Each discount rate for each time period in the future has a number associated with it called a discount factor. Tables of discount factors are readily available. You get the discount factors for your company's discount rate and multiply the cash flows in the spreadsheet quarter by quarter with the discount factors. The result is a figure for each quarter that represents the cash flow for that future quarter in today's dollars, just like the example above with the 91 cents. These are the discounted cash flows. If we add them all up, quarter by quarter, we get the total value of the reserves for a given well, again, in today's dollars. This is the net present value of the well and it is the number that the bankers and financial markets want to know.

The THIRD MODEL deals with consolidating these numbers across an entire oil field. It is essentially an accounting-style `roll-up' procedure. In order to understand the economic value of an entire field, it is necessary to identify all the reservoirs and wells that make up the field. Of course, there may be only one large reservoir or several smaller ones under afield, and there may be any number of wells tapping into whatever configuration of reservoirs underlies the field, as well. Understanding the reservoir configuration is essential for the engineering work, and understanding the monthly production by individual well is essential for the economic analysis. The roll-up procedure is the process of summing all the discounted cash flows for all the wells on a property by quarter and overall. The total of all the discounted cash flow totals for all the wells in the oil field is the economic value for the entire field in today's dollars. "

Everyone sat quietly, intently waiting while Ken made his case. As the Board looked on, it became obvious that Hop was convinced. "A sophisticated three-dimensional reservoir software package, one that could predict the flow of oil and gas at the wellhead and forecast revenues and profits automatically by well or by oil field for his reservoir engineers! What could be better?!!" Larry offered a word of caution. He had read that big software projects are risky and too often fail (De Meyer, Loch & Pich, 2002; Keil & Montealegre, 2000; Matta & Ashkenas, 2003). He noted that "the credibility of Hopkins & Associates in the marketplace could be eroded badly if the PREsys computer software was not absolutely accurate and reliable". Ken agreed, saying that he believed that accurate and reliable software could be created; and, if it could, it would provide a great competitive advantage for the firm. Tommy Smith, who was also at the Board meeting for a presentation, was excited. "You know," he said, "oil wells change hands all the time. And sometimes, a client will use the same wells as collateral several times. We have folks coming to us to re-evaluate the same wells that we evaluated just a few years ago. We can just dust off the old evaluations, update them and resell them. That is really the most profitable part of our business! If we could electronically file and organize completed evaluations, indexing and cataloging them on the computer, we could make the process of updating and reselling old evaluations a lot easier to manage. It would also help us make sure that our evaluations of wells stayed consistent!" Hop was wide-eyed. He could see how this kind of system could really streamline the task of doing oil and gas reservoir economics analysis and increase his profit margins all across that part of the business. He ended the meeting on his way to give another interview to The Oil Journal by asking, "When can I have it and what will it cost?"

CURRENT CHALLENGES/PROBLEMS FACING THE ORGANIZATION

Ken was smiling as he left the meeting, but he soon began to "sober up" contemplating the scope of the task ahead. Now he needed a project plan, a humanpower loading plan, and a budget plan for this project fairly soon. He thought about who on his staff might be able to do the necessary planning. There was Ron Snyder. Ron is a Texas A&M Aggie and a super computer technology guy. And he was the principle architect of the Hopkins computing infrastructure. The network consists of a T3 digital backbone between the Houston and Tulsa offices with similar TI links between Houston and the Denver Office and Houston and the Calgary Office. Various hubs and LANs in the Hopkins offices provide the necessary connectivity so that every engineer has access to the databases and systems in the Houston datacenter from his or her desktop. All network protocols are either ETHERNET or TCP/IP compatible for local and wide area networking, respectively. A longtime user of DEC computers, the Houston datacenter now utilizes HP AlphaServers, a GS320 and two GS80s, all running under the OpenVMS(TM) operating system. The geophysical and drilling staffs were outfitted with UNIX-based scientific workstations and the engineers all use Windows-based platforms for their engineering workstations.

Ron is good with the technology but he does not know enough about petroleum engineering to do this job and, besides, he is too busy running and maintaining the firm's other systems. Then there was Mary Nunn. Mary ran the user support function at the datacenter in Houston. An ace teacher and trainer, Mary was a former secretary for Jack Crocket, a super "gal Friday" with excellent people skills. Everyone liked Mary. She was a natural leader and had picked up a lot about reservoir engineering in her 18 years with Hopkins, but not being an engineer herself (or even degreed), she would have a hard time maintaining credibility with the engineering staff during requirements analysis (Howard, 2001). She may not even understand what they are talking about with some of the key down-hole engineering simulation formulas and mathematics that would govern the migration of petroleum through a reservoir.

Another of Ken's trusted lieutenants is Jerry Bye, who runs the applications development and maintenance functions for the computer company. Jerry is a great guy from Indianapolis, a fanatic fan of NASCAR and the Indianapolis 500, which he attended every year growing up as a kid. He is well schooled and experienced in software development (Kezsbom & Edward, 2001; Marchewka, 2003), expert in procedures for project cost estimation (Armour, 2002), but he too is not an engineer. Therefore, Ken is even hesitant about Jerry. He is sure that the PREsys development project will be expensive and will consume a lot of engineering time around the firm. In a company owned and operated by engineers, Ken is hesitant to put a non-engineer in charge of such a high visibility project. Hop will probably let him do it, but if the project turned out badly, it would be a politically difficult decision to justify to the rest of the engineers in the firm. There would be a lot of second-guessing, and Ken finally decides he is just not interested in taking that risk.

Ken is also concerned that whoever he chooses to plan the project should be in a position to become Project Manager for the project once it is approved and funded by Hop and the Board. HCSI is a small company and all of his most capable people are critical (even indispensable) to the ongoing operations of the HCSI in their current roles. Ken reluctantly decides that no one on his current staff can take on this mission-critical project for Hopkins & Associates (Hayashi, 2004; Klein, Jiang & Tesch, 2002).

Fortunately, Ken has an "ace in the hole". He has a friend from his days working for Shell Oil prior to his joining Hopkins. His friend, David M. Gardner, was educated as a petroleum engineer at SMU. He had been a crackerjack programmer at Shell for 10 years, where he learned to develop state-of-the-art software following generally accepted industry standards (Rada & Craparo, 2000). Gardner is now a computer consultant to the petroleum industry with his own firm, David M. Gardner & Associates, Inc., based out of Dallas. Ken calls David, who is on the next plane to Houston. David is shrewd. He agrees to develop the plan and serve as Project Manager for the PREsys project if and when it is approved by Hop and the Board. He agrees to do all of this for minimal pay provided that David M. Gardner & Associates shares equally in the rights to the PREsys system and with the stipulation that The Hopkins Companies and its subsidiaries would be barred from selling the PREsys software itself. Hopkins can utilize PREsys internally to support its reservoir engineering consulting business, but PREsys will be a software product of the tiny, struggling Gardner company. In addition, David requests a royalty of $7 per case from Hopkins for every well evaluation done by Hopkins and Associates that makes use of PREsys.

Ken and Hop discuss this arrangement. Ken confides that he has great confidence in David even though his company is small and has few resources outside of David's programming expertise. Hop, who really wants the PREsys software, agrees to the deal. The Board rubberstamps the contract and provides the initial funding. David rents an apartment in the same block as the Hopkins Building in Greenbrier Plaza and moves to Houston for the duration.

Ken and David meet at Ken's office to begin planning the project. "Where do we start?" Ken asks David, smiling coyly but also deadly serious. The current problems facing this organization are clear. Oil and gas consulting is a highly competitive business. If H&A were to become technically obsolete, it would certainly lose its competitive edge. PREsys is a strategic, potentially mission-critical system. Hop, Larry, Ken, and David all understand this reality. Senior management sees a fundamental threat to the business if this technology is not developed soon. For them, there is a competitive imperative driving the demand for this system. So, whether it is realistic or not, Hop and the rest of senior management are pushing hard to get this new system developed and online in record time.

However, software development is not really the strong suit of any of The Hopkins Companies. None of the executive management has engaged in such a project before, and the systems staff is inexperienced as well. It is questionable whether they have the collective expertise to oversee the development of PREsys. There is a lot riding on David's expertise, his judgment and ethics, and his very small company. There is potentially a lot of risk associated with this project configured like this.

The challenge is to develop a realistic project plan that will help mitigate the risk and give the developers a reasonable chance of developing a first-rate system that will meet the needs identified while standing up to the time pressures effectively. This is a classic problem, one that is common today, and one that will always be with the information systems management community. And the problem is this: How to balance the demand for rapid delivery of final products by executives with great organizational power against the critical need to make sure that everything is properly analyzed, designed, constructed, tested and implemented.

There are two kinds of serious risks here, each diametrically opposed to the other. The first risk is that the system is not developed in time and The Hopkins Companies loses competitive position in the oil & gas consulting business. The second risk is that the company will rush to market with the PREsys software too soon, thinking that it is excellent, only to find out too late that there are serious flaws in the software that lead to inaccurate reserves economics forecasts and, eventually, major law suits. Fundamentally, the project planning for the PREsys software must balance these two risks in the face of real technical complexity and overly optimistic executive time pressures.

References

REFERENCES

References

Armour, P. (2002). Ten unmyths of project estimation. Communications of the ACM, 45(11),15-19.

Arsanjani, A. (2002). Developing and integrating enterprise components and services. Communications of the ACM, 45(10), 30-34.

De Meyer, A., Loch, C.H., & Pich, M.T. (2002). Managing project uncertainty: From variation to chaos. MIT Sloan Management Review, 43(2), 60-67.

References

Eppinger, S.D. (2001). Innovation at the speed of information. Harvard Business Review, 79(1), 149-158.

Gido, J., & Clements, J.P. (2003). Successful Project Management (21 ed.). Mason, OH: South-Western, Thompson Learning.

Hayashi, A.M. (2004). Building better teams. MIT Sloan Management Review, 45(2), 5.

References

Howard, A. (2001). Software engineering project management. Communications of the ACM, 44(5), 23-25.

Keil, M., & Montealegre, R. (2000). Cutting your losses: Extricating your organization when a big project goes awry. MIT Sloan Management Review, 41(3), 55-69. Kerzner, H. (2003). Project Management: A Systems Approach to Planning, Scheduling, and Controlling (8h ed.). New York: John Wiley & Sons.

Kezsborn, D.S., & Edward, K.A. (2001). The New Dynamic Project Management (2"nd ed.). New York: John Wiley & Sons.

Klein, G., Jiang, J., & Tesch, D. (2002). Wanted: Project teams with a blend of IS professional orientations. Communications of the ACM, 45(6), 81-86.

References

Marchewka, J.T. (2003). Information Technology Project Management - Providing Measurable Organizational Value. Danvers, MA: John Wiley & Sons.

Matta, N.E., & Ashkenas, R.N. (2003). Why good projects fail anyway. Harvard Business Review, 81(9), 109-205.

Rada, R., & Craparo, J. (2000). Standardizing software projects. Communications of the ACM, 43(12), 21-24.

Schwalbe, K. (2002). Information Technology Project Management (2nd ed.). Boston, MA: Course Technology, Thompson Learning.

AuthorAffiliation

Charles K. Davis, University of St. Thomas, USA

AuthorAffiliation

Charles K. Davis is a professor of MIS at the University of St. Thomas in Houston, Texas. He is an authority on the use of information technology in business. In addition to authoring over 100 articles, monographs, books, and reports, he has held numerous technical and managerial positions with IBM Corporation, Chase Manhattan Bank, Occidental Petroleum Corporation, Pullman Incorporated, and Deloitte & Touche. He received a PhD in MIS from the University of Houston, an MBA from Columbia University, an MAT from Harvard University, and a BS from Oklahoma State University.

Appendix

APPENDIX

Appendix

Role Playing For Interviews

Appendix

Divide the class into five teams of interviewers to gather information about requirements. Each person in the class is either a role player or a lead interviewer for a team, and each person is on perhaps two interview teams. The following five individuals will be interviewed by one of the five teams of analysts. This exercise is done in an effort to begin the process of developing a project plan for systems development effort in this case and to officially kick off the project:

Appendix

1. Hop Hopkins, President of Hopkins & Associates

2. Rocky Ridge, Manager of Geophysical Analysis

3. Ken Summers, President of HCSI

Appendix

4. Jerry Bye, Director of Applications Systems Development

5. Mary Nunn, Manager of Technical & User Support

Appendix

Sample questions for each interview are listed next. Please be sure that you get the information presented next, at least, plus any other information that you feel is relevant as well.

Appendix

Sample Interview Questions for Hop Hopkins

Tell me a bit about Hopkins & Associates and how you see the company in its marketplace.

Appendix

What do you hope to get out of this project short term and long term?

What do you think would be a reasonable timeframe for this effort?

What do you think are the major risks with this project?

Appendix

Sample Interview Questions for Rocky Ridge

Appendix

What is involved in reservoir engineering modeling?

Do you have time to serve to help with the modeling?

How long will it take to build a generalized reservoir software model?

Appendix

Sample Interview Questions for Ken Summers

Appendix

What is your vision for the system?

Appendix

Why do you want to bring in someone from outside to lead the development work?

How do you expect to forecast the price of oil and gas in the future?

Appendix

Sample Interview Questions for Jerry Bye

Appendix

How do you see this system returning value to H&A?

What kind of staffing for this project can H&A provide?

What systems development tools do you support?

What platforms do you think that this system should run on?

Appendix

Sample Interview Questions for Mary Nunn

Appendix

How is your staff organized and where are they located?

How would you assess the computing capabilities of the engineers?

What additional requirements would you need to support this new system?

Appendix

Now, the following are facts and information about the persons to be interviewed. Each role player is given the fact sheet that pertains to his/her character. The fact sheets help to establish how each player is to play each part and include attitudes and facts that are to come out in the interviews. Only the individual playing each part should be given the fact sheet for that part.

About: Hop Hopkins

Appendix

Assorted Facts

Appendix

H&A generated $382 million in revenues last year. Hop's mother is descended from an original western Pennsylvania oil family and views H&A as important because it bears the Hopkins name, but really as "small potatoes". Hop is seldom at the office, which is huge with red silk-covered walls and Louis XIV furniture covered with goldleaf, reminding one of certain houses of ill repute in New Orleans.

Appendix

Primary Work Responsibilities

Appendix

Hop is the President & Chairman of the Board of the holding company that owns all of the Hopkins Companies. "I want the Hopkins Companies to be there for our employees so that they can raise their families and be happy doing it." These companies are privately owned by his family, mostly by his mother. "Mom is a hard task-master. I am glad she lives in western Pennsylvania and we are not! "

Appendix

Hop is a curious mixture of figurehead for the firm and final authority for all decision-making in this collection of companies. "I like to let the companies operate for themselves. As long as they get their work done and make profits, I don't like to get involved too much. "

Appendix

Hop almost always defers to the presidents of the various Hopkins Companies, especially to Larry Jordan. "Let's see what Larry Jordan has to say about that before we make a final decision. "

Appendix

Public Persona & Attitudes Toward Work

Appendix

First and foremost, Hop is a flamboyant salesman with a big smile and a glad hand. Hop always introduces himself and shakes hands with the individuals that he encounters and projects his importance right away. "Hi! I'm Hop Hopkins. Good to meet you! You know, I bought a Lear Jet the other day and it is really nifty, and super convenient!"

Hop is "old money" and very polished socially. "I've always loved theater and really enjoy Broadway plays. I studied DANCE in high school and college and danced in a Jazz Dance Troup when I was a kid!"

He believes in self-promotion and that, by promoting himself, he is promoting H&A. "I was in the Middle East last week and Venezuela the week before. One of those Saudi princes gave me his new Mercedes limo for only $25,000. He was tired of it. The thing is bullet-proof! It should be here by the end of the week. "

Appendix

He pays a great deal of attention to his appearance, having only the most exquisite personal grooming and elegantly tailored clothing, even for casual wear. "Back when I dressed in business suits all the time, the TV stations never gave me a moments notice. Then I started wearing bright yellow golf slacks and flashy sport shirts and now I'm on Houston TV as an oil industry expert almost every week!"

Hop is not concerned with company problems much. He has Jordan to handle those. He is a cheerleader for the firm and works to be optimistic. "We only hire the best people and we give them the best working environment and tools. Hopkins cares about its customers and its employees like family."

Appendix

Personal Agendas

Appendix

All Hop really wants to do is play golf with a group of oil and entertainment industry tycoons. "Every year we sponsor a tent at the Doug Sanders Pro-Am Golf Tournament in Houston and hang out with Doug, and Willie and Waylon, and the boys!"

Hop is insecure and believes he can never really live up to the legacy of his father. "I stood there watching them zip him up the body bag after he died and wondered what am I going to do now?"

He is a hedonist who is always looking for a new girlfriend. "Hey fellas, let's go to the club. Or let's send the Lear Jet over to Denver to get `the girls' and bring them back here to the ranch."

Hop has always had an interest in Rocky Ridge, but she has always wanted to keep work and pleasure separated. "Boy that Rocky is one hell of a woman. "

Appendix

About: Rocky Ridge

Appendix

Assorted Facts

Appendix

Rocky's group is independent from the rest of the firm. There are no other geologists or geophysicists in the Hopkins Companies outside of her group. She does independent studies for clients as well as projects for various Hopkins subsidiaries. Last year she engaged in mapping and analyzing the subsurface structures in over 80 oil fields in Texas and Oklahoma. Her most famous (and ultimately the most successful) job was an evaluation of the oil-bearing formations beneath Lake Maracaibo in Venezuela two years ago. People are still talking about that one!

Appendix

Primary Work Responsibilities

Appendix

Dr. Roxanne (Rocky) Ridge is a PhD in Geophysical Sciences from Oklahoma State with six years of experience in the petroleum industry, most of it at H&A. "Sometimes, I really love this business. It is so exciting when a well comes in!" Rocky runs a team of some 20 geophysicists, plus support personnel, that analyzes client seismic data to determine the most likely spots for successful drilling. "We use tools like a `black oil simulator' that helps us to understand how petroleum will flow to the borehole and up to the wellhead at the surface. That tells us the rate of flow and how long a well is likely to produce. "

Appendix

Rocky is renowned for her ability to find oil or gas deposits that have been previously overlooked in older, supposedly depleted fields. "This three dimensional modeling has made a huge difference in my ability to recognize reserves in old seismic data. Hop & Larry have equipped a state-of-the art geophysics lab for us here in Tulsa, complete with the latest computers and modeling software. "

Appendix

Public Persona & Attitudes Toward Work

Appendix

Rocky is aloof and has a superiority complex about her ability to use new technology to identify reservoirs and find petroleum deposits. "This work involves a highly sophisticated understanding of geology and it is hard to explain in simple terms. We use complicated models to analyze geophysical data in three dimensions. I am afraid that it is too hard for you to understand, really. It takes years of training and experience to appreciate what we are doing here. " Rocky is an attractive woman in a position of power right in the middle of the "old boys" network that runs the oil business in Texas and Oklahoma. Most of the time she is overly serious and too severe, but she is not above flirting occasionally to gain influence. "Come on, Eddie [Dolan], you know we just have to drill in the Austin Chalk one more time. I showed you what we think is over there in the area around the Wayside-One well. Come on, Eddie!"

Appendix

Personal Agendas

Appendix

Rocky was fired from her previous job and does not want to explain anything about her work to anyone that she does not control personally. She avoids giving

Appendix

out any information unnecessarily under the pretext that it is all too hard to understand without a PhD or years of experience in the geophysical field. "Like I told you before, this is just too complicated to explain without a lot of training in this field. Just let us take care of it. I'll loan you one of my people to do the analytical work and you can do the programming part of it. "

Appendix

Rocky knows that Hop is interested in her, and she is flattered by his interest. But she is happily married to a veterinarian who was raised in College Station and she keeps Hop at a distance. "Hop is a great guy to work for. He has really supported our department with the latest gear and he has let us hire some really good people; and I really appreciated that. "

Rocky is in her early thirties. She would actually like to retire from the oil business, maybe teach college, and begin a family, but she is just making too much money. "Sometimes, I think that if the pressure doesn't let up, my husband, Bubba, and I will just drop out and go live on a beach somewhere and make babies for a few years!"

About: Ken Summers

Appendix

Assorted Facts

Appendix

HCSI has a budget of $11 million. The computer company as a separate unit makes huge profits, with profit margins regularly 65% or higher. But this is actually a "paper profit" because HCSI charges very high prices to H&A absorbing a lot of MAN profits. Larry believes this is a good way to deflect customer complaints that Hopkins charges too much for services. "It's those `gal darned' computer costs!"

Primary Work Responsibilities

Appendix

Ken is a young reservoir engineer, a prot6g6 of Larry Jordan. Ken is a `super user' type. "I really do not know much about computers, or systems development, but Hop wants me to make sure that the HCSI and its products meet the needs of H&A's engineering staff. And that is my role!"

Ken is in charge of the computer company's daily operations and its systems development activities. In particular, he is intending to personally supervise the development of the new PREsys software development project. "The future of reservoir engineering and economics depends upon having software that can automate projections and make the individual engineer more efficient. Getting this right is VERY important!"

Appendix

Ken is responsible for hiring his friend, David Gardner, as a consultant to make sure that the PREsys project turns out all right. "David is a petroleum engineer AND a programmer! He was in computer systems support for the reservoir engineering group at Shell Oil in Dallas, and he really understands what we need here. "

Appendix

Public Persona & Attitudes Toward Work

Appendix

Ken believes that he is the `man of the hour,' a sort of medieval warrior battling to provide a critical software tool for his engineering colleagues to use in their work. "A good manager can manage anything. "

Ken is a kind, friendly, hardworking, and capable young man. He is barely thirty and possesses tremendous energy and dedication to work. "I was here late one Saturday afternoon last year I was the only guy here and a FedEx delivery came. It was an envelope for Hop. I signed for it and left it on the corner of my desk overnight when I went home. Next morning, Hop showed me the contents of the envelope. It was a million dollar royalty check from one of his oil wells!"

Appendix

Ken was an All American golfer in college and he loves to use his golfing skills to build friendships at work. Hop adores him for his golfing. "Some weeks, I cannot get any work done because Hop keeps calling me to go golfing with him and some of our clients, or potential clients, and I have to go do it!"

Personal Agendas

Appendix

In his heart, Ken only trusts engineers. He believes that other people, no matter how good, cannot measure up to the standards of the engineering profession. "The Professional Engineer (PE) designation is something that only the very best can aspire to. Engineering professionalism means that engineers are the best people to work with. "

Ken wants to get out of the computer company as soon as possible and get back to the engineering work that he loves best. "I know the people in this company and I know what they need from this software. So Hop and Larry trust me to get the computer company working smoothly. But I certainly will be glad when this job is finally done. "

More than anything, Ken wants to justify Larry's trust in him. He gives `lip service' to Hop, but he knows with certainty that Larry is THE man at Hopkins & Associates. "I think that loyalty is the most important trait that an employee can possess. Larry is loyal to Hop and to the memory of Hop's father. Without Larry, this company would have some serious difficulties. "

Ken really does not respect Hop. He thinks Hop is an overgrown adolescent. "When we have the company Christmas & New Years parties, I like to stay close to my wife and kids. Then we go home before Hop starts getting wild."

About: Jerry Bye

Appendix

Assorted Facts

Appendix

Hopkins Computer Services, Inc., actually historically has done very little software development. Most of the software packages supported at HCSI are purchased from outside vendors or are applications developed and used independently by H&A engineers. HCSI is primarily a Data Center that runs and maintains `canned software' packages to support the Hopkins businesses.

Appendix

Jerry's group is staffed for the software maintenance function. Every one of them wants to get out of routine maintenance and be on the development team for PREsys. Also, after the PREsys project is over, Jerry sees this new system as undoubtedly elevating the stature of his group (and of him) in the opinions of senior K&A managers. He is very pleased by this prospect.

Primary Work Responsibilities

Appendix

Gerald Bye runs the systems development function in the computer company. He is a rather dull, methodical man in his fifties. "I just want to do my job as well as I can and spend my evenings with my kids. I have two boys in their early teens. You know, little league and all that. "

Jerry is experienced in the oil industry and he is well-grounded as a software development manager. He has both a solid technical education and extensive project experience. "I am confident that we can develop this system in-house if Hop wants to, but I also understand that the reasoning behind getting a consultant with the engineering expertise to do the job."

Public Persona & Attitudes Toward Work

Appendix

Jerry is a classic fire-fighter. He is poor at anticipating what might go wrong and planning for contingencies. He is very good at managing emergencies as they happen. He drives his employees crazy more often than not. "Can you guys stay late tonight for a couple of hours? We had an outage on the simulator application today that affected the Tulsa office and we need to run some tests and do some outstanding maintenance. We need to have this problem fixed for Tulsa by tomorrow."

Jerry is convinced that he is underpaid. He has been reading ComputerWorld and has seen the latest salary statistics for the IT industry. His salary is $9,000 below the numbers quoted there and he is unhappy about it. "I wish Hop would do a study of the salaries here in the computer company and determine if we are keeping up with the market. If we fall too far behind, we will start to loose some of our technical people! And the best ones will be the first to go!"

Personal Agendas

Appendix

Jerry is frustrated by the arrogance of the engineers, with the engineers subtly intimating that his performance would be better if he were an engineer. "They don't think anyone can do a good job if he is not an engineer. It is a cultural thing; they just feel it in their bones. I just want to `keep my head down' and ride this job until retirement. "

Jerry complains that his staff is not being allowed to tackle the PREsys project on its own, but secretly, he is delighted to have some one else assume the risk of this project. "I am looking forward to working with David and his programming team. We will certainly stand ready to give them any help that we can during this critical project. "

Appendix

Jerry discounts the idea that the profits of HCSI are a bookkeeping gimmick and he believes deeply that the staff at HCSI is not really given sufficient credit (or rewards) for the tremendous profit contribution that the computer company makes toward the Hopkins Companies bottom line. "These engineers just don't understand how hard it is to keep all of these systems working. We make their lives a lot easier with our technology!"

About: Mary Nunn

Appendix

Assorted Facts

Appendix

Mary's group handles about 35 calls per day during a typical workweek, with peaks usually happening on Mondays. The K&A engineers often work on weekends and problems accumulate over the weekends for Monday resolution. On Mondays, there are often fifty or sixty calls to be handled. Most calls deal with routine processing. For example, a request to expedite processing for a particular set of analyses or to find a set of historical cases and load them to the system are common. Some calls are reports of outages or processing errors that need further technical assistance and these must be referred to the proper support staff for resolution. New systems packages tend to cause a lot of commotion. But once the staffs in the engineering offices are trained, those kinds of questions are minimal.

Primary Work Responsibilities

Appendix

Mary is in charge of technical and user support for the computer company. Her group of about ten support staff operates a help desk, mostly answering `how to' questions about software packages or logging system problems reported by users for later resolution by the programming staff. "We are the first line of defense, so to speak. The new PREsys software will need to be supported by us and we are very interested in making it user friendly and intuitive for the engineers to use!"

As a divorced mother of two grown children, Mary is, in effect, married to Hopkins Computer Systems, Inc. "Some days, I arrive here at the office at 5:00 AM and I go around to the desks of my staff and leave notes for them about ideas that I have had the night before. I think they find it stimulating to come in and find a note from me!"

The other function that is Mary's responsibility is training for users of the applications packages that reside on the Hopkins servers. "I have a lot of expertise as a trainer. We are going to need PREsys training manuals, user guides, and presentation materials to use in rolling out this system for the engineers to use once the development is completed. We will have to work with the project team to assure that these items are available in a timely fashion."

Public Persona & Attitudes Toward Work

Appendix

Mary is defensive about not having a college education. "I worked for Jack Crocket in engineering at Hopkins in Tulsa for 18 years before coming to the

Appendix

computer company here in Houston. I was his number one assistant and I really learned a lot about working with engineers there! Sometimes good work experience is more valuable than a lot of impractical book-learning!"

Appendix

Mary would often rather stay in her office than head home each evening. There is plenty of work to do and she thrives on getting things done. "There are many of us who work late here. The freeways are crowded during the rush hour so it makes no sense really to leave until rush hour is over. We get a lot of work done after hours when the phones stop ringing! Of course, Hop provides an open bar for employees after 5:00 PM every day. So, everyone has a drink before heading home anyway."

Personal Agendas

Appendix

Mary is secretly in love with Jack Crocket and was crushed when Hop brought in Tommy Smith to be VP for Reservoir Engineering instead of promoting Jack to the job. "I think Jack Crocket is the best engineer in the company and the finest man I ever knew. If you need help with the specifications for PREsys, I suggest you talk to Jack. You cannot do any better than working with Jack on this. I can assure you!"

Mary hungers for recognition and reward for her dedication and hard work for the firm. "I think we should do something special for the people who work the PREsys project to recognize their contributions as team members on this critical project. "

Appendix

EXPERIENTIAL TEACHING STRATEGIES

Appendix

This is designed as an `experiential case' (as opposed to an 'expository' one). It is for use in a graduate course dealing with Information Technology Project Management. This case fits in the course curriculum after the students have been exposed to project planning and cost estimating procedures as well as the importance of managing the expectations of project stakeholders and the complexities of project staffing. The main deliverable for this assignment is a project plan that fits the circumstances of the case, including the work-breakdown-schedule, work packages, task deliverables, staffing requirements, and cost estimates. This assignment can be done individually or in teams. At the completion of the case, it is often interesting to conduct a "structured walkthrough" of one of the project plans. Have one student (or team) project his or her project plans on a screen and present their ideas point by point, using this one case solution as a springboard and having the rest of the class discuss additions to or variations in the plan as appropriate.

This is not a case in petroleum engineering. It is a case that deals with planning information technology projects. The setting is the Oil & Gas Industry and the need to develop a software package to support petroleum engineers in valuing petroleum reserves. Software project developers often face situations in which they are to develop systems for users in areas that are foreign to them when the project begins. They learn the details of the user's business and needs as the project develops. This case is crafted

Appendix

to provide enough understanding of the work and needs of petroleum engineers so that the resourceful student can develop a reasonable set of plans for this project, just as the resourceful project manager must do in the "real world" of software development.

Appendix

This is an experiential case because it includes role playing as an integral part of the learning process. The concept is to have several students play key figures in the case during a series of interviews conducted by the other students who also role play as interviewers who gather new information and confirm old information gathered elsewhere (e.g., in the case discussions or from websites). At the discretion of the instructor, each student in the class should be on one or more interview teams. Those students playing key roles at the Hopkins Companies (Hop Hopkins, Rocky Ridge, Ken Summers, Jerry Bye, and Mary Nunn) have a set of materials (including secret personal goals and agendas) that are not known to the rest of the class (the interviewers). These materials are intended to inform both their content responses and their behaviors during the interviewing. Obviously, the quality of this case experience depends in large part on who among the students in a class might be chosen to play these key roles. The instructor should choose carefully in assigning these roles, generally choosing the more outgoing and academically stronger students who can memorize and deliver the facts necessary and perform the acting roles needed. It is generally a lot of fun.

The interviewers are required to meet in teams and develop questions for the interviewees. Those who play one of the key roles for one interview generally join an interviewing team for one of the other roles. Interview teams elect a leader who is responsible for creating the interview agenda. Each member of the class must be sure to document the information that comes out of each interview carefully.

Appendix

The role playing in this case involves five interviews, and therefore, fills a lot of classroom time. With students playing key roles, there is always the chance that an interview will fall flat or a student will miss class, or whatever. This could be a major problem, and the instructor will want to guard against potential problems. There is a way to do this. It should be noted that Larry Jordan is not among those included in the interviewing process, even though he should be. The basic story is that Larry Jordan (who is the real power behind Hop's throne) is out of town, in the Middle East working on a deal. On the night of Hop's interview, the instructor comes to class in cowboy (or cowgirl) clothes, at least a big hat, and plays the role of Larry Jordan who has returned unexpectedly from overseas travels and would like to sit in on the meeting. (If the instructor is female, then the full name is "Larry Ann Jordan" and "Daddy wanted a boy!") This ploy is a surprise to the class, loosens up the role players, and allows the instructor to inject new information into the interview and to control the first interview while the students figure out how it will work. Having established this expectation, the instructor can assume the identity of Larry Jordan at any time throughout the subsequent interviews if there are problems.

Subject: Case studies; Information technology; Project management; Role playing; Software engineering

Classification: 9110: Company specific; 9130: Experimental/theoretical; 5220: Information technology management

Publication title: Journal of Cases on Information Technology

Volume: 7

Issue: 1

Pages: 1-21

Number of pages: 21

Publication year: 2005

Publication date: Jan-Mar 2005

Year: 2005

Publisher: IGI Global

Place of publication: Hershey

Country of publication: United States

Publication subject: Business And Economics--Computer Applications

ISSN: 15487717

Source type: Reports

Language of publication: English

Document type: Business Case

Document feature: charts

ProQuest document ID: 198679217

Document URL: http://search.proquest.com/docview/198679217?accountid=38610

Copyright: Copyright Idea Group Inc. Jan-Mar 2005

Last updated: 2011-07-21

Database: ABI/INFORM Complete

Document 87 of 100

The Selection of the IT Platform: Enterprise System Implementation in the NZ Health Board

Author: Shakir, Maha; Viehland, Dennis

ProQuest document link

Abstract:

The Health Board is one of the largest public health care providers in New Zealand (NZ). In early 1999, a supply chain optimization review recommended an enterprise system (ES) implementation to provide better control and reporting of organizational finances. The focus of this case is the IT platform decision made in conjunction with the ES implementation process. This decision was thoroughly considered by all Health Board stakeholders and the final choice was made in alignment with the Board's strategic IT policy. Nevertheless, initial testing two months prior to go-live revealed major performance problems with the new system. The case documents the events that led up to the selection of the original IT platform and the challenges the project team faced in deciding what to do when the platform did not meet contractual specifications. [PUBLICATION ABSTRACT]

Full text:

Headnote

EXECUTIVE SUMMARY

Headnote

The Health Board' is one of the largest public health care providers in New Zealand (NZ). In early 1999, a supply chain optimization review recommended an enterprise system (ES) implementation to provide better control and reporting of organizational finances. The focus of this case is the IT platform decision made in conjunction with the ES implementation process. This decision was thoroughly considered by all Health Board stakeholders and the final choice was made in alignment with the Board's strategic IT policy. Nevertheless, initial testing two months prior to go-live revealed major performance problems with the new system. The case documents the events that led up to the selection of the original IT platform and the challenges the project team faced in deciding what to do when the platform did not meet contractual specifications.

Headnote

Keywords: IS project risk management, IT decision process; IT platform; MIS implementation

ORGANIZATIONAL BACKGROUND

The Health Board is a non-profit public organization that is one of New Zealand's (NZ) largest providers of public hospital and health services. The Board has approximately two million patient contacts annually and provides regional services for 30% of NZ's population. The organization is structured around seven business units that include four specialist teaching hospitals and other facilities offering community health services, mental health services, and clinical support services. The Health Board vision focuses on patients' needs. Being a non-profit organization, surplus funds are allocated to supporting patients, research, and education. Table 1 provides the organization's profile.

Health funding in NZ is disseminated through 21 district health boards (DHBs). Each DHB is responsible for improving, promoting, and protecting the health of the population it serves. For their catchment area, each DHB is delegated the responsibility for making decisions on the mix, the level, and the quality of the health services that are publicly funded. They are also responsible for entering into agreements with providers for health service delivery. DHB decisions are made on the basis of local needs, within national guidelines. Funding is based on the size and characteristics of the population of the district each DHB serves; however, a few nationally funded services still exist.

The Health Board is one of three DHBs in the same region that share a vision to promote close cooperation for the provision of health services. The Board is made up of 11 members: seven elected and four appointed. All Board members report directly to the Minister of Health.

SETTING THE STAGE

In 1999, ConsultCo, a big-five consultancy firm, was engaged to assess the strengths and weaknesses of the supply chain management function at the Health Board, with a view to provide recommendations for the improvement of that function. The product of that engagement was a supply chain optimization (SCO) review report. The SCO review identified problems in business operations and suggested a combination of an organizational restructure, business process reengineering (BPR), and ES (ERP) implementation to accomplish the change program.

The core financial modules of Oracle 10.7 ERP system had been implemented in 1997 and were operational at the time the SCO review was conducted. However, that implementation was heavily customized and could not provide for realizing the new strategic vision that aimed to "standardize, consolidate, and integrate services ... and control finances" (Strategic Plan for the Health Board 2002-2007).

In addition to the recommendation of the SCO review, in early 1999 the Health Board was informed that Oracle 10.7 financials was going to be de-supported by Oracle by the end of 2000, leading to the realization that a major application upgrade was urgently needed. As a result, and in partnership with ConsultCo, an ES business case was developed with a view to rectify these problems. The business case included eight key objectives that were linked to the Health Board's strategic plan. These are summarized in Table 2.

Despite the problems the SCO review had identified with the Oracle 10.7 system, there was an agreement that the new implementation would still be an Oracle ES. The Health Board would have had to write-off the huge investment in the Oracle 10.7 application if it chose to change to a different vendor. Therefore, the business case for the new system was written with a focus on an Oracle upgrade and implementation that was financially justifiable.

View Image -   Table 1:

Organizational restructuring started by the end of 1999, with new job descriptions being written and advertised to fulfill the new organizational design. All new roles had a focus on system implementation experience in preparation for a re-implementation of ERP applications to support the change program. Table 3 presents a chronology of ES implementation events.

The final business case the Board considered in July 2000 compared two upgrade alternatives. These were an upgrade from Oracle 10.7 to either Oracle 11 or Oracle lii ERP applications. While Oracle 11 was in operation since 1999, Oracle Ii was a new release that was launched in NZ in June 2000. The Health Board chose the upgrade to the Web-enabled Oracle 11 i application to avoid the need to undergo a further upgrade a short time later. A profile of the ES implementation project is included in Table 4.

CASE DESCRIPTION

It is October 2000. James Keen, the chief financial officer (CFO) of the Health Board and the business sponsor of the ES project, is faced with a difficult decision. The implementation of the Oracle 11 i ERP system is scheduled to go live in mid-December. However, initial testing shows that there are some key performance problems with the system. In a meeting with the project team earlier that day, James was told that software testing on PCs that use the Windows NT platform showed substantial delays in data processing. Even worse, the tests were carried out using mockup data and the expectation was that these would be fairly manageable by the system.

View Image -   Table 2:

James remembers that the IT platform issue was one of the issues the ES project team had spent considerable time on during the evaluation phase. The IT platform is the foundation for all business applications; hence it is key to any successful IS implementation. As shown in Figure 1, the base of the IT platform is the hardware (HW) and operating system (OS) layer. Although the components in this base layer are largely commodities and are readily available in the marketplace (Broadbent & Weill, 1997), the hardware and software architecture form the basis for the IT capability and functionality of the firm (Meyers & Oberndorf, 2001).

When purchasing any new, large application the organization must consider a number of criteria for a suitable IT platform. One obvious factor is the vendor's choice of platforms. For example, if a Linux-based version of the application is unavailable, then Linux is not an option. A second factor is the cost of the operating system and the hardware. For example, initial investment in Windows is generally considered to be a high-cost option, while Unix and Linux cost less (NetNation Communications, 2003). However, organizations must also look beyond acquisition costs to total cost of ownership (TCO), which also includes operations and control costs. TCO can be as much as 100% more than hardware acquisition costs (David, Schuff & Louis, 2002). A third factor is any hardware/software standard configuration policy in place, usually to solve operational problems (McNurlin & Sprague, 2002). Because of existing staff expertise, the need to integrate applications across a uniform platform, or attempts to reduce TCO, an IT department may prefer or require a standard IT platform for all applications. Other factors such as ease-of-use, portability, processing capability, track record, reliability, and scalability also influence the IT platform choice. See Table 5 for a more detailed comparison of the Windows NT and Unix operating systems platforms.

These general factors apply to enterprise systems implementations. TCO is a critically important component in determining the business value of an ERP initiative (Meta Group, 2000). Additionally, a new ES implementation or upgrade requires knowledge and expertise in areas of software functionality, systems configuration and integration and other technical aspects of the IT platform (Ng, 2001). Other factors that are part of an IT platform decision for ES implementation include vendor customer support, lease versus buy options, and the working relationship, good or bad, that the IT vendor has with the organization (Hirt & Swanson, 1999).

View Image -   Table 3:
View Image -   Table 4:
View Image -   Figure 2:

Many of these criteria for the IT platform decision were considered by the NZ Health Board ES project team. Vendor1 had proposed an IT platform consisting of Sun computers using the Unix operating system. Vendor2's proposal was to support the ERP application on IBM computers running Windows NT. Michael Field, who has the conjoint role of ERP Project Director and BPR Manager, recalls how the initial IT platform decision was made:

We gave the opportunity to a number of hardware suppliers based on our statistics [that] we'd collected through the business case exercise. ... ConsultCo was helping us write the business case. Also was Oracle. ... We had already collected all of that information informally so we already had a view on what was possible and what wasn't.

Part of our strategy was preferably to go down an NT operating system route. That's why we went down the hardware route that we did because it was an NT operating system.. By the time it got to formally go out for RFP for the hardware, we knew what we wanted and how we would evaluate it. ... We wanted to make sure we had the right guarantees. So contract negotiations with those hardware vendors was very much written into warranty - [we had aj strong focus on warranty provisions. ... We again ended choosing objectively a hardware solution, which was based on the NT platform. ...

Then it was up to the hardware vendor to guarantee that the Oracle software would work on their hardware. That was a large part of the negotiations because we knew we were going into a risky environment and that was the only way that we could seal it because we didn't have a relationship with a prime vendor... We had to make very sure each one of the individual contracts we signed had good warranty clauses in them...

The Board's IT department had favored the Windows NT platform because it was the standard IT platform for the organization. Furthermore, two years earlier, a review of information systems at the Health Board had concluded that business operations were disadvantaged because of an inconsistent approach in managing IT. A standard configuration policy was promoted and this had a strong influence in the selection of the IT platform. Finally, there were significant price savings in adopting the Windows NT platform over the Unix alternative due to lower TCO.

An issue that complicated the evaluation of the IT platform decision was that Oracle Ili had just been released at the time the IT platform was being considered. The proposed Health Board implementation was to be the first implementation of Oracle lii in NZ. Additionally, the only planned implementation in Australia was in a for-profit business that was relatively smaller than the Health Board. As a result the Board lacked any concrete evidence of how the application would perform under either platform.

Theoretically, the Oracle li set of applications could be supported by both platforms, Windows NT or Unix. Andrew Smith, the Accounts Manager for Oracle at the time had explained that "yes, both alternatives were possible," though he recommended the Unix platform. Experience in implementing ERP applications on the Unix platform showed that system performance was often more stable, especially for an implementation the size of the Health Board. Andrew, whose role was focused on sales and managing the client-Oracle relationship, left both options open for the Health Board project team to decide.

The other party involved in the IT platform decision was ConsultCo, the big-five consultancy firm that was the ES implementation partner. Like many public organizations in NZ, the Health Board was embarking on a big ERP project, but with a considerably low implementation budget for the size of the organization. To support the fast track project, the Health Board contracted with ConsultCo to manage both the evaluation and implementation processes.

In NZ, it is common practice that the client organization determines what the new IT platform should be. Most organizations in NZ are small and medium-sized enterprises (SME), especially when compared to organizations in North America or Europe. As a result, the resources allocated to these implementations are relatively small, even though the systems involved usually have the same amount of sophistication and complexity. As one means of cutting costs, the client organization generally takes more responsibility in implementation decisions. That was the case here - the Health Board was responsible for a large portion of the implementation risk and the IT platform was one of those risks.

View Image -   Table 5:

After considering the advice offered by the Board's IT department, the Oracle Account Manager, and ConsultCo, the Health Board ES project team selected the Windows NT platform for the implementation of Oracle Ii ERP system. Knowing the risks involved, and to mitigate these risks, they put into the agreement with Vendor2 a condition to ensure that the new system performed according to specification. If performance was not acceptable, the legal agreement allowed for the contract to be terminated. Vendor2 accepted this condition and implementation began.

Coming back into the present, James was very disturbed to learn that the performance tests during the past week had shown unacceptable delays in data processing. He realized that a revisit of the earlier evaluation decision was imminent. James knew that this could represent a major setback to the project. If this problem were to delay the go-live date, even if only by a few months, then the whole project would collapse. Any delay, he thought, would require a huge boost in the implementation cost. Specialized ERP consultants were scarce and the ConsultCo consultants working on the Health Board project were being flown into NZ from the ConsultCo office in Australia every week. To consider extending the project, even for a few weeks, would mean a large increase in costs and the Health Board did not have a large contingency fund to cover this blowout. Furthermore, as part of new government regulations, the Health Board was to start implementing a new chart of accounts in December. Plans for implementing the new chart of accounts were embedded within the new ERP system, so statutory requirements, as well as cost considerations, were at risk.

James, as the business sponsor of this project, knows he needs to move on this issue very quickly. Going over both the earlier considerations of the IT platform decision and the contractual obligations with the hardware vendor, he wondered: Could he recommend that the contract be terminated and go for the alternative path of the Unix platform? Because of the size of the contract, organization policy necessitated that such a decision needed to go to the Board members for approval. Other questions that needed a careful assessment were: What if the hardware vendor decided to go the litigation path? What if the problems were not caused by the IT platform? What if the Board did not approve the change?

James knows that a decision needs to be made and to be made very quickly. It is one of those times when not making a decision is going to jeopardize the fate of the project anyway. He picks up his phone and schedules an urgent meeting with his project team the next day.

CURRENT CHALLENGES/PROBLEMS FACING THE ORGANIZATION

One of the main problems that affected the choice of both the OS and the hardware platform was the relationship between the release version of the ES application and the IT platform. The Health Board had chosen to implement the new release of Oracle Ii; yet, experience in implementing different combinations of OS and hardware platforms with the new release was very limited. In the following, Michael Field, the ERP Project Director/BPR Manager), explains the implication this decision had on ES implementation:

One of the important areas in terms of a large ERP implementation is around the maturity of the software and its relationship with the operating system. This had quite a large impact on the issues which we had to manage for our project. For us, one of the biggest things in this particular implementation was the relationship of the application to an operating system. That triggered a whole lot of things for us. What we did on the project might have been different to some other ERP applications because this issue looked like it was going to have an impact on us being able to deliver the whole project on time.

When a lot of people do an implementation they bundle the whole implementation with no risk. They pass the risk onto the party implementer who supplies everything - the hardware, software, and implementation services. In our case we believed we didn't want to do that so we structured the project in a certain way and that was to get a third party to help us do the implementation. We'd buy our software from someone else and we would get the hardware from somewhere else. This in terms of managing a project of this size proved too challenging. But for us, that was the only way we could afford to do this project.

It [selection of the IT platform] had a major impact on the project. So ... [it] went up through to the steering committee, even to the Board. ... Even though we had used all the expertise from Oracle, all the expertise from the IT platform vendor in this case, plus ConsultCo's collective expertise, so-called best around the world, the decision ended up in hindsight not the right one. But at least we made a decision.

Although the initial rr platform decision was made at the project manager level, where Michael (ERP Project Director) and ConsultCo were key decision-makers, when performance deteriorated James (the CFO) stepped in in order to rescue the project. He says: I didn't get involved in those [IT platform] decisions at all. That was driven out of the IS function working with the consultants. That's where we had major problems all around around the hardware and the database. A decision had been taken to go down that path. As we got into the project, there were problems.

There are two different explanations to the software performance problems that caused the Board to consider a change in the IT platform decision. The Health Board attributed performance problems to the newly released Oracle Ii. Oracle, the ES vendor, attributed the problems to a combination of unrealistic expectations, limited vendor participation, and an immature implementation experience. A detailed explanation of these two views is provided next.

The Health Board based their conclusion that the Oracle Illi had not been thoroughly tested within an NT environment on their own experience, as well as the experience of others who were implementing Oracle I ii at the same time. Heated discussion in the online forum of the Oracle application user group (Hawaii Ebuzz, 2000; Songini, 2000) and a 2001 report from the Gartner Group ("Oracle calls Gartner Group biased," 2001) affirmed this explanation that Oracle Ii was not ready to go to the market in its initial release.

The ES vendor Oracle believed that the IT infrastructure problem was exaggerated for three reasons. First, neither the vendor nor any of its representatives were actively involved in the implementation. Therefore, critical issues did not come to their attention until a problem became significant and needed immediate action.

Second, although the implications of implementing a new release had not been clearly explained by Oracle in advance, the Health Board should have had realistic expectations when they chose the new Ii release. One fact most computer professionals are aware of is that new software releases are never bug free until they are validated by users. Therefore, problems inherent in the new software release could have complicated the diagnosis of performance problems.

Third, the ConsultCo implementation team did not have prior experience in implementing the Oracle IIi applications on an NT platform and had refused several suggestions to add an Oracle person to complement their team. The Oracle Accounts Manager best summarizes those three issues in the following statement:

IT were the people that were saying that you must use an NT system in the first place because "that's our standard. " ... They were more worried about the fact that they were trying to have an NT Microsoft type strategy. ... We most assuredly suggested to them and recommended to them many times that they should go down a Unix path and they didn't listen to us there. ... We [Oracle] concluded that [ConsultCo] had little experience with NT - very little experience with NT and with Oracle. Even less, [they] certainly had no experience for putting Ili onto it. They had no experience in putting Ii into a Sun box, which is why I always felt uncomfortable that they weren't taking Oracle people [as sub contractors on to the project].

In summary, the main challenge facing James Keen is how to resolve the IT platform problem within the two months before go-live. James knows that not resolving IT platform implications in a timely manner is likely to result in a failed project. Hence, a decision needs to be made and actioned quickly. Is it possible to work with Vendor2 to resolve these problems, assuming these were only teething problems? Or need a change of IT platform be actioned as soon as possible with implications of a cost overrun and a legal suit?

Footnote

ENDNOTES

Footnote

All organization and personal names have been disguised.

References

REFERENCES

References

Alexander, B. (2004). Unix vs. Windows NT. India Web Developers. Retrieved January 30, 2004: http://www.. indiawebdeve lope rs. com/technology/scripts/ chapter1.asp

Broadbent, M., & Weill, P. (1997). Management by maxim: How business and IT managers can create IT infrastructures. Sloan Management Review, 77-92. BroadSpire. (2003). Windows vs. Linux: Choosing the right hosting platform. Retrieved

January 30, 2004: http://www.broadspire.com/solutions/express/shared/ linuxvswindows. html

David, J.S., Schuff, D., & Louis, S. (2002). Managing your IT total cost of ownership. Communications of the ACM, 45(1), 101-106.

References

Hawaii Ebuzz. (2000, October 27). OAUG conference offers users chance to ask Oracle. Hawaii Ventures Corporation. Retrieved July 2003: http://www.hawaii ventures. com/news] 0023.html

Hirt, S.G., & Swanson, E.B. (1999). Adopting SAP at Siemens Power Corporation. Journal of Information Technology, 14, 243-251.

McNurlin, B.C., & Sprague, R.H. (2002). Information Systems Management in Practice (5th ed.). Upper Saddle River, NJ: Prentice Hall.

Meta Group. (2000). ERP platform-related analysis total cost of ownership study: A platform-related cost analysis of ERP applications on-going support costs in the mid-tier. Retrieved April 21,2004: http:/www.verio.co.uklpowerplatformllibrary/ erp_tco.pdf

References

Meyers, B.C., & Oberndorf, P. (2001). Managing Software Acquisition: Open Systems and COTS Products. Boston: Addison-Wesley.

NetNation Communications. (2003, October 6). Unix versus Windows. Retrieved January 30, 2004: http:llwww.netnation.com/products/unix or nt.cfm

Ng, C.S.P. (2001). A decision framework for enterprise resource planning maintenance and upgrade: A client perspective. Journal of Software Maintenance and Evolution: Research and Practice, 13, 431-468.

Oracle calls Gartner Group biased after consultant knocks operations. (2001, August 28). CFO. Retrieved July 31, 2003: http://www.cfo.com/article/1,5309, 4748%7C%7CA%7C134%7C6, 00.html

Songini, M.L. (2000, October 20). Oracle applications users look for more help on upgrades. Computerworld. Retrieved July 2003: http:llarchive.infoworld.comlarticleslhnlxml/OO/10/20/001020hnorapps.xml

AuthorAffiliation

Maha Shakir, Zayed University, United Arab Emirates Dennis Viehland, Massey University, New Zealand

AuthorAffiliation

Maha Shakir (maha.shakir@zu.ac.ae) is an assistant professor of information systems at Zayed University. Her primary research areas are strategic IS implementations, management information systems and enterprise system applications where her publications appeared in the Journal of Decision Systems, ERP edited books, ACM Software Engineering Notes, and several international IS conferences.

AuthorAffiliation

Dennis Viehland(d.viehland@massey.ac.nz) is an associate professor of information systems at Massey University's Auckland (New Zealand) campus. His primary research areas are information management, electronic commerce strategy, and ubiquitous computing. He has published widely, most recently as co-author of Electronic Commerce 2004: A Managerial Perspective.

Subject: Case studies; Studies; Information technology; Public health; Enterprise resource planning

Location: New Zealand

Classification: 9130: Experimental/theoretical; 9110: Company specific; 5220: Information technology management; 9179: Asia & the Pacific; 8320: Health care industry

Publication title: Journal of Cases on Information Technology

Volume: 7

Issue: 1

Pages: 22-33

Number of pages: 12

Publication year: 2005

Publication date: Jan-Mar 2005

Year: 2005

Publisher: IGI Global

Place of publication: Hershey

Country of publication: United States

Publication subject: Business And Economics--Computer Applications

ISSN: 15487717

Source type: Reports

Language of publication: English

Document type: Business Case

Document feature: tables references diagrams

ProQuest document ID: 198671942

Document URL: http://search.proquest.com/docview/198671942?accountid=38610

Copyright: Copyright Idea Group Inc. Jan-Mar 2005

Last updated: 2011-07-21

Database: ABI/INFORM Complete

Document 88 of 100

Beyond Knowledge Management: Introducing Learning Management Systems

Author: Grace, Audrey; Butler, Tom

ProQuest document link

Abstract:

In the knowledge economy, a firm's intellectual capital represents the only sustainable source of competitive advantage; accordingly, the ability to learn, and to manage the learning process are key success factors for firms. The knowledge management approach to learning in organizations has achieved limited success, primarily because it has focused on knowledge as a resource rather than on learning as a people process. Many world-class organizations, such as Procter & Gamble, Cisco Systems and Deloitte Consulting, are now employing a new breed of systems known as Learning Management Systems (LMS) to foster and manage learning within their organizations. This article reports on the deployment of an LMS by a major US multinational, CEM Corporation, and proposes a framework for understanding learning in organizations, which highlights the roles that LMS can play in today's knowledge-intensive organizations. [PUBLICATION ABSTRACT]

Full text:

Headnote

EXECUTIVE SUMMARY

Headnote

In the knowledge economy, a firm's intellectual capital represents the only sustainable source of competitive advantage; accordingly, the ability to learn, and to manage the learning process are key success factors for firms. The knowledge management approach to learning in organizations has achieved limited success, primarily because it has focused on knowledge as a resource rather than on learning as a people process. Many world-class organizations, such as Procter & Gamble, Cisco Systems and Deloitte Consulting, are now employing a new breed of systems known as Learning Management Systems (LMS) to foster and manage learning within their organizations1. This article reports on the deployment of an LMS by a major US multinational, CEM Corporation, and proposes a framework for understanding learning in organizations, which highlights the roles that LMS can play in today's knowledge-intensive organizations.

Headnote

Keywords: case study; computer systems implementation; innovative technology; intellectual capital; IS training and development; knowledge transfer; personnel training

ORGANIZATIONAL BACKGROUND

CEM Corporation2 is a world leader in the design, development and manufacture of Internetworking storage IT infrastructures. The company's core competencies are in networked storage technologies, storage platforms, software, and, also, in services that enable organizations to better and more cost-effectively manage, protect and share information. CEM was founded in 1979 and launched its first product in 1981 - a 64kilobyte integrated circuit memory board developed for the then popular Prime minicomputer platform. CEM's sales passed the $3 million mark in 1982 and reached $18.8 million two years later. In the mid- 1980s, CEM launched a series of memory and storage products that improved performance and capacity for minicomputers made by IBM, Hewlett-Packard, Wang, and Digital Equipment Corporation. The company went public in April 1986; a year in which sales hit $66.6 million and a net income of $18.6 million was achieved.

In the late 1980s, CEM expanded strongly into the auxiliary storage arena, where it remarketed other suppliers' magnetic disk drive storage subsystems, often coupled with its own controller units. In 1987, the company introduced solid state disk (SSD) storage systems for the mini-computer market and its headquarters moved to Hopkinton, Massachusetts. In 1988, its stock was listed on the New York Stock Exchange and in 1989 CEM accelerated the transition from a supplier of memory enhancement products to a provider of mass storage solutions. In 1997, more than 70% of the company's engineers were dedicated to software development for mass storage technologies. Software sales rose from $20 million in 1995 to $445 million in 1998, making CEM the fastest growing major software company in the industry sector. In 2001, CEM was named as one of Fortune's 100 best companies to work for in America. In the same year, the company launched a major new global branding initiative. CEM Corporation's total consolidated revenue for 2002 was $5.44 billion.

SETTING THE STAGE

From its inception, CEM recognized the importance of learning within the organization: accordingly, it facilitated learning development and support for its employees, including: technical skills; business skills; IT skills; management skills; and individual personal development. Prior to 2000, learning development and support was facilitated through a number of training services, which included:

A Corporate University, which provides training throughout CEM, including induction training for new staff, corporate guidelines, professional and project management guidelines, and computer skills.

A Professional Global Services Training department, which supports field and sales staff at CEM.

A Global Technical Training Department, whose main aim is to address the advancing technologies in the ever-evolving hardware, software products, and support applications and processes.

Human Resources Training Centers, which support the soft skill training of managers, supervisors and individual employees.

Technical Libraries and Personal Development Libraries.

A Continuing Education Program, which provides financial support and study leave.

These diverse training services within CEM had, for some time, been successfully delivering training and learning support to a number of distinct areas within the corporation. However, by the year 2000, CEM recognized that it was facing a number of key challenges in relation to its organizational learning processes. These included the following:

As a large multinational organization with a constantly growing global workforce of 20,000-plus employees, the overall management of the learning of all employees using multiple training organizations was becoming increasingly difficult. In particular, the management of course enrollments, training paths and individual competency levels posed a significant challenge.

There was some duplication of effort across many of the training services and a distinct lack of consistency in how training was being developed and delivered. Specifically, there was a lack of coherence in relation to how content was being created and administered. From the point of view of an employee, there was no overall catalogue of courses available that outlined the training or learning programs available from each of the training services.

By 2000, the business environment in which CEM Corporation operated was rapidly evolving and becoming more intensely competitive: hence, learning and the management of learning began to play an increasingly critical role in the ongoing success of the organization. Within this context, CEM needed to replace the isolated and fragmented learning programs with a systematic means of assessing and raising competency and performance levels of all employees throughout the organization.

In addition, CEM wished to establish itself as an employer of choice by offering its people extensive career planning and development opportunities.

In response to these challenges, CEM decided to implement an enterprise learning solution. The stated business drivers for deploying this enterprise learning solution were to:

Decrease time-to-competency.

Develop and manage skill sets for all employees.

Leverage global, repeatable and predictable curriculum.

Integrate competency assessments with development plans.

Accelerate the transfer of knowledge to employees, partners, and customers.

Provide a single learning interface for all internal and external users.

CEM went to the market looking for an off-the-shelf corporate-based learning management system (LMS) that could be used to formulate and manage learning across multiple functions within the organization, including: technical functions; business functions; rT professional functions; and management functions. The system would also need to facilitate the delivery and tracking of disparate training programs, including the tracking of individual personal development training. Having considered several LMS then available from different vendors, CEM Corporation chose Saba Learning Enterprise(TM) (see Appendix A for a brief overview of Saba Software Inc.). In February 2001, CEM deployed its enterprise learning solution, incorporating this new LMS to employees across the entire organization as well as to CEM customers and business partners.

Based on an exhaustive analysis of previous research in the area and an extensive case study of the deployment and use of Saba Learning Enterprise(TM) at CEM Corporation, this article proposes a framework that places LMS in context with other categories of IS said to underpin learning in organizations. The framework also highlights the roles that LMS can play in the support and management of learning within knowledge-intensive business enterprises. Thus, it is hoped that this framework will deepen the IS field's understanding of the contribution of LMS to learning within organizations.

Motivation for the Study

Significance of Learning in Organizations

The importance of facilitating and managing learning within organizations is well accepted. Zuboff (1988), for example, argues that learning, integration and communication are critical to leveraging employee knowledge; accordingly, she maintains that managers must switch from being drivers of people to being drivers of learning. Harvey and Denton (1999) identify several antecedents that help to explain the rise to prominence of organizational learning, viz.

The shift in the relative importance of factors of production away from capital towards labor, particularly in the case of knowledge workers.

The increasing pace of change in the business environment.

Wide acceptance of knowledge as a prime source of competitive advantage.

The greater demands being placed on all businesses by customers.

Increasing dissatisfaction among managers and employees with the traditional "command control" management paradigm.

The intensely competitive nature of global business.

Deficiencies in the Knowledge Management Approach

During the 1990s, there was a major shift in focus from organizational learning to knowledge management in both applied and theoretical contexts (Alvesson & Karreman, 2001; Easterby-Smith, Crossan & Nicolini, 2000; Scarbrough & Swan, 2001). Knowledge management systems (KMS) sought to facilitate the sharing and integration of knowledge (Alavi & Leidner, 1999; Chait, 1999; Garavelli, Gorgoglione & Scozzi, 2002). However, these systems had limited success (Shultz & Boland, 2000), with reported failure rates of over 80% (Storey & Barnett, 2000). This was because many of them were, for the most part, used to support data and information processing, rather than knowledge management (Borghoff & Pareschi, 1999; Butler, 2003; Garavelli et al., 2002; Hendricks, 2001; Sutton, 2001) and also because many implementations neglected the social, cultural and motivational issues that were critical to their success (Huber, 2001; McDermott, 1999; Schultze & Boland, 2000). Indeed, some argue the knowledge management paradigm may be little more than the latest "fad" to be embraced by the IS field (Butler, 2000; Galliers & Newell, 2001; Swan, Scarborough & Preston, 1999), and its popularity may have been heightened by glossing over complex and intangible aspects of human behavior (Scarborough & Swan, 2001).

New Potential Offered by Learning Management Systems

It is perhaps time to admit that neither the learning organization concept, which is people oriented and focuses on learning as a process, nor the knowledge management concept, which focuses on knowledge as a resource, can stand alone. These concepts compliment each other, in that the learning process is of no value without an outcome, while knowledge is too intangible, dynamic and contextual to allow it to be managed as a tangible resource (Rowley, 2001). She emphasizes that successful knowledge management needs to couple a concern for systems with an awareness of how organizations learn. Researchers believe that what is needed is to better manage the flow of information through and around the "bottlenecks" of personal attention and learning capacity (Brennan, Funke & Andersen, 2001; Wagner, 2000) and to design systems where technology services and supports diverse learners and dissimilar learning contexts (McCombs, 2000). In response to these needs, learning management systems (LMS) evolved; accordingly, an increasing number of firms are using such technologies in order to adopt new approaches to learning within their organizations. This new learning management approach has been led primarily by practitioners and IT vendors; as it is a relatively new phenomenon, there is a dearth of empirical research in the area. Therefore, an important challenge for the IS field is to better understand LMS and to examine the role that these new systems play in organizations.

CASE DESCRIPTION

Conduct of the Study

This case study was conducted over a period of 11 months from October 2002 to August 2003. The LMS in use at CEM is a complex and multifaceted system; hence, it was necessary to first conduct several exploratory interviews with the subject matter expert. Five such site visits occurred over a six-month period and each meeting lasted between one and one and a half hours. This type of elite interviewing (Marshall & Rossman, 1989) is sometimes necessary to investigate little understood phenomena. In one of these sessions, a detailed demonstration of how the system operates was provided by this expert. A second demonstration of the system was subsequently obtained from a training manager within CEM Corporation. This provided the researchers with an understanding of the system's capabilities and an insight into how the system is used on a day-to-day basis. The human resources manager was also interviewed at this stage. Subsequently, the researcher carried out eight semi-structured interviews with key personnel, including an administrator of the system, a number of employees and managers who use the system, and several training specialists, one of whom had responsibility for knowledge management initiatives at CEM. Appendix B provides an outline of the interview guide used in the semi-structured interviews.

The Enterprise Learning Solution

The Enterprise Learning Solution implemented by CEM Corporation consists of several components, one of which is an LMS called Saba Learning Enterprise(TM) (Figure 1). Much of the learning material is created and maintained by CEM employees using a range of off-the-shelf products that includes Microsoft Office, Adobe Acrobat and Saba Publisher, while the systems learning content is stored in CEM's own on-site storage repository. In addition, courseware is created and maintained directly by third parties including KnowledgeNet and Netg, and is stored offsite in the storage repository of both third-party organizations.

Employees at CEM manage their own learning processes by accessing the LMS through the Internet. Using the Web, they can enrol in classroom courses; search for learning material; engage in online learning activities; and look at what development options are suitable for their role within the organization. Managers also use the system to administer the employee learning processes; for example, managers can examine the status of the learning activities of their employees; assign learning initiatives to their employees; and generate reports on learning activities. Administrators and training personnel use the system to supervise employee training; for example, they publish and manage learning content; manage a catalogue of courses; and create reports on learning activities. While much of the required reporting is provided by the LMS, administrators also use a third-party software application called Brio to generate more sophisticated reports.

The Saba Learning Enterprise(TM) LMS has the capability of managing and tracking offline activities (e.g., books, "on the job" training, mentoring, classroom training) and online activities (e.g., video and audio, Webcasts, Web-based training, virtual classroom training, and rich media). Learning content for online activities may be accessed and delivered through the Web application interface either from CEM's own learning content repository or from a third party's storage repository. Certain post-training testing is built into the learning content itself, but additional pre-training testing and post-training testing may be invoked, and this is provided by another third-party product called QuestionMark.

View Image -   Figure 1:

LMS: Toward a Better Understanding

Figure 2 summarizes the case study findings. In this diagram, an empirically tested framework is presented that places LMS in context within a wider topology of the key categories of IS that underpin learning in organizations. Furthermore, the framework describes the principal attributes of each category of IS and highlights the roles that LMS can play in the support and management of learning within an organization. The categories of IS have been segregated into two groups: those that support formal managed learning within the organization, and those that support informal or unmanaged learning. The IS category of LMS is highlighted within the framework to emphasize that this new breed of system is central to the strategic "people oriented" approach to managing learning that is now emerging in many organizations.

View Image -   Figure 2:

LMS: In Context

On one hand, the findings illustrate that CEM found that their new LMS, learning content management systems (LCMS), and learning/training environments all contributed to the process of formal managed learning in the organization. On the other hand, it was clear that informal unmanaged learning within the organization was facilitated through IS that supported ad hoc learning in concert with the extant knowledge management system (KMS). The reason for this situation is that KMS, while supporting knowledge management in a formal way, only support informal learning, as learning is not facilitated in a structured way, nor is it measured or validated by the KMS.

In Figure 2, the arrows describe the links that exist from one IS category to another (i.e., LMS, LCMS, KMS, etc.), signifying the interrelationships between them. For example, the case study findings indicate that LMS are fed content directly by LCMS (as illustrated by the solid arrows lines). The LMS Manager elaborated on this: "a link is created in the LMS that contains the address where content is located, either on CEM's own storage repository or on the third party courseware repository." The findings also highlighted that LMS have a strong two-way relationship with learning/training environments, as training programs are often initiated from within the LMS and information on the outcome of this training is often captured directly by the LMS. It was clear that LMS had only a tenuous link to other information systems that support ad hoc or informal learning (as illustrated by the broken arrowed lines). In describing this type of linkage, the LMS Manager pointed out that "the link from these systems consists primarily of a need which they generate for formal learning and training programs to be carried out." He added that "the content for this training will often stem from the IS itself and the type of environment used will, more than likely, be decided by the nature of the system in question." He indicated that KMS often store information on problems and solutions relating to other systems that support informal learning; hence, there is a tenuous link between these two categories of IS.

LMS: Key Roles

The framework shown in Figure 2 lists a number of key roles that LMS can play in supporting and managing learning. These roles indicate the dimensions, factors, or variables that future researchers should try to capture when evaluating the roles of LMS. One of the more significant roles listed is that LMS can support the administration of training 3 across large organizations with a variety of training needs (Barron, 2000; Brennan et al., 2001; Zeiberg, 2001). A training manager within CEM Corporation commented that "the main role of the LMS is to automate training administration and then to add value." He also maintained that "with the LMS, the amount of work that you can get through is greater.. it improves the efficiency of delivering and managing training." Thus, the LMS facilitates an increase in the productivity of training. From a learner's perspective, the principal role of the LMS is that it can provide a central repository for a range of learning material in a structured way that enables the system to support a diverse body of learners within diverse learning contexts (Brennan et al., 2001; McCombs, 2000; Wagner, 2000). As one user of the LMS within CEM Corporation put it, "employees who work in areas of the business can identify their role and cross reference the LMS for recommendations on what training is appropriate for that role.. the system also provides guidance with recommended paths through several training courses." Another user of the LMS emphasized that "before, it was known that the Training Organization facilitated training, but you couldn't put your finger on something you wanted..now there is a central repository and you can see all the training that is being delivered." This leads to the most critical role of all, which is that it can increase the degree to which training is utilized and hence, increase learning in the organization. Also, from the perspective of the learner, the research findings identified two other significant and emerging roles of the LMS, which are listed within the framework. The first of these is the provision of post learning support, whereby, as the LMS manager explained, "the LMS enables employees to return to material from a course or download documents associated with a course that they have already completed." The second emerging role of the LMS is that it acts as a signaling system for changes in the organization. This was highlighted by one user of the system, who holds a software development role within the organization. He argued that "when new training becomes available on the LMS within our area, this normally signals that either new software product features have been released or that software product changes have taken place."

CEM's LMS also allows for competency mapping and facilitates career development paths. Using the LMS, an employee's competencies may be assessed using a predefined competency model for their particular job role. Subsequently, a number of development options or learning activities are suggested by the system, which may be carried out by the individual in order to fill any skill gap or competency deficiency for their role type. Thus, the LMS facilitates competence development to meet particular business objectives (see also: Brennan et al., 2001; Hall, 2001). The competency assessment process enables a dual approach to learning management (i.e., top-down and bottom-up). From a top-down perspective, training managers can use the LMS skillassessment process to automate the training needs analysis process, which will assist them in the identification of training needs and will support training planning. Furthermore, from a management perspective, it is possible for a manager to get an overall picture of the competency levels within their department. One technical manager maintained that "although it started as just automation of training needs analysis, managers then saw that they can get a picture of training gaps and competency levels ... they can also see overlaps in competencies." The LMS manager also commented on the bottomup approach facilitated by the system viz. "self assessment and self directed learning is offered, which has passive approval." In this context, passive approval means that if an employee registers for a particular course or learning activity, they are automatically approved for that training unless the training is specifically disapproved by their manager within a certain limited time period. In this way, employees are encouraged to selfmanage their own learning using the LMS: this has the added benefit of encouraging accountability for learning among employees (see also Hall, 2000).

The use of competency models for assessing and developing employee capabilities forms the basis of a number of other evolving roles of the LMS. Through standardizing role-based competency requirements and development options, the LMS can enable more consistent and cohesive learning throughout the enterprise (see also Greenberg, 2002). The LMS manager pointed out that "the status of competencies within the organization may be reported on at a number of different levels, using the LMS." This enables the monitoring and analysis of the "learning condition" of an organization (see also Nichani, 2001). Furthermore, a department manager described how "the LMS can support a manager in assessing an employee's role-based competencies and having agreed development plans with that employee, a subsequent competency assessment can help that manager to determine the employee's `learning performance' in acquiring the new competencies, as per the development plan." Thus, by reviewing progress between one competency assessment and the next, the evaluation of individual learning performance for an employee is facilitated. This may then form part of the individual's overall performance evaluation.

CEM Corporation: Overall Benefits of the Enterprise Learning Solution

The deployment of the enterprise learning solution has enabled CEM Corporation to address many of the challenges that it faced in 2000, prior to the system's implementation. In particular, CEM has achieved the following:

CEM now has a single enterprise system that supports the administration of all training across the entire organization. From the point of view of the employees, the system provides a centralized mechanism that enables them to search for and to enrol in selected courses or training programs; it also offers guidance on recommended training paths and curriculums. Furthermore, the competency assessment facility enables employees to determine and rectify competency gaps as well as providing management at CEM with a means of monitoring and managing overall employee competency levels within the organization.

The enterprise learning solution supports all training content whatever its subject matter or form and enables the management and control of access to this content using one system. This has the added advantage of highlighting duplication of training material in different parts of the organization and paves the way for streamlining the efforts of different training services within the company.

The flexibility and dynamic nature of the system allows CEM Corporation to unilaterally introduce and to quickly implement new training requirements across the organization in response to changing business needs or new technical advances.

The Saba Learning Enterprise(TM) LMS may help to attract or retain key personnel by offering them a unique opportunity to monitor and develop their competencies and to manage their careers within the organization.

CURRENT CHALLENGES/PROBLEMS FACING THE ORGANIZATION

As outlined earlier, CEM Corporation is a hi-tech organization that operates in a very competitive and dynamic business environment. Managing learning and measuring learning outcomes are in themselves difficult tasks, but they are made even more problematic within complex learning domains, such as those that exist at CEM. It is unlikely that the LMS will enable the full management of all of the learning in the organization in a truly scientific way, though it will assist greatly in managing the diverse and extensive array of learning contexts and learning processes that must be supported. The system's strengths lie in the new approach and attitude that it will encourage and inspire in the hearts and minds of individuals within the organization, as it enables learning that is highly visible, structured, and more accessible within the organization. This stimulation of the hearts and minds is a major contributing factor to learning and is known as "emotional quotient" (Goleman, 1996). Having deployed the enterprise learning solution, CEM Corporation now faces a number of key challenges. These are outlined next:

Control vs. Creativity: Managing the Delicate Balance

The findings of this case study demonstrate that CEM's new LMS can play a vital role in increasing learning within across the organization. This will be achieved by improving the control and management of employee competency levels, and also by empowering employees to be creative in managing their own learning and competency development. Thus, the key challenge for management at CEM is to increase their influence and control over training and learning within the organization, while at the same time increasing employee commitment to managing their ongoing self-development by taking responsibility for improving their knowledge of the business and building related competencies. These objectives are delicately balanced and must therefore be handled carefully. Too much control may de-motivate employees and discourage them from engaging with the system, but at the same time, enough control must be exerted to ensure that employees are developing competencies that support the day-to-day operational requirements of the organization, as well as being in sync with the overall goals and objectives of the company.

Exploiting the Benefits of the LMS: Incorporating all Training & Learning

Another key challenge presently facing CEM Corporation is that they have a long way to go before all of the benefits offered by their new LMS can be fully exploited. Not all formal training is currently being tracked and managed through the LMS and some departments independently organize their own training outside of the system. One engineer argued that "there doesn't appear to be a large amount of suitable training available for our department." The benefits offered by this enterprise learning solution will not be fully realized until sufficient training or learning programs are offered to all employees in all departments within the organization. Furthermore, while it is possible to take certain online training directly through the Internet, it is not possible to track or manage associated learning outcomes, as this training is initiated and completed outside of the LMS, and is not currently recorded by it. It is understandable that it will take some time to incorporate every training program for all employees onto the system, but it is critical that this is achieved as quickly and efficiently as possible, to ensure support for the system and ongoing use of the system across the entire organization.

Drawing Up Competency Models for All Employees

Role-based competency models have not yet been drawn up for all roles within the organization. As the LMS Manager pointed out, "there is difficulty in having accurate competency models for all roles when there is such a vast array of diverse technical positions." He added that "as you drill down, you find that there are a lot of specialist functional competencies and you get into the ROI question.. because there is such a large investment in time and effort involved in devising competency models for all technical roles, it has to be driven by the local business needs". Competency assessments are instrumental to determining if positive learning outcomes have been achieved and they will also demonstrate if the organization is obtaining a return on its investment in implementing and deploying the LMS. Furthermore, competency assessments offer management at CEM an opportunity to identify and rectify gaps or overlaps in competency levels as well as providing a means of assessing and managing overall competency levels within the organization. CEM Corporation is now faced with the daunting task of drawing up and maintaining competency models for the vast array of role types of its 20,000-plus employees, many of whom work in dynamic and highly technical areas.

Managing the Competency Assessment Process

Even where competency models are available, the study revealed that the process of self-management of career development has, for the most part, not yet been taken up within the organization. Moreover, many employees, and indeed managers, have not yet engaged with the competency assessment process. A structured plan or roadmap needs to be formulated in conjunction with local business needs for the formal migration of all employees onto the system for competency assessment and competency development planning to take place.

Fully Mobilizing the LMS within the Organization

One manager observed that "many employees still feel that the system is primarily designed for course registration and the other elements of the system may need to be emphasized more internally." Another user of the LMS argued that "although the initial rollout of the LMS seems to have been good and although there is a growing awareness of the system, people still have not got to grips with using it." The challenge facing CEM Corporation is to raise internal awareness of the functions and capabilities that are now provided by the LMS, and to educate the employees on how these functions and features operate. This education program needs to address cultural issues, as well as dealing with the fears and anxieties that employees may have in relation to the use of the system. This finding was supported by one manager who noted that "some employees may fear that if they use the system to log their competencies, their career may be negatively affected."

CEM Corporation needs to encourage the active participation of senior management in the mobilization of the LMS and perhaps consider the appointment of an overall champion for the initiative at senior management level. This chief learning office4 could promote the utilization of the system at a senior level within the business units and ensure that any synergies that exist between them are exploited. Finally, a number of managers felt that CEM needs to publicize and promote the benefits of engaging with the LMS and find ways of formalizing and integrating this novel strategic learning management system with extant business processes and work practices.

View Image -   APPENDIX A
View Image -   APPENDIX B
View Image -
Footnote

ENDNOTES

Footnote

http://www.saba.com/englishlcustomers/index.htm

For reasons of confidentiality, the organization on which this case study is based cannot be identified; it will be referred to as CEM Corporation throughout the document.

Footnote

Bold text within this section indicates that this is a role fulfilled by the learning management system.

Akin to a chief information officer (CIO) or chief knowledge officer (CKO).

References

REFERENCES

References

Alavi, M., & Leidner, D. (1999). Knowledge management systems: Issues, challenges and benefits. Communications of the Association of Information Systems, 1(2).

Alvesson, M., & Karreman, D. (2001). Odd couple: Making sense of the curious concept of knowledge management. Journal of Management Studies, 38(7), 9951018.

References

Barron, T. (2000). The LMS guess. Learning Circuits, American Society for Training and Development. Online: http://www.. lea rningcircuits.org/2000/apr2000/ barron. html

Borghoff, U.M., & Pareschi, R. (1999). Information Technology for Knowledge Management. Heidelberg: Springer-Verlag.

Brennan, M., Funke, S., & Andersen, C. (2001). The learning content management system: A new elearning market segment emerges. IDC White Paper. Online: http:llwww. lcmscouncil. org/resources. html

Butler, T. (2000, August 10-13). Making sense of knowledge: A constructivist viewpoint. Proceedings of the Americas Conference on Information Systems, Long Beach, CA (vol. II, pp. 1462-1467).

References

Butler, T. (2003). From data to knowledge and back again: Understanding the limitations of KMS. Knowledge and Process Management: The Journal of Corporate Transformation, 10(4), 144-155.

Chait, L.P. (1999). Creating a successful knowledge management system. Journal of Business Strategy, 20(2), 23-26.

Easterby-Smith, M., Crossan, M., & Nicolini, D. (2000). Organizational learning: Debates past, present and future. Journal of Management Studies, 37(6), 783-796.

References

Galliers, R., & Newell, S. (2001, June 27-29). Back to the future: From knowledge management to data management. Global Co-Operation in the New Millennium, 9" European Conference on Information Systems, Bled, Slovenia (pp. 609-615).

References

Garavelli, A.C., Gorgoglione, M., & Scozzi, B. (2002). Managing knowledge transfer by knowledge technologies. Technovation, 22, 269-279.

Coleman, D. (1996). Emotional Intelligence. London: Bloomsbury Publishing. Greenberg, L. (2002). LMS and LCMS: What's the difference? Learning Circuits, American Society for Training and Development. Online: http:ll www.learningcircuits.org/2002/dec2002/greenberg.htm

Hall, B. (n.d.). Learning Management Systems 2001. CA: brandon-hall.com. Harvey, C., & Denton, J. (1999). To come of age: Antecedents of organizational learning. Journal of Management Studies, 37(7), 897-918.

Hendriks, PH. (2001). Many rivers to cross: From ICT to knowledge management systems. Journal of Information Technology, 16(2), 57-72.

Huber, G.R (2001). Transfer of knowledge in knowledge management systems: Unexplored issues and suggestions. European Journal of Information Systems, 10(2), 72-79.

References

Marshall, C., & Rossman, B.G. (1989). Designing Qualitative Research. CA: Sage. McCombs, B.L. (2000). Assessing the role of educational technology in the teach

ing and learning process: A learner centered perspective. The Secretary's Conference on Educational Technology, US Department of Education. Online: http:llwww. ed.gov/rschstat/eval/tech/techcon, fOO/mccombs-paper. html

McDermott, R. (1999). Why information technology inspired, but cannot deliver knowledge management. California Management Review, 41(4), 103-117.

Nichani, M. (2001). LCM S = LMS + CMS [RLOs]. Online: http:ll www.elearningpost..com/features/archives/001022. asp

Rowley, J. (2001). Knowledge management in pursuit of learning: The learning with knowledge cycle. Journal of Information Science, 270), 227-237.

References

Scarbrough, H., & Swan, J. (2001). Explaining the diffusion of knowledge management: The role of fashion. British Journal of Management, 12, 3-12.

Schultze, U., & Boland, R.J. (2000). Knowledge management technology and the reproduction of knowledge work practices. Journal of Strategic Information Systems, 9(2-3), 193-212.

Storey, J., & Barnett, E. (2000). Knowledge management initiatives: Learning from failure. Journal of Knowledge Management, 4, 145-156.

Sutton, D.C. (2001). What is knowledge and can it be managed? European Journal of Information Systems, 10(2), 80-88.

References

Swan, J., Scarbrough, J., & Preston, J. (1999, June 23-25). Knowledge management The next fad to forget people. In J. Pries-Heje et al. (Eds.), Edition Proceedings of the 711 European Conference on Information Systems, Copenhagen, Denmark (vol. I-II, pp. 668-678).

Wagner, E.D. (2000). E-learning: Where cognitive strategies, knowledge management, and information technology converge. Learning without limits (vol. 3). CA: Informania Inc. Online: http://www.learnativity.com/downloadILwoL3.pdf

References

Zeiberg, C. (2001). Ten steps to successfully selecting a learning management system. In L. Kent, M. Flanagan & C. Hedrick (Eds.). Online: http:/Avww.Iguide.coml reports

Zuboff, S. (1988). In the Age of the Smart Machine: The Future of Work and Power. New York: Basic Books.

References

ADDITIONAL RESOURCES

References

The following is a list of other resources that may be relevant for obtaining additional information related to the case:

References

Alavi, M., & Leidner D. (2001). Research commentary: Technology mediated learning - A call for greater depth and breadth of research. Information Systems Research, 12(I), 1-10.

Aldrich, C. (2001). Can LMSs survive the sophisticated buyer? Learning Circuits, American Society for Training and Development. Online: http//www.learningcirruits.org/ 2001/nov2001/ttools.html

References

Broadbent, B. (2002). Selecting a Learning Management System.

Brown, J., & Duguid, P. (1998). Organizing knowledge. California Management Review, 40(3), 90-111.

Evangelisti, D. (2002). The must-have features of an LMS. Learning Circuits, American Society for Training and Development. Online: http:11 www.learningcircuits.org/2002/mar2OO2/evangelisti.html

References

Hall, B. (2003). LMS 2003: Comparison of Enterprise Learning Management Systems. CA: bandon-hall.com.

Hodgins, W., & Conner, M. (2002). Learning objects and learning standards. IEEE Learning Objects Groups Overview. Online: http:llwww learnativity..com/ standards. html

Lennox, D. (2001). Managing knowledge with learning objects. A WBT Systems White Paper. Online: http:ll//www wbtsystems.cot/news/whitepapers

AuthorAffiliation

Audrey Grace, University College Cork, Ireland Tom Butler, University College Cork, Ireland

AuthorAffiliation

Audrey Grace (a.grace@ucc.ie) is a lecturer in information systems at University College Cork, Ireland. She has more than 12 years of industry experience, principally in the development, implementation and mobilisation of business solutions from both a business and a technical perspective. Audrey is currently undertaking a PhD with the BIS Department at UCC and already holds a BSc in computer science; a CDip in accounting finance; a HDip in management and marketing; and an MSc in management information systems. Her research interests focus primarily on learning management and knowledge management, particularly on IS that support learning and the management of learning.

AuthorAffiliation

Tom Butler (tbutler@afis. ucc. ie) is a senior lecturer in information systems at University College Cork, Ireland. Before joining academia, Tom had an extensive career in the telecommunications industry. His research is primarily qualitative, interpretive and case-based in nature and has two related major streams: IT capabilities and the development and implementation of information systems in organizations; and knowledge management systems. Other research interests include hermeneutics, e-learning, educational informatics, IT education and the digital divide. Tom received his PhD from the National University of Ireland at UCC, where his doctoral research examined the role of IT competencies in building firm-specific IT resources in knowledgeintensive organizations.

Subject: Intellectual capital; Learning; Information systems; Multinational corporations; Case studies

Company / organization: Name: CEM Corp; Ticker: CEMX; NAICS: 334515, 511210; DUNS: 06-632-7305

Classification: 5240: Software & systems; 9510: Multinational corporations; 9110: Company specific

Publication title: Journal of Cases on Information Technology

Volume: 7

Issue: 1

Pages: 53-70

Number of pages: 18

Publication year: 2005

Publication date: Jan-Mar 2005

Year: 2005

Publisher: IGI Global

Place of publication: Hershey

Country of publication: United States

Publication subject: Business And Economics--Computer Applications

ISSN: 15487717

Source type: Reports

Language of publication: English

Document type: Business Case

Document feature: charts tables references

ProQuest document ID: 198720787

Document URL: http://search.proquest.com/docview/198720787?accountid=38610

Copyright: Copyright Idea Group Inc. Jan-Mar 2005

Last updated: 2011-07-21

Database: ABI/INFORM Complete

Document 89 of 100

Information Technology in the Practice of Law Enforcement

Author: Susan Rebstock Williams; Aasheim, Cheryl

ProQuest document link

Abstract:

In February 2001, the Charlotte-Mecklenburg Police Department began the rollout of a "mobile" information system that will eventually enable all information relating to incident reports, arrests, and investigations to be collected, distributed, and managed in a paperless, wireless environment. The system, dubbed Knowledge-Based Community Oriented Policing System (KBCOPS), began as a "grass roots" project within the police department to reduce paperwork, increase data accuracy, share knowledge and information, and promote a problem solving analytical framework. The system has been under development for seven years, from concept to implementation. The strategies and approaches used to develop this system, the technologies employed, and, most importantly, the challenges faced in merging wireless, wired, database, and applications technologies while satisfying the user requirements of the police department are detailed in this report. [PUBLICATION ABSTRACT]

Full text:

Headnote

EXECUTIVE SUMMARY

Headnote

In February 2001, the Charlotte-Mecklenburg Police Department began the rollout ofa "mobile" information system that will eventually enable all information relating to incident reports, arrests, and investigations to be collected, distributed, and managed in a paperless, wireless environment. The system, dubbed Knowledge-Based Community Oriented Policing System (KBCOPS), began asa "grass roots" project within the police department to reduce paperwork, increase data accuracy, share knowledge and information, and promote a problem solving analytical framework The system has been under development for seven years, from concept to implementation. The strategies and approaches used to develop this system, the technologies employed, and, most importantly, the challenges faced in merging wireless, wired, database, and applications technologies while satisfying the user requirements of the police department are detailed in this report.

Headnote

Keywords: database; database management; emerging information technologies; end-user computing; end-users; law enforcement IS; strategic alignment; system acceptance; system implementation; systems development life cycle; systems development process; user satisfaction; wireless technologies

ORGANIZATIONAL BACKGROUND

The Charlotte-Mecklenburg Police Department (CMPD) is the principal local law enforcement entity for the city of Charlotte, NC, and surrounding Mecklenburg County. CMPD serves a population of nearly 700,000 citizens in an area covering more than 550 square miles, and employs nearly 2,000 people, including sworn police officers and civilian support staff. Civilian personnel are assigned to a variety of clerical and administrative support functions related to but not directly involved in the practice of law enforcement activities. CMPD is headquartered in a state-of-the-art building in the downtown area of the city. This facility was designed and constructed to support the computing and data communications needs of CMPD.

CMPD is commanded by the Chief of Police with the aid of the Deputy Chief of Administrative Services, Deputy Chief of Support Services, Deputy Chief of Field Services and Deputy Chief of Investigative Services. There are many units in CMPD. Figure 2 in Appendix A contains a full organizational chart for CMPD. Technology Services, a division of Administrative Services, manages existing information systems and is responsible for the design and implementation of new IT applications. In addition, they manage strategic planning and crime analysis and provide training for all police department personnel.

The operating budget for CMPD in FY2005 is approximately $146 million. Administrative Services, which includes but is not limited to Technology Services, accounted for approximately 20% of the overall budget. CMPD's operating budget over the 3 most recent fiscal years is shown in Table 1.

CM[PD prides itself on being a community-oriented law enforcement agency whose mission is "to build problem-solving partnerships with our citizens to prevent the next crime" (FY2004 & FY2005 Strategic Plan, p. 57). As stated in the 2004-2005 strategic plan, "the Police Department's problem solving efforts are predicated on the availability of accurate and timely information for use by employees and citizens" (FY2004 & FY2005 Strategic Plan, p. 57). Since 1995, CM[PD has recognized that IT will be one of the most important crime fighting tools of the 21s' century and has emphasized the commitment to making information one of its most important problem-solving tools. The strategic plan recognizes that IT will play an integral role in achieving the strategic goal of "making Charlotte the safest large city in America" (FY2004 & FY2005 Strategic Plan, p. 31).

SETTING THE STAGE

CMPD was established in 1994 when the city and county police departments of the Charlotte-Mecklenburg area merged. At about that same time, CMPD hired a new Chief of Police, who recognized the potential of information technology as a problemsolving tool in the practice of law enforcement - particularly in the areas of crime analysis and computerized mapping. To further this cause CMPD commissioned a nearby university to conduct an in-depth needs analysis in 1995. CMPD also hired a planning director to lead the effort of updating or replacing antiquated systems, and more importantly, to identify new systems that would improve the quality of policing. As a result of the needs analysis, an information systems master plan was created in 1996. The master plan called for the establishment of an infrastructure, followed by the development of mission-critical databases. Top priorities included the creation of a wireless network, an improved dispatching system, and a new report management system.

The information system requirements of CMPD are many and varied. Major systems include those that support (1) administrative and personnel functions; (2) dispatching and 911 emergency services; and (3) incident reporting, case management, arrest, investigative, and crime analysis activities. The system that supports the information requirements encountered in the daily activities of law enforcement is of primary interest in this case. This mission-critical system includes, but is not limited to, incident reporting, case management, arrests, investigation, and crime analysis. The KnowledgeBased Community Oriented Policing System (KBCOPS) was designed and developed to support these activities.

View Image -   Table 1:

Prior to the roll out of KBCOPS, daily law enforcement activities were carried out in a paper-laden environment. The processes of reporting and investigating incidents were not linked. When an incident was reported, a patrol officer was dispatched to perform a preliminary investigation. During this investigation, the officer took notes on a small paper notebook. When the officer returned to headquarters, often several hours later, he would file a paper report detailing the incident based on his notes and memory of the details of the case. The paper report was given to the appropriate supervisor for approval. The reports were sometimes returned to officers for revision before approval. Reasons for returned reports included spelling errors, grammatical errors and lack of sufficient information about the incident. Patrol officers quickly became aware of which supervisors were more likely to accept their reports without revision. In addition, reports were often resubmitted to a different supervisor due to shift changes. One problem arising from resubmission to a different supervisor was that the new supervisor was not aware of the initial rejection of the report and the reasons for the rejection. Once the report was approved it was sent to the Records Department. The Records Department was responsible for entering some of the information from the report into a database, archiving the report and routing a copy to the proper investigative unit. The supervisor for the investigative unit then assigned the case to a detective. The time frame from reporting an incident to assignment to a detective was four to five days.

In the pre-KBCOPS environment, systems across CMPD did not effectively link to each other. As a result, when a detective discovered a pertinent piece of information upon investigation of the case, the patrol officer who originally investigated the case was not usually notified and there was no mechanism for the notification to take place. If an officer wanted to look at crimes with similar characteristics, the paper reports for those crimes would have to be pulled from the archives by the Records Department and the cases would be analyzed manually by the detective. Information needed for crime analysis, which identifies patterns that might lead to the prevention of the next crime, was not readily accessible across units.

Although information technology supported the collection of data needed in daily law enforcement activities prior to the rollout of KBCOPS, it did not meet the needs of the department with respect to sharing, assimilating, and reviewing these data. It also fell short of fulfilling the Chief's vision of IT-enhanced law enforcement. Efforts to create KBCOPS began in 1996. The development and implementation of this new system is the subject of the case described in the following section.

CASE DESCRIPTION

When a police officer responds to an incident in the field an incident report is filed. The first portion of KBCOPS implemented at CMPD - the Incident Reporting Subsystem - supports the electronic capture, storage, and retrieval of these reports. Functionality has since been added to support case management activities, arrests, investigative activities, and crime analysis. The following sections describe the features of the system in more detail as well as the required infrastructure, the process used to develop the application, and user perceptions of the system.

The KBCOPS Application

The Incident Reporting subsystem rolled out in February 2001 and consists of modules for creating and approving incident reports. The Incident Reporting subsystem captures all information needed to file an initial police report. This includes data pertaining to suspects, vehicles, victims, witnesses, relationships between suspects and victims, the role a person plays in a crime (victim, suspect or witness) and prior offenses. Accurate, complete, and timely information is critical to subsequent arrest and investigative activities.

KBCOPS runs in a client/server environment. The client runs on laptops issued to police officers in the field, in what is essentially a browser window. Officers use the client software to create police reports while they are in the police car rather than waiting until they return to their division office or police headquarters to complete their reports. The ability to capture the data at or near the source, as opposed to hours afterwards, is a significant benefit of KBCOPS because it pushes better investigation at the scene and improves the quality of the information contained within the incident report. Confidence in the merits of this system is so strong that upon initial roll-out of the Incident Reporting sub-system officers graduating from the police academy were issued three items: a flak jacket, a weapon, and a laptop.

To complete an incident report an officer fills out a series of forms that are generated as Web pages. Figures 3 through 5 in Appendix B provide examples of forms used in an incident report. Each form is submitted via a wireless link to a server at headquarters (HQ). Context-sensitive field-level and form-level intelligence and workflow routing capabilities are built into this application. Context-sensitive field-level intelligence means that given a specific piece of information the system automatically knows which remaining pieces of information are needed and, in many cases, what the range of acceptable values for those fields can be. Forms are also context driven - which means the next form generated is dependent on the entries on the previous form. This kind of built-in intelligence enables the system to check for errors, omissions, and inconsistencies. Officers must correct these errors before the report can be submitted. The length of time needed to complete an incident report depends upon the nature of the crime but typically ranges from thirty minutes to two hours.

The information submitted by officers in the field is immediately available to other authorized users of KBCOPS. Once a report is filed its contents cannot be modified. Each time changes or additions to an existing report are needed a copy of the report is generated. Changes are appended to the copy and it is saved as a new report. Each previous version remains intact, ensuring that CMPD never loses a version of the incident report - an important consideration for data integrity.

Once an incident report has been submitted, it must be reviewed by a supervisor. If the report is rejected the supervisor provides comments as to why. Reports are often rejected due to spelling and grammatical errors. The supervisor's comments and submission history of the report are recorded, which prevents officers from submitting the same report to another supervisor for approval without first making the corrections suggested in the previous supervisor's comments. Figure 6 in Appendix B shows the screen the officers view to determine the status of their reports. After the report has been approved, a rule-based feature routes the report to the proper investigative unit. These rules are quite complex - requiring knowledge of statutes, policies and specifics of the crime, offenders) and victim(s). Prior to the development of the system routing a report to the appropriate investigative unit could take days or weeks. Now, the report is routed in a matter of hours.

The Case Management subsystem, which went live in August 2001, extended these capabilities to allow tracking of a case from initial incident all the way through the arrest and investigation procedures. The officer in charge of the investigative unit responsible for the case can view the case summary, assign investigators to the case, or re-route a case to another unit. The Case Management subsystem allows supplements to be added to a case. A case supplement provides an officer with a copy of the original report to change as needed. Both the copy and the original are kept to track the progression of the investigation. When a supplement is added to a case all officers involved are automatically alerted to the new information. Supervisors can make a supplement required, in which case officers are notified when a supplement is past due. Figure 7 in Appendix B illustrates the screen officers view to manage their cases.

The Incident Reporting and Case Management subsystems facilitated the process of completing and tracking police reports. However, users remained unable to retrieve information from the database in any way other than report format. The KBCOPS database contains a wealth of information that can be used to identify and apprehend perpetrators and to identify patterns and trends in criminal behavior. In August 2002 search capabilities were added. Officers, detectives, and other users can now use a large number of search options to retrieve information from the database. Searches can be based on the type of crime, date ranges, patrol division(s), method of operation (M.O.), physical characteristics of the suspect, weapons) used, or any combination of a wide range of variables. Figures 8 and 9 in Appendix B show examples of typical searches.

In addition to search capabilities, several other new features have recently been implemented. For example, the data captured in KBCOPS can be rolled up into the format required for the National Incident-Based Reporting System (NIBRS). NIBRS (NIBRS Implementation Program, 2002) is a nationwide tracking system used to solve crimes that occur across individual police department jurisdictions and across state lines. Although many local police departments have records management systems to capture data about crime incidents, they are unable to use those systems to report to NIBRS because the data are in an incompatible format, not coded in a NIBRS-compliant manner or not all of the mandatory NIBRS elements are captured. A feature that will provide a direct interface to NIBRS is currently underway.

Additional enhancements are being planned. One of these will integrate KBCOPS directly with other local, state, and federal law enforcement systems, as well as hospitals, pawnshops, utility companies, and other entities that possess potentially vital information. Additionally, GIS and global positioning system components will be integrated into KBCOPS to provide street file overlays on the officer's laptop. Finally, a Juvenile Arrest subsystem will be added in the near future. Handling crimes involving juveniles is complex because statutes and policies for dealing with juvenile offenders and victims differ significantly from those that do not. For example, fingerprints are not taken from juveniles for positive ID, making it nearly impossible to link crimes involving the same juvenile offender. The Juvenile Arrest module is scheduled for rollout in March 2004. Table 2 summarizes the currently implemented and planned components of KBCOPS.

The KBCOPS Infrastructure

KBCOPS supports nearly 2,000 users. Category 5 (CATS) cable is used within HQ for local area network (LAN) connectivity. CATS provides data transmission speeds of up to 100 million bits per second (Mbps) over normal telephone wire. Fiber extends to district offices up to 18 miles from HQ via a synchronous optimal network (SONET). SONET (Tomsho et al., 2003) is a wide area network technology that is used to allow dissimilar long-distance networks to transmit voice, data and video at speeds in multiples of 51.84 Mbps using fiber-optic media. Within the headquarters building and at district offices, CATS cable drops are available every 10 feet each with quad jacks supporting two data connections and two voice connections. This wiring infrastructure provides maximum data connectivity and work area layout flexibility.

View Image -   Table 2:

The KBCOPS infrastructure initially included 1,500 laptops in the field (one issued to each patrol officer), more than 100 laptops at police headquarters for staff and support personnel, and some 500 desktop computers. Laptops are now issued to vehicles rather than to officers. Currently, over 700 police vehicles are equipped with trunkmounted modems that support wireless data communication to and from headquarters. Servers and data switches were installed to support the implementation along with the required conventional wired connectivity. CMPD worked with a local wireless data provider to achieve a 99.9% coverage rate in the community. Approximately 53 towers are used to enable communication via TCP-based cellular digital packet data (CDPD). TCP (Tomsho et al., 2003) is an acronym for transmission control protocol, the primary protocol for transport of data packets over the Internet. CDPD (Tomsho et al., 2003) is a mobile computing technology used for wireless Internet and e-mail access. CDPD "sends packets of digital data over unused cellular voice channels at a rate of 19.2 Kbps" (Tomsho et al., 2003, p. 599). Although these towers are shared with cellular phone service providers, the frequencies over which CMPD transmits data do not compete with those used by cellular phone customers.

The Development & Implementation Process

The development process for KBCOPS has been lengthy and costly-running five years from concept to rollout of the Incident Reporting subsystem at a cost of nearly $4 million. Although a majority of this cost has been offset by grant funding, the remainder has been supplied through departmental funds.

The development of KBCOPS was based upon the systems development life cycle (SDLC). The SDLC is a process for understanding how an information system can support the needs of a business, then designing, building, and implementing the system (Dennis & Wixom, 2002). As shown in Table 3, the SDLC consists of five fundamental phases: planning, analysis, design, implementation, and support.

Planning for KBCOPS began in 1996 with the creation of the information systems master plan. Shortly thereafter, efforts to understand the business needs began with one year spent determining the system requirements. System developers and consultants worked with a functional area expert from within CMPD to map the required processes to design specifications.

The development team consisted of nine people - including applications developers, database administrators, systems administrators, project managers, consultants, and network/mobile communications experts. Coding for the Incident Reporting subsystem was finished in April 2000, and system validation testing was conducted in July and August of that year. As a result of these tests new functionality was added and a long test/fix cycle ensued.

Despite early success in the requirements analysis and process mapping phases of development, the project soon suffered a variety of problems. These problems were primarily attributed to the creation of inadequate design specifications, failure to control project scope, and lack of a strong technical project leader. In addition, a number of organizational changes were taking place, including the retirement, in 1999, of the Chief of Police. Both the retiring Chief as well as his replacement supported the development of KBCOPS.

As development of the system progressed the project experienced "scope creep". Scope creep - the identification of new requirements after the project was initially defined - is one of the most common reasons for schedule slippage and cost overruns (Dennis & Wixom, 2002). In 1998 a new Director of Information Technology was hired, and the project was "re-scoped" with clearly identified project phases. An experienced technical project manager was brought on board to work with and oversee the development team. A formal development plan was established with a heavy emphasis on system validation testing. The design specifications were revised and new requirements defined. A great deal of progress on the KBCOPS application soon followed.

Design specifications were developed using Oracle Designer/Developer - a computer-aided software engineering (CASE) tool that supports the tasks associated with the system development process. The use of CASE tools has been shown to reduce development time (and costs) and improve software quality (Dennis & Wixom, 2002). The Incident Reporting subsystem is comprised of more than 1,000 modules (screens, reports, PL/SQL code segments, etc.) and 240 tables. JavaScript and HTML were used for the majority of the client application on the laptops, with PL/SQL running on the Oracle server.

At the time the KBCOPS application was developed the limited bandwidth (19.2 Kbps) available for the wireless transmission of data caused lengthy delays for officers filling in forms using the wireless connection from the field. Changes in the system architecture, including moving to JavaScript on the client side and redesigning transaction confirmation screens (referred to as "Success" screens) were required to address these delays. The use of JavaScript allows some validation of information entered into the forms (such as ensuring required fields are not blank) to be handled on the client machine, instead of sending the form over the wireless connection to the server for all validation (Gosselin, 2000).

The rollout of the Incident Reporting subsystem - the first subsystem to go live was conducted over a 6-week period. Two of the 12 patrol divisions went live each week. During this time period new incident reports were entered both in KBCOPS and in the old system to provide backup in the event of a major latent bug in the system. No major problems were found and duplicate data entry was soon discontinued.

View Image -   Table 3:

CMPD used a proactive support strategy to assist officers during the implementation of the Incident Reporting subsystem. Officers and other users received 16 hours of initial training to learn how to use the system. A technical team of 12 full-time and six split-time people supported officers in the field. If an officer had questions or problems that could not be handled remotely, support personnel would go to the officer in the field to assist. Some support personnel were stationed at HQ, some at district offices, and others were mobile and thus able to respond quickly to an officer's questions at the incident site.

Today, support is handled by a team of four people at HQ. There is no longer a need to assist officers in the field as the system has become more familiar. KBCOPS has become an integral part of training on "report writing" within the police academy. Approximately 16 hours of the two weeks spent on report writing is dedicated to KBCOPS. Officers identified by their peers as "power users" help fellow officers when questions arise. The rollout of new features and subsystems now utilizes the "big bang" approach rather than a phased approach going division by division. Incremental changes are not viewed as significant enough to require a more conservative approach.

Development and implementation of new subsystems is ongoing. In September 2002 the Director of Information Technology was replaced. Despite this change in leadership support and enthusiasm for the application, it has continued.

A summary of how a case was processed before KBCOPS versus after KBCOPS is provided in Table 4. Due to the automatic storage of fields in the report to the database and the automatic routing of the approved report to the appropriate investigative unit by the system the time from reporting an incident to assigning an investigator has been reduced from four to five days to less than 24 hours.

A timeline of the major events that took place during the development and implementation of the KBCOPS application is provided in Table 5.

User Perspectives of the KBCOPS Application

In November 2003 several users were interviewed to determine their perceptions of the KBCOPS application. The participants came from two groups, patrol officers and detectives. The interview questions were drawn from the technology acceptance model (Davis, 1989) and the information systems implementation literature (Burns, Turnipseed & Riggs, 1991). The interview protocol can be found in Appendix C. Example comments from each group are provided.

Detectives' Comments:

"In the beginning, the time it took was huge. The compression utility has made a big difference. I am excited about it now. From an administrative point of view, it is great. "

"Newer officers do not seem to have a problem with the system. Older officers still have some resistance. "

"Investigation has improved. It used to take 4 or 5 days to assign a case to an investigator. Now it takes less than 24 hours. Also, being able to do searches is a big timesaver. We can identify patterns and trends. Our case clearance rate has improved greatly. "

"There is a big learning curve. Officers try to take shortcuts to get through the system. The reason the officers take so many shortcuts is there are so many screens to go through. Narratives aren't being done as well as they were before. Quality of data is still one of the biggest problems. "

Patrol Officers' Comments:

"The availability of information is a big plus. The ability to do searches transformed the system from one that seemed worthless to one you can use. Once you see how the information you enter is used, you understand why they need it. Seeing the big picture really makes a difference. "

"We were trained on how to use the system, but we didn't understand why we had to use it or how it would alter the investigation process. "

"The time it took to enter all that data seemed futile before. Now I use the search capabilities every day. 11

"Entering information one screen at a time is a big problem. You can't see the big picture. Some screens ask for information you did not know you had to collect. "

"Spellchecking takes too long. You can't do intermediate saves in KBCOPS. If the system goes down while entering information, you lose the whole screen. I use Word so that I can undo, use the spellchecker and do intermediate saves. "

View Image -   Table 4.

CURRENT CHALLENGES/PROBLEMS FACING THE ORGANIZATION

Despite the success of the project, CMPD faces ongoing challenges with respect to the KBCOPS application. These challenges stem from technology, user, budgetary issues and aligning IT with community policing objectives.

Technology Issues

At the time this case was written bandwidth in the wireless environment was limited to 19.2K, with an effective bandwidth of IOK. Compression software was installed to improve bandwidth, reducing delays by 60%. However, officers continue to experience delays in uploading and downloading forms.

View Image -   Table 5:

The system manages approximately one million inbound mobile requests per month and supports 200-250 simultaneous users. The system has thus far proven to be highly reliable, experiencing fewer problems than the internal LAN within CMPD. However, reliability could become an issue in the future as new modules are added and the number of simultaneous users increases.

Although there have been no security breaches to date, security of the wireless implementation must continuously be evaluated. Initially, security issues required almost two years to resolve. The current solution includes user authentication with two levels of encryption. User authentication is the process of identifying authorized users (Newman, 2003). The most common method is through the use of user names and passwords. Encryption prevents a person with unauthorized access to data from reading them (Newman, 2003). Two independent vendors ensure an end-to-end secure connection. The commercial wireless provider encrypts data across its channels, and an additional layer of priority encryption and compression is performed by a leading software-based security system running on CMPD servers. Maintaining security across the network will be an ongoing challenge for CMPD as new encryption standards and better authentication techniques become available.

As with any IT application, the need to manage and integrate emerging technologies is an ongoing challenge. Although there has been relatively little need for maintenance or replacement of equipment, this will become a necessity in the future.

User Issues

Restructuring CM?D's business processes forced changes in the daily activities of police officers. These changes continue to meet with some resistance. If not managed properly, user resistance can lead to attempts to undermine the system (Jiang, Muhanna & Klein, 2000). Thus, finding effective ways to deal with user resistance is vital to the continued success of the project.

Although many users are satisfied with the system, pockets of user resistance are visible. Some officers see the system as pushing extra work on them. KBCOPS requires them to spend a significant amount of time entering information that populates the incident database - a database that is subsequently used primarily by detectives. Although the implementation of search features has helped, some patrol officers still question the value added by the system.

Additionally, the software has some shortcomings that frustrate users. Specific issues include the delay time for submitting forms, the inability for the officers to save a form before it is submitted, and the lack of support for spellchecking. The last two issues are particularly problematic for forms that require narratives. As a temporary solution, many officers enter their narratives in Word so that they can save their work intermittently and use the spelling and grammar features. They then copy the narrative to the required form. Although this workaround accomplishes the task, it takes extra time and leads to frustration.

Another challenge is created as officers become familiar with the system and take "shortcuts" to avoid filling in extra forms. Entering certain information in one form may generate many additional forms to fill in. Additionally, officers sometimes fill in the required fields in a form and leave non-required fields blank. Consequently, the information stored is sometimes incomplete and inaccurate, compromising the quality of the data and the resulting investigation. The shortcuts and incomplete forms also lead to problems between officers who enter the information and the detectives that depend on it.

Training is one of the most important parts of any change management initiative and is one of the most commonly overlooked (Dennis & Wixom, 2002). Training and a willingness to combine knowledge and skill sets across functional lines are critical success factors for implementation of large systems (Benji, Sharman & Godla, 1999; Gauvin, 1998). Research suggests that training improves the likelihood of user satisfaction, increases organizational effectiveness, and improves employee morale (Barney, 1991; Peters & Waterman, 1982; Rosenberg, 1990; Ulrich, 1991). Although CMPD trains officers on the use of KBCOPS, training focuses on how to use the system rather than why it should be used and how it fits into the bigger picture of crime investigation.

Budgetary Issues

Continual feedback from users has led to a two-year backlog of requested enhancements. CMPD's ability to respond to these requests is threatened by the drying up of federal grants that to this point have largely underwritten the development of the system. Federal funds previously directed to local police initiatives are being eliminated or redirected to homeland security. Replacement of these funds will be a challenge (FY2004 & FY2005 Strategic Operating Plan).

Further evidence of budgetary problems is reflected by unfunded CMPD budget requests of $1,409,074 in FY04 and $917,009 in FY05 (FY2004 & FY2005 Strategic Operating Plan). Unfunded requests directly affecting KBCOPS included installation of LAN switches and other networking equipment to enable direct access to the system.

At a more technical level, system enhancements present challenges in establishing effective ways to deal with configuration management, defect tracking, quality assurance, and test planning. Developers identified these as areas of concern. Lack of code/ version control and inadequate testing are classic implementation mistakes (McConnell, 1996). Continued success of the project will require finding solutions to these problems.

Aligning IT with Community Policing Objectives

Through the development and implementation of KBCOPS, CMPD has migrated from using IT in a reactive manner to employing IT in an active role for sharing knowledge, facilitating collaboration, and promoting a problem-solving analytical framework.

The ultimate goal of KBCOPS is to improve the quality of policing. Although a causal relationship cannot be shown, crime rates decreased steadily between 1996 and 2002, as shown in Figure 1.

CMPD recognizes that it will be difficult to continue to reduce crime. Police will have to expand the number and scope of partnerships to solve new problems. CM[PD must identify new ways in which KBCOPS and IT in general can support strategic initiatives and continue to improve the quality of policing.

View Image -   Figure 1:
View Image -   APPENDIX
View Image -
View Image -
View Image -
View Image -
View Image -
References

REFERENCES

References

Barney, J. (1991). Firm resources and sustained competitive advantage. Journal of Management, 17(1), 99-120.

Benji, P., Sharma, M.K, & Godla, J. (1999, Summer). Critical issues affecting an ERP implementation. Information Systems Management, 7-14.

Burns, M., Turnipseed, D., & Riggs, W. (1991). Critical success factors in manufacturing resource planning implementation. International Journal of Operations and Production Management, 11(4), 5-19.

References

Davis, FD. (1989, September). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 319-340.

Dennis, A., & Wixom, B. (2000). Systems Analysis and Design. New York: John Wiley & Sons.

References

FY 2004 & FY2005 Strategic Operating Plan. Retrieved November 25, 2003: http.11 www.charmeck.org/NR/rdonlyreslebfoi6vj2zxo3fizpg57kgvuw 4oylbc 52onaniem63x4s2rweqz6oogoohigtncpeyky6lcxy35tnlaswait6msbirb/Section+1 +-+Final+FY2004+SOP.pdf

References

Gauvin, G. (1998). Plan to succeed. Manufacturing Systems, A44-A48. Gosselin, D. (2000). JavaScript. Cambridge, MA: Course Technology.

Jiang, J., Muhanna, W., & Klein, G. (2000). User resistance and strategies for promoting acceptance across system types. Information & Management, 37(1), 25.

References

McConnell, S. (1996). Rapid Development. Redmond, WA: Microsoft Press. National Incident-Based Reporting System (NIBRS) Implementation Program. (2002,

December 26). Retrieved November 25, 2003: http://www.ojp.usdoj.govlbjs/ nibrs.htm

References

Newman, R.C. (2003). Enterprise Security. Upper Saddle River, NJ: Prentice Hall. Peters, T.J., & Waterman, R. (1982). In Search of Excellence: Lessons from America's

Best-run Companies. New York: Harper & Row.

Rosenberg, M.J. (1990). Performance technology: Working the system. Training and Development, 44(1), 43-48.

References

Smith, D. (1996). Taking Charge of Change. Reading, MA: Addison-Wesley. Tomsho, G., Tittel, E., & Johnson, D. (2003). Guide to Networking Essentials (3d ed.). Boston, MA: Course Technology.

Ulrich, D. (1991). Using human resources for competitive advantage. In I. Kilmann (Ed.), Making Organizations Competitive. San Francisco, CA: Jossey-Bass. Varshney, U., Vetter, R., & Kalakota, R. (2000). Mobile commerce: A new frontier. Computer, 33(10), 32-39.

AuthorAffiliation

Susan Rebstock Williams, Georgia Southern University, USA Cheryl Aasheim, Georgia Southern University, USA

AuthorAffiliation

Susan Rebstock Williams is professor and acting chair of the Department of Information Systems in the College of Information Technology at Georgia Southern University. Prior to earning a PhD at Oklahoma State University, she spent 13 years in the IT industry, where she worked as a programmer, systems analyst, and information systems manager. She has published three books on object-oriented software development as well as numerous articles addressing the impact of IT

AuthorAffiliation

Cheryl Aasheim is assistant professor in IT in the College of Information Technology at Georgia Southern University. In 2002 she received her PhD in decision and information sciences from the University of Florida. Dr. Aasheim's publications include papers on research areas including information retrieval, text classification and the impact of IT

Subject: Police administration; Information technology; Case studies; Grass roots movement; Systems integration

Location: Charlotte North Carolina, United States, US

Company / organization: Name: Police Department-Charlotte-Mecklenburg NC; NAICS: 922120

Classification: 9110: Company specific; 5240: Software & systems; 9190: United States

Publication title: Journal of Cases on Information Technology

Volume: 7

Issue: 1

Pages: 71-91

Number of pages: 21

Publication year: 2005

Publication date: Jan-Mar 2005

Year: 2005

Publisher: IGI Global

Place of publication: Hershey

Country of publication: United States

Publication subject: Business And Economics--Computer Applications

ISSN: 15487717

Source type: Reports

Language of publication: English

Document type: Business Case

Document feature: tables graphs references charts illustrations

ProQuest document ID: 198679346

Document URL: http://search.proquest.com/docview/198679346?accountid=38610

Copyright: Copyright Idea Group Inc. Jan-Mar 2005

Last updated: 2011-07-21

Database: ABI/INFORM Complete

Document 90 of 100

Siemens: Expanding the Knowledge Management System ShareNet to Research & Development

Author: Heier, Hauke; Borgman, Hans P; Manuth, Andreas

ProQuest document link

Abstract:

The case study describes the issues surrounding the expansion of the community-based knowledge management system (KMS) ShareNet to the research and development (R&D) function at Siemens Information and Communication Networks (ICN). It sets the stage for a decision situation that Siemens ICN's vice president business transformation and knowledge management, Janina Kugel, faced in 2003. While R&D usage rates differed not remarkably from other Siemens ICN functions, a strategic emphasis on innovative products and services as well as ambitious targets for leveraging offshore development resources - necessitated a stronger penetration of this highly relevant function. Could this extension build on earlier experiences gained with the best practice implementation approach at the sales and marketing function? The case description provides a chronological account of ShareNet's conceptualization, development, international rollout, and operation. It pays attention to information systems (IS) implementation issues, change management, and current developments in the field of knowledge management (KM). [PUBLICATION ABSTRACT]

Full text:

Headnote

EXECUTIVE SUMMARY

Headnote

The case study describes the issues surrounding the expansion of the community-based knowledge management system (KMS) ShareNet to the research and development (R&D) function at Siemens Information and Communication Networks (ICN). It sets the stage for a decision situation that Siemens ICN's vice president business transformation and knowledge management, Janina Kugel, faced in 2003. While R&D usage rates differed not remarkably from other Siemens ICN functions, a strategic emphasis on innovative products and services as well as ambitious targets for leveraging offshore development resources - necessitated a stronger penetration of this highly relevant function. Could this extension build on earlier experiences gained with the best practice implementation approach at the sales and marketing function? The case description provides a chronological account of ShareNet's conceptualization, development, international rollout, and operation. It pays attention to information systems (IS) implementation issues, change management, and current developments in the field of knowledge management (KM).

Headnote

Keywords: case study; explicit knowledge; information system implementation; IS project teams; knowledge exchange; knowledge sharing; organizational culture; tacit knowledge; user participation; user training

ORGANIZATIONAL BACKGROUND

Siemens, headquartered in Munich, is a German-based multinational corporation with a balanced business portfolio of activities predominantly in the field of electronics and electrical engineering. With sales of EUR 74.2 billion and a net income of EUR 2.4 billion in fiscal 2003, it was Europe's industry leader with strong positions in the North American and Asian markets (in August 2003, EUR 1.00 was equivalent to about USD 1.13). Approximately 50,000 researchers and developers were employed; research and development (R&D) investments totaled EUR 5.1 billion. Exhibit 1 shows Siemens' financial performance from 2000 to 2003. Siemens was a conglomerate of six business segments: Information and Communications, Automation and Control, Power, Transportation, Medical, and Lighting. Each business segment was split into several groups with independent profit responsibility and regional sales organizations (local companies) around the globe.

The decentralized matrix structure allowed for entrepreneurial responsibility and the development of close ties to customers. Global, interdivisional cooperation and systematic sharing of best practices enabled the provision of comprehensive and customerfocused solutions. Siemens' managing board confirmed that the "global network of innovation" - over 400,000 employees in 190 countries - was the firm's greatest asset. Linked in a global knowledge network, they were key for innovation and finally for offering technologies, tailor-made solutions, and services.

Siemens' largest business segment, Information and Communications, comprised three groups. Siemens Business Services (SBS) offered single source IT solutions and services. Information and Communication Mobile (ICM) covered all mobile communication requirements with network technology, terminal devices, and mobile applications. The case study focuses on Information and Communication Networks (ICN) that developed, manufactured, and sold public communication systems, private business communication systems, as well as related software and services. Impacted by the telecommunications equipment industry's continuing difficulties, Siemens ICN's sales of EUR 7.1 billion resulted in a negative EBIT of EUR 366 million in fiscal 2003 (Siemens, 2003). The 38,000 employees in over 160 countries focused on improving the product base, cost structure, and sales channels.

It was Siemens ICN's strategy to become a solution provider for other "global networks of innovation". Its three business units would provide the physical components of a sales project while the local companies were responsible for customizing and integration into the customer network: Enterprise Networks (EN) offered communications solutions for enterprise customers, Carrier Networks (CN) comprised IP-based convergence solutions, circuit-switched networks, optical networks solutions, and a portfolio of broadband access solutions, and Carrier Service (CS) provided local maintenance, system support, and general services for circuit-switched, IP-based, and hybrid networks (Siemens Information and Communication Networks, 2003). Exhibit 2 depicts Siemens ICN's organizational structure. For the case study, mainly the complementary central functions business transformation (BT) and knowledge management (KM), as well as the local companies, are relevant.

Headed by Janina Kugel, vice president of business transformation and knowledge management, a six-person team drove and supported knowledge sharing initiatives in order to enhance Siemens ICN business processes and global cooperation. Exhibit 3 presents the mission statement of the central function KM. Responsibilities included the mapping of business processes to establish supportive KM platforms, the creation of a common knowledge infrastructure and culture, and fostering the awareness that knowledge sharing generates value. This was supposed to facilitate cooperative global learning, as well as cross-divisional and cross-country reuse of global best practices.

SETTING THE STAGE

The case study illustrates the issues surrounding the implementation of the community-based knowledge management system (KMS) ShareNet at Siemens ICN over the period 1998-2003. It sets the stage for a range of decision options that Kugel must incorporate in her upcoming proposal to extend the KMS to Siemens ICN's research and development (R&D) function, by presenting a chronological account of ShareNet's history. Specific attention is paid to information systems (IS) implementation issues (e.g., Ginzberg, 1981; Zmud & Cox, 1979) as well as to change management interventions (e.g., Earl, 2001; Fahey & Prusak, 1998; Seeley, 2000). Kugel was convinced that much could be learned from the sales and marketing rollout history but that recent challenges in the telecommunications sector - as well as the specific needs of the R&D function - would make several adaptations to the system's functionalities and implementation strategy necessary.

ShareNet, a global knowledge sharing network initially developed for the global Siemens sales and marketing community, was conceived in 1998. With the market environment in constant flux, Siemens realized it had to be able to provide flexible bundles of services and products that could be easily adapted to individual customers. To this end, the company recognized that a major improvement in the fast and purposeful identification and exchange of relevant information and knowledge was needed. Hence, Siemens ICN started the development of a community-based KMS under the name ShareNet. For "explicit knowledge," the aim was to provide structured knowledge objects in the form of project descriptions, functional and technical solutions, customers, competitors, and markets. For "tacit knowledge," the system was intended to provide functionalities such as newsgroups, discussion forums, and chats.

As explained next, ShareNet's implementation and rollout across the global sales and marketing function was overall successful. Kugel's challenge now was to extend this success to the R&D community in a much grimmer economic environment. Facing a difficult business situation and outlook in 2003, Siemens ICN's group executive management continuously emphasized the need for innovative products and services. At the same time, all organizational functions had to meet strict cost criteria. In 2003, Siemens developed 5%10 of its software in low-cost countries. An ambitious program was started to extensively use offshore development resources in order to reduce costs. In addition, Siemens aimed to consolidate development activities to shorten the time to market, to concentrate on core competencies and, thereby, to strengthen its innovative power.

Cost cuttings through decentralization to low-cost sites seemed easy. Keeping R&D quality high - while scattered across the globe - was the real challenge. Knowledge sharing between employees and partners in remote areas was seen as a key driver, again strengthening the call for ShareNet's R&D expansion. Fueled by the KMS' successful, large-scale rollout at the sales and marketing community, as well as by first evidence for related culture change, the ShareNet operating team had conducted first pilot implementations at R&D.

Besides heading the KM team, Kugel also directed a team of business consultants - the BT team. Just when Kugel had to decide on ShareNet's expansion to R&D, those employees had successfully finished a project to define and implement a process to foster radical new innovations (labeled "disruptive innovations") within ICN and feed these innovations into the well-defined product and service development processes for the carrier and enterprise business. The BT team envisioned a central role for ShareNet in this process, which could give ShareNet a jump-start into the R&D environment. Now Kugel saw basically three options to proceed: first, to simply replicate the sales and marketing implementation approach for the entire R&D community; second, to adapt the implementation process for R&D and to establish several smaller groups of R&D employees; or third and last, to customize the implementation process and expand ShareNet usage step-wise along the R&D process.

CASE DESCRIPTION

Definition & Prototyping

The initial development of ShareNet started in 1998. ShareNet's first key project stage - "definition and prototyping" - lasted from August 1998 to the end of March 1999. Objectives were to establish the ShareNet project team, to create conceptual definitions and refinements, to start prototyping the technical platform, and to ensure early executive and user buy-in. Soon, the ShareNet project team developed the vision of a structured KM initiative for the sales and marketing function: "ICN ShareNet is the global knowledge sharing network. We leverage our local innovations globally. We are a community committed to increase value for our customers and ICN by creating and reapplying leading-edge solutions." The aim was to change Siemens ICN's communication flow from a broadcast-oriented "enabling" approach that is, headquarters to local companies, to a meshed network approach required for fast global learning.

Several benefits were emphasized: costs should be reduced by avoiding expensive mistakes made in the past, or simply by reusing technical and functional components that had already been developed; project delivery times ought to be shortened through reuse, leading to higher project throughput/utilization by the sales force; quality should improve as reusable modules were repetitively sold and improved; lastly, besides representing benefits in their own right, these would lead to more successful tenders and higher revenues. Four crucial elements were defined to guide the KMS' conceptual development, prototyping, and later implementation. Exhibit 4 depicts the basic components: Sales Value Creation Process, ShareNet Content, ShareNet Community, and ShareNet Systems.

ShareNet's central part - the Sales Value Creation Process - was a sequence of important sales activities and decisions where knowledge ought to be reused. It served as an abstract global sales process definition, where each individual local sales process could be mapped. The ShareNet project team and four consultants from The Boston Consulting Group (BCG) realized early that the KMS' development should be no isolated effort, and later parachuted into the local companies. Consequently, the team was augmented by 40 sales representatives from headquarters and 15 local companies. Their involvement served three distinct change management goals: they specified KMS solutions, supported a network of people experiencing similar difficulties, and set examples for the combined KM and change initiative's progress. Siemens ICN's group president and high ranking sales managers formed the steering committee responsible for project supervision and top management support.

The ShareNet project team was assembled for the first time in October 1998 at the kick-off workshop at Frankfurt airport. Goals were the definition of the KMS' content, objectives, and structure. The project team and BCG presented first ideas for ShareNet's vision, basic concept, and graphical user interface (GUI) mock-ups for prototyping. Afterwards, the participants' team engaged in a joint diagnosis of business problems in order to make sure that the KMS provided value-add to the sales and marketing process. The structure of the KMS was tailored to tackle these problems through global collaboration. All sales representatives were asked to identify projects, solutions, and practices in their home regions that could be leveraged globally, that is, early win-showcases. An Intranet site with a preliminary database, discussion and feedback groups, and core team member profiles was soon established. Altogether, the knowledge of 18 sales projects was captured, more than 30 sales tips and tricks identified, and a first concrete sharing of knowledge initiated.

All content gathered was reviewed in November 1998 at the global exchange workshop in Garmisch. Based on their previous experiences, the ShareNet project team decided early on two ShareNet applications. First, the IS should serve as a document repository for the coding and sharing of best practices in selling solutions. It included structured knowledge about everything needed to create a solution. Second, ShareNet should foster the creation of knowledge networks. Employees should virtually exchange personalized knowledge to promote global cooperation, human networking, and quick help. The option of adding a corporate directory for the mapping of internal expertise (yellow pages functionality) - often found in KMS - was seen as less promising due to a perceived lack of data quality (see Alavi & Leidner, 2001; Earl, 2001, for a typology of KMS and KM strategies).

To accommodate the first application, the explicit knowledge derived from different stages of the solutions-selling process fell into distinct categories of ShareNet solution objects (e.g., technical or functional solution knowledge) and ShareNet environment objects (e.g., customer or market knowledge). Technical solution components were all technology-related parts of solution packages provided to the customer. Functional solution components were all the non-technical tips and tricks or generic methods offered, for example consulting service, financing, and so forth. Useful documents (e.g., customer presentations, spreadsheets) could be linked and references to other content in ShareNet were supported. The linkage was to some extent inherent in the structure, for example a sales project naturally contained a pointer to a customer, and so forth. Additionally, contact persons were named for further help.

To accommodate the second application, ShareNet's tacit content consisted of urgent requests, discussion forums, news, and chats. The urgent request feature allowed ShareNet members to post an urgent message or question to alert the other ShareNet users. If feedback on general ideas or suggestions to solve low priority issues was needed, discussion forums should rather be chosen. ShareNet news was a specific type of forum that served as a bulletin board for the ShareNet Community. ShareNet chat was the global virtual meeting room for the KMS' members based on Internet relay chat (IRC). The final element in ShareNet's people-to-people section was the ShareNet member directory, comprising a directory of all users with contact information, organizational details and the individual list of contributions to ShareNet.

The ShareNet Systems included both the technical systems to facilitate low effort global publishing and searching, and the managerial systems to encourage the capturing, sharing, reuse, and global leverage of knowledge and best practices. These comprised - among others - incentives and rewards, methodologies to externalize knowledge, and dedicated resources for maintaining and evolving the KMS. The core team decided to start with rapid prototyping of the technical platform and to leave the definition of the managerial systems for the final workshop.

The technical systems employed three-tier client/server architecture. The first tier was the user inter-face/personal workspace accessible via regular Web browsers. The second tier did most of the processing: a SUN SparcServer served as the designated application and Web server for all local companies and business units. It ran a software toolkit based on open Internet standards: open source Web server (AOLServer) and open source community system (ACS - ArsDigita Community System). ShareNet's dynamic Web implementation was based on AOLServer Dynamic Pages (ADP), an HTML derivate. Web pages were generated by scripts loading meta-data (e.g., object structure and graphical layout) and actual data (e.g., customer description) from the relational database management system (Oracle 8i). It was housed on the same server and comprised the third tier.

The third and final workshop in the "definition and prototyping" stage was held at Munich airport in February 1999. Content gathered and reviewed from three regions was posted on the prototype system and set an example for the successful application of managerial innovations. However, the participants were unsure about incentives, rewards, and culture change: how could they ensure that ShareNet was adopted by the whole organization? Joachim Doering, president group strategy, estimated that 80% of KMS failed for non-technical reasons: lack of capability to execute, missing readiness or commitment to change, defunct change communications, limited top management support, and poor strategy. To side-step these traps, he wanted the initiative to simultaneously address all domains of change management: strategic change, process change, technological change, and especially organizational and people change.

For the managerial systems, the Munich workshop decided on a range of objectives: first, to increase the usage of ShareNet and thereby improve value creation in sales; second, to support the capturing of knowledge created in the sales processes; third and last, to enable ShareNet's further development and growth by rewarding knowledge sharing. In order to ensure that all ShareNet crucial elements (processes, content, community, and systems) were developed and improved further, the Munich workshop participants proposed a consistent organizational structure. Exhibit 5 shows the resulting ShareNet organization, roles, and tasks.

Top management support mainly relied on explicit means of change communications to bundle organizational resources and individual commitment to the project. Line managers rather served as neutral intermediaries to spread ShareNet's idea across organizational levels and functional departments. Nevertheless, in the long term the ShareNet Community should assume responsibility for the KMS' maintenance and evolution through its input and formulation of requirements. In March 1999, Roland Koch, ICN group president, decided to continue the project and to proceed with the next development stage: "This [ICN ShareNet] network will be of key importance for the success of ICN's solutions business, because the company that is able to make use of existing experiences and competencies quickest has a distinct competitive edge over the other players. We need to be among the first to realize this strategic competitive advantage through efficient knowledge management."

Setup & Piloting

The second key project stage - "setup and piloting" - lasted from April to mid July 1999. Objectives were to test and improve the technical platform, to ensure local company commitment to the project, and to develop a phased implementation approach including training material. BCG's assignment ended with the final workshop in Munich. The KMS was rolled out in four pilot countries (Australia, China, Malaysia, and Portugal) chosen for the following reasons: they showed good "fit in" with the core team, represented Siemens' global operations well, and their first cross-regional sharing of experiences set examples for the entire company. A pilot project team conducted informal training sessions with workshops developed by Rolf Meinert, vice president of change management.

The ShareNet team project saw the pilots as an important means to rapidly establish buy-in at headquarters and local companies. Team members and managers from the ShareNet committee began to meet key executives in local companies (i.e., local ICN heads, local company heads) and at headquarters. They made sure that the managers were committed to KM, informed the team about local particularities, and nominated or supported ShareNet managers. Besides the training material, the ShareNet project team had no formal change management strategy, but rather a range of measures to overcome common implementation barriers. Keeping the right balance between challenging and realistic goals avoided "scope creep". Involving users in developing their own KM solutions helped to build personal networks, to create buy-in and trust with internal customers, and to secure top management support.

The team strongly believed in a bottom-up approach for ShareNet manager nominations. Koch sent a personal letter to all local companies to create awareness for the KMS and to request the nomination of one part-time ShareNet manager per country. In addition, Meinert approached potential ShareNet managers all over the world, making use of his large personal network. Only in the case where countries without voluntary participants were detected were the local company heads asked to nominate some of their employees as ShareNet managers. Lack of competence and commitment or too strong a focus on technology were often the result of forced nominations. In very few cases, a removal of ShareNet managers who did not live up to their obligations was necessary.

Technical systems accounted for only 25% of total project costs; the majority was spent on the selection and training of prospective ShareNet managers, communication campaigns, and training material. The ShareNet project team and the external consultancy Change Factory jointly developed a range of user trainings/workshops and tools for the global rollout, for example training videos, illustrated pocket references, and giveaways. A mission statement concretized ShareNet's vision and explicitly linked it to economic benefits: "ICN ShareNet intends to network all local sales efforts to facilitate global learning, local reuse of global best practices, and the creation of global solution competencies. ICN ShareNet shall realize considerable and measurable business impact through time and cost savings and through the creation of new sales opportunities. ICN ShareNet shall be integrated in the daily work of every sales person. ICN ShareNet is a selforganizing growing system."

The ShareNet project team decided on two-sectioned local company workshops as a central element of the change management initiative. The first section - creating necessary know-how for using ShareNet - followed the participants' working routines. They would learn about ShareNet's philosophy, discover its benefits for daily work, and get to know the structure and handling of the technical platform. Coaches would provide walk-through examples, live exercises, and stimulate discussions about the value-add of global knowledge exchange. During the second section - capturing knowledge with ShareNet - the participants would start to capture and peer review some sample projects they brought to the workshop. A positive, knowledge-oriented attitude was considered the basis for success.

The pilot project team began to test the KMS' database, GUI and usability, response times, and reliability. Objectives were to have secure and stable technical systems available for the "global rollout" stage. To ensure smooth integration with Siemens' Intranet, the ShareNet project team took a close look at Siemens ICN's global technology infrastructure and the level of the local sales representatives' Intranet know-how. Early on, the core team planned for integration with other Siemens knowledge sources and systems. However, the full mapping of all content into the ShareNet data model was never realized since speed of implementation was favored over lengthy coordination with other IS owners.

Global Rollout

The third key project stage - "global rollout" - lasted from mid July 1999 to mid February 2000. Objectives were to have ShareNet implemented in 30 major countries, to establish the ShareNet organization and managerial processes, and to capture and reuse valuable knowledge. The ShareNet project team provided user trainings, controlling to steer the global rollout, and communication material. Four phases for the international rollout were decided: buy-in and preparation (partly accomplished in the preceding stage), ShareNet manager handover, ShareNet workshops in local companies, and ShareNet manager review meetings.

Early in the "global rollout" stage, the introduction of the consistent incentive system "bonus-on-top" put even more emphasis on top management support. Some local executives felt threatened by ShareNet because their employees were bypassing traditional hierarchies in search of solutions. A one-time promotion scheme in fiscal 2000 should link knowledge sharing with economic benefits: local ICN heads should now be rewarded for inter-country business generated through substantial international knowledge exchange. "Business generated" was the total order income of projects secured with knowledge from other countries and the revenues from other countries created with knowledge from the ICN head's local company. "Substantial international cooperation" comprised reuse of knowledge via ShareNet and/or a verifiable exchange of human resources, which together accounted for more than 10% of the order income generated, and/or more than 10% of total project cost or time savings.

To be eligible for a bonus of approximately 10% of their fixed annual salary, the overall revenue achieved should sum up to at least 5% (up to 30%) of local ICN revenue (Gibbert, Kugler & Volpel, 2002). The local ICN heads had to complete forms that contained all cases of collaboration, that is, success stories. Several restrictions applied: since a successful knowledge transfer was described, knowledge giver and taker had to work in distinct departments and project groups and the amount of time and money saved or additionally earned turnover had to be stated. For approval, the ShareNet project team required written proof, for example, invoice, purchase order, or delivery confirmation. The success stories could be checked against each other just like consolidated balance sheets to ensure accuracy. Bonus-on-top yielded remarkable results: during fiscal 2000, Siemens ICN reported additional revenue of EUR 130.9 million from international knowledge exchange, some 50% obtained through ShareNet.

The ShareNet manager handover took place at the end of July 1999. Participants from some 30 countries were assembled for the first time at a one-week boot camp in Feldafing, Germany. The ShareNet team selected rollout countries primarily on the basis of annual sales, availability of local ShareNet project team members, advanced market stage, and advanced technology infrastructure. The ShareNet managers received indepth formal training enabling them to take over the responsibility for the introduction and utilization of ShareNet in local companies.

Moreover, the ShareNet project team intended to build-up committed social networks, first among ShareNet managers, and later throughout the sales and marketing community. Team building events, for example, trying to build a raft without tools to cross the Lake Starnberg, and a friendly and relaxed climate were important change management measures. Doering recalled the team spirit at the boot camp: "All they had to work with were steel drums, logs, pontoons, and some rope. Another catch: no talking. The managers, who gathered from offices around the world, could only scribble messages and diagrams on a flip chart. For the better part of the day, it was knowledge sharing at its most basic. Yet the group managed to put together a small fleet of rafts, which they paddled about triumphantly on the placid waters of the lake."

There was low headquarter participation at the first boot camp and the business units showed higher implementation resistance than local companies: they were afraid to lose sales opportunities for internal services, questioned ShareNet's positioning among other IS, and did not fully appreciate value creation in local companies. In addition, headquarters were afraid of sharing centralized knowledge, that is, a source of influence and power. Whereas more than half of the local companies' employees supported the KMS and some 20% resisted its implementation, numbers at headquarters were roughly vice versa. Resistance came in several flavors: inactivity and lack of implementation support, postponing decisions, preventing employees from posting safeguarded knowledge, denying the right to use ShareNet, and all kinds of politics. The ShareNet project team decided to continue the implementation with central funding and a focus on key impact areas, that is, the local companies.

Soon after the boot camps, the ShareNet managers began with the local rollouts. On average, each local implementation required project work for two or three months: one week for "selling" ShareNet in the local companies, three weeks for user training/ workshops to teach the necessary skills to capture knowledge, up to two weeks for the review of captured content, two to three weeks for the support of local staff, and two days for a final review meeting. The ShareNet project team and ShareNet committee members visited 18 countries to support the implementation with communication campaigns and workshops. The entire implementation process was centrally driven and monitored, for example, rollout targets, resources, and workshops. Country-specific metrics were tracked and discussed with the local ShareNet managers on a monthly basis.

To formally conclude the KMS project, the ShareNet project team organized a ShareNet manager implementation review conference at Sun City, South Africa in February 2000. Goals were to reinforce community spirit, to exchange experiences with the international rollout, and to define future implementation ideas. Exhibit 6 recapitulates ShareNet's key project stages. Doering felt a substantial commitment to change: "ICN ShareNet is more than a database; it is a new spirit, a new way to cooperate worldwide across country and organizational boundaries. Knowledge reuse is the key to success, e.g., innovation, time to market, etc. With ICN ShareNet we take advantage of our strengths: local innovations and creativity and global leverage of sales power." Approximately 4,200 ShareNet users had registered and posted more then 2,100 public knowledge objects and 490 urgent requests; news and discussion groups enjoyed significant traffic.

To emphasize the project closing's importance, Koch participated via videoconference on the conference's last day. The participants consolidated their key learnings. Everybody acknowledged that ShareNet needed political attention and ongoing top management support, that is, Siemens ICN's group executive management and local ICN heads. Otherwise, time resources and prioritization for ShareNet rollout activities would consequently be too low. An adjustment of goals, incentives, and rewards was required for all members of the ShareNet organization and individual users. ShareNet managers needed sufficient time for support; that is, 25%-50% of their working time; other tasks had to be reduced. During a formal handover ceremony, the ShareNet project team transferred the KMS' ownership to a regular line organization, that is, the new ShareNet operating team. Through their new representatives, users should finally assume ownership and responsibility for ShareNet's maintenance and evolution.

Operation, Expansion, & Further Development

The fourth key evolution stage - "operation, expansion, and further development" - lasted from mid February 2000 to the end of November 2001. Objectives were to continuously expand ShareNet throughout Siemens ICN and to further refine and develop the technical platform. The ShareNet operating team felt that knowledge exchange did not come naturally to the corporate culture. There were old boys' networks, risk adverse decision making, and a strong engineering "do-it-all yourself' culture that made it difficult to get accustomed to new rules of competition (Gerndt, 2000). Top engineers had adopted a "hero mentality," showing respect only for individual design achievements (Davenport, De Long & Beers, 1998). Innovations no longer originated in central R&D; rather they were derived from customers' needs. Strong hierarchies counteracted an atmosphere of openness, mutual respect, and ambiguity tolerance since they placed value on individual achievements at the expense of teamwork.

The ShareNet operating team recognized that people were slow to change their behavior; first results from culture change after a few years showed that the whole processes needed a decade to become self-sustaining. Albeit "bonus-on-top" had been successful beyond expectations, it was unclear whether ShareNet itself was benefiting. Users commented: "Receiving some [...] award naturally serves as an incentive to sharing our knowledge with colleagues worldwide, but it is not the most important aspect. Getting direct recognition for how much our daily job is appreciated is the most important thing. That's what counts and motivates us." The new team decided to focus incentives and rewards more on the users themselves to get a critical mass of content into the system, to make users active contributors, and to create awareness.

Consequently, the ShareNet quality assurance and reward system went live on March 1, 2000. There were no monetary incentives since they encountered ambiguity in local companies; a share system, comparable to frequent flyer miles, faced less obstacles. ShareNet shares could be collected, accumulated, and finally turned into knowledge-related rewards. The share system was a flexible incentive scheme that could be

adjusted according to needs for motivation and guidance: for example, objects published and forum responses yielded between three and 20 shares, dependent on a pre-assigned value. One share was equivalent in value to approximately EUR 1.00. ShareNet's technical systems automatically distributed the shares for contributions.

During the first four months, the share system yielded remarkable results: there was more awareness for ShareNet (35% new users), more activity (50% additional active contributors), and increasing content quantity (plus 90% knowledge objects posted). In July 2000, the competitive reward system was turned into an "online shop" where shares could be traded for a defined range of products, for example professional literature and Siemens laptops. But the success in quantity imposed drawbacks on quality. Lots of users - especially ones that joined ShareNet in earlier stages - lamented the decrease of content quality. Thousands of new objects brought the ShareNet managers' formal review process to its limits.

The ShareNet operating team introduced a peer-to-peer review process, that is, feedback from users to contributors. The change became visible through a five-starrating of objects and urgent request answers. The stars were multiplied by a certain factor to compute the amount of shares the contributor earned. Introducing this new review process boosted the quality (plus 50% reuse feedback per knowledge object). The "ShareNet Special Weeks," that is, doubled shares for promising knowledge objects, aroused even more interest in July 2001. Though many knowledge objects were posted and several new users registered, the ShareNet operating team criticized special events: an artificial and expensive hype was created that rapidly ebbed off.

The ShareNet operating team continued with "networking people" at a second ShareNet manager conference in Istanbul in December 2000. Some 60 participants revised the quality assurance steps, discussed the inclusion of other communities into the KMS, and defined ShareNet manager targets. The basic requirement for the latter was general user support, for example, user trainings, presentations, and monthly reports. Complementary was the establishment of a constant knowledge input, that is, 1.5 knowledge objects per registered user per year, plus/minus 30% flexibility according to local peculiarities (knowledge givers vs. knowledge takers). Further required were the documentation of two success stories per 100 registered users per year and high performance knowledge exchange, that is, an average of 10 shares per registered user per month. As a result some 20 ShareNet managers received 50-120% of an additional fixed monthly salary as a bonus at the end of 2001.

Shifting to a Multi-Community Concept

The fifth and last key evolution stage - "shifting to a multi-community concept" began in December 2001. ShareNet had aroused much interest within Siemens. Heinrich von Pierer, Siemens CEO and president, declared ShareNet a Siemens-wide KMS best practice. Objectives of this stage were to sharpen the focus on topics leading to more efficiency, to foster the development and progress of smaller communities-ofpractice (CoPs), and to delegate maintenance responsibilities to new user groups. The ShareNet operating team had gathered many requests for CoPs focusing on specific topics of interest. Those were seen as a good indicator for an institutionalization of the concepts and meanings inflicted by the culture change. Siemens ShareNet VI.x marked the introduction of a company-wide, multi-community platform.

The former ShareNet became one CoP amongst others but retained the largest number of users. The conceptual change necessitated a personal workspace (WS) with personal data, e-mail alerts, bookmarks, and links to all CoPs for which users had registered. Community homepages provided an overview of community-specific content for each user, for example, new threads since last login. Designated functional modules (M), that is, knowledge libraries, discussion forums, chat, and news, could be flexibly adapted to each CoP's businesses processes to win over users. This design also reflected the security requirements of sub-communities dealing with sensitive topics. In cooperation with other Siemens group divisions an interface/bridge license and user management was designed to ensure information exchange between ShareNet and Livelink Communities (the corporate document management system). Exhibit 7 shows the underlying technologies.

When the new technical platform went live, some users complained about the new layout (adapted to Siemens' corporate identity guidelines), many bugs, and weak performance. The majority of bugs were resolved quickly, while performance tuning required more time. Due to unclear specifications, former functionality was missing in Siemens ShareNet VI.x. ShareNet consultants and the global editor were badly prepared and encountered many obstacles over the first weeks. High user demand could not be met due to a shortage of resources: the central IT function needed additional human resources for timely development, implementation, and documentation; ShareNet consultants lacked money to travel and to train users globally. Top management could no longer provide the usual level of support due to other pending problems, that is, the collapsing telecommunications sector.

Through its successes in the sales and marketing functions, ShareNet had always attracted attention from R&D employees. As a result, just before the introduction of the new ShareNet technical platform, the ShareNet team was approached by an R&D department that focused on the development of "carrier products". This specific development process was well established and had not changed for many years. It, however, lacked formal mechanisms to share experiences and ideas across individual projects, for which R&D employees had to rely on their personal networks. As ShareNet had proven its ability to extend private networks within the sales and marketing environment, the R&D initiators expected the same for their community.

Discussions between the ShareNet team, the initiators, and several potential key users led to the development of R&D-specific knowledge objects and a corresponding capturing wizard. Since no further user involvement was desired by the community leaders, only brief training sessions were conducted at headquarters. The first results were disappointing: a general lack of traffic with a narrow focus. The ShareNet operating team members explained this in part by pointing out the proprietary R&D applications as well as (perceived) security concerns that made possible users cautious. A virtual R&D conference set a more positive example. Participants could post presentations with links to discussion threads and knowledge objects. Similar to traditional conferences, presentations were organized by time sequence and were available for a window of time. After a slow start on the first day, lots of comments were posted the following days and active discussions evolved among the virtual participants (MacCormack, 2002).

In September 2002, the ShareNet operating team announced a change in the knowledge sharing incentive system. Two main reasons were given: first, implementation success was established; second, both the current business situation and the business outlook were gloomy. Users could still keep and accumulate shares, but the incentive catalog was discontinued. There was no consensus within the ShareNet operating team whether the intrinsic motivation of knowledge exchange had already made ShareNet's usage self-perpetuating. For compensation, visibility and expert recognition, invitations to high-level events, and integration with business processes, for example employee target agreements, were planned. However, most decisions were neither taken nor implemented since Siemens' decentralized matrix structure required such decisions from local companies and not from Siemens ICN's executive management.

On the one hand, some team members were confident that the power of the ShareNet Community was not founded on incentives only. Users would keep their motivation on a high level since knowledge sharing was needed more than ever with globally distributed expertise and experiences. Thomas Ganswindt, Siemens ICN's new group president, exclaimed: "global networking and sharing knowledge is key to the success of ICN, even more since we will no longer have all the necessary knowledge in all local companies. The same counts for headquarters. And, if people really contribute to the success of ICN, it has to be beneficial to them." On the other hand, some team members argued that a discontinuation of extrinsic motivators would lead to significant drops in contributions and usage or even to a deadlock situation. Existing users might become passive and it would be difficult to attract others.

CURRENT CHALLENGES/PROBLEMS FACING THE ORGANIZATION

The collapse of the telecommunications sector in 2001 did hurt Siemens ICN as seriously as any of its competitors. As a response, the group executive management started the Profit and Cash Turnaround (PACT) program. Its first phase, "clean-up," aimed for cost reductions through organizational redesign, headcount reduction, and improved asset management. This phase lasted until fiscal 2003. In the same year, the overlapping second phase, "rebuild," started - continuing until 2004. It comprised customer-orientated portfolio adjustments, as well as the implementation of innovative concepts for leveraging the synergies of enterprise and carrier solutions. Beginning in fiscal 2004, the third phase, "growth," emphasized intense customer relationships, streamlined processes, and a balanced portfolio of products and services.

"Rebuild" and "growth" were fuelled by major efforts in the field of innovation. On one hand, the group executive management required Kugel's BT team to design and kick-start a common innovation process and a technology roadmap. In addition to an existing product line process for incremental innovations, Kugel's team implemented a process to fuel disruptive innovations. Linked with ICN's strategy and based on ideas from internal and external sources, both defined innovative projects to be handled in the carrier and enterprise business' product development processes. The technology roadmap unified the view on existing and emerging technologies for all these processes, in order to foster synergies and to avoid double work. On the other hand, the existing R&D function and its product development processes were reconsidered in order to shorten new products' time to market. As one outcome of this revision, the new group president Thomas Ganswindt requested Doering to expand ShareNet throughout the R&D function. In turn, Doering asked Kugel to provide him with a detailed roadmap within one week.

Kugel knew that the "clean-up" phase's headcount reduction had struck the whole organization. Not only was her KM team reduced to three full-time employees -just about able to maintain the existing ShareNet - but the local companies were reducing their ShareNet managers as well. Additionally, the targeted R&D departments were made leaner while simultaneously speeding up their cycle times. Those developments limited the organization's ability and willingness to devote resources to KM. Cost reductions made it impossible to increase funding for external resources unless a striking business case could be presented. This was the only way to imagine a rollout comparable to the sales and marketing implementation.

The extremely difficult business situation and outlook also had severe impact on ShareNet usage. More than ever, employees were complaining about their lack of time for knowledge sharing. Facing massive layoffs, knowledge hoarding was again taken up as a means to make oneself irreplaceable. The discontinuation of the highly efficient ShareNet incentive and reward system and its less successful substitution with the recognition of ShareNet "masters and experts" added to the general challenges. In result the number of visiting users had fallen from some 4,600 (in August 2002) to some 2,100 (in August 2003). Page views declined from 179,000 to 75,000, and the number of contributing ShareNet users dropped from 432 to 190.

Though PACT led to more centralization in terms of target definition and controlling, it still made use of the "networking company" that ShareNet had fostered. Most employees recognized the need to identify and leverage Siemens ICN's knowledge globally in order to remain competitive and innovative. A majority shared knowledge freely without ever making personal contact; rather they were bound together in a global corporate network, worked within the same industry, and had a common code of conduct. It had become a habit for Siemens ICN people to involve local companies into strategic decisions. This approach ensured global applicability and established early buy-in.

While looking at the Alps from her office, Kugel wondered how to capitalize on the earlier experiences and accomplishments. Would the existing ShareNet line organization, training material, user base, brand identity, and culture change allow for a cheap and fast expansion into R&D? What would she present to Doering? A first meeting with her team led to the identification of three major expansion alternatives: first, replicating the original - but expensive - sales and marketing implementation approach with only minor modifications; second, identifying and fostering a range of smaller, topic-driven R&D communities (e.g., for technologies on the roadmap); third and finally, expanding ShareNet step by step along the R&D processes - starting from the recently defined innovation process, taking the adjacent process elements next and finally covering the full R&D process.

View Image -   APPENDIX
View Image -
View Image -
References

REFERENCES

References

Alavi, M., & Leidner, D.E. (2001). Knowledge management and knowledge management systems: Conceptual foundations and research issues. MIS Quarterly, 25(1), 107-136.

Davenport, T.H., De Long, D.W., & Beers, M.C. (1998). Successful knowledge management projects. Sloan Management Review, 39(2), 43-57.

Earl, M.J. (2001). Knowledge management strategies: Toward a taxonomy. Journal of Management Information Systems, 18(1), 215-233.

References

Fahey, L., & Prusak, L. (1998). The eleven deadliest sins of knowledge management. California Management Review, 40(3), 265-276.

Gerndt, U. (2000). Serving the community. KM Magazine, 3(9), 7-10.

Gibbert, M., Kugler, P., & Volpel, S. (2002). Getting real about knowledge sharing: The premium-on-top bonus system. In T.H. Davenport & G.J.B. Probst (Eds.), Knowledge management case book: Siemens best practices (2nd ed., pp. 260-278). Erlangen and New York: Publicis Corporate Publishing and John Wiley & Sons.

Ginzberg, M.J. (1981). Key recurrent issues in the MIS implementation process. MIS Quarterly, 5(2), 47-59.

References

MacCormack, A. (2002). Siemens ShareNet: Building a knowledge network (pp. 127). Boston: Harvard Business School Press.

Rothnie, D. (2001). ShareNet: Siemens information and communication networks. In V Mellor, E. Barnfield & N. Aitken (Eds.), Strategies for best practice intranet

References

management (pp. 186-194). London: Melcrum Publishing.

References

Seeley, C. (2000). Change management: A base for knowledge-sharing. Knowledge Management Review, 3(4), 24-29.

Siemens. (2003). Annual report 2003. Berlin.

Siemens Information and Communication Networks. (2003). Facts and figures 2003. Munich.

Zmud, R.W., & Cox, J. E (1979). The implementation process: A change approach. MIS Quarterly, 3(3), 35-43.

AuthorAffiliation

Hauke Heier, European Business School, Germany Hans P. Borgman, Universiteit Leiden, The Netherlands

AuthorAffiliation

Andreas Manuth, Siemens Information & Communication Networks, Germany

AuthorAffiliation

Hauke Heier is a fellow at European Business School in Oestrich-Winkel (Germany) and a visiting assistant professor of business administration and information management at Leiden Institute of Advanced Computer Science, at Leiden University School of Management (The Netherlands), and at Munich Business School (Germany). Dr. Heier holds a BA and MS in information systems and organizational behavior from European Business School, an MBA from James Madison University (USA), and a PhD from Leiden University. His current research interests include knowledge management systems, open source initiatives, and the adoption of new technologies in organizations. In addition, he is active as a, frequent speaker at academic conferences.

AuthorAffiliation

Hans P Borgman is a professor of business administration and information management at Leiden University School of Management (The Netherlands). Previous appointments include the University of Michigan Business School in Ann Arbor (USA), the European Business School in Oestrich-Winkel (Germany) and the Erasmus University in Rotterdam (The Netherlands), where he also obtained his PhD. Dr. Borgman's current research interests include management aspects ofe-business, data warehousing, and the adoption of new technologies in organizations. In addition, he is active in consulting, on (supervisory) boards, as a frequent speaker at academic and business conferences, and in executive education programs.

AuthorAffiliation

Andreas Manuth is a member of the knowledge management team at Siemens Information and Communication Networks, department Group Strategy, Munich (Germany). He held previous positions as sales engineer and management consultant in German and international telecommunication carriers. Mr. Manuth holds an MS in computer science from Karlsruhe University (Germany). His current interests include knowledge management motivators and the adoption of new technologies in organizations. In addition, he is active as a frequent speaker at business conferences and executive education programs.

Subject: Case studies; Knowledge management; Information systems; Research & development; R & D; Expansion

Location: United States, US

Company / organization: Name: Siemens Information & Communication Networks Inc; NAICS: 334220, 334210

Classification: 9110: Company specific; 5240: Software & systems; 5400: Research & development; 9190: United States

Publication title: Journal of Cases on Information Technology

Volume: 7

Issue: 1

Pages: 92-110

Number of pages: 19

Publication year: 2005

Publication date: Jan-Mar 2005

Year: 2005

Publisher: IGI Global

Place of publication: Hershey

Country of publication: United States

Publication subject: Business And Economics--Computer Applications

ISSN: 15487717

Source type: Reports

Language of publication: English

Document type: Business Case

Document feature: references tables diagrams

ProQuest document ID: 198672124

Document URL: http://search.proquest.com/docview/198672124?accountid=38610

Copyright: Copyright Idea Group Inc. Jan-Mar 2005

Last updated: 2011-07-21

Database: ABI/INFORM Complete

Document 91 of 100

Development of KABISA: A Computer-Based Training Program for Clinical Diagnosis in Developing Countries

Author: Jef Van den Ende; Lagana, Stefano; Blot, Koenraad; Bisoffi, Zeno; et al

ProQuest document link

Abstract:

KABISA is a computer-based program for training in diagnostic problems in (sub-) tropical regions. It challenges the individual student with a randomly generated case, for which he should try to find the diagnosis, asking questions, performing a physical examination, and ordering tests. The built-in tutor follows the student's input with complex logical algorithms and mathematical computations, gives comments and support, and accepts the final diagnosis if sufficient evidence has been built up. Several problems arose with the development. In the first place, the evolution in the teaching of clinical logic is always ahead of the program, so regular updating of the computer logic is necessary. Secondly, the choice of MS Access as computer language has provoked problems of stability, especially the installation of an MS Access runtime. Thirdly, and most importantly, scholars want proof of the added value of computer programs over classical teaching. Moreover, the concept of a pedagogical "game" is often regarded as childish. Finally, the planning and financing of an "open-ended" pedagogical project is questioned by deciders, as is the case with all operational research. [PUBLICATION ABSTRACT]

Full text:

Headnote

EXECUTIVE SUMMARY

Headnote

KABISA is a computer-based program for training in diagnostic problems in (sub-) tropical regions. It challenges the individual student with a randomly generated case, for which he should try to find the diagnosis, asking questions, performing a physical examination, and ordering tests. The built-in tutor follows the student's input with complex logical algorithms and mathematical computations, gives comments and support, and accepts the final diagnosis if sufficient evidence has been built up. Several problems arose with the development. In the first place, the evolution in the teaching of clinical logic is always ahead of the program, so regular updating of the computer logic is necessary. Secondly, the choice of MS Access as computer language has provoked problems of stability, especially the installation of an MS Access runtime. Thirdly, and most importantly, scholars want proof of the added value of computer programs over classical teaching. Moreover, the concept of a pedagogical "game" is often regarded as childish. Finally, the planning and financing of an "open-ended" pedagogical project is questioned by deciders, as is the case with all operational research.

Headnote

Keywords: cognitive skills; computer-assisted education; computer-based training; distance education, resources; healthcare education; hermeneutics; instructional materials; student-centered learning; virtual teaching

ORGANIZATIONAL BACKGROUND

The Institute of Tropical Medicine is a private institute of public utility, located in Antwerp, Belgium. It has formal links with all Belgian universities. Its mission statement encompasses research, training, and services in the field of tropical medicine and medicine in resource-poor countries. It employs more than 300 people and has an annual budget of more than 25 million Euros. The ministry of education and the ministry of international cooperation provide the core budget.

Training varies from several short courses, including a four-month course for nurses, a six-month diploma course for medical doctors, and different master's courses and PhD programs. During recent years, the training philosophy has shifted to problembased and distance learning. Several computer-assisted tools and CD-ROMs have been produced. A telemedicine program is running for veterinary diseases and for anti-retroviral treatment of HIV in developing countries.

The institute has more than 100 projects, mostly in developing countries, and participates in many others. Training forms a substantial part of several of these projects.

SETTING THE STAGE

At the end of the eighties, the need for a different type of teaching and training became apparent worldwide. Merely loading students with more and more knowledge was questioned. The need for a shift from knowledge to competence was clear. New approaches to training were introduced: role-play (the trainer or an actor plays the patient's role, the student asks questions and suggests investigations in order to reach a final diagnosis); simulation of trials, where students take the role of prosecutor, lawyer, and judge; discussion of diagnostic errors or patient management in small groups; and "problem-based learning" in general.

Computers were introduced into the training, first for retrieval of information, and later for training programs (Clayden & Wilson, 1988; Siegel & Parrino, 1988; Verbeek, 1987). An interactive computer classroom with 50 computers, and a smaller one with 12 computers were installed in the institute. The library was also fully equipped with all available IT means. In student residences, wireless networks provided and maintained by the institute staff permit students to study at night and during the weekends. IT staff consists of five full-time computer experts, and several scholars are actively involved in writing and creating programs.

CASE DESCRIPTION

History

As part of the new didactic instruments, a card game called "KABISA" was developed in 1986. Students could suggest a diagnosis to their partner, who should guess it from the constellation of cards successively presented. Bridge-like rules were developed, and beautiful witty drawings were printed on the cards. With the introduction of microcomputers at the institute at the end of the eighties, an immunologist offered to write a simple computer program based on the card game. A first version was written in 1989 in dBase and compiled in clipper. The program challenged the student with cases electronically compiled from a randomly generated disease with randomly generated presenting symptoms. The student should find the diagnosis with disease characteristics such as symptoms, signs, and available tests in a hospital in developing countries. The program remained very limited, with logic very similar to that of the card game.

In 1991 a resident in internal medicine asked permission to translate the program into C++. He achieved this in just one night. Further developments became possible, and the horizon broadened gradually. Weight was added to the disease characteristics, and thresholds were introduced for diagnosis. Further features included a formal exam, a scoring system, economic implications of testing, and relations between disease characteristics (Van den Ende et al., 1997).

A major limitation was the absence of images. A first attempt to show a single ultrasound image during a consultation with KABISA II required 90 seconds, far too slow to be operational. When more powerful microcomputers became available, an Italian IT student proposed his collaboration, as part of his thesis. He preferred MS Access with Visual Basic for Applications, since it had an easy-to-use interface for images and sounds. From 1997 on, the complete program was rewritten in Access, and a large database with microscopy, X-ray, ultrasound, and ECG images was created. When the program became operational, his Italian university claimed the entire intellectual property, which was impossible, and finally he was not able to defend KABISA III as his thesis.

Description of the Program

KABISA is used as a tool for individual training, after explanation of clinical logic and teaching of tropical diseases in the classroom. Its use as an expert system is limited, and was also not the main aim (Van den Ende et al., 1997). It confronts the user with virtual patients, who are initially presented with three randomly selected symptoms. The student can ask questions, perform a physical examination, and order laboratory tests and imaging. The built-in tutor follows the student's input with complex logical algorithms and mathematical computations, gives comments and support about disease characteristics and possible diagnosis, and accepts the final diagnosis only if sufficient evidence has been built up (Myers & Dorsey, 1994).

Different tools are available to support learners (Figure 1). These tools allow students to look for information about certain symptoms or diseases, to check the relative weight of disease characteristics, to compare different diagnoses, or to see how much a disease characteristic contributes to the final certainty. An exam module challenges the students with a series of consultations, while all help functions are shut down. An evaluation report keeps track of soundness of ordering of tests, and of correctness of final diagnosis.

A separate module can be used for exercises with laboratory, x-ray, and ultrasound images. Randomly generated images have to be interpreted and commented on by the student. On request, the tutor offers an explanation.

Students can choose their language, the continent in which they want to exercise (Africa, South-America, Asia), a pediatric or adult ward, their currency, and also the level of difficulty they prefer (Figure 2).

In the "Professor" edition, the content of the databases can be changed and updated (Figure 3). This version is used only by the scholars who update the modules for each continent, as prevalence, presence, and presentation of diseases differ. Interested universities might create a KABISA version typical for their country or region.

The program is distributed as public domain for developing countries. Its use is widespread in developing countries, and also in training institutions in Europe. It has been translated into eight languages, all available on one CD-ROM, which includes an Access XP runtime in case the student does not have a licensed MS Access XP program. As the image database is larger than 600 Megabytes, installing from the Internet is impossible, but updates of the logical engine and of the images can be obtained from www.kabisa.be.

Logic

The development of the program paralleled the development of the teaching organized during the same period. In the beginning, the aim was to teach "classical" clinical epidemiology applied to cases of tropical medicine. Clinical epidemiology studies the value of disease characteristics in relation to diseases, and their contribution to certainty, all with rather complex mathematics. Students expressed their disbelief in the utility of this teaching, and asked for formal proof that this theory is useful in practice. The computer was a powerful tool to detect what was wrong in the teaching: the question was whether the difficult calculations themselves were the problem, or whether it was more the wording or the concepts. Even with results computed in milliseconds, clinicians did not use calculations. A fundamental problem of language became clear: clinicians do not think in mathematical terms or with mathematical data (Bryant & Norman, 1980). Developers were forced to "translate" terms like "positive likelihood ratio" into common language like "confirming power," and so forth, in order to make the clinician comprehend the meaning. Only after translations of the terms, and shifting to a more intuitive certainty scale, did clinicians start to understand and to use a more formal logic (Van den Ende et al., 1994).

Students forced programmers to refine the logic with each version: a complaint about the first version was that it lacked "weight" of arguments, and for the second one developers discovered the necessity for a clear endpoint, that is a certain "threshold" probability of disease where the student has gathered enough evidence to start treatment (Pauker & Kassirer, 1980). In the third version, developers had to take into account the diagnostic weight of images, as often their yield is much more than a yes/no statement.

The first version was very simple and used only pattern recognition. In the second, developers included weight of symptoms and signs, and thresholds. C++ was quite interesting for this purpose: it remained stand-alone, and computation was quick. (Although the writing was quite complex: the source code contained 115,000 lines!)

View Image -   Figure 1:
View Image -   Figure 2:

For the third version, teachers wanted to include images. Programmers struggled for a long time with the speed and the capacity of microcomputers at that time, but also with the interface between C++ and imaging. Finally developers decided to rewrite the code in MS Access, which at that time (1997) offered quite a good engine for retrieval and integration of images. But problems arose: since customers were mostly poor health professionals in tropical countries, they could not afford the high cost of a full MS Office package. An Access runtime assembled by the MS Office Developer package gave a solution but created many recurring problems. Microsoft gave support, but after fixing one problem, another arose. Moreover, since the program KABISA builds temporary tables, students had to be instructed on how to compact the database after exercising. If not, the database would reach up to 100 Megabytes, precluding all further exercises. Accidental closing of a session with the main window closure button was also a disaster, resulting in bilingual screens. Students became quite upset, and sometimes refused to use the program after bad experiences. Fortunately, the conversion of the program to MS Access XP and the development of an appropriate Access XP runtime by Microsoft brought relief. The program became stable, with a much easier installation procedure.

Pedagogy

The biggest problems, however, arose with the proof that a program is useful. In an academic environment, one has to produce hard data that the addition of such a program to the curriculum is relevant. Especially when looking for funding of further developments, sympathy can turn into overt skepticism. Through the first development of the card game to the latest version of KABISA, it was a continuous fight to defend it when facing some scholars.

View Image -   Figure 3:

Since 1995, final clinical exams of the diploma course are undertaken with a roleplay of clinical cases. Before the advent of KABISA III, it was extremely difficult for the student to finish a case in less than half an hour. Since KABISA III, the mean time to make a correct diagnosis has been reduced to less than 10 minutes. But to prove this retrospectively is difficult. Moreover, a prospective study is unacceptable for students, since KABISA is public domain and very popular.

The Department of Pedagogy of a Belgian University was asked to perform a formal evaluation (Clarebout et al., 2004). A special version was adapted for logging of all actions students took during a computer session. "Think aloud" sessions were recorded. The final conclusion was that the students rarely used the built-in logical help functions and did not follow an ideal path: they often reached the diagnosis through a rather intuitive quest. It seemed as though they used the program like a game, rather than an instructional tool. A new version with emphasis on training in formal logic and intensified guidance was written. In Italy, Spain, and Belgium, a trial version was abandoned by all students after a quarter of an hour. "We do not want to be treated like children," was the main comment. Further development of this version was completely abandoned. One can argue that an "ideal path" to a diagnosis does not exist, and that the evaluation of a didactic tool for clinical reasoning cannot be solely based on the frequency the help functions are used by students. The students take each new case presented by the computer as a challenge, and try to solve the case without any help. It is indeed a kind of game in this sense. All the same, games can be very powerful pedagogic tools!

Management

In the first years, clinicians, professors, analysts, programmers, and financers were the same people. Coordination was simple, control of the production process was nonexistent. With the development of KABISA II, financial and managerial aspects became clear. The program was sold at a low price, given the lack of resources in developing countries, but bank transfer costs for purchase from abroad exceeded the cost of the program itself. With the growing success of the program, intellectual property also became an issue. Ownership was not discussed before programming, so debate arose and an investor was to be sought.

For the development of KABISA III, a managerial structure was set up, programming was separated from design and management, and financing was sought. As the ministry of international cooperation became a major stakeholder, clear goals and formal evaluation were imposed. KABISA became public domain for use in developing countries, but a clear delimitation of use in Europe was difficult. Intellectual property issues became complex, as so many actors in different countries became involved.

Planning

When asked how much further development would cost and how much time they would need, developers could never answer. The way developers make such an interactive training tool is a close collaboration between clinicians, logicians, programmers, and students. Every single step forward could open new horizons, could change the fundamental logic. Programmers could suggest new logic to logicians, who would test this with clinicians. Students checked every change and often suggested other approaches or a new layout. The possibility to try out every new step with groups of students and to adapt the program directly to their needs was innovative and exciting. For KABISA III, an attempt was made to write a classical project, with a clear architecture for the program and formal logical flowcharts. But after a few months, these plans were changed almost every week, as the interaction between bright people and the enormous possibilities of IT created new horizons and unpredictable dynamics.

KABISA was an example of true "operational research," where the process itself and the results are more important than the proof. It was a marvelous example of "cross-fertilization" between different disciplines.

CURRENT CHALLENGES/PROBLEMS FACING THE ORGANIZATION

A fundamental problem that has hitherto not been resolved is that students can make a diagnosis of for example, "the flu," while a dangerous disease like meningitis has not been excluded. Furthermore, they may make a diagnosis before exhausting all relevant disease characteristics. This may represent an overestimation of the probability of that particular disease, and as a consequence, other diseases (including severe ones like meningitis) may be erroneously pushed below their respective threshold and not considered any further. Adapting the logic appears to be very complex and might necessitate modification of all algorithms written in the actual version. A last important challenge for the future logic is how to manage clinical images, because for every disease, typical images for children or adults and for male and female patients are needed for all the different continents. Many contributors should be sought, transmission of data and coordination will be difficult, and privacy of patients could be a major obstacle.

The question arises which language the programmers should write KABISA IV in: a more general language, independent of Microsoft? With the availability of the Internet almost all over the world, a Web-based version might be preferable. But speed might be a problem.

In the future, evaluation of use and usefulness will become a challenge. Further scientifically founded proof of the utility of the program should be given. Formal proof of utility in classrooms could be set up, but comparing groups of students who use and who do not use KABISA in the same university or institution is very difficult, since the program is public domain. Also, what kind of proof is required: that students master logic, content, or both? For logic, it is all the more difficult, since no formal rules for good medical logic exist. Finally, evaluation of use of the program as an individual continuous training tool should be considered.

For further development, separation of responsibilities will become a burden. As the team becomes bigger, more time will be spent in communication and meetings. Since contributors are spread over almost the entire developing world and Europe, transmission and communication problems are a threat.

How do we solve the marketing problem? Can managers agree to give such an expensive program free of charge to any person in the developed world who orders the program? Even more complex is the problem of ownership. With so many contributors, who will decide about selling the logical engine for use in the developed world? And what is to be done if a university builds on the logic of KABISA, without permission?

For the development of KABISA IV, a strict planning structure should be written. Increasingly, stakeholders do not allow "art" to influence development, they favor a rigid framework, where quantity, quality, and time are scheduled (QQT logical framework). Should the makers of KABISA give up their artistic approach, or can alternative frameworks be found?

References

REFERENCES

References

Bryant, G. D., & Norman, G. R. (1980). Expressions of probability: Words and numbers. New England Journal of Medicine, 302(7), 411.

Clarebout, G., Elen, J., Lowijck, J., Van den Ende, J., & Van den Enden, E. (2004). KABISA: Evaluation of an open learning environment. In A. Armstrong (Ed.), Instructional design in the real world: A view from the trenches. Hershey, PA: Information Science Publishing.

Clayden, G. S., & Wilson, B. (1988). Computer-assisted learning in medical education. Medical Education, 22(5), 456-467.

Myers, J.H., & Dorsey, J.K. (1994). Using diagnostic reasoning (DxR) to teach and evaluate clinical reasoning skills. Academic Medicine, 69, 429.

Pauker, S.G., & Kassirer, J.P. (1980). The threshold approach to clinical decision making. New England Journal of Medicine, 302(20), 1109-1117.

References

Siegel, J.D., & Parrino, T.A. (1988). Computerized diagnosis: Implications for clinical education. Medical Education, 22, 47-54.

Van den Ende, J., Van Gompel, A., Van den Enden, E., Van Damme, W., & Janssen, A. J. (1994). Bridging the gap between clinicians and clinical epidemiologists: Bayes theorem on an ordinal scale. Theoretical Surgery, 9, 195.

Van den Ende, J., Blot, K., Kestens, L., Van Gompel, A., & Van den Enden, E. (1997). KABISA: An interactive computer-assisted training program for tropical diseases. Medical Education, 31(3), 202-209.

Verbeek, H. A. (1987). Self-instruction through patient simulation by computer. Medical Education, 21(1), 10-14.

AuthorAffiliation

Jef Van den Ende, Institute of Tropical Medicine, Belgium Stefano LaganA, Ospedale Sacro Cuore at Negrar, Italy Koenraad Blot, Pfizer Canada Inc., Canada

Zeno Bisoffi, Sacro Cuore Hospital at Negar, Italy

AuthorAffiliation

Erwin Van den Enden, Institute of Tropical Medicine, Belgium, Louis Vermeulen, Institute of Tropical Medicine, Belgium

Luc Kestens, University of Antwerp, Belgium

AuthorAffiliation

Jef Van den Ende was born in 1949. He earned his MD from the Catholic University of Leuven, Belgium, and his PhD on imported malaria from the University of Amsterdam. He worked as a tropical doctor in Zaire (1976-1985) and in Rwanda (2000-2003). He is associate professor in tropical medicine and chief of the Department of Clinical Sciences at the Institute of Tropical Medicine, Antwerp. Besides tropical medicine and piano playing, he is active in clinical epidemiology, artificial intelligence, and computer-based training.

Stefano Lagana was born in Lecco, Italy. He studied ICT at the University of Milano. He has been active as afreelance analyst, programmer and database and datawarehouse manager He has written the third version of KABISA in collaboration with the ITM, and he is involved in the writing of the Electronical Medical File in the Ospedale Sacro Cuore at Negrar, Italy.

AuthorAffiliation

Koenraad Blot holds an MD from Ghent University and a Diploma of Tropical Medicine from the Antwerp Institute of Tropical Medicine. From 1987 to 1990, he worked on various African missions for Doctors without Borders. During his residency (1991-1992) at the Institute for Tropical Medicine, he co-developed the first Windows version of KABISA. In 1992, he joined Pfizer Belgium as medical advisor of anti-infectives. Following his move to Pfizer's New York headquarters in 1995, he has held various national, regional, and international researchrelated assignments. He is currently the director of medical operations with Pfizer Canada Inc. Zeno Bisoffi earned his medical degree from the University of Padua (1980), a DTM&H from the London School of Tropical Medicine (1982), and a certificate of Public Health and Preventive Medicine from the University of Padua (1992). From 1982 to 1990, he worked in Nicaragua and in Burundi in clinic, epidemiology, and public health. Since 1990, he has worked at the Centre for Tropical Diseases at the Sacro Cuore Hospital, Negrar, Verona, where he was appointed head in 2000. His main scientific interests are tropical medicine, clinical epidemiology, and the mathematical basis of clinical reasoning.

AuthorAffiliation

Erwin Van den Enden graduated cum laude from the University of Antwerp, Belgium, in 1980. He specialized in tropical medicine and internal medicine. He worked in Sri Lanka and Zimbabwe. At present, he works as a clinician and lecturer at the Institute of Tropical Medicine, Antwerp, and is a guest lecturer at the Koninklijk Instituut voor de Tropen, Amsterdam, The Netherlands. He likes working with motivated students. Among his many interests are the medical aspects of general biology, especially those of entomology and venomous animals. Louis Vermeulen, BSc, received a bachelor's in chemical sciences (1966) and has since been working at the Institute of Tropical Medicine. As head of the purchasing and expedition service of the ITM, he was a collaborator in many academic projects. After self-study in information and computer technology, his responsibilities were reoriented to internal ICT-consulting for staff and students. Since 1993, he has been responsible for the hard- and software of the different ICT classes and is the main consultant concerning ICT problems for master's or PhD students.

AuthorAffiliation

Luc Kestens, born in 1955, studied biomedical sciences at the University of Antwerp and obtained his PhD on experimental immunopathology of murine schistosomiasis in 1987. Since the early days of the HIV pandemic in 1983, he became involved in HIV research at ITM and in the field (predominantly Africa). He published more than 100 scientific papers in international scientific journals and books. He was appointed professor of immunology in 1992 and became head of the Laboratory of Immunology in 1995 and chairman of the Department of Microbiology of ITM in 2000. He has lectured on immunology at the University of Antwerp since 2002.

Subject: Computer assisted instruction; CAI; Diagnostic tests; Operations research; Developing countries; LDCs; Software engineering

Classification: 2600: Management science/operations research; 5240: Software & systems; 8306: Schools and educational services

Publication title: Journal of Cases on Information Technology

Volume: 7

Issue: 1

Pages: 136-145

Number of pages: 10

Publication year: 2005

Publication date: Jan-Mar 2005

Year: 2005

Publisher: IGI Global

Place of publication: Hershey

Country of publication: United States

Publication subject: Business And Economics--Computer Applications

ISSN: 15487717

Source type: Reports

Language of publication: English

Document type: Business Case

Document feature: illustrations references

ProQuest document ID: 198652828

Document URL: http://search.proquest.com/docview/198652828?accountid=38610

Copyright: Copyright Idea Group Inc. Jan-Mar 2005

Last updated: 2011-07-21

Database: ABI/INFORM Complete

Document 92 of 100

EASYCAR.COM: STRATEGIC SERVICE SYSTEM DESIGN

Author: Lawrence, John J; Solis, Luis

ProQuest document link

Abstract:

This case describes the situation faced by easyCar.com at the start of 2003. EasyCar is the low priced European car rental business founded by easy Jet pioneer Stelios Haji-Ioannou. EasyCar had just reached breakeven in 2002 on sales of £27 million, and had as its goals to reach sales of £100 million and profits of £10 million by the end of fiscal year 2004 in order to position itself for an initial public offering. To do this would require opening new locations at a rate of two per week and expanding its fleet of rental cars from 7000 to 24,000. The case describes the company's processes and facilities as well as its pricing and promotional strategies. It also describes a number of significant changes that the company has made in the last year, including a move to allow rentals for as little as an hour that was designed to position easyCar as a competitor to local taxis, buses, trains and even car ownership. The case also explores several legal challenges the firm faced, including a ruling that threatened one of the core elements of its business model. Students are asked to evaluate easyCar's operations strategy and assess the likelihood that easyCar will be able to achieve its ambitious goals. [PUBLICATION ABSTRACT]

Full text:

Headnote

CASE DESCRIPTION

The primary subject matter of this case concerns concepts relating to operations strategy and service system design. Secondary issues examined include the application of production line approaches to service, service quality concepts, and the value of demand management systems to the firm. The case has a difficulty level of four/five. The case was written for an MBA level introductory operations management class. It is also suitable for use in operations strategy or service operations management courses, at either the MBA or senior undergraduate level. The case has been designed to be taught in 75 minutes and is expected to require about two hours of outside preparation.

CASE SYNOPSIS

This case describes the situation faced by easyCar.com at the start of 2003. EasyCar is the low priced European car rental business founded by easy Jet pioneer Stelios Haji-Ioannou. EasyCar had just reached breakeven in 2002 on sales of £27 million, and had as its goals to reach sales of £100 million and profits of £10 million by the end of fiscal year 2004 in order to position itself for an initial public offering. To do this would require opening new locations at a rate of two per week and expanding its fleet of rental cars from 7000 to 24,000. The case describes the company's processes and facilities as well as its pricing and promotional strategies. It also describes a number of significant changes that the company has made in the last year, including a move to allow rentals for as little as an hour that was designed to position easyCar as a competitor to local taxis, buses, trains and even car ownership. The case also explores several legal challenges the firm faced, including a ruling that threatened one of the core elements of its business model. Students are asked to evaluate easyCar's operations strategy and assess the likelihood that easyCar will be able to achieve its ambitious goals.

INSTRUCTORS' NOTES

Recommendations for Teaching Approaches

The case has been written primarily to illustrate concepts relating to operations strategy and service process design. Specific concepts that the case can be used to illustrate include:

How to align a company's operations strategy with its business strategy (i.e., low price market strategy supported by processes, procedures and systems totally focused on achieving low cost), and how to use the concept of order winning criteria to facilitate linking process design decisions to the firm's operations strategy (Hill, 1999).

How to apply production line approaches to a service through standardization, the use of technology, and the reduction of the discretionary actions of employees (Levitt, 1972).

Why a low cost service does not necessarily imply a low quality service to the consumer. The case provides a good illustration of Parasuraman, Zeithaml and Berry's (1985) service quality model and the notion of service quality relating to customer perceptions compared to customer expectations.

How services differ from manufactured products (i.e., intangibility, perishability, heterogeneity and simultaneity), how services differ from each other, and how the characteristics of a given service influence the design of the service delivery process (i.e., relative focus given to physical facilities and policies, employee behaviors and employee judgment).

How the customer can be designed into the service delivery process (i.e., so that they are performing a portion of the service delivery).

How valuable sophisticated forecasting and demand management systems can be to a firm and how process details can be designed to aid forecasting and capacity planning efforts (e.g., early bookings, no cancellations).

The discussion questions that follow were written so that the instructor can simply walk the class through the questions in sequence. This takes the class basically through a discussion of different order winning criteria that a rental car company might choose to compete on (cost, quality, flexibility) and looks at easyCar's processes, policies and procedures with respect to these possible order winning criteria. Questions 5 and 6 are designed to either further reinforce the lessons of questions 1-4 or to test students understanding of the ideas discussed in these earlier questions. Some instructors may wish to assign only questions 1 -4 and 7 and integrate the important discussion points from questions 5 and 6 into questions 2 and 3. Question 7 is designed to help bring closure to the discussion and emphasize to students that the success of easyCar's operations strategy will depend in part on how well it can implement the strategy during a period of rapid growth.

DISCUSSION QUESTIONS

1. What are the characteristics of the car rental industry? How do these characteristics influence the design of service delivery processes in this industry in general?

This first question is intended to have students think about the nature of the industry that easyCar competes in and the nature of car rental services in general. This will help students better understand and distinguish between actions taken by easyCar's that are related to the nature of the industry and service and those related to easyCar's strategy.

Perhaps the best way to start the discussion is by looking at the general characteristics of services and which of these characteristics are most significant in the case of car rentals. In general, services are characterized by their intangibility, perishability, heterogeneity and simultaneity. But different services vary significantly in the extent to which these characteristics hold.

Intangibility - While strictly speaking, the "service" of car rental is intangible, given the physical nature of the rented vehicle, it really is not as intangible as many other services in the sense that the consumer can see and touch the rented vehicle. For the vast majority of the period during which the customer uses the service of car rental, the physical car is the service provided. For many services, intangibility makes it very difficult for the consumer to judge quality and for the producer to control quality. This is not nearly as difficult a proposition in the case of car rental. The "convenience" factor (e.g., location, speed of pick-up and drop-off, etc.) associated with rental is the most significant intangible associated with rental cars.

Perishability - Car rental is clearly a very perishable service. If a day goes by and a car is not rented, the opportunity to generate revenues from that unrented time is lost forever. Perishability is a critical factor in the rental industry given the generally high fixed cost associated with the service (i.e., a fleet of vehicles). All industry players must cope with this perishability and different companies will have somewhat different strategies for dealing with it.

Heterogeneity - Car rental is not a particularly heterogeneous service, as compared, for example, to the services provided by a doctor, an architect, a lawyer or a hairdresser. While customers may request different vehicles or different extras (e.g., child seat, ski rack) or different rental terms (return with empty or full tank, unlimited miles, etc.), the majority of customers will receive exactly the same service - the use of a vehicle for some specified period of time. Further, the basic interaction or contact that employees of the rental car company have with customers is going to be very similar.

Simultaneity - The issue of simultaneity is not a major issue for the car rental industry. The service being provided by the car rental industry is the use of a vehicle in a location where the customer both needs one and does not have one (i.e., typically when the customer is travelling). While there is simultaneity in the sense that the customer and the vehicle are together during the time that the service is consumed, most of the process of creating the service (e.g., creating the facilities, arranging for the right car to be in the right place) is done without the customer in the process. The customer only interacts with the service organization when booking the vehicle and when picking up and returning a vehicle. While these interactions are important, they do not limit the ability to achieve economies of scale in the industry the way simultaneity does in some other industries.

Service design has been characterized as having three basic components - (i) physical facilities, processes & procedures, (ii) employee's behaviors, and (iii) employee's professional judgement. Given that car rental service is a relatively tangible, homogenous service with fairly low levels of customer contact (i.e., simultaneity), rental companies tend to focus their service design on the physical facilities, processes and procedures. While employees' behaviors are not unimportant, they are of secondary importance to facilities, processes and procedures in service design in the car rental industry. This can be seen industry wide.

2. EasyCar obviously competes on the basis of low price. What does it do in operations to support this strategy?

Once the student understands the characteristics of the car rental industry from a service design perspective, the discussion can move to how easyCar's operational design allows it to compete on the basis of price. Given the extent to which easyCar has designed its process to reduce cost, students should not have a difficult time identifying the features of its process design that allow it to offer a lower price. The key point to drive home is the extent that easyCar has gone to align its operations strategy and process design with its business strategy. Clearly the order winning criteria in this case is low price, (see Terry Hill's Manufacturing Strategy textbook for more on the concept of the order winning criteria in operations strategy).

Perhaps the best way to make this point is to explicitly compare easyCar's operations with the operations of a traditional car rental company. Exhibit TN-I shows this comparison. After having gone through this comparison, the instructor can ask students why all rental car companies don't follow easyCar's lead and reduce their costs in this manner. Doing this drives home the link between the operations design and the business strategy - that is, the traditional car rental companies have strategies focused more on flexibility and service, and as such have different order winning criteria and different operational designs to support these criteria. (An alternate way to ask this is to ask what easyCar gives up to achieve this low cost, although discussion questions 3 & 4 are really designed in part to get at this issue).

View Image -   Exhibit 1
View Image -   Exhibit 1

Finally, once the components of the easyCar operations systems have been brought out, they can be used to make the point that many of the methods that easyCar uses can be thought about as applications of production line approaches applied to a service context. This point is particularly worth making if students have been assigned to read Levitt's (1 972) "Production-line approach to service". The easyCar situation clearly illustrates the ideas of service standardization, reducing the discretionary action of employees and using technology to support or substitute for people in the process.

3. How would you characterize the level of quality that easyCar provides?

Asking students about quality is a logical follow-up to the previous question focused on cost. Discussing quality is important so students see that low cost does not necessarily imply low quality in the minds of the customer. The discussion can also be used to illustrate several important service quality concepts.

One way to begin this discussion is to ask what is quality in this case in the mind of the consumer. Clearly easyCar is targeting a particular segment of the market that is very price conscious, but the students should recognize that "quality" in the consumers' minds is more than simply a low price (or alternatively, the needs of this segment is more than simply low price). The idea of value as a concept relating both quality and price can be introduced here, with value equating to the benefit of the service provided relative to the price paid. This discussion can also be used to introduce Garvin's eight dimensions of quality as a way to better understand the multidimensional nature of quality. Garvin's dimensions are: performance, features, reliability, conformance, durability, serviceability, aesthetics, and perceived quality. EasyCar's customers would likely define quality in terms of the basic functionality (i.e., core performance benefit) of the vehicle rented, the reliablity of the vehicle rented, and the conformance of easyCar processes to the specifications provided on the easyCar web site (across all locations).

The instructor can next ask students why easyCar started with a fleet of Mercedes A-class vehicles (or students may raise the issue in the context of aesthetics from the discussion of Garvin's dimensions). This choice seems inconsistent with easyCar's positioning as a low cost provider, and indeed the company has recently switched and is now using more Vauxhall Corsas and similar vehicles. The key to understanding the launch of easyCar with the more expensive Mercedes is that easyCar did not want to be perceived as a low quality service provider (this comes through in the quote in the case from Stelios about not compromising on the hardware). The importance of the Mercedes ?-class is not just for the current customer. Since a major advertising strategy of easyCar is to put its name in bold orange lettering on all its cars, the Mercedes A-class vehicles are likely to be more positively perceived by those who see the vehicle and the easyCar advertising. EasyCar wants to create an image of reliability that a fleet of new Mercedes might imply (as opposed to being associated with other very low-price rental car companies that often rent older vehicles).

In addition to understanding meanings of quality, the case provides an excellent opportunity to discuss the issues of dealing with service quality in particular. For many services, quality is particularly difficult to deal with because of the intangibility, heterogeneity, and simultaneity of the service. These features of a service typically make it difficult to specify and maintain quality standards. Because car rental is not as intangible or heterogeneous as many services, and the simultaneity is associated primarily with the facilitating good, quality standards are not as difficult to establish or maintain. What is more relevant to the easyCar case is the research indicating that consumers evaluate the quality of a service largely by comparing the perception they have after receiving the service with the expectations they had in advance for the service. Parasuraman, Zeithaml, and Berry's (1985) service quality model can be introduced at this point to drive home this idea. EasyCar is good example of an application of this model. EasyCar now goes to great lengths on their website to communicate exactly what customers will receive and what they will not receive. The reason that easyCar does this is to manage its customers' expectations regarding the service (gaps 4 & 5 in the Parasuraman, Zeithaml and Berry model). When easyCar was launched, it experienced some bad press as a result of customers who did not fully understand the easyCar approach. EasyCar does not want customers to be surprised by any of the features of its service that are different than traditional car rental companies, as such surprises would have a negative impact on the customer's perceptions of service quality.

4. Is easyCar a viable competitor to taxis, buses and trains as Stelios claims? How does the design of its operations currently support this form of competition? How not?

EasyCar sees itself as a potential competitor to taxis and buses because it allows customers to rent a vehicle for as little as one hour. From easyCar's position, this makes sense as part of their effort to achieve maximum utilization of their fleet. If they can rent out a car for even an extra one or two hours when the vehicle would otherwise sit in a garage unused, then it adds to their bottom line. Further, it is possible that such very short term rentals seem most likely to come during the work week, a traditionally slower period for easyCar given its primary appeal is to leisure travelers who demand vehicles more on weekends than on weekdays. In this way, the very short-term rentals may help balance out demand on a weekly basis.

EasyCar's change to allow rentals for as little as one hour provides a good opportunity to discuss the issue of the flexibility of EasyCar's processes. The easyCar process is flexible in that it allows customers to choose exact pick-up and drop-off times and pay for only that time. Traditional rental car companies charge by 24-hour periods and for a minimum of one day. Further, easyCar charges customers for each individual service that they use (e.g., cleaning the car, extra kilometers), allowing customers to pay only for the services that they require. This flexibility really revolves around prices. In two cities, easyCar also offers flexibility in terms of location. Fully half of easyCar's rental sites are in either London or Paris.

The question is whether these forms of flexibility are sufficient to make rentals of a couple of hours appealing to customers. There are several significant limitations from the customer's perspective that will likely limit easyCar's ability to attract these customers. First are the preparation fees or activities that the customer will have to pay and/or engage in to rent the car. There is a euro4 standard preparation charge and a euro5 charge if the customer uses a standard credit card to pay for the rental. Then the customer may have to wait once arriving at the easyCar location to collect their car if there is a queue of other customers, which as the case indicates can occur, particularly during peak times, because of the minimum staffing levels maintained at each location. Once the customer picks up the car, he or she will then have to put gas in the car before it is ready to go. When the customer returns the car, he or she needs to wash the car or pay the euro16 cleaning fee, and must again potentially wait to return the car. This all amounts to a significant investment in time or money to rent for a couple of hours. The second limitation is that easyCar's prices typically increase as the time of the rental period draws near, particularly during peak periods. While a few customers may know well in advance that they need a vehicle for only a couple of hours on a given day, it would seem that this market segment is likely to buy more at the last minute. This makes the price somewhat less competitive. Obviously easyCar can factor this into their pricing model, so that if a customer does want a car for a short term period on short notice and the vehicle is available and would likely go unrented, then the system can quote the customer a reasonable price. However, this raises a third limitation, which is that frequently easyCar will not have a vehicle on such short notice, as they currently achieve 90% utilization of their fleet. If a customer frequently finds no vehicles available, at some point he or she will stop bothering to check and simply use the alternatives.

The point to make is that most of easyCar's processes are tailored much more to the customer who knows his or her travel plans well in advance and has the extra time to go to a secondary location and perform some of the traditional service themselves. This does not seem compatible with the renter who might want to use the easyCar for an hour or two on short notice instead of taking one or a couple of taxi rides. For easyCar to successfully compete for such customers may require changes to its service process. Such changes might include, for example, a relaxation of cleaning policies (e.g., the exterior is free from mud, grime, etc. rather than evidence that the car has been washed) and some type of automated drop off system to reduce the time factor for customers.

Having many locations in the same city also clearly makes easyCar a more viable competitor to taxis, buses and car ownership. This has significant implications to easyCar's expansion strategy. If it truly wants to compete against taxis, buses and car ownership, it will focus its expansion on opening multiple locations in the major European cities. If it sees itself more as competing for tourist customer, it will open more locations in tourist destination locations, either near airports or train and bus stations.

5. What are the operational implications of the changes made by EasyCar.com in the last year?

A total of five recent changes are identified in the text that easyCar has made in the last year. Discussing some or all of these is designed to reinforce some of the proceeding lessons as well as further highlight some of the trade-offs that the company must deal with in its efforts to compete based on cost. The discussion can also be used to emphasize that all companies, regardless of what their competitive priorities are, must still seek continuous improvement in their methods.

Rental by the Hour - This would have been discussed in detail in the preceding question. Introduction of vehicles other than the Mercedes A-Class - Perhaps the most interesting change that easyCar made, other than allowing rentals of only an hour, was to move away from its one car model and offer a number of different, although generally similar, vehicles at its different locations. The case indicates that the change was made to keep pressure on suppliers (i.e., the automobile manufacturers) to keep costs down and to in turn be able to lower the price of a rental to customers. What is perhaps surprising in the change is that easyCar went from having one vehicle type to having five vehicle types. Part of the operational benefits of a single fleet is site specific. Any car can go to any customer and significant economies of scale would exist in the maintenance of the fleet. However, having different vehicles at different locations reduces easyCar's flexibility to shift vehicles between locations easily if demand is greater at one location than at another. This is particularly an issue in shifting vehicles between Mercedes and non-Mercedes locations. Customers who have paid a few euros extra a day to rent from a location that offered the Mercedes vehicles would likely be disappointed if they showed up to pick up there vehicle and were given a Renualt Clio or Ford Focus. So operationally, what easyCar has done with this change is to lower its cost some, but at the expense of some operational flexibility. The long term question related to this is whether customers will develop preferences for specific vehicles and how easyCar will deal with this on the market side of things. This situation can also be used to introduce extending operations strategy issues to the supply function. Clearly the move by easyCar pushes their vehicle suppliers to offer competitive prices, although it moves easyCar away from a supplier partnership models intended particularly to improve quality and flexibility along the supply chain.

Clean Car Policy - This changes is clearly very consistent with easyCar's low cost strategy. Basically it represents a transfer of a task traditionally done by the company to the customer. Operationally, it has several implications. It reduces the need for staff at the rental site, helping easyCar reduce one of its costs. More significantly, perhaps, it also speeds the turnaround of a vehicle. That is, this policy, combined the empty fuel policy, means that most vehicles are returned in a condition that allows them to be immediately rented to the next customer. This helps easyCar maintain a very high fleet utilization. But what is also interesting operationally is that it makes the employees' task somewhat less predictable. Whereas with the old policy employees knew they would have to clean each vehicle, and they knew how many vehicles were coming back each hour, with the new policy there is an additional element of uncertainty in the process because an occasional car will need to be cleaned. This may mean that one or more customers may have to wait at the easyCar site while the employee cleans such a vehicle. This is particularly an issue at sites which are staffed by a single employee. It is worth mentioning that the change in policy on the operational side has a real impact on the market side as well. The policy lowers the price to customers willing to take the time to wash the car by euro7 (i.e., through reduction of the vehicle preparation charge from euro11 to euro4) while increasing the price of the vehicle to customers not willing to wash the vehicle by euro9 (i.e., such customers now pay a euro4 preparation fee + a euro16 cleaning fee instead of the previous euro11 preparation fee). EasyCar is likely to pick up some new, price sensitive customers by the euro7 reduction in price. However, for customers who don't want the inconvenience of cleaning the vehicle, the euro9 price increase may push some of them toward traditional rental car companies.

Empty-to-Empty Policy - This change, like the previous one, is clearly consistent with easyCar's low cost strategy. Operationally, the empty-to-empty policy would seem to significantly reduce the chance that an easyCar employee would have to deal with the gas level. Previously, customers had to worry about taking the time to fill the tank. Customers running late might skip this step to save time, leaving the task for an easyCar employee. With the new policy, the gas can be at any level as long as the low fuel indicator light is not on. Since most drivers are unlikely to allow the gas level in their vehicles to drop this low anyway, the chance that an easyCar employee would have to deal with putting gas in the car is small. Combined with the previous change, this policy basically means the vast majority of customers bring their car back in a condition that allows it to be immediately re-rented.

Requiring Customers to Purchase Insurance - This policy change probably has greater implications on the marketing side than on the operations side. Operationally, however, it greatly reduces the likelihood of conflict between customer and easyCar employee when a customer returns a damaged car. Previously customers who did not purchase the optional insurance had some liability, and the employee on duty would have to sort this out with the customer. This can be a timely process, and present difficulties particularly for a location staffed by only one person. Such incidents would likely cause delays for other customers attempting to pick up or return cars at the same time.

6. How significant are the legal challenges that easyCar is facing?

Clearly the OFT ruling against easyCar is much more significant than is the posting of the pictures of renters with overdue vehicles. Discussing the OFT ruling against easyCar is designed primarily to reinforce the cost benefits gained from easyCar's demand management system and its high utilization rates it achieves. According to the quote by Stelios, allowing customers 7 days to change or cancel reservations without penalty would cause utilization to fall from 90% to 65% and prices to triple. While these estimates are in all likelihood an overly pessimistic assessment of the impact, the impact none the less would be significant given the central role yield management plays in easyCar's approach. Further, it is worth using Stelios' estimates to give students a better feel for the significance of the high utilization rate that easyCar achieves. At a 90% utilization rate, easyCar would have (0.9)(24,000) = 21 ,600 vehicles rented out at any given time by the end of 2004 if its growth goals are realized. To have the same number of vehicles on rent at the end of 2004 with a 65% utilization rate would require a total fleet of 33,200 (21,600/0.65) or a 38% larger fleet than currently planned. Further, current easyCar facilities rent as few as 15-20 spaces in a parking garage to operate a fleet of 150 cars. To service the same number of customers out of a location at a 65% utilization rate would require a fleet of 208 (0.9*150/0.65) vehicles and an absolute minimum of 72 (208*(l-0.65)) spaces to park un-rented vehicles. Students could be asked what would happen to easyCar's hoped for £10 million profit if it had to purchase an additional 9,000 vehicles and quadruple the size of all of its facilities. Going through this analysis and asking students to think about and calculate the impact on profits should drive home the cost savings achieved from the high utilization rate.

The other legal challenge easyCar faces deals with its posting of the pictures of customers with overdue vehicles. This is not as significant, both because its impact is not as great and because no legal action has yet been taken. The value of including this in the case, and possibly in the discussion, is two-fold. First, it indicates to students the significant cost of this problem to the rental car industry. Second, it illustrates that basically a "zero mistakes" process must exist for implementation of this policy to minimize the chance of any legal claim against the firm.

7. What is your assessment of the likelihood that easyCar will be able to realize its goals for 2004?

This question is really intended to bring closure to the discussions. The established goals, a quadrupling of sales from £27 million to £ 1 00 million via the opening of 1 30 new locations in the next two years while realizing a £ 1 0 million profit are certainly ambitious. It is worth noting that easyCar's operational model certainly makes opening new locations easier than for traditional rental car companies, given the minimum facilities required and the creation on the part of easyCar of vans with all the equipment needed to run a location. The bottlenecks for expansion more likely rest with hiring and training all of the employees to staff these locations, as well as providing sufficient marketing support to launch 130 new locations on a minimum marketing budget. The greater challenge operationally will be to continue to find ways to drive costs down while maintaining customer satisfaction so that it can realize profits at the same time.

USE IN A STRATEGIC MANAGEMENT CLASS

The case, as written, could also be used in a strategic management class to discuss or illustrate how functional strategies need to be aligned with corporate strategies, how a low cost strategy is implemented, and what constitutes a durable competitive advantage. The following questions are suggested as possible discussion questions for using the case in a strategic management class. Questions 1-4 and 7 are very similar to those described above, only broadened somewhat to better fit a strategic management (as opposed to an operations management) course. Questions 5 and 6 are unique and are intended to point students toward important strategic management concepts. In relation to a strategic management class, the idea of strategic groups could be included in the discussion of question #1 (with a strategic group map being built along dimensions of price and service/quality). Discussion of question #2 can be broadened to include issues relating to finance (e.g., customers paying in advance has a big impact on cash management) and marketing (e.g., advertising on the side of the car, posters in subway, bus & train stations). Question 5 is intended to highlight that process innovation can be as or more important than product innovation in creating competitive advantage. Question 6 allows for a discussion of how a company goes about achieving a durable competitive advantage and whether or not easyCar.com's strategy and actions are consistent with creating a durable advantage. The strategy easyCar.com is pursuing is likely to be at least somewhat durable because the rental car industry is not terribly dynamic, the major competitors are unlikely to try to imitate its strategy because of prior strategic commitments, and easyCar.com's advantage is built around process innovation is not always easy for a competitor to copy.

1 . What were the characteristics of the car rental industry that made it attractive to Stelios?

2. EasyCar obviously competes on the basis of low price. What does it do across the business to support this strategy?

3. How would you characterize the level of quality that easyCar provides? How would you characterize the level of customer responsiveness that easyCar provides?

4. Is easyCar a viable competitor to taxis, buses and trains as Stelios claims? How does the design of its operations currently support this form of competition? How not?

5. It has been argued that innovation is the single most important building block of competitive advantage. Does that appear to be the case for easyCar? Why or why not?

6. Your textbook authors discuss the durability of competitive advantage. Based on your textbook authors' perspectives, is easyCar's competitive advantage durable?

7. What is your assessment of the likelihood that easyCar will be able to realize its goals for 2004?

EPILOGUE

In March of 2003, easyCar had announced that it was going to make as many as 12,000 vehicles available from unmanned pick up points by the end of 2004 through the use of car clubs. EasyCar had started testing the technology at one of its locations in London in the spring of 2003. Customers would still reserve a car via the internet, then call on their mobile phone when they arrived at the vehicle. EasyCar operators would then unlock the car remotely using mobile technology connected to the vehicles locking system. Customers would then get the keys from the glove box and be on their way. EasyCar was going to allow only customers who proved trustworthy through the hire of cars from ordinary locations to use the club vehicles, and there would be no preparation fee associated with the club vehicles. (Mackintosh, J. "EasyCar plans unmanned rental pick-up," Financial Times, 03 March 2003, pg 4).

By June of 2003 easyCar had 53 locations open (up from 46 in January, 2003) and had reached a fleet size of 8000 vehicles. This was well off its desired pace of opening two new locations a week. In July of 2003, easyCar admitted that its expansion and profitability goals were not being achieved. It cut its workforce from 150 to 60 and reduced its operating hours to save costs. It also began closely some unprofitable locations. It had closed its operations in the Netherlands and was looking for franchisees to take over operations of facilities in France, Spain and Switzerland. Plans for an IPO were put off until 2005 or later. ("EasyCar put brakes on stock listing," 21 July 2003, BBC News). During the fall of 2003, easyCar received bad press because of complaints from customers about cars not being available as promised and not being able to find easyCar staffai certain locations ("How easyCar gives angry clients the runaround" The Guardian, 01 November 2003). By February, 2004, easyCar had operations in 39 locations, 30 of which were in the UK.

References

INSTRUCTORS' MANUAL REFERENCES

Garvin, D.A. (1984). What does Product Quality Really Mean?, Sloan Management Review, 26(1), 25-43.

Hill, T. (1999). Manufacturing Strategy: Text & Cases, (3rd Ed.) New York: McGraw-Hill/Irwin.

Levitt, T. (1972). Production Line Approach to Service. Harvard Business Review, September/October, 41-52.

Parasuraman, A., Zeithaml, V.A. & Berry, L. (1985). A Conceptual Model of Service Quality and its Implications for Future Research. Journal of Marketing, 49(3), 41-50.

AuthorAffiliation

John J. Lawrence, University of Idaho & Instituto de Empresa

Luis Solis, Instituto de Empresa

Subject: Automobile rentals; Business growth; Case studies; Strategic management; Initial public offerings

Location: United Kingdom--UK

Company / organization: Name: easyCar Ltd; NAICS: 532111

Classification: 2310: Planning; 9130: Experimental/theoretical; 3400: Investment analysis & personal finance; 9175: Western Europe; 8300: Other services

Publication title: Journal of the International Academy for Case Studies

Volume: 11

Issue: 4

Pages: 1-15

Number of pages: 15

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 10784950

Source type: Reports

Language of publication: English

Document type: Business Case, Feature

Document feature: Tables References

ProQuest document ID: 216291802

Document URL: http://search.proquest.com/docview/216291802?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-13

Database: ABI/INFORM Complete

Document 93 of 100

BEAUTY AND HONESTY AT AEROSPACE DESIGNS' MARKETING DEPARTMENT

Author: Morena, Anthony; Armandi, Barry; Sherman, Herbert

ProQuest document link

Abstract:

Derived from observation and field interviews, the case center's around Lola's seemingly misrepresentation of her working hours and days according to her time card. Lola was claiming overtime pay while her boss was out-of-town, stating that this work had been done for another Director. Further investigation by another Director (her boss was out-of-town) revealed that on several other occasions Lola had taken time off yet claimed those hours worked on her time card. When confronted with the discrepancies, Lola claimed that she had forgotten to put in those days as sick days. However, she also admitted as to not following the accepted procedure of calling in to the office when one is out sick. Ultimately, these facts were considered and the company decided to terminate Lola's employment due to falsification of her timecard on the two weeks in question. A month later, Lola sued the Company and her original supervisor for sexual harassment. [PUBLICATION ABSTRACT]

Full text:

Headnote

CASE DESCRIPTION

This case concerns a female employee, Lola Meyer, and the problems that occurred when Lola received a less than satisfactory assessment on her annual performance evaluation, one that was delivered over four months after it was due and not by her immediate boss. Lola's reaction to her negative performance evaluation was to claim sexual harassment against her boss and her coworkers (sexually-charged language and references to anatomical parts.) The case examines not only the issue of sexual harassment but also deals with the issues of time theft, fraud, and falsification of documents. The case has a difficulty level appropriate for sophomore level or above. The case is designed to be taught in one class period (may vary from fifty to eighty minutes depending upon instructional approach employed, see instructor's note) and is expected to require between two to fours hours of outside preparation by students (again, depending upon instructor's choice of class preparation method).

CASE SYNOPSIS

Derived from observation and field interviews, the case center's around Lola's seemingly misrepresentation of her working hours and days according to her time card. Lola was claiming overtime pay while her boss was out-of-town, stating that this work had been done for another Director. Further investigation by another Director (her boss was out-of-town) revealed that on several other occasions Lola had taken time off yet claimed those hours worked on her time card. When confronted with the discrepancies, Lola claimed that she had forgotten to put in those days as sick days. However, she also admitted as to not following the accepted procedure of calling in to the office when one is out sick. Ultimately, these facts were considered and the company decided to terminate Lola's employment due to falsification of her timecard on the two weeks in question. A month later, Lola sued the Company and her original supervisor for sexual harassment.

INSTRUCTORS' NOTES

Sexual harassment is a serious accusation, so is time theft. Yet when does one have proof of either accusation? This case concerns a female employee, Lola Meyer, and the problems that occurred when Lola received a less than satisfactory assessment on her annual performance evaluation, one that was delivered over four months after it was due and not by her immediate boss. Lola's reaction to her negative performance evaluation was to claim sexual harassment against her boss and her coworkers (sexually-charged language and references to anatomical parts) which resulted in a prompt investigation, a transfer of Lola to another supervisor, and sexual harassment training for her former boss.

This solution was acceptable to Lola.

The case problem center's around Lola's seemingly misrepresentation of her working hours and days according to her time card. Lola was claiming overtime pay while her boss was out-oftown, stating that this work had been done for another Director. Further investigation by another Director (her boss was out-of-town) revealed that on several occasions Lola had taken time off yet claimed those hours worked on her time card. When confronted with the discrepancies, Lola claimed that she had forgotten to put in those days as sick days. However, she also admitted as to not following the accepted procedure of calling in to the office when one is out sick. Ultimately, these facts were considered and the company decided to terminate Lola's employment due to falsification of her timecard on the two weeks in question. A month later, Lola was suing the Company and her original supervisor for sexual harassment.

INTENDED INSTRUCTIONAL AUDIENCE & PLACEMENT IN COURSE INSTRUCTION

This case was primarily developed for undergraduates taking a course in human resource management (HRM), although the case does include issues of business ethics (i.e. Is Lola's lawsuit blackmail and/or payment for her dismissal? What is the appropriate punishment for time theft?). The case specifically deals with sexual harassment and time theft and should be introduced after the students have read material on the legal environment of HRM (Kleiman, 2000, Chapter 2; Bowin and Harvey, 2001, Chapter 2) and complying with workplace justice laws (Kleiman, 2000, Chapter 11). The case was intended as an end of chapter case or end of section case (legal aspects of HRM), rather than serving as a comprehensive, end of course, case.

Learning Objectives

The overall purpose of this case is to have students examine two critical issues in HRM and how they are intertwined in this case. This case in particular has practical value to students since many of them may find that they as general employees, supervisors, or HRM specialists will have to deal with similar situations. Students are asked to probe beyond personalities and the immediacy of the moment and examine the underlying nuances of the posed problem.

Specific learning objectives are as follows:

1. For students to understand legal aspects of sexual harassment and time theft.

2. For students to analyze the behavior of management and the HRM department in dealing with Lola's two distinct situations.

3. For students to agree or disagree with management' s decision to terminate Lola and explain why.

4. For students to determine what actions management and HRM could take in the future to avoid similar situations.

TEACHING STRATEGIES

Preparing the Student Prior to Case Analysis

There are several approaches, none of which are mutually exclusive, that an instructor may employ in terms of utilizing this case. It is strongly recommended that regardless of the specific methodology employed, that students prior to reading this case be exposed to some material on sexual harassment (Player, 1992) and time theft (Cheeseman, 2001). This will provide students with the proper perspective and allow them to acknowledge some of the legal issues embedded in the case.

This conceptual framework may be delivered prior to assigning the case by using at least one (1) of the follow methods:

a. a short lecture and/or discussion session on the above noted topics.

b. a reading assignment prior to reading the case that covers several of the topics mentioned.

c. a short student presentation on each topic.

d. a guest lecturer on one of the topics.

Traditional Case Method

In the traditional case method, the student assumes the role of a manager or consultant and therein takes a generalist approach to analyzing and solving the problems of an organization. This approach requires students to utilize all of their prior learning in other subject areas as well as the field of management. This case, in particular, will also require students to draw upon their knowledge of leadership, structure, culture and systems thinking. It is strongly suggested that students prepare for the case prior to class discussion, using the following recommendations: allow adequate time in preparing the case, read the case at least twice, focus on the key strategic issues, adopt the appropriate time frame, and/or draw on all your knowledge of business (Pearce and Robinson, 2000).

The instructor's role in case analysis is one of a facilitator. The instructor helps to keep the class focused on the key issues; creates a classroom environment that encourages classroom discussion and creativity, bridges "theory to practice" by referring back to key concepts learned in this or prior courses, and challenges students' analyses in order to stimulate further learning and discussion. There are several variations of the aforementioned approach including written assignments, oral presentations, team assignments, structured case competitions, and supplemental field work. Regardless of the variation employed, it is recommended that the students' work be evaluated and graded as partial fulfillment of the course's requirements.

Role-Playing

Role-playing "enacts" a case and allows the students to explore the human, social, and political dynamics of a case situation. There are several opportunities for role-playing in this case, the most interesting being the final meeting between Lola and Tom to discuss Lola's time discrepancies.

Prior to role-playing the case, students should be asked to read the case but and answer the following questions:

1. Who are the key participants in the case? Why?

2. What is the "role" of each of these participants in the organization?

3. What is the motivation, rationale, or benefit these participants derive from the situation?

4. What is the employee's rights and responsibilities?

5. What are management's rights and responsibilities?

The instructor may either go through these questions prior to case enactment or wait for the role-playing exercise to be completed in order to use this material to "debrief" the class.

Starting the Role-Playing Exercise

The role play should start at the beginning of the meeting, that is, Tom's presentation of the issue of the overtime that Lola had claimed and the summary of the ensuing investigation and his findings.

Lola hadn't been aware of the investigation going on that day and was unaware as to why Tom wanted to see her. In the discussion Lola claimed to have "forgotten" to put in for two days of sick time and offered to have the time changed. As that comment was to be expected, she had inadvertently indicated in the initial part of the discussion the procedure for communicating to her supervisor during his time away from the office. According to procedure, she was to either leave him a voicemail or an e-mail if she wasn't going to be in. She had not done so for the two days in question. For the prior week she had actually requested a personal day for that Thursday, and had taken it. When confronted with that timecard (which she would have completed the next day - Friday) her baffled response was simply that "she must have worked that day." In both cases she was aware that Mark was not in the office due to his travel schedule and that she had indeed signed both timecards (as was her habit when he was away).

Step 1: Assignment of Roles (5 minutes)

The class should be broken up into groups of 3-4 students. Assign the key roles of Tom and Lola to two members of each group. Class members not chosen for specific roles become outside observers. It might be helpful to provide the students playing Tom and Lola with specific instructions in terms of how to enact their roles. Varied instructions (a different set of instructions per group) may lead to differing results and add some value to the end-of-class discussion. For instance, one student playing Lola could be instructed to act indifferent throughout the whole meeting and agree to anything just to get out of the meeting. Another could act indignant, and threaten legal action. A student playing Tom could act in an accusatory fashion while another could act sympathetic. These variations should be noted for later class discussion.

Step 2: Enactment (20 minutes)

The student enacting the role of Tom should be instructed to start the role play with a summary of the situation (including problem definitions) and include comments concerning Lola's inaccurate time card. Both students, should then be instructed to contribute to the discussion with the notion of coming to some sort of resolution based upon their specific character instructions (i.e. a sympathetic Tom might look for an easy solution that would not hurt Lola while an accusatory Tom would fire Lola no matter what she said). The instructor during this phase of the exercise should note how well the students enacting Tom's role covers the major issues surrounding the case.

Step 3: Exercise Debriefing (20 minutes)

The meeting should first be debriefed as a whole in each group. Once the in-group debriefing is completed, the group should then address the class as a whole and then the discussion should be opened to the entire class. The instructor might want to ask the following questions or provide these questions to each group for guidance:

a. What were the goals and results of each meeting?

b. Did Tom accomplish his objectives?

c. What alternative results might have occurred from this meeting? Best and worst scenarios?

d. What theory(ies) from the course helped the students to understand the case situation and recommend solutions to the defined problems?

Students should also be given the opportunity to comment on the role-playing exercise as a learning instrument. The instructor might ask the class the following questions:

1 . Did this exercise animate the case?

2. Did students get a "feel" for individual and organizational issues surrounding the case?

3. What were the strengths and weaknesses of the exercise?

4. What changes would they make to the exercise given their experiences with it?

Using Case Questions

Whether or not the instructor assigns questions for students to analyze with the case is usually a matter of educational philosophy and student readiness. Naumes andNaumes (1999), for example, thought that if the questions were handed out with the case "students will tend to focus only on the issues specifically raised by the questions . . ." (p.86). Lynn (1999), on the other hand, noted that the use of assignment questions provided students with more concrete guidance in case preparation and analysis; specifically directing them to consider the decision to be reached.

In deciding whether or not to assign questions, the instructor should first answer the following questions:

1. What is the level of course instruction?

2. What type of case is being taught? (Iceberg, incident, illustrative, head, dialogue, application, data, issue, or prediction - see Lundberg et. al., 2001 for full descriptions.)

3. What is the instructor's preliminary assessment of the students' ability to be self-directed learners?

4. What are the students' previous experiences with case instruction?

5. If the students have already been exposed to the case method, what types of cases have they been exposed to, such as: Case incidents (1-2 page cases with questions); Short cases (3-8 page cases with and/or without case questions; Comprehensive cases (greater than 8-15 pages); or Harvard-style cases (greater than 15 pages)? (David, 2003)

6. What is the instructor's preferred method for case instruction? (For example, "sage on the stage", "guide on the side", "student as teacher" (student-lead discussions), "observer and final commentator" (open class discussion with faculty summation), etc....

SUGGESTED QUESTIONS AND ANSWERS

The following questions may be employed by the instructor either as guidelines for the instructor for case analysis and/or as questions to be distributed to the class in conjunction with the case. This methodology provides the instructor some latitude in terms of how much direction he or she wishes to provide the student and therein allows the instructor to modify the difficulty of the case to fit his or her class's needs. The questions are divided by topics.

1 . Describe the legal aspects of sexual harassment, time theft, and fraud that impact upon this case.

Sexual Harassment. Sexual harassment is defined in Title VII of the Civil Rights Act of 1 964 as "lewd remarks, touching, intimidation, posting pinups, and other verbal or physical conduct of a sexual nature that occur on the job." (Cheeseman, 2001, p. 843) These actions must create a hostile environment for the employee, one where "there were repetitive or debilitating incidents that would affect seriously the psychological welfare of a person of reasonable sensibilities." (Player, 1992, p. 207) A hostile environment is defined as any conduct including "unwelcome sexual advances, requests for sexual favors, and other verbal or physical conduct of a sexual nature" (29 CFR Section 1604.11(a)(3)) and must negatively impact his or her work performance or psychological well-being "as measured from the perspective of a reasonable person of the victim's gender." (Player, 1992, p. 210)

It is interesting to note that everyday conversations that may include obscenities, or a single incident or suggestion of sexual involvement in and of itself does not constitute sexual harassment. The plaintiff must indicate that the environment or the activity is unwelcome, although participation in an activity does not necessarily indicate approval. In an environment where sexual innuendos are the norm and the plaintiff fully engages in such behavior, the defendant would have the right to determine why the plaintiff did not object to such an environment before claiming sexual harassment. Another component of sexual harassment is that liability is based upon actions of the employer (i.e. owners, managers, supervisors - those with managerial authority over the employee), not necessarily the plaintiffs fellow employees. Management is not liable for the actions of low level employees it is not aware of, if the employer has a clear policy on sexual harassment, which includes a process of informing management of the harassment. (Player, 1992)

Time Theft and Fraud. Employee theft, one of the most serious problems faced by US businesses, takes many forms. The theft of tangible property is the most obvious and most controllable form. The theft of intangible assets, such as time, however, is more difficult to detect and reduce. Robert Half of Robert Half International defined time theft as deliberate waste of on-the-job time by employees who use company time for matters totally unrelated to the organization. (Scelsi, 1988) Unlike outright thievery of a company's supplies, a worker who steals time is less likely to feel guilty about it. (Schaeffer, 1988)

A 1990 study found that the typical employee steals 6 workweeks worth of time each year (Snyder, Blair, and Arndt, 1990) while 67% of surveyed professionals say that time theft - early departure, long lunches, excessive chatting with co-workers - is the leading way in which employees cheat the company. (USA Today, 1989) In an executive survey, 82 percent felt government employees steal more time than private sector workers, and 84 percent said workers under 30 steal more time than older workers. The most likely time for the thievery is during the first work hour on a Friday in December. (Thomas, 1986) Estimates are that, in 1987, firms lost up to $300 billion to employee crimes, and in 1988, they are likely to lose $200 billion to time theft. (Scelsi, 1988)

Fraud, also known as intentional misrepresentation, "occurs when one person consciously decides to induce another person to rely and act on a misrepresentation." (Cheeseman, 2001, p. 250) There are several types of fraud including fraud at the inception (where facts are hidden or there is deception relative to a contract), fraud at the inducement (where one party intends to break the terms of the contract), fraud by concealment (one party takes specific action to conceal facts from the other party), fraud by nondisclosure (is misrepresentation if it amounts to a failure to act in good faith), and fraud by misrepresentation of the law (only occurs when one of the parties is a professional or expert who should know the law and is intentionally misrepresenting it to the other party). (Cheeseman, 2001)

2. What are the facts in the case that apply to these legal considerations?

Sexual Harassment. In terms of case specifics, Lola claimed that her poor job performance, as stated in her evaluation, was due to sexual harassment. She mentioned several conversations which included inappropriate language from her boss Frank and a specific incident where she was asked by a group of co-workers to comment on a male's genitalia. Although she did not report these incidents until after her employee evaluation (she did not object at the times of these acts), her personnel office treated the incidents as sexual harassment and reached an agreement with Lola in terms of a remedy. The personnel office, however, also supported her boss' s poor performance evaluation while her boss insisted that no wrong doing had occurred. The remedy, which was acceptable to Lola, was a lateral job move where she reported to another manager in the same Division and where her work location was moved away from her old manager.

Time Theft and Fraud. In the above case, Lola had claimed she worked overtime when her manager was out-of-town and no other manager would sign her time card. This set off a chain of events in that included the personnel department changing her time card to indicate that two days that she had claimed she had worked were in fact sick days (Lola was consulted on this), and an investigation by Tom, the HRM Director, which revealed that Lola did indeed take one day off the prior week as well. In addition, in each week her supervisor had been out of the office, and hadn't had the opportunity to even review and approve Lola's timecards, both of her cards were initialed in the supervisor's box by Lola herself and not by her supervisor.

Tom met with Lola who claimed to have forgotten to put in for two days of sick time and offered to have the time changed. As that comment was to be expected, she had inadvertently indicated in the initial part of the discussion the procedure for communicating to her supervisor during his time away from the office. According to procedure, she was to either leave him a voicemail or an e-mail if she wasn't going to be in. She had not done so for the two days in question. For the prior week she had actually requested a personal day for that Thursday, and had taken it. When confronted with that timecard (which she would have completed the next day - Friday) her baffled response was simply that "she must have worked that day." In both cases she was aware that Mark was not in the office due to his travel schedule and that she had indeed signed both timecards. Given the facts of the case the company decided to terminate her employment due to falsification of her timecard on the two weeks in question.

3. Analyze the behavior of management and the HRM department in dealing with Lola's two distinct situations (sexual harassment and time theft).

The average student will see this situation as much ado about nothing, that is, that both of these situations are quite straight forward from management's perspective. In the sexual harassment situation, the student will describe the incident as a clear case of sexual harassment and that personnel acted appropriately in both deciding that harassment did occur (inappropriate language was employed by a manager and coworkers and had negative ramifications since Lola's performance was substandard) and that the actions taken by personnel to resolve the issue was satisfactory since it was accepted by Lola. The time theft situation was also clear cut since Lola did not follow procedure in notifying the firm that she would be out for sick days and that she then clocked those days as work days on her time card. These students would agree that Lola was in the wrong although they may or may not believe that firing Lola was overly harsh given that this was her first offense. They may perceive Lola's law suit as sour grapes and not worry about any associated ramifications.

The above average student will recognize that both situations are not as clear cut as they seem. In the sexual harassment situation, Frank (Lola's supervisor) admitting no wrong doing and Sue, the HRM manager at the time, determined that Lola's performance was marginal and upheld the performance review as written. Since Sue determined that there was no impact on job performance (one of the requirements for a sexual harassment charge), this student might justify Frank's being "written up" for this situation and sent to sexual harassment awareness training as a way for the company to protect itself from potential lawsuits.

Exceptional students would note that these actions by personnel in fact lend credence to Lola's contention that there was a hostile environment that impacted her job performance since management took action to remedy the situation. Why "fix what isn't broken?" Secondly, these students would note that Lola was hired by HRM over Frank's objections - this already set the stage for possible problems between these two individuals even before they were working together. Also, these students might also note that Frank's actions surrounding Lola's evaluation (late filing), coupled with his illness and inability to provide Lola direct feedback himself (her evaluation was given to her by another manager) may have exacerbated the situation. Certainly HRM should have noticed that Lola's performance evaluation was late. This should have been a signal to HRM to at least investigate why Frank was negligent in filing the form and may have uncovered some of the problems Lola had with Frank.

In terms of the time theft, the above average student would note that except for the breaking of the calling in policy for sick days and the claiming that those sick days were work days, much of the evidence against Lola was second-hand information and not well documented although Tom's investigation did reveal Lola did indeed take one day off the prior week and placed hours on her timecard as if she had worked that day. The fact that she signed her own time cards when her boss was away, in and of itself is not evidence of wrong doing and may in fact have been her boss's instructions. The exceptional student would note that it was to the best recollection of the General Manager and Sue of the Human Resources Department there had been no case in which Aerospace Designs had allowed this type of transgression but they made no reference to a company handbook or procedures manual that dealt with issues of time theft (or for that matter, sexual harassment). These students would also point out that Lola's immediate supervisor, Marc, had not been consulted in terms of this situation and may have been able to either support or reject the company's claim of time theft.

4. Agree or disagree with management's decision to terminate Lola and explain why.

Since this is an opinion question, there is no absolutely right or wrong answer. Although partially addressed in question four, in this question the student needs to provide both situational evidence and law to justify terminating Lola's position with the firm. Some students my see this situation as straight forward time theft and fraud, others might try to connect the previous sexual harassment situation, while others may opt for leniency for a first offense given the lack of a policy manual that deals with this issue or in order to avoid a potential lawsuit.

Secondly, students also need to address the impact of firing Lola on the firm as a whole - what message does firing Lola send to her fellow employees? Does it say that time theft and fraud will not be tolerated in any fashion or does it say that women, especially those who whistle blow concerning sexual harassment, will be given little opportunity to learn from their mistakes? Or does not firing Lola say that women who do whistle blow will be treated more leniently than others in fear of reprisal?

5. What actions should management and HRM take in the future to avoid similar situations?

Management, through the HRM department, needs to address several distinct issues:

a. The development and dissemination of a clear and distinct policy statement re: sexual harassment and a training program to ensure that supervisors and employees are quite clear on the consequences associated with sexual harassment. The company also needs to develop and publish clear and concise guidelines for the filing and handling of sexual harassment charges.

b. The development and dissemination of a clear and distinct policy statement re: time theft and fraud. There should be clear and concise definitions of each with associated consequences.

C. Student answers should address the need for HRM to take a proactive stance on each of these issues and provide their personnel with information and training when needed.

EPILOGUE

Lola left in a huff. Her parting jab was "you haven't heard the last from me," and "you better not mess up my unemployment." Her request for unemployment benefits was denied. Fred's other management issues resulted in his being released in July 2000. Lola found a Manhattan based lawyer willing to take her case on a contingency basis. The lawyer's threat to submit the case to the EEOC (unless AD could come up with a settlement) was initiated and the Company responded. The EEOC failed to see the merit of her claim of sexual harassment and retaliatory discharge. Lola followed with a civil suit that was settled about a year later quite modestly. Frank was individually named in the civil suit that was filed and it was determined he needed to retain separate counsel.

It was not completely clear as to why Lola falsified the time records. It was assumed that she was doing it for personal reasons. The fact that she was into modeling spurred guesses that she was going to the hairdresser, makeup artist, photographer, and other image consultants to help her "other career".

The AD supervisory staff since was trained in harassment awareness and the company handbook was rewritten to more clearly articulate the company policies and expectations. The marketing assistant job vacated by Lola was never filled. The latest was Lola's modeling career was expanding into maternity clothing.

References

REFERENCES

Bowin, R. B. & D. Harvey (2001). Human Resource Management: An Experiential Approach. 2nd Edition. Upper Saddle River, NJ: Prentice-Hall, Inc.

Cheeseman, H. R. (2001). Business Law: Ethical, International, & E-Commerce Environment. 4th Edition. Upper Saddle River, NJ: Prentice-Hall, Inc.

David, F. R. (2003). Strategic Management Case Writing: Suggestions After 20 Years of Experience. S.A.M. Advanced Management Journal, (Summer) 68, 3, 36-38.

Kleiman, L. S. (2000) Human Resource Management: A Managerial Tool for Competitive Advantage. 2nd Edition. Cincinnati, OH.: South-Western College Publishing.

Lundberg, C. C, P. Rainsford, J. P. Shay & CA. Young (2001). Case Writing Reconsidered. Journal of Management Education, (August) 25, 4, 450-463.

Lynn, L. E. Jr. (1999). Teaching & Learning with Cases: A Guidebook. New York: Seven Bridges Press.

Naumes, W. & M. J. Naumes (1999). The Art & Craft of Case Writing. Thousand Oaks, Ca.: Sage Publications.

Pearce II, J. A. & R. B. Robinson Jr. (2000). Strategic Management: Formulation, Implementation, and Control. 7th Edition. Boston, Mass.: Irwin McGraw-Hill.

Player, M. A. (1992). Federal Law of Employment Discrimination. St. Paul, Minn.: West Publishing Company.

Schaefer, T. (1988). Time wasting' by employees estimated to cost billions, Houston Chronicle, Sept. 18, 2.

Scelsi, P. (1988). Time Is Money-Lots OfIt. Management World, (Nov/Dec) 17, 6, 19-20.

Snyder, N. H, K. E. Blair & T. Arndt. (1990), Breaking the Bad Habits Behind Time Theft. Business, (Oct-Dec) 40, 4, 31-34.

Thomas, L. R. (1986). Time theft/Survey finds workers 'steal' working hours. Houston, Dec 14, 2.

USA Today (1989). On-the-job cheating. USA Today, Oct 13, 01B.

AuthorAffiliation

Anthony Morena, Long Island University

Barry Armandi, SUNY-OId Westbury

Herbert Sherman, Southampton College-Long Island University

Subject: Sexual harassment; Litigation; False information; Working hours; Case studies

Location: United States--US

Classification: 4330: Litigation; 9190: United States; 6100: Human resource planning; 9130: Experimental/theoretical

Publication title: Journal of the International Academy for Case Studies

Volume: 11

Issue: 4

Pages: 17-29

Number of pages: 13

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 10784950

Source type: Reports

Language of publication: English

Document type: Business Case, Feature

Document feature: References

ProQuest document ID: 216303919

Document URL: http://search.proquest.com/docview/216303919?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-13

Database: ABI/INFORM Complete

Document 94 of 100

THE SHORT BUT HAPPY LIFE OF DYERSBURG FABRICS

Author: McCullough, Mike; Lane, Wilburn

ProQuest document link

Abstract:

The history of the American Corporation begins with the textile industry in New England in 1790. Slater imported the British textile technology, processes and expertise to Massachusetts and a hundred years later, it had spread all over the northeastern U.S. Due to clashes between management and labor, the industry began moving south in search of rural communities in need of relatively good paying work, where patriarchal mill towns could be set up, including tenement housing owned by the company, and where entire families could be counted on to work hard and remain loyal to the company. On March 25, 1929, just a few months before the stock market crash, Dyersburg, Tennessee became the site of a cotton, spinning, carding and weaving operation transplanted from operations in Oswego, NY and Adrian, MI. The company would barely survive the early years due to the global depression. The story told in this case is one of resilience and the tireless pursuit by management of healthy employee and community relations. The war years proved beneficial to the company, but the post war years saw the struggle become one of competition with foreign imports. Only through continuous modernization did the company continue throughout the century. Dyersburg competed more effectively than unionized textile mills, by paying decent wages and keeping employees involved in the social life provided by various company programs. This case would serve well as a companion to the early chapters in a Human Resource Management text, giving a little of the flavor of how HR was practiced during the early part of the 1900s, or as a case to support a chapter on organizational culture in an Organizational Behavior class, dealing as it does with how organizational culture became an important phenomenon for management to understand and seek to influence, even prior to the time when organizational culture was a popular term. [PUBLICATION ABSTRACT]

Full text:

Headnote

CASE DESCRIPTION

In this case the authors tell the story of the early years of Dyersburg Cotton Products, later Dyersburg Fabrics, in a way that highlights the difficulties the company had of surviving in an industry beset with so many labor and import problems. Woven around the account of Dyersburg Fabrics, is a brief account of the history of the U.S. textile industry from its inception in 1790 to its current status of near extinction. This case would be most suitable for upper division undergraduate courses or graduate courses in Human Resource Management or Organizational Theory or Behavior. The case is designed to be taught in one fifty to seventy-five minute class period, with about thirty to forty-five minutes of reading and preparation time on the students part, prior to class.

CASE SYNOPSIS

The history of the American Corporation begins with the textile industry in New England in 1790. Slater imported the British textile technology, processes and expertise to Massachusetts and a hundred years later, it had spread all over the northeastern U.S. Due to clashes between management and labor, the industry began moving south in search of rural communities in need of relatively good paying work, where patriarchal mill towns could be set up, including tenement housing owned by the company, and where entire families could be counted on to work hard and remain loyal to the company. On March 25, 1929, just a few months before the stock market crash, Dyersburg, Tennessee became the site of a cotton, spinning, carding and weaving operation transplanted from operations in Oswego, NY and Adrian, MI.

The company would barely survive the early years due to the global depression. The story told in this case is one of resilience and the tireless pursuit by management of healthy employee and community relations. The war years proved beneficial to the company, but the post war years saw the struggle become one of competition with foreign imports. Only through continuous modernization did the company continue throughout the century. Dyersburg competed more effectively than unionized textile mills, by paying decent wages and keeping employees involved in the social life provided by various company programs.

This case would serve well as a companion to the early chapters in a Human Resource Management text, giving a little of the flavor of how HR was practiced during the early part of the 1900s, or as a case to support a chapter on organizational culture in an Organizational Behavior class, dealing as it does with how organizational culture became an important phenomenon for management to understand and seek to influence, even prior to the time when organizational culture was a popular term.

INTRODUCTION

If the life expectancy of a human being is based on how long the average person is tending to live when that individual is born, Dyersburg Fabrics no doubt outlived its life expectancy defined in individual terms. The life expectancy of a cotton mill born in 1 929, in West Tennessee, although not officially established, must surely have been considerably lower than 70 years. The company that began in August, 1929, as Dyersburg Cotton Products, and later became known as Dyersburg Fabrics, lived to be almost exactly 70 years of age. Using the New International Version of the Bible, Psalm Chapter 90 and verse 10 says, "The length of our days is seventy years- or eighty, if we have the strength; yet their span is but trouble and sorrow, for they quickly pass, and we fly away." Dyersburg Fabrics (the name we will tend to use here) achieved the Biblical promise of 70 years and also experienced the promised "trouble and sorrow", and in the end, it did "fly away". However, as is often the case with individuals, many of the nearly 26,000 days the company was alive, could be considered happy and hopeful.

Dyersburg Fabrics very nearly died as a child, which is not surprising since it was born in the economic equivalent of a disease epidemic. This economic disease was "The Great Depression". To better understand economic conditions that prevailed at the time of the birth of Dyersburg Cotton Products, let's recall the events of the Great Depression (based on information found on February 28, 2004 at http://chantal_pitcher.tripod.comJ.)

THE GREAT DEPRESSION

In the 1 920s, with the war to end all wars, World War I, behind them, Americans looked with high hopes toward happy and economically improving lives. Until the closing months of the decade, the U.S. experienced growth in industry, technology, wages, consumer spending, and availability of cash. These factors supported economic growth and confidence in the economy. Many US citizens, from all classes, invested in stocks to make quick money. As more invested, stock prices rose and the rising values spurred even more people to buy, resulting in billions of dollars of investment in the US stock market. Many invested all their savings. Some mortgaged homes, cashed in savings or took out loans speculating that the market would continue to rise. The stock market peaked at the end of August and beginning of September, 1 929, when the Dow Jones reached a high of 381 after having been at 191 at the beginning of 1928.

October 3, 1929 and the days following, saw the Dow lose some, but confidence remained high. Most people thought this was a natural dip and that in a few days the prices would return to normal. However, on October 1 8 the stock market began to fall abruptly and during the night of October 21 and early hours of October 22 many banks, corporations, and overseas investors called Wall Street asking to sell their stock. Each day grew worse until Thursday, October 24 when everything fell apart.

October 24, 1 929, was a busy day, but it was not until the final two hours that things became overwhelming. The New York Times reported 2,600,000 shares sold in the last hour. Confidence was shattered and investors hurried to sell before they lost all value. On this Thursday, there were 12,894,650 shares traded and the Dow Jones ended the day at 299. The exchange clerks worked until five the next morning to complete Thursday's transactions.

On October 25, 1 929 the New York Times reported a paper loss of four billion dollars. The weekend came and the exchanges used this time to catch up on processing transactions. On Friday, major investment companies and banks bought large sums of stock, trying to reverse the effects of the week. However, by Monday when the exchanges opened, panic had gripped the United States and thousands of investors attempted to sell their shares. Most lost all they had put into the market. For many Americans this was everything they owned. They were stripped of all but the clothes on their back.

Tuesday, October 29, 1929 ("Black Tuesday") was even worse, 16,000,000 shares were traded, billions of more dollars were lost and the stock market collapsed as the gains of 1928 and 1 929 were stripped away. Stock prices dropped until November 1 3 , 1 929 when they reached an all-time low. By the time 1 929 ended, stock values had dropped by at least fifteen billion dollars.

By 1933, 1 1,000 banks (almost half of all U.S. banks) that had invested their deposits in the stock market were forced to close (bank fraud exposed by the market crash was a major reason for many of these closures). Many industries and business that had dumped profits into stock, also shut down. These closures, resulting from the market crash led to a dramatic decline in the U.S. economy. There was no confidence in the economy, the average American spent far less, and production and employment levels fell. This fueled a worldwide economic slump known as the Great Depression.

Prior to turning to the story of Dyersburg Cotton Products, let's take one more look at relevant history by tracing the highlights of the American Textile Industry.

A BRIEF HISTORY OF THE AMERICAN TEXTILE INDUSTRY

The story of the U.S. textile industry can be reduced to immigration, migration and emigration. (Note: a primary source for the history given here was written by Barbara M. Tucker and found at: http://college.hmco.coni/history/readerscomp/rcah/html/ah_085400_textileindus.htm; in February, 2004).

Immigration

The American Textile Industry was imported from England by Samuel Slater, a British Mechanic, in 1790, to Pawtucket, Rhode Island, the same year Rhode Island became a state, three years after the founding of the first three states, Delaware, New Jersey and Pennsylvania and six years before Tennessee was founded.

The American textile industry was thus a descendent of the British factory system. Samuel Slater's importation of cotton-spinning technology from England transformed New England from an agricultural to an industrial region and led to the modern corporation, owner-management separation and the development of big business. The system's emphasis on the individual rather than family or community was a major shift in American society and came to characterize the nation's industrial and social development. It also meant that the federal government would only encourage industry, not operate it. Operation would be left to private individuals.

Slater, while living in England, had worked for Jedediah Strutt, partner of Richard Arkwright, who was the progressive factory master and inventor of a water-powered spinning machine. Through Strutt, Slater was exposed to all aspects of textile production from building machines to managing workers. Slater moved to New York in 1789. He and Moses Brown, a wealthy New Yorker, went together with a man named Almy, and formed Almy, Brown and Slater. Slater built machines on the Arkwright model he had learned in England. The business grew and employed young children as machine operators. Soon, Almy, Brown and Slater built more mills in Massachusetts, Rhode Island and Connecticut. Thus, the textile industry began in New England.

The family was an important institution in New England, so Slater adapted his business model around it, employing fathers as supervisors, children as laborers, leaving mothers to take care of the home. Production was kept on a small scale, businesses were managed as partnerships or sole-proprietorships. The children, as young as seven or eight, earned as little as twenty-five cents a week and the income went to the family unit. Hundreds of these small manufacturing operations were built by a variety of entrepreneurs in New England and the mid-Atlantic states, with the business model becoming known as the Slater system.

Around this time, the new U.S. government was debating what its role should be with respect to these manufacturing interests. In a Report on Manufactures issued in 1 79 1 , Alexander Hamilton highlighted the advantages of industrialization in the United States and espoused a belief that the government should assist but not control these businesses. There was even a group born within the government called the Society for Establishing Useful Manufacturers, who set up a manufacturing center in Paterson, New Jersey, but it had a short life, folding in 1796.

After this, the federal government stuck to passing tariffs and issuing patents, permitting private individuals to sponsor, locate and manage these efforts. Private capital and entrepreneurship had arrived in the U.S.

Francis Cabot Lowell, a wealthy Boston merchant, introduced another form of textile manufacturing to New England around this time. The Lowell system, was based in larger-scale operations, used power looms and combined the spinning of yarn and the weaving of cloth. Lowell, who built a large factory in Waltham, Massachusetts in 1813, employed women and girls. These were the first "big businesses" in America. He used professional management staffs and, supported by U.S. tariffs on imported cotton and woolen goods, his factories would turn annual profits of from 20 to 25%.

In 1826 the town of Lowell was founded in Massachusetts and six firms were established there. The company built boardinghouses to accommodate the labor force, mainly twelve-to-twenty-five-year-old females. Twenty-five or so women resided in each house, developing a sense of sisterhood, working, eating, and spending leisure time together. They hailed from New England farms and expected to be treated with respect and to be well-compensated for their work.

A downturn occurred in the textile industry beginning in 1 829 and when management cut wages, the women reacted by going out on strike and running petition campaigns in the 1 830s and 40s. They formed the Factory Girls' Association, with one of their demands being a shorter, ten-hour work day. Mill owners responded by importing immigrant labor, using French-Canadians and Irish women to replace the New Englanders.

By the Civil War, the Lowell and Slater systems looked a lot alike, both using immigrant and family labor, company owned tenement housing for the workers, and tight control over both the work and non- work lives of the labor force. These manufacturers used the corporate form of ownership, with professional managers and cost accounting.

The Paterson, New Jersey, venture was revived, and in Philadelphia, the textile industry flourished with factories specializing in weaving, spinning, dyeing, or finishing.

Unions won few victories during the years prior to the Civil War, as the managers successfully played women against men, adults against children and immigrants against those born in the U.S. The economic depression of 1836-1844, further hurt the cause of organized labor and thus was born a tradition of paternalism and harsh working conditions in the textile industry. Throughout the nineteenth century, New England remained the center of cotton, woolen, linen and thread production.

Migration

In the 1880s, a shift in location began to occur. Small textile mills moved south, many of them mirroring the earlier Slater system: town design based on rural villages, small-scale production, and paternalistic practices by owners. One of these small southern towns would be Trenton, Tennessee, only a few miles from Dyersburg, Tennessee, that would later become the home of the company featured in this story. The majority of this southern migration would take place down the east coast, but the fact that cotton was grown in the delta region, helped bring some of the manufacturing to that area.

Early southern mill towns were controlled by mill agents and superintendents, with the company providing jobs, houses, food, clothing, and goods. The work force was drawn from the countryside, and conditions were harsh. In the 1880s and 1890s the Knights of Labor and the National Union of Textile Workers organized southern mill workers, but strikes were largely ineffective with the national economy in trouble.

In the early twentieth century, conditions in the textile industry continued to deteriorate in the North. Major strikes organized by the Industrial Workers of the World (IWW) occurred in 1 9 1 2 and 1913, with the IWW developing new tactics. One of the most successful, called the "Children's Crusade", saw workers in Lawrence, Massachusetts send their children dressed in rags to New York and other cities to parade through the streets for strike sympathy. The northern unions had some success, but mostly they helped shape management's long-term strategy, which involved seeking southern, non-union labor. As has often been the case over the years, union success led to industrial migration, in this case to the southern United States.

Several new factors were entering the picture in the early 1900s: synthetic fibers, changing fashions, international competition (cotton and woolen tariffs had been lowered) from Japan, so that by the 1 920s New England textile towns were in a depression. In the South, where the factories had migrated, the situation was also precarious. Mill owners instituted "speed-up and stretch-out" policies (forcing workers to work more rapidly and to manage additional machines), initiated night work, and cut wages. Strikes occurred across the South as the National Textile Workers Union (NTW) moved in to organize workers. Violence broke out on occasion and the strikers tended to fail, but issues that would pre-occupy the nation's government were in place, such as low wages, long hours, night work, miserable factory conditions and weak union leadership.

In 1 934, the United Textile Workers (UTW) called for a general strike of the textile industry, but again the effort failed. The depression hurt the strike effort and only passage of the National Labor Relations Act in 1 935 and the advent of World War II permitted unions to establish a foothold in the South. Following the war, the American textile industry lost ground to Asian and Central and South American firms.

Emigration

Eventually, the U.S. textile industry would succumb to foreign competition, with factories leaving for ridiculously lower wages to points around the world (thus the emigration, and last, phase of the U.S. textile industry). Dyersburg Fabrics would fight the trend longer than most others. Let's return to their story.

HOW DYERSBURG PRODUCTS CAME TO BE

Ground was broken for the building in the Summer of 1928 and the first machines started spinning at Dyersburg Cotton Products on Monday, March 25, 1 929, which means the company was seven-months old when the great disease (depression) struck the nation on Friday, October 25, 1 929. The young company would struggle to survive the first few years of its life. However, before looking at these difficult years, we should answer the question of why the company came to be in Dyersburg in the first place.

As we noted earlier, Trenton Mills was founded in nearby Trenton, Tennessee, in 1884, as part of the early movement of the textile industry to the south, and in this case, western part of the United States. Mississippi had a cotton mill in Bankston in 1 848, and several more in the years just after the Civil War, but it was not until the 1 880s that the south began to broadly attract most of the New England textile industry (information found at: http://narvellstricklandl .tripod.com/cottonmillhistory2/indexl .html).

In 1884, Trenton Mills in Trenton, Tennessee made cotton products such as meat bags and knit material for gloves. A unionized cotton bag mill in Jackson, Tennessee, called the Bemis Mill, named after Judson Moss Bemis, opened in 1900. These mills were close to the large cotton fields and gins in west Tennessee, making shipping cost minimal.

So, the textile industry was already established in west Tennessee by the time R. J. Wheeler and Ladd Lewis took the Illinois Central railroad from Chicago as far south as Florence, Alabama. Their stop in Dyersburg, Tennessee was the most impressive of several, due to the great interest shown by area officials and the friendliness of the reception. Thus Dyersburg was chosen as the location for the spinning operation.

In 1 929, Oswego set up Dyersburg Cotton Products with Ladd Lewis as president. The plant was large from the early days, with around 1500 employees. This was a time when cotton production processes were labor intensive. A large number of these employees were women who cut and sewed. The mill made long-handle underwear, knit material for gloves, meat bags and knit material for sweaters and other types of clothing.

People had to drive, or more often, walk great distances to work. Mr. Lewis decided this was a problem so he took bids for the construction of homes. (As we saw before, this "company-town approach", was a well-established model of business for the textile industry.) He wanted to build one hundred houses. He received three good bids, so rather than choose one, he gave each of the three contractors 33 homes to build, so a total of 99 homes were built. The people paid a little each week to live in the houses. The coal to heat their homes was furnished by the company from its supply.

Vestiges of New England-textile practices came south with the Adrian Mills/Oswego Mills combination. Not only was the Dyersburg operation paternalistic, but it brought south ethnic groups that were in charge of various operations. These ethnic divisions had come to be because management had hired large numbers of European immigrants, when the young women in New England demanded better conditions and higher wages.

The carding operation brought down from New York was English because it was run by Bill Coward an Englishman. Spinning was done by Italians hired and supervised by an Italian named Frank Garro. The knitting operation was run by a first-generation German immigrant, Ray Weidner, who had hired other German immigrants. These workers came south with the operation, infusing the town of Dyersburg, Tennessee and the surrounding rural communities, with diversity.

In 1932, Dyersburg Cotton Products was reorganized when Mr. Wheeler convinced the accountant who had recommended liquidation that he could run the firm. The accountant, E. L. Amis, decided to join Wheeler as the financial expert and so Wheeler became manager and Ladd Lewis left the company.

After this reorganization and the assumption of leadership by Mr. Wheeler, the company began to prosper and would realize some of its finest years during World War II. The decades from the 1930s to the 1990s, are filled with stories of events that occurred in the U.S. textile industry and Dyersburg' s reactions to them. Our focus here though, will be on the approach the company took toward employee relations. Along with technical and financial adjustments, this reaction to the human part of the business played a strong role in the ability of the company to endure the century.

HOW THE COMPANY COMMUNITY WAS BUILT

After Dyersburg Cotton Products, which later became Dyersburg Fabrics, began operations under Wheeler, the accountant E. L. Amis, was not only given the title of Secretary-Treasurer, but he was also given the assignment of employee relations. What follows is an account of the aggressive way he carried out this latter function and how it helped build a community-spirit within the company and better attach the company to the Dyersburg area.

The company weekly newspaper: The SPINNIT

According to a story that appeared in the newspaper on April 3, 1979, around the time that the company was celebrating its 50th anniversary, E. L. Amis, may well have fancied himself as something of a journalist (perhaps missing his true calling, the story's writer speculated). By 1979, Mr. Amis was already deceased, but his legacy, the SPINNIT, remained.

The SPINNIT was the company newspaper, printed every two weeks, first published on September 1, 1940. Amis edited it, drew cartoons and took photographs. The first editions were four pages long, but at the time of the company's SO^-anniversary issue in 1 979 (the 39th year of the publication), the paper was 12 to 14 pages long.

Amis had the reputation of being as devoted to the newspaper as he was to the company. He was often "caught" sketching out ideas and drawings for the paper during company business meetings. The fact that the paper thrived long after his death was testimonial to the fact that Amis was not the only one with a deep affection for the newspaper.

The first edition of the paper in September of 1940, indicated that the company had 630 names on its payroll the week before. This means that the company had settled into far fewer employees than they had at the beginning, when the number is reported to have been as high as 1500. During those days of large numbers, the ranks were inflated by the number of women in the large sewing operation. By 1 940, the sewing operations had dwindled until the number of men was 370 and the number of women employees was 260. The Sept. 1, 1940 paper also said that the average age of the men was 34 and that of the women was 32.

The Hankering and Hunkering Club

After Mr. Amis became ill, sometime in the 1 940s, and left the company, Fred Childress, the personnel director, took over editorship of the paper. It was Fred Childress who invented the fictional Hankering and Hunkering Club and wrote stories of supposed events that occurred during the periodic meetings of the club. He used names of actual employees in his humorous accounts, which served as an additional source of mirth. The following is an excerpt from the Hankering and Hunkering report that ran on Tuesday, January 16, 1979, that shows the type of stories Childress wrote for this section of the paper.

"Once inside, the meeting was called to order by President Buck Evans, but about that time somebody outside started hollering for help. Some of the members ran back out and found Lardy Reasons, who had made the mistake of putting his bare hands on the chain link fence out behind the hose house, and was frozen to it.

Joe Townsen told Lardy to stay right there while he went to get some help, and Lardy said he wondered how Joe thought he could do anything but stay there, since his hands was froze to the fence. Joe said he would run to the plumbers' shop and get a blowtorch, and Ronnie Beckett lit out runnin ' toward the machine shop and said he would bring a chain saw to cut Lardy loose.

With that, Lardy' s hands suddenly got warm and he got loose from the fence without any more trouble.

As soon as things had got sorta settled down, Buck called the meeting to order again, and told everybody to go ahead and light up their smokes, and maybe they could enjoy the rest of the meeting in peace. He said he was glad to see so many members present, because these were sure troublesome times with all the ice and snow.

Stretch Kee said if any of the Hankering and Hunkering Club members thought they had trouble, they should come over to his house. He said the icicles around the roof of his house got so long they finally just lifted the house up off the foundation. "Me and Eddie had to get a 12 foot step ladder just to climb in and out of the house. " Stretch said.

He said that wouldn 't have been so bad if it hadn 't busted all the water pipes when the house was lifted off the foundation. "That water run all over the floor of the house and froze into ice before you could bat an eye. " Stretch continued.

But Stretch said there is always a bright side to everything, no matter how bad it might seem. He said at least he didn 't have to waste no energy gettin 'from one room to the other, because if you could just get pointed in the right direction, you could slide anywhere in the house. "

These stories of the club meetings were always like this, funny, offbeat and clearly designed as partly a reflection of the culture of the company, and also perhaps, an attempt to shape the culture of the company, or at least to "keep things light".

The paper featured a free want-ads section where people would list cars and other items for sale. Looking at back issues of the paper suggests the great variety of company-sponsored events and services. These included, free help for employees filling out their tax returns.

The staff of the SPINNIT were pictured in the April 3, 1979 edition. All the men had on suits, light-colored shirts and ties. The women were all decked out in hats. There were 17 women who sat for the picture and 10 men. These people were the ones who wrote the stories describing recent goings on in their respective departments. The following are accounts written by Carolyn Tarkington and Joyce Mallard, that are included here to give the flavor of the way these accounts were written and the news they covered.

Tuesday, November 21, 1978

Cafeteria

By Carolyn Tarkington

Mrs. Dycus is out sick at the time this is being written. We hope it is nothing serious, and that she will be able to come back to work soon. Virginia says she is going back to Alabama next week. There must be more exciting things going on down there than we know about.

We were all sorry to hear that Margaret Bane 's son is in the hospital and will undergo surgery. Hope he gets along fine.

"I don 't know anything, not gonna do anything, and if I do, I'm not gonna tell it, " says Faye Well, no one can accuse her of being an old blabbermouth now, can they?

Louise Tucker said her son Johnny, worked all day Saturday putting a roof on the new room they 're adding to the house. We hope it is leak-proof because we don 't wanna get wet, Louise, when we have that dance in that new room!

Everyone is looking forward to being off from work on Thanksgiving weekend. Se don't know whether they 're lookingforward to eating a big Thanfagiving dinner, or lookingforward to getting some extra rest.

Carolyn and Louise went to Jackson last week to do some shopping. Maybe I should say a "little shopping" since we didn 't bring very much home.

Richard Dyson and his girlfriend went to a fashion show last weekend.

Reba and her husband went to ReelfootLake on Saturday night for a pleasant visit with Mr. and Mrs. Wright.

Guess that 's all, folks! See you at the Pancake Day!

Spring Needle Knitting -First Shift (North)- by Joyce Mallard

Everyone is looking forward to our Thanksgiving holiday and a long weekend. Roselle is planning on a big Thanksgiving Dinner. There will be Mr. andMrs. Bob Harrison from Sweetser, Indiana; Mr. andMrs. BillJohnson and Pat Martin from Memphis. She also hopes that Mr. andMrs. J.C. Davis from Michigan will be there.

Barbara cooked Michael and Sammy a big birthday dinner last week. Sammy 's parents, Mr. andMrs. Rigsby, were also there to help celebrate.

Mildred Tinkle went to the banquet Saturday night. She said she really enjoyed it.

Wilma Hick's son, Tony, has been sick and in the hospital in Memphis. She said he was home and doing better now.

Evelyn Harbor's nephew, Terry Dial, broke his collar bone in the last Trojan football game of the season. We all wish him a speedy recovery.

Margaret Hill saw Albert Fowlkes at the Finley basketball game. She said he acted like he didn 't believe what he was seeing out of their boys. Finley has a good team this year, had a good one last year also.

Monette Jackson went deer hunting at Cheatham along with Janice White and Mary Phillips. Monette killed a 53 lb. buck and Janice killed a doe.

It seems everyone had a nice time at the banquet Saturday night. Plenty of good food and good entertainment. They had a group called Seven Notes and a Plus. Our own Stretch was Plus. Albert Fowlkes is going to get them some bookings and they are supposed to go on tour soon, but it will be as the Seven Notes and Minus because Plus won 't be able to go this time.

Linda Wells is looking for two beagle puppies about 2 or 3 months old.

That will be all this time. Everyone have a happy Thanksgiving.

Company-sponsored activities, benefits, events, services. The company had its own bowling league that played on Tuesday nights. In 1 979, the company gave employees who had been there 25 years or more, four weeks of paid vacation. Each December, on a designated Saturday morning, they had a pancake breakfast that was apparently well attended. The mill had winter and summer unpaid closings, of about ten days each. They also held an annual employee-recognition dinner in November of each year, at which time those who had been with the company twenty-five years were honored.

THE WAR

The SPINNIT also reported on the company's contribution to WW II. Apparently two people who had worked for Dyersburg lost their lives in the war: Arthur O'Malley, a former employee of the Cotton Spinning Department and Edward B. Jones, a former Knitting employee, the former dying in a plane crash and the latter when the ship he was on was attacked. The SPINNIT was able to find where at least 70 Dyersburg employees fought in the war.

PLAY BALL

The company sponsored a semi-pro baseball team made up of mill employees, called the Cotton Products Panthers, which was organized and managed by Ray Weidner, head of the Knitting Department, himself a former semi-pro baseball catcher. He started the team in 1 940 and according to the SPINNIT, they played in "just about every cow pasture in this part of the country".

Later on, the mill built the team a park of their own in Dyersburg, with part of the money coming from W. H. Burnham of Adrian, Michigan, one of the early members of the board of directors of the company. The park was named for Mr. Burnham and called, Burnham Field. The park was dedicated on May 23, 1941. Here is an account from The SPINNIT ofthat event:

"More than five hundred ardent fans packed the stands to witness the dedication ceremony, which began with the raising of Old Glory while the familiar strains of the National Anthem floated over the park.

Mayor L. D. Hammer spoke, and complimented the employees of the mill upon their fine new park, and said he marveled at the fine spirit of Mill officials as evidenced by their gift of Burnham Field.

The hundreds of enthusiasts roared with delight as R. H. Wheeler, President of Dyersburg Cotton Products, stepped into the pitcher's box (sic), wound up, and sent a fast ball steaming down across home plate and into the mitt of Catcher Charlie Reed."

Mr. Weidner managed the team through the 1 948 season (during which three players actually left the company for professional baseball, two of whom played in the major leagues). They had a record during those seven seasons of 1 02 and 42, which means they played an average of a little over 20 games a year. Mr. Weidner retired as manager in 1948 and the team folded in 1949, donating Burnham Field to the City ofDyersburg for the city's youth baseball program.

During the war years, soldiers stationed at nearby Halls Air Force base, Millington Navy Base, Fort Campbell Army Base, and other area military bases, organized baseball teams and played against Dyersburg Cotton Products on Sunday afternoons at Burnham Field, to hundreds of cheering people from the community and soldiers from the various bases.

DYERSBURG COTTON PROCUTS NURSERY

During the war, many women came to work at the mill, creating childcare problems. The company solved this problem by renting a home near the mill in Dyersburg, that was used as a Nursery School for working mothers. Fourteen children who attended the nursery appearing to be between the ages of three and ten or so, are shown in a picture from the SPINNIT in the 1940s.

FOLDING BANDAGES AND BUYING WAR BONDS

Miss Olma Caldwell, head of the company first-aid department, responded to a request by the American Red Cross and organized women to help fold bandages for the armed forces. A photo from a SPINNIT during that time shows a long table around which sat about thirty-five to forty women, folding white bandages, all smiling, the cloths laid out on the table in front of them.

Also at this time the mill launched a drive to sell war bonds. Dyersburg Cotton Products responded with 100% participation which won for the company the Treasury Department' s "Minute Man Award", presented at a ceremony at the mill in 1943.

SETTING THE TONE

It was during the war years that the community and company became galvanized around one another and this relationship would last until the plant's inordinately sad closing in 1999. At the time of the closing, the plant employed around 800 people. In some cases, as many as four generations of family members worked for the company, and in a lot of these instances, three generations were working there at the same time. The years between the war and the closing are filled with interesting events, but the focus of this account has been the early formative years, when the company culture was set and during which the mill and the community bonded in a way that is most likely thing of the past in the United States.

NOTE:

All information gathered in early 2004 through interviews conducted by the authors with Richard Donner and Jack Todd.

AuthorAffiliation

Mike McCullough, University of Tennessee at Martin

Wilburn Lane, Lambuth University

Subject: Textile industry; Organizational learning; Corporate culture; International trade; Corporate histories; Case studies

Location: United States--US

Company / organization: Name: Dyersburg Fabrics Inc; NAICS: 313312

Classification: 1300: International trade & foreign investment; 2500: Organizational behavior; 9190: United States; 9130: Experimental/theoretical; 8620: Textile & apparel industries

Publication title: Journal of the International Academy for Case Studies

Volume: 11

Issue: 3

Pages: 21-33

Number of pages: 13

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 10784950

Source type: Reports

Language of publication: English

Document type: Business Case, Feature

ProQuest document ID: 216275351

Document URL: http://search.proquest.com/docview/216275351?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-13

Database: ABI/INFORM Complete

Document 95 of 100

TAHITIAN BLACK PEARLS: A FAMILY BUSINESS STRATEGY CASE

Author: Wright, Norman S; Watson, Timothy; Jonassen, Tamatoa

ProQuest document link

Abstract:

Imagine yourself on a beautiful, isolated atoll in French Polynesia. The crystal blue water laps at your toes while you drink milk fresh from the coconut. Children laugh with joy as they play in the warm, tropical waters. Sound nice? Now, imagine that you live on this small island, population 600 and need to make a living. This case is set in the black pearl industry of French Polynesia. It presents the entrepreneurial choices made by a small pearl producer on the island of Takaroa. Here is the situation. Manea Tuahu has not produced a saleable crop of pearls for two years. Prior to that time, the Tuahu family had cultivated black pearls with revenues of roughly $200,000. Unfortunately, the division of the proceeds among the various family members had created hard feelings. This disruption of family harmony combined with a disease that entered the lagoon convinced Manea to stop pearl farming and tend to his small general store. Two years later, he is again considering pearl cultivation to enhance his $6,000 annual income. As he considers changes in the industry and his own strengths and weaknesses in pearl farming, Manea faces a difficult decision. Should he start producing again? Should he shift to being an industry supplier? Should he use family labor or more skilled, hired labor? How will he sell his pearls in an increasingly competitive market? These and other questions cloud his mind as he goes fishing with his friend, Tehina. Careful discussion of this case will provide students with insights into the analytical tools entrepreneurs use in their strategic decision making. If used in the winter, it will also make your students think about quitting school for adventure in warmer climes. [PUBLICATION ABSTRACT]

Full text:

Headnote

CASE DESCRIPTION

The primary subject matter of this case concerns the decision of a small, Pacific Island entrepreneur on how to enter the black pearl market. The issues examined are largely strategic and include Porter's five forces model, value chain analysis, distribution channels, and SWOT analysis. Secondary issues include analysis of the cultural and regulatory environment in which business operates. The case is appropriate for levels three and four. It is designed to be taught in either 1 class hour or 1.5 class hours. Student preparation should take between 2 and 3 hours

CASE SYNOPSIS

Imagine yourself on a beautiful, isolated atoll in French Polynesia. The crystal blue water laps at your toes while you drink milk fresh from the coconut. Children laugh with joy as they play in the warm, tropical waters. Sound nice? Now, imagine that you live on this small island, population 600 and need to make a living.

This case is set in the black pearl industry of French Polynesia. It presents the entrepreneurial choices made by a small pearl producer on the island of Takaroa. Here is the situation. Manea Tuahu has not produced a saleable crop of pearls for two years. Prior to that time, the Tuahu family had cultivated black pearls with revenues of roughly $200,000. Unfortunately, the division of the proceeds among the various family members had created hard feelings. This disruption of family harmony combined with a disease that entered the lagoon convinced Manea to stop pearl farming and tend to his small general store. Two years later, he is again considering pearl cultivation to enhance his $6,000 annual income.

As he considers changes in the industry and his own strengths and weaknesses in pearl farming, Manea faces a difficult decision. Should he start producing again? Should he shift to being an industry supplier? Should he use family labor or more skilled, hired labor? How will he sell his pearls in an increasingly competitive market? These and other questions cloud his mind as he goes fishing with his friend, Tehina.

Careful discussion of this case will provide students with insights into the analytical tools entrepreneurs use in their strategic decision making. If used in the winter, it will also make your students think about quitting school for adventure in warmer climes.

INSTRUCTORS' NOTES

The Immediate Issue

Manea Tuahu must decide whether he will begin to produce black pearls in the family's traditional waters after a two year break.

Possible Student Assignments

1. What are the key issues Manea Tuahu faces? (lease lagoon, produce with a hired grafter or with Tiare, distribution channel, do nothing). What does a financial analysis of the case tell you about the alternatives available to Manea Tuahu?

Manea faces several key issues. The most obvious of these is whether he should begin to produce pearls again, lease his lagoon rights, or simply do nothing with regards to the black pearl industry. If the student indicates that Manea should again begin production, at least two follow-up issues come into play. These include the issue of whether to use Tiare as the grafter or to hire a professional and, which distribution channel will be most effective.

With regards to the first decision, the data indicate that Manea currently derives an income of approximately $3,000 per year from his store. This income is most likely supplemented by approximately $3,000 from family members living abroad based on average figures for the islands. This yields an overall income of roughly $6,000 per year. When combined with subsistence fishing and farming activities, and the support of the French government, Manea and his family will have no problem surviving and will have a great amount of free time to enjoy their island life.

Data for the leasing of the lagoon are not available in the case. There is some suggestion that the lagoon rights might be leased for somewhere around 5% of the value of the pearls produced. By crunching the numbers in the case, the students should calculate that Manea's waters could produce some 30,000 grams of pearls which at 1999 prices would yield a value of roughly $560,000 every two years. At five percent, this would yield rental revenue of approximately $28,000. Of course, if prices continue to fall, this number could be smaller.

Additionally, the issue of whether his lagoon rights will be leased at all must be considered. This is complicated by the fact that currently no large producers are leasing Takaroan waters and that there may even be some local hostility to the idea given that the large producers have been seen as taking the lion's share of profits in the industry. Overall, Manea guesses that the chance of being able to lease his lagoon rights to a larger producer are relatively small, probably somewhere between 0% and 30%. Taking a midpoint would result in a 15% chance that he will earn $28,000 in leasing fees every eighteen months or $18, 667 per year. The financial calculations, result in an estimated income of approximately $2,800 per year. ($18,667 ? 0.15). Of course, this is an all or nothing proposition with an income of almost $19,000 per year or nothing at all.

Now, if the students indicate that Manea Tuahu should begin cultivating pearls, one issue that he must face is whether to use his daughter Tiare as a grafter or to hire a professional. There are two primary ways in which to analyze this question-quantitatively and non-quantitatively.

From a financial standpoint, the case indicates that less skilled graffeurs are successful in creating a saleable pearl some 50% of the time while that number is between 80% and 90% for those who are the most skilled. For a cultivator like Manea, this means that if he could produce 30,000 grams of saleable pearls using his daughter Tiare, he could probably achieve a yield of about 51,000 grams using a more skilled graffeur.

85%-50%=1.7

30,000 x 1.7 = 51,000 grams of saleable pearls

If we multiply the difference in the production, 21,000 grams by the most recent per gram sales price($18.6 per gram) we obtain increased revenues of $390, 600.

A more sophisticated analysis, however, would should that the sales price Manea achieved in 1998 was only about $10 per gram while the market was averaging $22.21 per gram. This is probably partially due to the fact that the pearls that Manea' s oysters produced during that period were of lesser quality on average than those produced by the average cultivator. This difference may also be explained, however, by other value chain factors such as market access and distribution channels used. While hiring a professional graffeur might largely handle quality differences, it would not address these other factors.

As a result, analysis might include a high and a low estimate of the value of hiring a professional graffeur. The high estimate is probably the one calculated above, $390,600. This assumes that all differences pricing differences are due to quality and, therefore, eliminated by hiring a professional graffeur. While this is probably not realistic, it does create an upper level boundary that is helpful.

The low estimate would assume that the grafter did not change the distribution of pearls in each range but merely brought a larger number of pearls into the acceptable range. While this is probably not realistic, it does create a lower limit. The calculation here is created by multiplying the increased number of grams by the projected price divided by 2.2 (the ratio of Manea's 1 998 per gram price to that of the market average). This would equal $177,545.

In determining whether it makes financial sense to hire a profession graffeur, we would want to know the interest rate Manea would face if he were to borrow funds to over a two year period of time to finance the initial cost of grafting services as well as the cost of the grafting services themselves. Unfortunately the case provides neither number, nor any comment on the ability of Manea to obtain a loan.

Further, we have only looked at revenue changes. While much of the cost of producing pearls would not vary as one must take care of all the oysters seeded regardless of expected future pearl quality, some marketing and sales costs would certainly change The one piece of information in this case that sheds additional light on the cost question is the fee charged by the G.I.E.'s to small producers like Manea. This amount is equal to 8% of the sales price. If we reduce the high and low estimates by this amount they then become roughly $360,000 and $163,000.

Another factor given in the case that students might mention is the opportunity cost of Tiare Roberts who would need to spend 4 months doing the grafts.

In addition to the financial costs which can be somewhat accurately calculated, there are non-financial data that would also come into play in this decision.

First, Manea seems very concerned about family relations. In Pacific island cultures, family is everything. As a result, Manea must consider what will happen if he were to not use his daughter to do the grafting. Would Tiare be offended? Would she be happy to not have to spend 4 months doing the grafting work?

Additionally, the market seems to be reaching saturation to some extent. Pearl production keeps increasing, but the price per gram is decreasing. Does Manea want to produce such a large number of pearls? Will he be able to sell all of his pearls if the acceptable number increases by some 250%? The current marketing environment is difficult and he has lost his primary distribution channel. While selling some 51,000 grams of black pearls is certainly not a foregone conclusion, he could just use a professional grafter to seed a smaller number.

The final key issue that the students should raise is the question of which distribution channel will be most effective. As a SWOT analysis or a Porter's Five Forces analysis will show, Manea and other small producers like him are at a disadvantage compared to the large producers. They simply produce an insufficient number of high quality pearls to justify holding their own trade shows in foreign markets. As a result, these producers, at best are hoping to either pick up the second tier of retailers including those in the local market or to work through a wholesaler such as Inka. Another alternative might be to team up and hold auctions or shows in foreign markets. In this case, the big producers would have to pay to join them in the foreign location.

In the past, Manea has been successful in reaching second tier retailers in Japan who buy in small lots but pay relatively high prices for pearls. Of course, this option no longer seems probable now that his daughter is divorced from her Japanese husband. The students may suggest, however, that Manea try a similar approach in the Hawaii market where he also has family. While the demand may not be as great as in Japan, there is a good market for black pearls in Hawaii that can easily be targeted by Tiare.

What most students will probably recognize is that Manea will probably benefit from using multiple distribution channels . While he may want to initially approach the U. S . market where he can hope to sell directly to retailers, he clearly should not ignore the GIE auctions as they are a relatively inexpensive way to make sales, albeit at somewhat lower prices. Further, wholesalers such as Inka can also provide a very low cost distribution channel, but one that pays lower prices.

In the end, while there is clearly not enough information provided to make a final decision regarding distribution channels, there is sufficient information to generate an interesting discussion.

2. Putting yourself into Manea Tuahu's shoes (or slippers), would you begin producing pearls again? Show the analysis you have done which supports your decision.

This question should really only be used if you are not concerned with the students identifying the key issues on their own. The answer to this question is outlined in the previous section.

3. If Manea Tuahu does begin producing pearls again, how should he sell his pearls in order to maximize profit?

This question should really only be used if you are not concerned with the students identifying the key issues on their own. The answer to this question is outlined previously.

4. Perform a SWOT analysis for Manea Tuahu's family business. Based on your analysis, what should he do to assure the success of his pearl farming business.

Strengths

Lagoon rights

Daughter with grafting skills

Owns the needed equipment

Pearl producing knowledge

Spare time

Free family labor

Low initial investment requirements (owns equipment, has access to labor that does not require immediate payment, and understand the process)

Weaknesses

Small size

Lack of access to capital

Poor to average pearl quality

No direct access to biggest markets

Limited marketing abilities

Low level of formal education to deal with import/export documentation

Hard feelings among family members that may make it hard to work together

Opportunities

Develop Hawaiian pearl market

Leasing lagoon rights

Entering the value chain at another level such as spat production

Threats

Maturing market

Increased competition from large French Polynesian producers at the GIE auctions

Competition from other geographical locations such as the Cook Islands and Hawaii Disease

Additional government regulations such as the quality requirements recently put into place

5. Perform a Porter's Five Forces analysis of the black pearl industry from the perspective of a small producer like Manea Tuahu. Based on your analysis, is this industry likely to be profitable for Manea Tuahu? What areas of concern does this analysis raise for his family business? What opportunities does this analysis suggest for a small black pearl producer?

Competitors: An analysis of this force indicates that Manea faces competition from a number of small producers such as himself. He also faces even stiff er competition from the large pearl producers who enjoy significant cost and market access advantages associated with their large size.

Further, a look at the industry numbers will indicate that production has been increasing from year to year while the per gram price of black pearls seems to be decreasing over recent years. This trend is characteristic of markets that are mature or maturing. In such markets, the competition becomes heated as an increasing number of companies fight over a relatively fixed number of customers. This provides a good opportunity to discuss how one competes in different stages of the industry life cycle.

This force should be considered strong in this industry.

Substitutes: Students may list a large number of substitutes for black pearls. Most likely, these will be other types of j ewelry or precious stones . The most obvious substitute is white pearls. Other competition comes from precious stones such as diamonds, rubies, emeralds and so forth. Jewelry made of lower cost materials such as hematite and jade could also be considered a weaker substitute..

The key here is to let the students use their imaginations but to encourage their thinking about the directness of the competition between the named substitute and the black pearls. Almost any item of jewelry from a pair of beautiful diamond earrings to an inexpensive necklace made of beads may be considered competition. The diamond earrings are more likely, however, to compete directly with black pearl jewelry as they probably target the same type of customer

This force should probably be considered quite strong as the pricing of the substitutes is, in many cases, competitive and the function that they serve is similar.

Threat of New Entrants: In this case, the threat of new entrants is somewhat limited by a single factor - lagoon rights. While there exist many South Seas lagoons, only certain of them seem to have the conditions allowing for pearl production to be successful. The rights to these lagoons are held by families, many of whom already engage in pearl production or lease their rights to other pearl producers. While there certainly is room for expansion, this becomes a political question that is not as simple as obtaining a business license.

As a result, while the costs of entering the industry are not terribly high at a small level of production, the political ability to do so is somewhat more problematic.

The greatest threat of new entrants probably comes from other Pacific Island nations such as the Cook Islands or Hawaii. Each of these is briefly mentioned in the case as having started pearl production. While the case does not make clear how competitive these other production sights will be (nor is it clear in the industry itself), students should mention this as a probable source of competition. Of course, if the market is reaching saturation, new entrants will be increasingly unlikely barring a significant technological or cost breakthrough.

This force is probably a weak to moderate force in the industry with low entry barriers pushing it to the moderate side.

Suppliers: The suppliers to this industry are limited. There are, of course, suppliers of things like ropes, buoys, and small boats. These suppliers tend to have little power over producers as there are a large number of them and none of their technology is proprietary. As a result, their ability to increase prices or control the small pearl producers is insignificant.

Other suppliers to the industry include those who provide spat to the pearl producers. The case does not provide a great deal of information about these producers. It is possible, however, for a small pearl producer such as Manea to collect his own spat. It increases his time to market but may also reduce his cost. As a result, there is a realistic threat of backward integration.

Finally, the other supplier to this industry is labor. The non-specialized work involved in cleaning oyster shells and harvesting the oysters would carry no significant power. As is made clear in the case, however, graffeurs are highly skilled workers whose input can add significant value to the process. To the extent that these individuals are rare, they can command very high wages. The case does indicate that they highly paid Japanese graffeurs are facing new competition from Chinese and local graffeurs with increasing abilities.

Overall, suppliers would seem to be a weak force in the industry.

Customers: While the case provides no specific information regarding the number and size of the customers, students should be able to understand that there exists both larger wholesaler and retail chains capable of buying thousands of grams of pearls. These customers demand high quality and competitive prices. The small pearl producers, however, are unlikely to be selling to such customers except in an aggregated way through the GIE auctions. Rather, their customers tend to be either smaller wholesalers who live in French Polynesia, local retailers, or small overseas retailers. These customers probably buy pearls in lots ranging from 1 00 grams to a few thousand grams. They are keenly aware of market prices and may demand price concessions if they know that this year has produced a bumper crop. Overall, however, their only real power comes from the fact that there are so many small producers trying to sell in the market.

The customer force is, therefore, probably only a moderate force in the industry.In the final analysis, this is likely to be a moderately difficult industry for a small producer like Manea in which to make profits. As Porter indicates, the most important of these factors is the direct competition and this is exactly where ManeaTuahu faces his biggest challenges. As the industry continues to mature, this competition will only become stronger.

On the other hand, Manea Tuahu and other small producers like him face a fairly low cost structure. Much of their labor comes from friends and relatives who do not face high economic opportunity costs for their time. Their lagoon rights are zero cost to them. Many of them already own the boats and buoys needed to maintain the pearls. Their largest cost will certainly come in the form of grafting services.

As a result, students may argue that Manea and other small pearl producers are likely to make good profits in this industry for many years to come. Those profits may not be as great as they were in the past, but for someone who is living on less than $10,000 per year the profits don't need to be huge to make a real difference.

The possible areas of concern that this analysis creates for Manea might include the entrance of new, foreign competitors and the way that the larger customers are being stolen prior to the GIE actions. Unfortunately, there may not be much that Manea can do about either of these. It may, however, be possible for him to encourage the GIEs to adopt different selling strategies such as working more one on one with large customers rather than through an auction forma or holding auctions abroad.

Finally, new possibilities arising from the analysis that Manea may want to consider include the possibility of becoming a supplier to the industry. He has the ability to collect spat and sell it to local producers. Further, leasing his lagoon rights to a larger producer may also be suggested by the high degree of rivalry in this industry. The competition in this area may be less extreme than that faced further downstream.

No other real possibilities seem to be suggested by the case. Students may, however, get creative and speak of training foreign producers who would like to enter the market, going after smaller jewelry markets found in other places beyond Japan, Europe, and the United States, producing oysters to sell to local hotels, and so forth. Each additional idea should, of course, be examined for evidence from the case that might support its success as well as the logical strength of the argument given the knowledge of market conditions available to students in the class.

6. Conduct a value chain analysis for the black pearl industry. What strategies does your analysis suggest for Manea Tuahu?

In conducting a value chain analysis, students should examine both Manea' s value chain and its relationship to the value chains of other participants in the industry. By doing so, the students may identify opportunities form him to increase his profits through additional revenue generation, cost reduction, or some combination of the two.

The case does a fairly complete job of laying out the value chain for the industry. First, spat and other materials are delivered to the pearl producer either by boat or plane. These spat are then allowed to mature by the producer who takes care to clean them and to keep them at the right water temperature so as to assure maximum growth. When the oysters reach an appropriate size, they are seeded with a nucleus. This step is either outsourced to professionals or completed by producers (or a family member as in the case of Manea Tuahu) with that particular skill. The oysters are then returned to the water for a period of 18 months to two years. During this time, they are cleaned and kept at the appropriate depth by the producer. At the end ofthat period the oysters are opened, pearls removed and the oysters receive a new nucleus.

This is the extent of activities undertaken by most small pearl producers. In the past, Manea took an additional step in house by transporting and selling the pearls through his daughter in Japan. Most small producers, however, place their pearls in a GIE auction, sell them to wholesalers, or try to traffic them door to door. The pearls are then either sold loose or turned into earrings, necklaces, rings, pendants, and so forth by jewelers. This step is not likely to be undertaken by small pearl producers.

Support activities undertaken by small producers are minimal as such things as technology development, human resource management, and the firms infrastructure are usually not undertaken at more than a rudimentary level due to the size of the firm. Further, procurement of supplies is typically done just a few times a year through well known intermediaries at competitive prices.

Students may suggest a number of possibilities suggested by a value chain analysis of Manea's operation. Among the more probable of these are backward integration into spat production, outsourcing grafting or enhancing grafting skills, or even specializing in the care of seeded oysters as part of the value chain of a larger producer.

Each idea should be explored in the depth appropriate to the skill of the class members. As outsourcing of grafting has been addressed in some detail previously, it will not be further considered here. Increasing Tiare' s skills in this area may not be straightforward as it is largely a function of experience and aptitude. Short of Tiare returning to French Polynesia to hone her skills, further development would prove difficult.

Beyond grafting, the case probably does not provide enough information to yield a thorough analysis of the backward integration alternative into spat production. It does indicate, however, that the number of pearls produced in French Polynesia continues to grow while prices are declining. This suggests that spat production may be a growth segment in this value chain wherein profits are growing and small producers will not face heavy competition from large, established producers. While complete movement into this segment of the chain alone may not be necessary, a backward move might provide additional revenue while also reducing production costs down the line.

The final possibility, refocusing on core competencies centered around lagoon rights and the ability to take care of pearl oysters as part of a larger producer's value chain may have some possibilities. Large producers would like to become even larger in order to take advantage of economies of scale. Without knowing minimum efficient scale and the current size of producers, however, it is hard to predict how attractive such an option may be to the larger producers.

On the other hand, the case does indicate that sometimes, these producers face opposition in leasing local waters to increase the size of their operations. If this alternative would allow them, somehow, to sidestep such opposition, they may be willing to pay more for this option than they would in lease fees. For Manea this would mean moving from a higher value added activity to a lower value added activity. Again, however, it has the advantage of moving him away from direct competition with large producers to a more cooperative relationship. Of course given the cultural norms in the area, where earning a small amount of additional money may not compensate for a major decrease in leisure time, this option may not be attractive.

Without more specific information on the amount of time required and the compensation available, this probably just remains an idea for Manea to explore with one or more large producer. It would, however, move him towards a core competency or major strength and reduce his activities in areas wherein he is weak.

These are just a few suggestions. Students, of course, will add their own which should make for an interesting discussion about the possibilities open to Manea in the black pearl value chain.

7. How is Manea Tuahu's decision making affected by the cultural environment in which he operates? How is this similar and different to the cultural in the country where you are studying or in the country where you were born?

This question is probably answered best in three parts.

i. First, the importance placed on family is significant in Pacific Island cultures. Making money will be secondary to Manea when compared with the importance of keeping his family together. While the students cannot be expected to know much about such cultures, the case provides sufficient evidence that the unity of the family will factor into Manea's decisions. From a practical standpoint, they will impact his choice of graffeur and his distribution of any profits. If it is at all perceived that outsourcing the grafting will hurt his daughter Tiare's feelings, he will probably not choose to outsource. Similarly, if he perceives that starting the business again will cause hard feelings in the family, he may choose a less profitable option such as leasing lagoon rights.

ii. The second cultural issue is closely tied to the first in this case. It is the issue of religion. Tiare's statement about God punishing her family ought not be taken lightly. In this part of the world, people have relied heavily on their God or gods to bring them food and to protect them from natural disasters for many years. In this case, Tiare is saying that because the family acted poorly in dividing the profits from prior pearl harvests, God decided to punish them. The Tuahu family will certainly seek God's blessing on their venture. What this probably means from a practical standpoint, is that no decision in this case will be made solely on its own merits. Much of the decision making here will be based on faith, intuition, or divine guidance. While students will certainly need to analyze this case according to their best logic, they can come to understand that more intuitive decision making is not unusual in many cultures.

iii. Third, students will come to understand that some cultures have different motivators than others. As mentioned in the case, many Pacific Islanders feel that living simply but enjoying life leisurely is more important than accumulating many material possessions by working extra hard. Rather than being motivated by possessions, they are motivated by relationships and enjoying themselves. This is pointed out in the case when Manea decides to go fishing rather than resolve his dilemma. It is further revealed by the saying, "There is always another coconut in the tree, another taro in the patch"

Another example you may choose to share comes from French Polynesia as well. It seems that a master carver was hired by a hotel to carve them a tiki, or statue in the old style, to grace the grounds of a new hotel being constructed. When asked the price, the carver agreed upon something that seemed quite reasonable. Upon receiving the quote for that tiki, the foreign investor asked what it would cost to produce 9 more tiki that were just the same as the first. The investor naturally expected to receive some kind of volume discount for purchasing ten of the same item. To his surprise, the master carver indicated that the additional nine tikis would come at a per unit price that was actually higher than the price for just one tiki. When asked about the per unit increase in price for the volume order the master carver simply replied, "the first one is fun to carve."

This story reveals something of the character of these people. They enjoy a good life in a beautiful setting, surrounded by family and friends. The motivation to work very hard to improve their lot in life may not be very strong.

Overall then, culture seems to be pushing Manea Tuahu away from restarting pearl cultivation. At the very least, it encourages him to only proceed if he feels that it will preserve family relations and create a reward that compensates him for the extra work. As such, the students might find greater rationale in the lower profit option of leasing lagoon rights than they would in a classic "masculine" culture such as those identified by Geert Hofstede.

AuthorAffiliation

Norman S. Wright, Brigham Young University Hawaii

Timothy Watson, Brigham Young University Hawaii

Tamatoa Jonassen, Brigham Young University Hawaii

Subject: Pearls; Jewelry industry; Aquaculture; Family owned businesses; Strategic planning; Case studies

Location: Tahiti

Classification: 2310: Planning; 8400: Agriculture industry; 9179: Asia & the Pacific; 9130: Experimental/theoretical

Publication title: Journal of the International Academy for Case Studies

Volume: 11

Issue: 4

Pages: 41-52

Number of pages: 12

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 10784950

Source type: Reports

Language of publication: English

Document type: Business Case, Feature

ProQuest document ID: 216303808

Document URL: http://search.proquest.com/docview/216303808?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-13

Database: ABI/INFORM Complete

Document 96 of 100

WEB ASSURANCE SEALS - ARE THEY ALL ALIKE?: A LOOK AT WebTrust AND OTHER WEB ASSURANCE SEALS

Author: Joseph, Gilbert W; Bostick, Lisa N; Slaughter, Lanford T, Jr

ProQuest document link

Abstract:

Patricia Greene, CPA is approached by Bill Miller, president of E-commerce.com, who is inquiring about web assurance seals. Mr. Miller wants to know what web seal programs are available and what requirements does his company have to meet to display a seal on its website. Ms. Greene, CPA has the task of identifying and comparing the various web seal programs. Additionally, she needs to investigate the requirements and responsibilities for performing a WebTrust engagement. Finally, she needs to communicate her findings to Mr. Miller. [PUBLICATION ABSTRACT]

Full text: _TVM:UNDEFINED_

Subject: Electronic commerce; Web sites; CPAs; Professional responsibilities; Network security; Case studies

Location: United States--US

Classification: 9190: United States; 5140: Security management; 5250: Telecommunications systems & Internet communications; 9130: Experimental/theoretical

Publication title: Journal of the International Academy for Case Studies

Volume: 11

Issue: 4

Pages: 57-85

Number of pages: 29

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 10784950

Source type: Reports

Language of publication: English

Document type: Business Case, Feature

Document feature: Tables

ProQuest document ID: 216277046

Document URL: http://search.proquest.com/docview/216277046?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-13

Database: ABI/INFORM Complete

Document 97 of 100

A SUBCONTRACTOR'S DILEMMA: READY FOR PRIME TIME?

Author: Makamson, Edwin L; D'Souza, Kelwyn

ProQuest document link

Abstract:

The Small Business Administration's 8(a) program was created in 1974 to assist minority and other disadvantaged small businesses to participate in Federal contracting through set-asides and preferential selection. If certified as an 8(a) firm, a small business can secure contracts from the government and from prime contractors with the government on a sole source, non-competitive basis. Hopeful of gaining government contracts and becoming certified as a "disadvantaged, small business enterprise," Smart Management Consultants (SMC) is in the developmental phase of 8(a) certification and finds the going tough. Government budgets have been cut and prime contractors seem to have already identified other small firms with which to subcontract. Unable to secure a continuing source of income as a small contractor, Richard Thomas, founder and partner in SMC must consider sticking with his original plan to build a contracting business in the transportation industry, move into new areas where his firm has less experience, or directly compete as a prime contractor against larger firms. While the names of the subjects and firms have been changed to preserve their anonymity and to protect any proprietary information that may be published, the case is based on the experience of an entrepreneur as documented through field research and interviews. The case provides an overview of the various government procurement and contracting resources available to small and minority businesses, and provides a general overview of how government contracting works. [PUBLICATION ABSTRACT]

Full text:

Headnote

CASE DESCRIPTION

The case illustrates the difficulty of a small business strategy dependent upon government contracting. Based on field research of a "disadvantaged, small business enterprise" that has since failed, the business is examined at a pivotal stage in which initial success through the government's small business assistance programs has arrested and the entrepreneur must consider alternative directions for future growth. The case provides an introduction to government assistance programs for small businesses, especially for minorities and women under the Small Business Administration's 8(a) program, and is suitable for entrepreneurship and management courses in which small business strategy or government procurement content is introduced. The case has been successfully used for workshops in training of owners and managers of small business enterprises. Time commitment during class is recommended at 30-50 minutes if the case is read before class or 1-2 hours if the case is read, analyzed, and discussed in a workshop.

CASE SYNOPSIS

The Small Business Administration's 8(a) program was created in 1974 to assist minority and other disadvantaged small businesses to participate in Federal contracting through set-asides and preferential selection. If certified as an 8(a) firm, a small business can secure contracts from the government and from prime contractors with the government on a sole source, non-competitive basis. Hopeful of gaining government contracts and becoming certified as a "disadvantaged, small business enterprise," Smart Management Consultants (SMC) is in the developmental phase of 8(a) certification and finds the going tough. Government budgets have been cut and prime contractors seem to have already identified other small firms with which to subcontract. Unable to secure a continuing source of income as a small contractor, Richard Thomas, founder and partner in SMC must consider sticking with his original plan to build a contracting business in the transportation industry, move into new areas where his firm has less experience, or directly compete as a prime contractor against larger firms. While the names of the subjects and firms have been changed to preserve their anonymity and to protect any proprietary information that may be published, the case is based on the experience of an entrepreneur as documented through field research and interviews. The case provides an overview of the various government procurement and contracting resources available to small and minority businesses, and provides a general overview of how government contracting works.

A SUBCONTRACTOR'S DILEMMA: READY FOR PRIME TIME?

Richard Thomas began his career as a state employee working for "VDOT," as locals refer to the Virginia Department of Transportation. As a Technical Inspector for the Virginia Department of Transportation, Richard evaluated the work and performance of engineering contractors who constructed and maintained roads, bridges, and structures for the state's extensive and growing highway system. A few years into his career of overseeing contractor work, Richard concluded that his experience, training, and knowledge of both the state's management of contracting and contractors' execution of business with the state well positioned him to enter the industry as an entrepreneurial contractor. In 2000 he and a partner formed Smart Management Consultants (SMC). After almost three years as a small management consulting company specializing in transportation and construction management services, SMC seems to be floundering for reasons that were not obvious. Richard wondered why his recent proposals for new contracts were unsuccessful. The business depended upon successful bids on projects, the kind of work that he had done well in the past. For the first time, he contemplated diversifying into new areas, where he had less experience, to find work. Recognizing the need for help to work through his problems and options, in Fall 2002, Richard visited a nearby university where the Office of the Small and Disadvantaged Business Utilization, U.S. Department of Transportation, had created an Entrepreneurial Training and Technical Assistance Program (ETTAP) to help small businesses enhance their contracting opportunities with federal, state, and local governments.

In talking with the ETTAP team, Richard expressed his concerns about doing more business as a subcontractor. The way the business worked is that prime contractors won bids on profitable government contracts and then would employ subcontractors, such as SMC, to execute portions of the contract. Recent state budget cuts reduced the number of prime contracts and shrank the market for subcontractors. Despite being a qualified subcontractor with a successful past performance, Richard explained that SMC faced a drastic reduction in business and a severe financial strain. SMC was proactive in its bidding for transportation and construction contracts from federal, state, and local governmental agencies, but had not been successful. Because his original business plan seemed to be failing, Richard asked for assistance in deciding which of the following options presented the best opportunity: "Should I continue to seek sub-contracts with larger, established firms despite the fact that business seems slower? Should I diversify into other areas, where I have less experience? Or, should I now actively pursue contracts as a prime contractor through the federal General Service Administration-Federal Supply Service?"

BACKGROUND INFORMATION

Starting up the company, Smart Management Consultants (SMC), was not especially difficult. Although most small businesses begin as a sole proprietorship, Richard opted for a "Limited Partnership" with his business partner Joseph Brown. Under a limited partnership, Richard and his partner would be able to share in the profits but avoid liability beyond their investments. It was simply "less risky" and would be set up similarly to incorporation of the firm. Joseph, because of his business background, would administer the office functions, leaving Richard free to market the business, secure contracts, and oversee projects once SMC had contracts.

SMCs mission statement emphasized that it would provide high-quality, reliable, and cost-effective services to its clients, mindful of the fact that clients are contracting, in part, on the basis of low cost. Specifically, Richard saw SMC as providing project management consultancy services to government, prime contractors, and private businesses. This includes a wide array of architectural and engineering services, from constructing and managing start-to-finish projects to smaller jobs, such as reviewing other firms' designs, plans, contracts and documents, and helping prime contractors manage and coordinate parts of their work. Because Richard had come out of the transportation industry, initially it was thought that there would be sufficient work on roads, bridges, sewers, and maybe airports, to project favorable cash flow well into the future.

SMCs Business Plan laid out an aggressive marketing strategy described in the following steps:

* Attend pre-proposal scheduled meetings to enquire about prime contractors.

* Identify projects that SMC can undertake.

* Provide SMC's capability brochure to potential prime contractors and agencies.

* Provide proposals that include cost of service, qualifications of SMC personnel and consultant.

* Follow-up until proposal due date.

Services mainly were to be marketed to existing governmental agencies operating under federal contracting rules. As a minority owner and manager of a small business, Richard felt that SMC could enhance business opportunities by taking advantage of a number of programs designed to assist the disadvantaged and small business, most notably:

SBA 8(a) or Public Law 95-507. - This federal statute was enacted in 1978 to support increased participation of minority and women-owned and operated small business enterprises (MBE's) in government contracting by requiring prime contractors to manage a small business inclusion program. Called "8(a)" because it amended that section of the Small Business Act, the statute made the Small Business Administration responsible to increase participation of disadvantaged in Federal contracting. Under the statute Federal contractors with contracts in excess of $500,000 for goods and services and $1,000,000 for construction are required to submit a plan for small business inclusion.

49CFR26.- The Code of Federal Regulations establishes the specific rules to execute statutes. This part of the Code provides the procedures by which small businesses become certified as a "Disadvantaged Business Enterprise." The certification procedure requires that the small business verify that it is minority or female owned and operated and that the business is qualified to compete for business with prime contractors with Department of Transportation projects.

The Small Business Administration's 8(a) program was enacted to specifically assist minority owned business because minority groups represent 26. 1 percent of the population, account for only 11.6 percent of the nation's business and earn only 6% of total business sales. In significant industries minorities and women represent only 3.5 percent of supply dollars. In the transportation industry minority contractors supply only 2.5 percent of purchased services (U.S. Department of Commerce). Because minority and women owned small businesses constitute a small share of government contracting, especially in transportation services, the program aimed to remedy this through a "set-aside" by which larger, successful "prime" contractors would be required to subcontract parts of their government projects to 8(a) certified firms.

The "set aside" program has been controversial. While the objective is to increase the number of disadvantaged, small businesses participating in federal contracting, some prime contractors have complained. Their position is that by requiring use of 8(a) firms by the prime contractor, usually a large and established firm that has a major contract with the government, the cost of government contracting has increased, minority businesses are often ill-qualified to perform the work needed, and there is a small pool of certified minority businesses from which to select a sub-contractor.

To take advantage of federal procurement opportunities, Richard initiated the SBA 8(a) certification process. Taking the first step, Richard contacted his district SBA office in Richmond. While the process can require two years of business history, the SBA was able to help SMC meet the criteria for certification earlier by demonstrating experience and success on the few contracts that SMC had acquired, likelihood of success with a solid business plan, and meeting the ownership and management requirements. As an 8(a) certified business, SMC entered the "developmental stage" in which it would be provided business development assistance in securing contracts and could take take advantage of the set-aside programs. After four years of success, participant businesses were to move from the "developmental stage" to a "transitional stage," and then graduate as an independent contractor. Along with 8(a) certification, SMC applied for and obtained certification as a Small and Disadvantaged Business Enterprise (S/DBE) by the Virginia Department of Transportation and Maryland Department of Transportation to gain preferential consideration for state contracts. Most states have enacted similar programs modeled on the Federal statute because state transportation funding is partly federally funded.

GOVERNMENT CONTRACTING AND SUBCONTRACTING

Because of the myriad of laws and administrative regulations involved and because of the long existing relationships with prime contractors, government contracting is itself a specialized area. It frequently is daunting to entrepreneurs attempting to secure contracts or subcontracts for government work. The federal government's Federal Acquisition Regulation (FAR) details procedures for every step in the procurement process, from the time someone in the government discovers a need for a product or service to the time the purchase is complete.

Having spent his early career in inspecting and enforcing government contract compliance, Richard brought rare insight on these procedures to his new business. When the federal, state, or local government requires construction or maintenance of roads, bridges, sewers, dams, or airports, a contract is awarded to a business knowledgeable of the kind of construction or service needed based on Full and Open Competition. The process typically involves issuing a public invitation to businesses to compete for the work through one of three procedures:

Invitation for Bids (IFB). An IFB is used when the government clearly understands its requirements. The IFB will describe in detail all specifications so that all bidders understand that each is bidding on exactly the same requirement. Bids are submitted by potential contractors on a certain time and date; the bids are announced; and the lowest responsive bidder is awarded the contract.

Request for Proposal (RFP). When technical expertise is needed on expensive projects, the government will describe the problem or project that is required, but asks the bidder to propose how the problem will be resolved or the project executed. The bidder's proposal must compete with others on price and on the merits of how the requirement is to be carried out. Proposals are evaluated and the final work and price are negotiated between the government and winning contractor.

Request for Quotation (RFQ). When the government is considering procuring a service or product, a RFQ is issued. Potential suppliers will quote on the requirement, but are not bound to deliver at the quoted price. If the government decides to buy from a contractor based on the quote, the contractor is obligated only if the order is accepted.

Because transportation and construction projects are typically large value contracts, the procedure normally followed is the RFP. To evaluate successful bidders the government relies heavily on a company's prior experience and capabilities in completing similar projects. The procurement process can result in on-going negotiations beween the government and qualified contractors over the price and work to be performed during which bidders offer a series of Best and Final Offers (BAFO) and Best and Really Final Offers (BARFO) until the deadline for a closing bid is met. This process presents obstacles to entrepreneurial, small businesses which usually lack experience on large projects, have little flexibility on costs, and lack the staffing to quickly revise bids. To counter this, as a matter of law, Congress has committed that 23% of all federal-contracting dollars must go to small business. In certain instances a small disadvantaged or black enterprise (S/DBE) can bid up to ten percent higher than a non-disadvantaged contractor.

To assist small businesses with government contracting nearly all invitations to bid on contracts are announced in FedBizOpps, an accessible Web site which links to each solicitation. The government will also actively seek bids from small businesses through the SBA' s Procurement and Marketing Access Network (PRO-Net), an on-line network to which small businesses apply for listing and pre-qualification for bidding. Many states have established similar small business support. In Virginia "Electronic Virginia (EVA)" and the Virginia Department of Transportation (VDoT) publicize contract opportunities.

When a major transportation contract is awarded (usually to a large, established firm), opportunities for smaller firms may exist through subcontractor awards from the prime contractor. Major contracts awarded to a prime contractor may specify that a certain percentage of the total contract is expected to be sub-contracted to S/DBEs. A prime contractor can obtain extra credit in the evaluation of its proposal for a contract on the basis of its use of S/DBE subcontractors. The prime contractor may have considerable latitude in what work will be sub-contracted, the price, and the specific business that will be involved. It is not unusual that a prime will declare its subcontractors in its initial proposal to the government.

SMCS INITIAL GROWTH

Certification as a S/DBE under the Small Business Administration's 8(a) program helped SMC win its initial contracts. Similar, larger projects followed. Between 2000 and 2003 SMC secured subcontracts with a range of services (Table I).

View Image -   Table I: Subcontracts Secured by SMC
View Image -   Table I: Subcontracts Secured by SMC

SMCS CURRENT POSITION

The year 2003 started with a recession that adversely affected the profitability of all businesses. Declining tax revenues shrank the state budget in the Commonwealth of Virginia, and many S/DBEs involved in transportation and construction projects experienced a significant drop in their business activities. At the start of 2003, the projects that SMC had successfully bid were coming to a conclusion. Competition had gotten tough with other companies pursuing the same kinds of contracts. Since prime contractors have a large pool of subcontractors to choose from, Richard saw dismal prospects ahead for SMC, and expressed concern that the S/DBE program is not level enough for subcontractors to compete with the prime contractors.

Nearly all of the work SMC had performed was on the Virginia Interstate 95 corridor. Robert had sought work outside this area. He even contemplated opening another office, perhaps in Washington, D. C. Failure to secure additional contracts to fund this expansion precluded a move for now.

There were a number of reasons for small subcontractors like SMC to be concerned about new developments in government purchasing. First, there had been a long standing feeling that prime contractors control most of the programs and use S/DBE's only because they are required to do so by the contracts they have with the government. Prime contractors publicly complained that they cannot find qualified S/DBE's to subcontract work to while small subcontractors felt that large firms were not really trying to do business with them. A recent government purchasing practice called "contract bundling" permitted a government agency to combine several smaller projects into a large contract. This was viewed by small businesses as mainly benefiting large prime contractors or corporations that have the range of skills and financial strength for multiple jobs, denying smaller subcontractors opportunities to bid on small jobs for which they were competent. Small businesses also complained about the newest government practice of "reverse auctioning" of contracts. Under this practice, the government would issue a RFP on a Web site with a fixed deadline for potential contractors to respond with their bid. The site would display the lower current bid. While the practice was intended to ensure that the government awarded contracts to a lowest bidder, the practice also promoted "sniping" by larger firms - that is, large corporations could wait until the last minute, assess if they could do the project at a price lower than the currently displayed bid, and offer a lowest price. Small subcontractors complained that they cannot respond to proposals quickly to revise bids and, because of their size, suffer high risks with lowered prices. For Richard, there were good reasons to be concerned about the future of government contracting as a small subcontractor.

DISCUSSION QUESTIONS

1. What special problems do new start-up businesses have that can be assisted by the various programs mentioned in the case?

2. Are the problems of the "disadvantaged" minorities and women different from the problems of most small businesses? How do the programs mentioned in the case address these problems?

3. The business economy is cyclical. During growth stages entrepreneurial businesses prosper, but during a downturn small businesses are vulnerable to a decline in demand. To what extent is Richard's problem attributable simply to the business cycle? What advice would you provide to a small business trying to ride out the effects of a downturn in the economy?

4. What are the advantages of large firms over small firms? What do you think of the concerns expressed by Richard and other small subcontractors in the concluding paragraph about the relationship between primes and subcontractors?

5. Assess SMC's options: Should Richard continue to pursue contracts as he has done? Change strategy to move into other areas? Strike out to compete as a prime contractor? Why?

6. If you were a member of the ETTAP team what would you advise SMC as to its next step?

References

REFERENCES

National Minority Supplier Development Council, Inc. Web site provides historical development of government statutes affecting small business contractors. (Retrieved March 26, 2004).

http://www.nmsdcus.org/infocenter/Legislation%20Affecting%20Minority%20Purchasing.htm

U.S. Department of Commerce, Minority Business Development Agency (MBDA). Growth Strategies for Minority Businesses. (Retrieved March 20, 2004). http://www.mbda.gov/documents/strategies.pdf

ACKNOWLEDGMENT

This paper draws upon results from the grant ETTAP03/HAM funded by the Office of Small and Disadvantaged Business Utilization (OSDBU), U. S. Department of Transportation, Washington, D.C. (2003).

AuthorAffiliation

Edwin L. Makamson, Hampton University

Kelwyn D'Souza, Hampton University

Subject: Subcontractors; Government contracts; Minority owned businesses; Government purchasing; Advantages; Case studies

Location: United States--US

Classification: 5120: Purchasing; 9521: Minority- & women-owned businesses; 9550: Public sector; 9190: United States; 9130: Experimental/theoretical

Publication title: Journal of the International Academy for Case Studies

Volume: 11

Issue: 3

Pages: 81-89

Number of pages: 9

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 10784950

Source type: Reports

Language of publication: English

Document type: Business Case, Feature

Document feature: Tables References

ProQuest document ID: 216277151

Document URL: http://search.proquest.com/docview/216277151?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-13

Database: ABI/INFORM Complete

Document 98 of 100

CREATE-A-CANDLE, INC.: A CONCEPTUAL APPROACH TO FINANCING FEEDBACK

Author: S Brooks Marshall; Frazier, Jennifer R; Wright, Newell D

ProQuest document link

Abstract:

Bob Fortune has spent a number of years in the candle-making industry and has decided to start his own business. Using a made-to-order approach, he is hoping to carve out a niche in the market. He has obtained $260,000 in equity investment for his business but still needs additional funds and plans to use a line of credit. To determine the amount he needs to borrow, Bob needs to develop his first year financials. Not only does he need to completely forecast his income statement and balance sheet, he also needs to determine the amount of debt financing needed to reach his target cash balance. Deriving the amount of financing needed is complicated by the financing feedback effect, wherein the more he borrows, the more interest he pays. [PUBLICATION ABSTRACT]

Full text:

Headnote

CASE DESCRIPTION

The primary focus of this case concerns the borrowing needs of a start-up business, taking into account the financing feedback associated with interest expense. Instead of using the traditional iterative method for debt determination, enough information is provided so the better students could express the relationship in an algebraic construct and solve directly for the requisite loan amount. Secondary issues include developing a forecasted statement for the first year of a start-up business. The case has a difficulty level of three, and is positioned for use in junior level principles of finance courses as well as in integrated business curriculum classes for juniors. The case is designed to be taught in two class hours and is expected to require three to six hours of outside preparation by students.

CASE SYNOPSIS

Bob Fortune has spent a number of years in the candle-making industry and has decided to start his own business. Using a made-to-order approach, he is hoping to carve out a niche in the market. He has obtained $260,000 in equity investment for his business but still needs additional funds and plans to use a line of credit. To determine the amount he needs to borrow, Bob needs to develop his first year financials. Not only does he need to completely forecast his income statement and balance sheet, he also needs to determine the amount of debt financing needed to reach his target cash balance. Deriving the amount of financing needed is complicated by the financing feedback effect, wherein the more he borrows, the more interest he pays.

INSTRUCTORS' NOTES

Learning Objectives

After successful completion of this case, students will:

* create a forecast for the first year of a start-up business

* describe the impact of financing feedback on financial statements for an S-Corporation and C-Corporation

* solve for the ending debt balance of an S-Corporation which takes into account the financing feedback associated with interest expense on new debt borrowing

* solve for the ending debt balance of an C-Corporation which takes into account the financing feedback associated with the tax deductibility of interest expense on new debt borrowing

Theoretical Frameworks

To successfully analyze this case, students must be familiar with:

* Accounting concepts and terminology. Students must understand basic accounting concepts (e.g. depreciation, cost of goods sold, accounts receivable, etc.) and terminology used to present the assumptions.

* Financial forecasting assumptions. This case provides students with enough information to construct financial statements (income statement and balance sheet) for a 1-year period. Students will need to take information presented in the text and in exhibits and convert this information into financial statement information.

* Financial forecasting methods. Students must understand the basics of forecasting financial statements (transaction-based) and the interrelationship between the income statement and balance sheet.

* Financing feedback. Students should be aware of the debt/interest loop encountered when forecasting financial statements. They should understand the meaning of financing feedback as it relates to new debt borrowing.

ANCILLARY READINGS

Financial forecasting assumptions. A realistic and comprehensive financial planning example is provided in:

Lasher, William R. (2005). Practical Financial Planning, Fourth Edition. United States: Thomson Southwestern, 636-646.

Financial forecasting methods. An example of the transactions-based approach, presented as an accounting equation is in:

Needles, Belverd, et al, (2002). Principles of Accounting, United States: Houghton-Mifflin, 16-23.

Financing feedback. The iterative technique for solving for debt given financing feedback is presented in:

Brigham, Eugene & L.C. Gapenski. (1997). Financial Management: Theory and Practice, Eighth Edition United States: Dryden Press, 536-543.

SUGGESTIONS FOR EFFECTIVELY TEACHING THIS CASE

This case has been "test marketed" in two sections of a principles of finance course. Each section had approximately 80 students. We suggest that student teams be divided into groups of five or six students, and each group be provided with a copy of the case at least 2 days prior to attending class. Student should come to class with a completed income statement and balance sheet assuming no debt is issued (for an S-Corp with no debt, EBIT is equivalent to net profit). Note that the correct ending cash balance will be negative, so the student may think of debt financing as the amount needed to both remove the negative balance and then to achieve the desired target. The students should have also thought about the impact of financing feedback and should have attempted to develop an equation that represents the relationship between the amount borrowed and the amount of cash after paying interest expense.

Two methods may be used to create a forecast - determining each account independently or representing each transaction using either the financial identity (see the answer key) or T-accounts. We prefer the transactions approach since it presents the context for the operations of the firm. We suggest allowing approximately 30 minutes of class time for students to ask questions regarding creating balances. At the end of the question and answer session, we suggest that a handout be provided of the correct estimates needed to forecast debt requirements. A class discussion should be undertaken addressing the debt/interest loop and financing feedback. Each group should brainstorm how debt could be solved for in the context of an S -corporation that would address the financing feedback associated with new debt borrowing required. The group should be pulled together and suggestions should be gathered from each group. This will work well and should lead to discussions as to what financing feedback is and why the debt/interest loop exists. The algebraic equation that closes the debt/interest loop should be shared with the students. The class should walk through how to solve for the amount of new debt financing needed that takes into account financing feedback. The statements should be completed with the new debt financing required.

The students should be asked to brainstorm in their groups how to solve for the ending debt balance needed if the company was a C-corporation. This would require the student teams to take taxes think of how taxes would impact financing feedback. They should develop the changes necessary to the algebraic equation that would adjust for taxes. Allow the students to resolve for the new ending debt balance that includes the tax deductibility of interest impacts. The statements should be completed with the new debt financing required.

ASSIGNED QUESTIONS

1. What is projected for operating income (EBIT) for 2005?

View Image -   2005 Operating Income

Students will be required to find the information in the case that is necessary to calculate operating income.

"A" students will be able to correctly determine EBIT. If a problem does occur, it is likely to concern confusion over depreciation being incorporated into inventory and then "expensed" though COGS.

"B" and "C" students will be able to derive SGA and depreciation expense correctly, but have problems in determining COGS. Also, some may represent PP&E purchases as expenses.

2. Calculate the financial statements with the assumptions provided. Do not consider the borrowing needed to meet the target ending cash balance of $52,000. (Note: Cash will be negative without additional borrowing)

We used the following transaction-based method for forecasting total assets:

View Image -

"A" students will be able to correctly complete the financial statements, with some relatively minor errors in the determination of cash and/or retained earnings. The balance sheet will balance.

"B" and "C" students will be able to correctly determine 4 of the 6 "simpler" accounts (not Cash or RE). Cash and RE will have most of the transactions correctly represented but some major errors will appear in both accounts.

3. How does the projected ending cash balance differ from the target cash balance?

View Image -

Almost all students will be able to address this question, since it involves finding the difference between the cash balance in the forecast and the target cash balance. The purpose of this question is to have the student to consider the meaning of a negative cash balance in the forecast and the relatively simple math needed to reach the target.

4. Explain the debt/interest loop issue and financing feedback impacts on the financial statements.

The debt/interest loop occurs when taking into account the new debt financing needed in balancing financial statements. Without knowing the borrowing required, interest expense cannot be calculated. Therefore, the income statement cannot be completed. Without a complete income statement, retained earnings cannot be computed. From a cash standpoint, the target ending cash balance cannot be achieved without knowing specifically the amount of debt financing required to create that balance. Therefore, the debt/interest loop prevents the completion of the financial statements.

Most textbook methods use an iterative approach to finding the debt required to balance the statements. We found this technique time consuming and inaccurate. Unfortunately with the iterative methods, students are required to plug in various debt levels and work towards the amount of debt required. At some point the statements are "close enough" and the statements are plugged to balance. Our method allows the student to solve algebraically for the level of new debt required and will balance the statements on the firm attempt.

"A" students will be able to identify the circularity: that the amount of cash you need to raise determines the amount you need to borrow; but the amount you need to borrow requires an interest payment, which increases the amount of debt you need to raise. These students will also be able to relate the interest payment to its impact on retained earnings and retained earnings to its impact on the firm's financing.

"B" and "C" students will be able to identify the circularity but not be able to relate the circularity to the financial statements.

5. Based on question #3, you have a specified shortfall of cash. Create an equation that represents how much you need to borrow to achieve the desired cash balance after taking into account the interest expense (financing feedback).

View Image -

"A" students will be able to identify the variables and express the variables within an equation context. Only a minority, however, will determine the correct equation.

"B" students will recognize that the amount borrowed will need to be greater than the amount of cash received. However, these students will not completely identify the relevant variables.

6. [To be addressed in class] Specifically, how much debt will it take to balance the balance sheet for this S-corporation, including the impact of interest expense? How much debt does Bob need to meet the target ending cash balance?

Upon the in-class presentation, first time through:

"A" students will be able to follow the presentation and clearly determine how this approach works.

"B" and "C" students will be able to identify what they don't understand. After asking questions, the majority will understand how to implement the algebraic approach to determining the required amount of financing.

To calculate the debt required, the students will need to compare the projected ending cash balance with the target ending cash balance. They will then need to borrow enough money to meet the target ending cash balance and to take into account the interest expense associated with borrowing.

View Image -
View Image -   New Debt Financing Needed

Here is the final solution taking into account the new borrowing for the S-Corporation:

View Image -

7. [To be addressed in class] If the company were a C-corporation with a tax rate of 40%, how much at a minimum would Bob need in a line of credit to meet the target ending cash balance? Include the impact of the tax deductibility of interest.

"A" students will find this to be a relatively easy transition.

"B" and "C" students that did not fully understand the treatment with an S-corporation will often begin to understand the approach since the transition from an S-Corporation to a C-Corporation is relatively simple and serves primarily as a review.

The first step is to reforecast the income statement and balance sheet taking into account taxes. Note that due to a loss, there is a tax credit that is treated as a cash inflow and not accrued.

View Image -

To calculate the debt required, the students will need to once again compare the projected ending cash balance with the target ending cash balance. They will then need to borrow enough money to meet the target ending cash balance and to take into account the tax deductibility of interest expense associated with borrowing. The equation needs to be adjusted such that the after-tax rate of interest is used.

View Image -
View Image -   New Debt Financing Needed

Here is the solution for a C-Corporation:

View Image -
AuthorAffiliation

S. Brooks Marshall, James Madison University

Jennifer R. Frazier, James Madison University

Newell D. Wright, James Madison University

Subject: Startups; Small business loans; Candles; Financing; Case studies

Location: United States--US

Classification: 9190: United States; 8600: Manufacturing industries not elsewhere classified; 9520: Small business; 9130: Experimental/theoretical

Publication title: Journal of the International Academy for Case Studies

Volume: 11

Issue: 4

Pages: 95-105

Number of pages: 11

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 10784950

Source type: Reports

Language of publication: English

Document type: Business Case, Feature

Document feature: Tables

ProQuest document ID: 216304036

Document URL: http://search.proquest.com/docview/216304036?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-13

Database: ABI/INFORM Complete

Document 99 of 100

THE MISSOURI DEPARTMENT OF ECONOMIC DEVELOPMENT

Author: Smith, David K, Jr

ProQuest document link

Abstract:

This case can be used to stimulate discussion on at least four interesting and important issues: (1) How can managers grow and/or turnaround a business or an organization which is not doing well; (2) Are the same models and/or conceptual frameworks and/or data analysis tools which would be applied to this situation within a private sector (that is, business) context useful within the public sector context as well; (3) What sort of efforts are public sector entities (for example, states, regions, and/or countries) making to promote their economic growth and development; and (4) Will the model or conceptual framework or data analysis tool utilized by the analyst affect the data on which decision makers focus their attention and/or the alternatives they are likely to consider? Data in the case include: (1) Description of the challenge faced by David Seamon; (2) Descriptive information on the Missouri Department of Economic Development and its various units; and (3) Recent statistics indicating the number of contacts, the in-bound investments, and the trade investments generated by each of the State of Missouri's overseas trade development offices. The costs of operating each office are also provided. [PUBLICATION ABSTRACT]

Full text:

Headnote

CASE OVERVIEW

This case challenges students to consider how David Seamon (newly-appointed Director for Business Development & Trade of the Missouri Department of Economic Development) can double (within three years) the annual number of firms from elsewhere in the United States and/or overseas who actively consider the State of Missouri as a place to open a new factory or a new office. From a measurement perspective, the case indicates that any firm making a written and/or electronic (web-based, telephone, etc.) inquiry to the Missouri Department of Economic Development will be counted as having "actively considered " the State of Missouri as a potential new location. The case is based on discussions conducted by the author with David Seamon. The case is appropriate for senior-level undergraduates as well as students in MBA and Executive Development programs. It is designed to be taught in a class session of 1.5 hours, and is likely to require a couple of hours of preparation by students.

CASE SYNOPSIS

This case can be used to stimulate discussion on at least four interesting and important issues: (1) How can managers grow and/or turnaround a business or an organization which is not doing well; (2) Are the same models and/or conceptual frameworks and/or data analysis tools which would be applied to this situation within a private sector (that is, business) context useful within the public sector context as well; (3) What sort of efforts are public sector entities (for example, states, regions, and/or countries) making to promote their economic growth and development; and (4) Will the model or conceptual framework or data analysis tool utilized by the analyst affect the data on which decision makers focus their attention and/or the alternatives they are likely to consider? Data in the case include: (1) Description of the challenge faced by David Seamon; (2) Descriptive information on the Missouri Department of Economic Development and its various units; and (3) Recent statistics indicating the number of contacts, the in-bound investments, and the trade investments generated by each of the State of Missouri's overseas trade development offices. The costs of operating each office are also provided.

INSTRUCTORS' NOTE

As indicated in the case, David Seamon (newly-appointed Director for the Missouri Department of Economic Development's Division of Business Development & Trade) faces the following situation:

1. Inbound investment of venture capital into Missouri has fallen from $766,000,000 in 2000 to $169,500,000 in 2002.

2, Kevin Simmons, Director of the Missouri Department of Economic Development, has challenged Seamon to double (within three years) the annual number of firms which "actively consider" the State of Missouri as a place to open a new factory or a new office. For purposes of this challenge, Simmons indicates that any firm which makes a written and/or electronic (web-based, telephone, etc.) new factory and/or new office-related inquiry to the Missouri Department of Economic Development will be considered to have met the criteria of "actively considering" the State of Missouri.

As regards lessons and/or information which students should learn from this case, at least four points can be made:

1. At the beginning of the case, students will need to consider the extent to which models and conceptual frameworks developed in the private (i.e., business) sector can be useful to public sector executives. By the end of the case discussion, they are likely to have concluded that in some situations, private sector conceptual frameworks and/or decision tools can be very relevant and useful to public sector managers.

2. Students will need to consider how to turnaround a business and/or organization which is not performing well. During the discussion of the case, students will discover that they have used different approaches to the problem; at this point, they should also discover that the model and/or conceptual framework and/or data analysis tool they use is very likely to impact upon the data and/or alternatives which they consider.

3. Students will be able to compare their solution to one developed by a Spring Semester 2004 MBA class at Southeast Missouri State University; they will also have the opportunity to hear the reaction of David Seamon to the solution proposed by the MBA class.

4. As they work through the case, students will be exposed not only to the challenge faced by David Seamon but also to a bit of information about the State of Missouri' s Department of Economic Development and the tools it uses to stimulate economic growth and development.

DISCUSSION QUESTIONS

I often select one student to lead the discussion. Another approach would be to solicit input from various students at various stages of the analysis. Either way, my usual approach to this case is threefold:

1. STEP #1. Solicit from many students the details of the situation faced by David Seamon. As it happens, this short case does not include a lot of information. Usually, I write much of the information which students do come up with on the board, so that if questions on "facts of the case" arise, we will have that information in front of us.

2. STEP #2. Ask an individual student or the class as a whole to address a very specific series of questions. Those questions, and comments relating to two possible solutions to the case, are as listed below:

1) What is the main problem?

Students usually conclude that David Seamon must develop a plan to double (within three years) the number of written and/or electronic inquiries received by the Missouri Department of Economic Development from companies located in other states and/or overseas.

2) What kind of problem is this?

Instructors should not be surprised if there are as many answers to this question as there are students in the class. Clearly, there is no one "right" answer. However, two alternative approaches, each of which seems quite relevant to the situation, are as indicated below:

1 . Growing a business.

2. Turnaround strategy.

3) For this kind of problem, what are the key variables which decision-makers must consider, and who is the expert who says so?

For students concluding that the main problem is the need to "grow the business," Ansoff (1957) indicates that there are four (and only four) options: (1) Market penetration; (2) Market development; (3) Product development; and (4) Diversification.

Students concluding that the main problem is the need to develop a "turnaround strategy" may find useful a model by Sheth (1985), which identifies nine alternatives which the author believes should be considered: (1) Entrenchment; (2) Sell to intermediaries; (3) Mandatory consumption; (4) Go international; (5) Broaden the product line; (6) New situations; (7) New applications; (8) Repositioning; and (9) Remarketing.

4) What data from the case relate to the key variables?

As implied above (and this is one of the key learning points of the case), the data students present will depend on the main problem they identify. Students believing the main problem relates to the need to "grow the business" will focus on the four options identified by Ansoff (1957); Appendix 1 provides descriptions of each alternative and identifies data from the case which relate to each of them. For students believing the main problem is turnaround strategy-related, Appendix 2 provides definitions of each alternative and then identifies data from the case which relate to them

5) What alternative solutions can be identified?

Because research suggests we make better decisions if we identify alternatives and then chose one, I require students to identify at least two alternatives. Of course, students having difficulties coming up with a second alternative can be reminded that one possible solution is to "change nothing."

6) Which one alternative does the class/student recommend, and why?

"Changing nothing" is not an option for David Seamon, if he wishes to achieve his objective, that is, to double (within three years) the annual number of inquiries received by the State of Missouri from companies outside of Missouri and/or overseas. Students believing the main problem involves the need to "grow the business" will need to present an analysis which touches on each of the growth options identified by Ansoff (1957) . Students believing that the main problem involves the need to create a "turnaround strategy" will need to present an analysis which touches on each of the turnaround strategy options suggested by Sheth (1985).

In the discussion and analysis of this case conducted by the MBA students in the Spring Semester 2004 session of BA65 1 (Strategic Marketing Management), students chose to focus intensively on the turnaround strategy alternative. For additional information on what happened, please see the epilogue.

7) What negatives are associated with the alternative selected by the class leader and/or other members of the class?

Very few solutions are risk and/or problem-free. Negatives associated with the solution proposed by the class leader and/or other members of the class could include the following: (1) The chosen alternative, if it requires the Missouri Department of Economic Development to develop specialized equipment and/or skills which the organization doesn't currently possess, could be expensive both in terms of time and money. Also, because the case probably doesn't provide all the data a decision-maker would need (in other words, it is likely that some important data is missing), it is possible that assumptions made by the class leader regarding the actual situation faced by the Missouri Department of Economic Development are incorrect. If so, the proposed solution might be inappropriate.

3. STEP #3 . Consider (at least briefly) the "take-aways" for the case. That is, of all the different points and issues discussed, what are the two or three issues most-worth remembering.

EPILOGUE(1)

In their comments for David Seamon, students presented arguments which focused on the turnaround strategy options suggested by Sheth (1985). Specific suggestions made by the students included:

1. Entrenchment: The Missouri DED website tells us that the State of Missouri has targeted three industry segments for special interest, attention, and efforts: (1) Plant and life sciences; (2) Information Technology (IT); and (3) Advanced manufacturing. For each of these targeted segments, students suggest that DED staff should identify key firms and/or trade associations, identify key decision makers in these firms and/or organizations, identify the processes they use to make investment decisions, the criteria they use to choose the locations where they are making those investments, etc. Also, DED staff should identify locations in the world where these companies are making investments, and then check to see what sort of incentives (financial or otherwise) those locations are providing to companies in these targeted segments. The point is that if the State of Missouri wants to attract investments from companies in these segments, it needs to be exceptionally knowledgeable regarding not only the individuals who are making the investment decisions and the decision processes used by companies in these segments, but also the decision criteria (including incentives targeted companies are being offered by locations elsewhere in the world) used by these key decision-makers. At the end of the day, to attract investments from players in these targeted industries (or any other industries, for that matter), Missouri needs to be perceived as offering good value for money on characteristics which are important to key decision makers in that industry, and compared to the value for money offered by other locations in the world. Please note: Once DED is certain that it has correctly identified criteria which are especially important to key decision makers in these targeted industries, it might be able to use to good advantage the ideas of permission marketing popularized by Godin (1999), either through direct marketing (buy lists of individuals and/or companies) or using the internet.

Regarding heavy users, students suggest that DED should take a look at the industries (both domestic and overseas) which have been making heavy investments in new factories and/or offices over the last several years. Once it is clear which industries in the world have been heavily engaged (over the last couple of years) in making inbound-investment related activities, it should be possible (through discussions with companies and/or trade associations) to sort out both where in the world these companies are making investments and why. Once DED has this information, it should be possible to use that information to assess the likely attractiveness of Missouri to these heavy-user (that is, heavy inbound investments over the last several years) industries. If the State of Missouri turns out to look highly attractive compared to the decision criteria of one or more heavy-investment industries, DED may wish to consider adding that industry to the list of those identified by the State as targeted industries.

Regarding heavy users, students also suggest that DED should take an intensive look the industry affiliations of companies (domestic or international) which have opened new factories and/or offices in the State of Missouri over the last several years. Perhaps there are industries for which Missouri-based firms do in fact benefit from defensible competitive advantages, whether natural resource-related, location-related, or human capital-related. If so, these advantages should be promoted to other firms in those industries, and/or firms which have moved here recently (note: could also include firms which have been here a long time, too) should be encouraged (incentivized?) to expand their operations here.

Regarding the use of multiple channels, students suggest that DED might be able to benefit importantly by using the sort of permission-style marketing described by Godin (1999). Additional elaboration on this idea can be found in the "New Applications" section of this note. Also, one student suggested that DED should link up with international students studying in Missouri (perhaps stage a one-day "International Student Day" event for them in Jefferson City), provide them with information about both trade and investment-related opportunities with Missouri companies, and then urge these students to communicate this information to relatives and/or business associates in their home country. Another student suggested that civic leaders of cities and/or towns in which overseas and/or domestic firms have located factories and/or offices should meet with the managers of those firms and solicit input from those managers on how to attract additional firms to their area and/or how to motivate (incentivize?) existing firms to expand their operations; these suggestions could then be used locally and/or forwarded to DED. This particular student also suggested that the State of Missouri should have a program so that if a town or city discovers that a small piece of missing infrastructure (for example, a rail spur) is preventing investments by overseas and/or domestic firms, that city or town could apply for funding, construct the missing infrastructure, and then repay the funds over a period of time, from its increased tax revenues.

2. Regarding intermediaries, students suggest that DED may wish to consider two specific initiatives:

a. Regarding the targeted industries (and, for that matter, other industries as well), there may be key suppliers and/or key customers already located here in Missouri or willing to consider establishing facilities here in Missouri. Assuming so, one might be able to attract firms in the targeted industries and/or other desirable investors here to Missouri because key suppliers and/or customers and/or partners of other kinds are already located here. Of course, even for non-targeted industries, if that industry already has key suppliers and/or customers and/or other partners operating here in Missouri, it seems likely that efforts to attract companies in this industry through their key suppliers and/or customers and/or other partners could be quite successful.

b. Regarding the targeted industries (and, for that matter, other industries as well), there may be trade associations or other individual and/or institutional stakeholders who could be interested in partnering-up with DED to attract key investors to Missouri. For example, perhaps the Missouri Botanical Garden is interested in motivating a particular domestic and/or overseas company to establish an office or operation in Missouri; assuming so, perhaps some sort of joint effort could be made by the Missouri Botanical Garden and the DED, to achieve that particular objective.

3. Regarding mandatory consumption: It does not appear likely that any state, local, or federal ordinances will be passed which will require domestic and/or overseas firms to invest in Missouri. However, students suggest that to the extent that a firm's key customers and/or key suppliers and/or other key partners already operate here in Missouri, it may be possible for these organizations to create situations where a particular company feels compelled (by that key supplier, customer, and/or other partner) to establish a presence in Missouri.

4. Regarding international: Students identified a couple of issues here, including the following:

a. Regarding the overseas offices, students had a variety of different suggestions. Some felt that since the "developed world" offices were producing nearing all of the inbound investment and nearly all of the trade as well, any new initiative by Missouri should focus on "developed world" locations. Other students felt that markets like China should certainly be targeted. It seems likely that resolving this issue will require a review by DED of exactly what role the trade offices are supposed to fill. If their primary objective is to generate inbound investments, it seems unlikely that opening an office in China will be useful. On the other hand, if the primary role of State of Missouri trade offices is to generate and/or expand overseas markets for firms based in Missouri, then opening a trade office in China might be very appropriate. Irrespective of the criterion agreed upon, it seems unlikely that the office in Ghana (a small market, with low Gross Domestic Product per capita (GDP)) will be very successful, unless substantial sales are made to the Ghanaian government and/or industry and/or this office can be used to tap the potential of larger markets elsewhere on the continent (for example, Nigeria and/or South Africa).

b. From a transportation and logistics point of view, one advantage of Missouri is that it is the population center of the United States. The implication is that for overseas (or, for that matter, domestic) companies desiring to serve their individual consumers efficiently and effectively, and/or for those overseas (or domestic) companies for whom transportation is a particularly important and/or costly issue, Missouri may be a very good place to establish a presence. Students believe that companies using trucks and needing to be able to service every U.S. customer within 24 hours will need a total of four or five U. S. warehouses; students believe too that Missouri can be one of the four or five locations in this sort of distribution system. The ability to move heavy and/or bulky products into the U.S. heartland using cheap water transportation (i.e., barges on the Mississippi and/or Missouri Rivers) could also be an advantage to domestic and/or overseas companies in industries which involve transportation of those sorts of materials or products. Students note that there may be distribution and/or logistics services-related companies who would be interested in partnering-up with DED to attract additional distribution and/or logistics business from domestic and/or overseas firms.

5. Regarding the idea of broadening the product line: Students had a couple of suggestions here, including the idea that some states have been far more successful in attracting new investments than others. Students suggest that comparing the policies and procedures of states which have been very successful in attracting investments from domestic andlor overseas companies (for example, policies and procedures of the 6-10 states which have been most successful in this regard) might be a very useful benchmarking sort of exercise. Students suggest that comparing the policies and procedures of these highly successful states against the policies and procedures of the 6-10 states which have been least successful in attracting new investments might also be a useful exercise.

6. Regarding new situations: The case does not indicate whether DED partners up with existing Missouri companies and/or institutions to promote Missouri at trade association meetings and/or other opportunities. If not, students recommend that the DED begin working with existing Missouri companies to identify firms (suppliers, customers, other sorts of partners) whose presence in Missouri could strengthen the competitive advantage of firms already operating here. Once a "we need them here in Missouri" firm has been identified, DED could work with existing Missouri companies to attract them here, either through trade association meetings and/or joint presentations (DED and the existing Missouri company) to the targeted company.

7. Regarding new applications: Students believe that it should be possible to use the web andlor the internet in a much more focused and intensive and productive maimer. The web/internet-related suggestions made by students include the following:

a. Some states have been much more effective at attracting inbound investment than others. Several students suggested identifying states which had been very successful and then having a look at the trade development-related websites of those states, to see if there are interesting ideas and/or approaches which DED could use. One idea suggested by several students who looked at the websites of other states is to have portions of the website (for example, sections relating to inbound investment and/or Missouri's unique competitive advantages) available in languages other than English. Another idea suggested by students who examined the websites of other states is to make sure that the DED website features links with trade-related websites such as tradeport.org.

b. Several students suggested that since DED has targeted three industries (that is, plant and life sciences, IT, and advanced manufacturing), there should be places on the DED website where individuals and/or organizations involved in those industries can go to find information which is particularly relevant to their particular industry and their investment decisions. Obviously, this would require that DED do research to uncover the issues and/or information which are especially important to individuals and/or organizations in each of these industries.

c. Several students suggested that DED's use of the website and the internet could be much more proactive. In the case of the targeted industries, for example, students suggested that DED could send (on a regular basis) emails to individuals, companies, and/or institutions in those industries. Even better, perhaps, would be to engage in what Godin (1999) calls "permission marketing," that is, contact the individuals and/or institutions in the targeted industries and ask permission from the recipients for DED to send them (on a regular, ongoing basis) information about the State of Missouri's initiatives in this particular industry.

8. Regarding repositioning, and as suggested earlier, students suggested targeting not only firms in the targeted industries (plant and life sciences, IT, and advanced manufacturing) but also key suppliers, customers, and/or other stakeholders who are important to those firms. Students thought that attracting investments to Missouri by partners whose investments strengthen the competitive advantages enjoyed by firms already in Missouri is an especially useful idea. Also, they perceived that if DED partners-up to do this with firms already present in Missouri, those firms may be willing and able to provide resources to compliment and/or supplement the limited resources available to DED.

9. Regarding re-marketing: Several students commented on the need to develop brand equity (that is, the value of the brand) for the State of Missouri. Experts (see for example Aaker 1991) indicate that the key variables for building the value of any brand (including Missouri) include: (1) Brand loyalty; (2) Brand awareness; (3) Perceived quality; and (4) Brand associations. For the targeted industries (that is, plant and life sciences, IT, and advanced manufacturing), it seems likely that DED could positively impact awareness, perceived quality, and the brand associations of Missouri by attending trade association meetings, advertising in trade publications, partnering-up with existing Missouri companies andlor institutions in the targeted industries to attract investments from key suppliers, customers, and/or other partners, and so on.

As for the idea of moving from primary to secondary (that is, value-added services), many students observed that Missouri needs to work toward providing a "one stop" service for potential investors (that is, one location or contact point where would-be investors can get everything they need (information, operating permits, environmental permits, etc.) so as to be able to create and then operate a business in Missouri. Many countries offer such services; surely, the State of Missouri ought to be able to provide this kind of service as well. As for resolving the sorts of conflicts which can arise between the DED on the one hand and the Department of Natural Resources (DNR) on the other, students suggest taking a look to see how other states are handling these sorts of issues. If there are some states which seem to be doing a better job than others in balancing environment versus economic development-related concerns, study and learn from those states..

Regarding the idea of moving from consumer to industrial or the opposite: It appears that the State of Missouri currently targets its trade development initiatives toward organizations and institutions. In the targeted industries, however, there may be certain individuals whose attitudes and opinions impact powerfully on the investment-related decisions of firms in the industry. If so, DED should certainly consider targeting not only institutions in the industry but also individuals who play key influencing roles as well.

EPILOGUE(2)

After receiving and reviewing the suggestions provided by students in the Spring Semester 2004 MK651 class, David Seamon sent the author of the case the following brief comment: ". . . very insightful and very good. I intend to send it (the suggestions) to my project managers and to Director Simmons. Many thanks for providing."

References

REFERENCES

Aaker, D. (1991). Managing brand equity: Capitalizing on the value of a brand name. New York: The Free Press.

Ansoff, I. (1957). Strategies for diversification. Harvard Business Review, 35(5), 116

Godin, S. (1999). Permission marketing: Turning strangers into friends and friends into customers. New York: Simon & Schuster.

Sheth, J. (1985). Winning back your market: The inside stories of the companies that did it. New York: John Wiley & Sons.

AuthorAffiliation

David K. Smith, Jr., Southeast Missouri State University

Appendix

Appendix 1: Case Data Relating to the "Grow the Business" Model

1. Market penetration. Ansoff indicates that this option involves increasing one' s own market share of existing products and/or services being sold to existing customers. The case provides no information which directly addresses this option. The large decline in venture capital invested in Missouri over the period 2000-2002 ($766,000,000 in 2000, $169,500,000 in 2002) suggests that Missouri may be losing (rather than gaining) market share from existing customers. The case suggests that one factor which could be contributing to this loss of investment is that investors are disadvantaged by the fact that Missouri does not have a "one-stop" orientation toward investments, i.e., there is no one contact point from which potential investors can receive not only information about opportunities in Missouri but also the licenses andlor permits they would need so as to be able to operate in the state.

2. Market development. Ansoff indicates that this option involves selling existing products andlor services to new customers. The case indicates that the Missouri Department of Economic Development, in an attempt to attract trade and/or new inbound investments (i.e., new offices and/or factories) from overseas investors, has opened overseas trade offices in a number of locations around the world, including Accra, London, Mainz, several locations in Mexico, Seoul, Taipei, and Tokyo. In other words, the Department of Economic Development is vigorously pursuing the "market development" option. As for the performance of these overseas offices, Tokyo has generated 137% of its $75,000,000 inbound investment quota and London has generated 26% of its $100,000,000 inbound investment quota; all other overseas offices together have generated only $3,000,000 of inbound investments. As for trade developed by the overseas offices, the London office has generated more than ten times its $150,000,000 quota, the Tokyo office has generated 78% of its $100,000,000 quota, and the Guadalajara (Mexico) office has generated 56% of its $50,000,000 quota. Total trade developed by all other offices is less than $4,000,000.

3. Product development. Ansoff indicates that this option involves selling new products and/or services to existing customers. The case does not indicate whether the Missouri Department of Economic Development is pursuing this option.

4. Diversification. Ansoff indicates that this option involves selling new products and/or services to new customers. The case indicates that the Missouri Department of Economic Development has targeted companies in three industries (plant and life sciences, information technology, and advanced manufacturing) to receive special promotional efforts and attention.

Appendix 2: Case Data Relating to the Turnaround Strategy Model

1. Entrenchment: According to Sheth, this turnaround option involves taking market share away from competitors. Four approaches which he suggests considering are: (a) segment the market (and then introduce different products and/or services for each segments); (b) identify specialty markets; (c) go after heavy users of the product or service; and (d) seek multiple channels of distribution. As indicated in the case, the Missouri Department of Economic Development has identified four industries (plant and life sciences, information technology, and advanced manufacturing) as being of special interest, and has targeted these areas for special promotional efforts.

2. Intermediaries: Sheth indicates that the idea behind this option is to sell to some sort of intermediate customer, not to individual customers one-by-one. There is no data in the case suggesting that the Missouri Department of Economic Development is attempting to generate trade andlor investments through intermediaries.

3. Mandatory consumption: Sheth indicates that this turnaround option involves changing the environment in such a way that customers are required (by governments, for example) to purchase the product. It seems very unlikely (and, there is no data in the case suggesting it, either) that any governmental unit would require a company to invest in and/or initiate trade with Missouri.

4. Go international: Sheth indicates that this turnaround option has four substrategies: (a) global marketing (no changes to the positioning or the actual product or service); (b) product differentiation (the actual product or service is adjusted); (c) market differentiation (the positioning used overseas is adjusted; and (d) unique marketing (both the positioning and the actual product or service is changed). While it is not clear exactly which of the above options the Missouri Department of Economic Development is using, it is clear that the department has made major efforts (through its trade development offices in Accra, London, Mainz, several locations in Mexico, Taipei, Seoul, and Tokyo) to develop trade and inbound investments from overseas firms.

5. Broaden the Product Line: This option, according to Sheth, involves thinking of the function filled by a product or service and then thinking of the product or service as a component in a system. The case does not provide any examples of the Missouri Department of Economic Development utilizing this approach.

6. New situations: Sheth indicates that this turnaround option involves seeking out different times, places, and/or images and positioning for a product or service. The case does not provide any examples of the Missouri Department of Economic Development utilizing this approach.

7. New applications: According to Sheth, this turnaround option usually involves some sort of functional change in the product. The case does not provide any examples of the Missouri Department of Economic Development utilizing this approach.

8. Repositioning: Sheth indicates that this turnaround option involves defining the image of a product or service into new usage situation within the same general application context. The case does not provide any examples of the Missouri Department of Economic Development utilizing this approach.

9 Redefine markets: According to Sheth, there are four approaches to this turnaround option: (a) convert a generic (unbranded) product to a branded product; (b) shift from primary (that is, basic) to secondary (that is, bundled with additional services) products or services; (c) shift from selling to industrial! institutional customers to final customers; and (d) shift from selling to individual customers to selling to industrial/institutional customers. The only evidence in the case of use (or mis-use) of any of the above strategies is the fact that the State of Missouri does not operate a "one-stop" investment office, where potential trade and/or investment partners could receive not only information but also the permits required to be able to operate in Missouri.

Subject: Economic development; Foreign investments in the US; Turnaround management; Government agencies; Case studies

Location: United States--US, Missouri

Company / organization: Name: Department of Economic Development-Missouri; NAICS: 926110

Classification: 9130: Experimental/theoretical; 9550: Public sector; 2310: Planning; 1310: Foreign investment in the US

Publication title: Journal of the International Academy for Case Studies

Volume: 11

Issue: 4

Pages: 107-120

Number of pages: 14

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 10784950

Source type: Reports

Language of publication: English

Document type: Business Case, Feature

Document feature: References

ProQuest document ID: 216292637

Document URL: http://search.proquest.com/docview/216292637?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-13

Database: ABI/INFORM Complete

Document 100 of 100

ST. LOUIS CHEMICAL: THE INVESTMENT DECISION

Author: Kunz, David A

ProQuest document link

Abstract:

St. Louis Chemical is a regional chemical distributor, headquartered in St. Louis. Don Williams, the President and primary owner, began St. Louis Chemical five years ago after a successful career in chemical sales and marketing. The company reported small losses during it first two years of operation but has since reported increasing sales and profits. The growth has required the acquisition of equipment, expansion of storage capacity and increasing the size of the work force. The unexpected withdrawal of one of St. Louis Chemical's competitors from the region has provided the opportunity to increase its packaged goods sales, in particular, sales of material in 55 gallon drums. However, St. Louis Chemical's 55 gallon drum filling equipment is already operating at capacity. To take advantage of this opportunity, additional equipment must be obtained, requiring a major capital investment. It is estimated that St. Louis Chemical must increase its drum filling capacity by at least 200, 000 to 400, 000 drums annually. The firm has no systematic capital expenditure evaluation process or an estimate of its cost of capital. [PUBLICATION ABSTRACT]

Full text:

Headnote

CASE DESCRIPTION

The primary subject matter of this case concerns the issues surrounding evaluation of capital expenditures. Case provides a systematic approach to evaluating capital expenditures including a review of alternative capital budgeting methods and the relationship between cost of capital and capital budgeting. Secondary issues include cost of capital theory and the advantages and disadvantages of financial leverage. The case requires students to have an advanced knowledge of accounting, finance and general business issues thus the case has a difficulty level of four (senior level) or higher. In particular, an understanding of capital budgeting practices and cost of capital issues are necessary to solve the case. The case is designed to be taught in one class session of approximately 1.25 hours and is expected to require 4-6 hours of preparation time from the students.

CASE SYNOPSIS

St. Louis Chemical is a regional chemical distributor, headquartered in St. Louis. Don Williams, the President and primary owner, began St. Louis Chemical five years ago after a successful career in chemical sales and marketing. The company reported small losses during it first two years of operation but has since reported increasing sales and profits. The growth has required the acquisition of equipment, expansion of storage capacity and increasing the size of the work force.

The unexpected withdrawal of one of St. Louis Chemical's competitors from the region has provided the opportunity to increase its packaged goods sales, in particular, sales of material in 55 gallon drums. However, St. Louis Chemical's 55 gallon drum filling equipment is already operating at capacity. To take advantage of this opportunity, additional equipment must be obtained, requiring a major capital investment. It is estimated that St. Louis Chemical must increase its drum filling capacity by at least 200, 000 to 400, 000 drums annually. The firm has no systematic capital expenditure evaluation process or an estimate of its cost of capital.

INSTRUCTORS' NOTES

CASE OVERVIEW

As the case opened Don Williams, the President of the St. Louis Chemical, a regional chemical distributor, headquartered in St. Louis is considering the opportunity to increase its packaged goods sales, in particular, sales of material in 55 gallon drums. The company's 55 gallon drum filling equipment is operating at capacity, thus to take advantage of this opportunity, additional equipment must be obtained, requiring a major capital investment. It is estimated that, St. Louis Chemical must increase its drum filling capacity by at least 200,000 to 400,000 drums annually.

Williams is considering two alternatives proposed by the company's engineer. The first is the acquisition and installation of used equipment that will provide the capacity to fill an additional 200,000 fifty-five gallon drums annually. The used equipment will cost $860,000 to acquire and install. The equipment is projected to have an estimated life of three years. The second option is the acquisition and installation of new equipment with the capacity to fill 400,000 drums annually. The new equipment would cost $2,480,000 to acquire and install and have an economic life of seven years. The new equipment is more efficient thus the cost to fill a drum is less than the per drum filling cost of the used equipment. Williams asked Bush to lead the evaluation process. The company does not have a formal evaluation process for capital projects.

Bush thinks the used equipment could be obtained without new bank debt. The acquisition of the new equipment would require new bank borrowing. Bush feels that Williams may be willing to consider using debt if she can convince him of the advantages of using debt in the firm's capital structure. The evaluation of each alternative requires an estimate of the financial benefits associated with each.

The learning objectives of the case include: 1) Introducing students to a systematic approach to capital budgeting decisions 2) Examining how firm's cost of capital is calculated and financial theory regarding a firm's optimum capital structure 3) Examining the relationship between a firm's cost of capital, capital budgeting and long-term financial performance 4) Examining capital expenditure evaluation techniques (NPV, IRR and Cash Payback and 5) Exploring non- financial issues that need to be considered when evaluating capital expenditures.

DISCUSSION QUESTIONS

1. Prepare a presentation for Williams regarding the concept of WACC.

Simply stated the weighted average cost of capital (WACC) is the cost the company is paying to finance its assets and reflects the riskiness of the firm or the firm's assets. As its name indicates, it is a weighted average of the costs of the various sources of capital (debt and equity) used in the firm's capital structure. What is not so readily apparent by its name is that the WACC is an after-tax cost. In other words, it is calculated using the after-tax cost of each source of capital. Interest paid by a business is tax deductible, thus the cost of debt needs to be converted to an after-tax cost by multiplying the before-tax interest rate by one minus the firm's marginal income tax rate. The firm's WACC is also referred to as the firm's marginal cost of capital or what a firm must pay for its next dollar of capital. Another point that should be made is since the WACC is used by businesses to evaluate possible long-term expenditures (capital projects), only long-term capital sources are included in the calculation. Thus, most firms do not include the cost of short-term debt in the calculation.

To determine WACC, a firm must 1) calculate the cost it must pay for each source of capital and 2) determine the target mix of debt and equity to be used by the firm. The cost of each source of capital and the target capital structure are provided in the case. St. Louis Chemical's before-tax cost of debt is given as 10% and its cost of common equity is given as 16%. St. Louis Chemical's target capital structure is given as 30% debt and 70% equity. For a detailed discussion of how a firm calculates its cost of debt and cost of equity, see Eugene Brigham and Joel Houston's "Fundamentals of Financial Management," 10th edition, Thompson-Southwestern Publishers or a number of other finance textbooks.

2. Calculate St. Louis Chemical's WACC (round to the nearest whole number). What arguments should be made to convince Williams of the advantage of using long-term debt in the firm's capital structure?

WACC formula:

WACC = W^sub d^(k^sub d^)(l-t) + W^sub 8^(k^sub 8^)

Where: w^sub d^ = weight of debt in the company's target capital structure

K^sub d^ = before-tax cost of debt

t = marginal income tax rate

W^sub 8^ = weight of equity in the company's target capital structure

k^sub 8^ = cost of equity

St. Louis Chemical's WACC = .30 (.10) (1-.30) + .70 (.16)

= .021 +.112

= .133 or 13.3% use 13%

The best argument that can be made to convince Williams to use debt capital in its capital structure is to calculate the firm's WACC with and without debt. Without debt, the firm's cost of capital is 16% (cost of capital and cost of equity are the same) and with 30% debt, its cost of capital is 13%. The use of debt lowers St. Louis Chemical's cost of capital because low cost debt capital is substituted for high cost equity capital. Debt has a lower cost than equity because to the holder of debt there is less risk. Debt has less risk because the certainty of payments associated with debt (interest and principal) is greater than the payments associated with equity (dividends and stock appreciation). Debt payments are legal obligations thus are paid before any payment to equity shareholders. Because there is less risk associated with debt, the providers of debt are satisfied with a lower but more certain return. The downside of debt is the fixed nature of the payments, thus the use of debt by a firm increases its financial risk. The more debt a firm has, the greater the financial risk or financial leverage. The introduction of debt into a firm's capital structure will at first cause the WACC to decline, but eventually the use of large amounts of debt will cause the WACC to increase. What businesses attempt to achieve is a capital structure which provides the lowest cost of capital because it is at that point the value of the firm is maximized.

3. Since the used equipment will be financed with internal capital and the new equipment with a bank loan, should the same discount rate be used to evaluate each alternative? Explain.

The discount rate used to evaluate the project reflects the risk level of the project, not the cost of the financing. The cost of capital represents the risk level of the firm's assets, and since both alternatives appear to have the same risk level as the firm's existing assets, the cost of capital should be used to evaluate each alternative.

4. Explain why an accurate WACC is important to a firm's long-term success.

A firm's WACC is used to assess investment decisions. Assets must return at least the firm's cost of capital (what it must pay for the capital to acquire the asset). If an asset's return is less than the WACC, shareholders will not receive their required return. If a firm underestimates its WACC, it may invest in assets (projects) that do not yield the necessary return. If a firm overestimates its WACC, it may not invest in assets that would yield the necessary return (missed opportunities). Either error will result in problems. If the WACC is underestimated, the firm risks losing equity capital as unsatisfied investors take their funds elsewhere or will have difficulty raising capital in the future. If the WACC is overestimated, the firm risks missing profitable growth opportunities. Making investment decisions based on informal analysis is an unacceptable process and will not result in an effective allocation of the firm's scarce resources.

5. Evaluate the strengths and weaknesses of the NPV, IRR and Cash Payback Period capital expenditure budgeting methods. Prepare a recommendation for Williams regarding the capital budgeting method or methods to use in evaluating the expansion alternatives. Support your answer.

Cash Payback Period is the number of years it takes a firm to recover the original investment. For example, if a capital project requires an investment of $10,000 and is expected to return $5,000 for each of the next four years, the Payback Period would be two years. The advantages of the Payback Period include: 1) easy to calculate and explain, 2) focuses on future cash flows, and 3) places a premium on liquidity (i.e. a quick return of the investment). Disadvantages: 1) ignores time value of money (i.e. a dollar received in year three is assumed to be worth the same as a dollar received today), 2) ignores cash flows beyond the payback period, and 3) does not include an accept/reject feature.

Net Present Value (NPV) method is determined by 1) calculating the present value of the future cash flows (using the WACC as the discount rate) and 2) deducting the project's cost from the present value of the future cash flows. If the present value of the future cash flows exceeds the project's cost, the project is said to have a positive NPV. Stated another way, if the project's value (the present value of its future cash flows) exceeds its cost, the project is a good investment and should be accepted. Advantages of this method include: 1) focuses on future cash flows, 2) takes into account time value of money, 3) considers all cash flows associated with the project, and 4) includes an accept/reject feature. Disadvantages: 1) relatively difficult to explain and calculate, and 2) requires knowledge of a firm's WACC.

Internal Rate of Return (IRR) method is calculated by determining the discount rate that will cause the present value of the future cash flows to equal the project's cost. The discount rate is the project's internal rate of return (IRR). If the IRR exceeds the firm's WACC, the project should be accepted. Advantages of this method include: 1) focuses on future cash flows, 2) takes into account time value of money, 3) considers all cash flows associated with the project, and 4) does not require knowledge of a firm's WACC. Disadvantages: 1) relatively difficult to explain and calculate, and 2) if the project's future cash flows include some years with cash outflows rather than cash inflows, multiple IRRs may result.

Recommendation should include the use of all evaluation methods because each provides valuable information regarding a potential proj ect. Priority should be given to the results of the NPV method because it compares the projects value (the present value of future cash flows, determined by using the firm's WACC as the discount rate) to the projects cost. If a project's value exceeds its cost, it is a good investment. For a more complete discussion of the superiority of the NPV method over the other techniques, see Eugene Brigham and Joel Houston's "Fundamentals of Financial Management".

6. Calculate the NPV, IRR and Cash Payback for each alternative by completing Schedules One and Two. For these calculations, assume a WACC of 13%. Based strictly on the results of these methods, should either option be selected? Why? How could the analysis be improved? Solution requires preparation of a spreadsheet.

See Schedule One and Two for complete calculations. Results are:

View Image -

The Cash Payback Period assumes annual operating cash flows are received evenly over the course of the year while the NPV and IRR assume operating cash flows are received at the end of the year. The Cash Payback Period for the used equipment is 3 years. The full amount of the investment is not recovered until the project is terminated. Based on the results of the evaluation methods, the new equipment would be selected because of the higher NPV.

Note: The case includes two schedules which will aid students in preparing the solution, but the schedules can be omitted to provide a more challenging case.

7. The projected cash flow benefits of both projects did not include the effects of inflation. Future cash flows were determined using a constant selling price and operating costs (real cash flows). The cash flows were then discounted using a WACC that included the impact of inflation (nominal WACC). Discuss the problem with using real cash flows and a nominal WACC when calculating a project's NPV or IRR.

In general, using "real" future cash flows and a "nominal" WACC will result in an understated NPV and IRR or both will have a downward bias. If inflation is neutral, impacting revenues and costs equally, the NPV and IRR will be underestimated. Because revenues are usually greater than costs, revenues will increase by a greater dollar amount than costs. The exact impact of combining "real" cash flows and a "nominal" discount rate can only be determined by removing the impact of inflation from the discount rate or adding the impact of inflation to the future cash flows.

8. What other issues should be considered before a final decision regarding the expansion alternatives is made?

The analysis is based on a single point estimate, and it is highly unlikely that future sales volume will exactly equal projected sales. Although both alternatives appear to be highly profitable, it would be beneficial to evaluate profitability at lower sales volumes. At what minimum level of sales will the projects still be acceptable? The point of this question is to illustrate to the students that the financial analysis is only part of the decision-making process.

View Image -
View Image -
View Image -
References

REFERENCES

Brigham, Eugene & Joel Houston, (2004). Fundamentals of Financial Management, (10th edition), South- Western, a Division of Thomson Learning.

Brigham, Eugene & Michael Ehrhardt, (2002). Financial Management: Theory and Practice, (10th edition), Harcourt Brace College Publishers.

AuthorAffiliation

David A. Kunz, Southeast Missouri State University

Subject: Capital expenditures; Capital budgeting; Chemical industry; Business growth; Equipment purchasing; Decision making; Case studies

Location: United States--US

Classification: 9190: United States; 5120: Purchasing; 8640: Chemical industry; 3100: Capital & debt management; 9130: Experimental/theoretical

Publication title: Journal of the International Academy for Case Studies

Volume: 11

Issue: 4

Pages: 121-130

Number of pages: 10

Publication year: 2005

Publication date: 2005

Year: 2005

Publisher: Jordan Whitney Enterprises, Inc

Place of publication: Arden

Country of publication: United States

Publication subject: Business And Economics

ISSN: 10784950

Source type: Reports

Language of publication: English

Document type: Business Case, Feature

Document feature: Equations Tables References

ProQuest document ID: 216275118

Document URL: http://search.proquest.com/docview/216275118?accountid=38610

Copyright: Copyright The DreamCatchers Group, LLC 2005

Last updated: 2013-09-13

Database: ABI/INFORM Complete