CHAPTER 12
IT Strategy, Sourcing, and Strategic Technology Trends

Introduction

As you have learned throughout this book, organizational performance depends on the quality and responsiveness of its IT infrastructure and information systems. IT strategy shapes the direction of IT investments over the next one to five years to maximize business value and shareholder wealth. As all strategies, IT strategy defines priorities, a road map, budget, and investment plan—and must align with and support the business strategy. Deciding on a strategy entails making decisions about a future that can only be imagined. According to Roger L. Martin’s article in Harvard Business Review: “True strategy is about placing bets and making hard choices. The objective is not to eliminate risk but to increase the odds of success” (Martin, 2014). Strategy making is uncomfortable because it is about taking risks and facing the unknown. Economic and technical experts agree that the extent to which an organization can achieve business–IT alignment (BITA) heavily influences its chances of success and sustainability.

Creating an IT strategy takes into consideration the acquisition, implementation, maintenance, and disposal of all IT assets needed to meet current and future organizational objectives along with methods to monitor, measure, and control how well the IT plan is working. An IT strategic plan also includes an operating plan for acquiring or providing new technology and services. The operating plan defines how to execute the IT strategic plan: for example, deciding on in-house development or sourcing options such as managed services, cloud computing, or software as a service (SaaS). Strategies are measured and evaluated continuously and revised annually during the strategic planning process. Some of these measures are quantifiable, and others are not. A tool that is used to evaluate both financial and nonfinancial metrics of an IT strategy is the balanced scorecard (BSC). The BSC provides a much more comprehensive assessment of a company’s performance than solely relying on numbers on a profit/loss statement.

Another important component of the IT strategy is the acquisition of newly emerging strategic technologies. Strategic technologies can change the way that a business operates and are important differentiators in determining future directions of a company in the digital economy.

In this chapter, we will discuss the components of an IT strategy, the benefits an IT strategy offers, how a BSC helps evaluate the effectiveness of an IT strategy. You will also learn the advantages of discovering and implementing strategic technologies to ensure sustainability. But first, let’s take a look at a best-practice IT Strategic Planning Process that Intel developed.

12.1 IT Strategic Planning

IT strategy focuses on the technology needs of a business. Setting an IT strategy and creating an IT strategic plan is an important part of managing IT. Industry, sector, and specific competitive environments along with prevalent technology trends all shape IT strategy. IT strategy directs investments in social, mobile, analytics, cloud, and other digital technology resources. To create an effective IT strategy, a CIO must have a clear understanding of the business strategy and the environment in which the business exists to create, maintain, and sustain a competitive advantage and business value for the organization.

Strategy addresses fundamental issues such as the company’s position in its industry, its available resources and options, and future directions. A strategy addresses questions such as the following:

  • What is the long-term direction of the business?
  • What is the overall plan for deploying resources?
  • What trade-offs are necessary? What resources will need to be shared?
  • What is the company’s position compared to that of its competitors?
  • How does a company achieve competitive advantage over rivals in order to achieve or maximize profitability?

It’s important to remember that IT strategic planning is not just a one-time activity. It is an ongoing iterative process that focuses on the value drivers in core process areas in order to make targeted improvements.

Value Drivers

Long-term strategic planning starts with a clear understanding of the factors that create significant value and that work together with other factors to drive future revenue and profit at or above their current rates. These factors are value drivers.

In order to create business value, you must identify value drivers and link them to daily activities. For example, it is not enough to identify cost as a key value drive. Cost is almost always a value driver, but for this factor to be useful, you need to drill down to the activities that impact cost. The general types of business value drivers are explained in Table 12.3. Drivers can have a limited life span. Their value can diminish due to chances in the economy or industry, at which time they are replaced with relevant ones.

TABLE 12.3 Three General Types of Business Value Drivers

Type of Business Value Drivers Definitions Examples
Operational—Shorter-term factors Factors that impact cash flow and the cash generation ability through increased efficiency or growth Cost of raw materials, cost of providing service, cost per mile, sales volume, sales revenue
Financial—Medium-term factors Factors that minimize the cost of capital incurred by the company to finance operations Debt level, working capital, capital expenditures, day’s receivables, bad debt expense
Sustainability—Long-term factors Survival factors; factors that enable a business to continue functioning consistently and optimally for a long time Government regulations, industry standards, federal and state environmental laws, privacy and security regulations

Value drivers are considered in the strategic planning process and the BSC methodology.

IT Strategic Plan Objectives

The four objectives of IT strategic plans are to:

  1. Improve management’s understanding of IT opportunities and limitations
  2. Assess current performance
  3. Identify capacity and human resource requirements
  4. Clarify the level of investment required

Various functions in the organization—such as manufacturing, R&D (research and development), and IT—are the most successful when their strategies are forward looking. Forward looking means that they carry out strengths, weaknesses, opportunities, and threats (SWOT) analysis to create their future rather than react to challenges or crises. Additionally, IT implementations that require new infrastructure or the merging of disparate information systems can take years. Long lead times and lack of expertise have prompted companies to explore a variety of IT strategies.

IT and Business Disconnects

According to a survey of business leaders by PwC Advisory, 87% of business leaders believe that IT is critical to their companies’ strategic success, but not all of them work with IT to achieve that success. Less than 50% of business leaders reported that the IT function was very involved in the strategic planning process. When the IT strategy was not aligned with the business strategies, there was a higher risk that the IT project would be abandoned before completion. About 75% of companies abandoned at least one IT project and 30% abandoned more than 10% of IT projects for this reason. There are several possible reasons why a high percentage of IT projects are abandoned—the business strategy changed, technology changed, the project was not going to be completed on time or budget, the project sponsors responsible did not work well together, or the IT strategy was changed to cloud or SaaS.

The fundamental principle to be learned is that when enterprise strategies change, the IT strategies need to change with them. Both strategies are dynamic—to adapt to opportunities and threats.

Corporate and IT Governance

Business and IT strategies depend on shared IT ownership and shared IT governance among all senior managers. When an IT or any type of failure causes harm to customers, business partners, employees, or the environment, then regulatory agencies will hold the CEO accountable—and the public will as well. A high-profile example is BP CEO Tony Hayward, who was held accountable to Congress for “The Role of BP in the Deepwater Horizon Explosion and Oil Spill,” the rig explosion that killed 11 workers and caused the subsea oil gusher that released 60,000+ barrels per day into the Gulf of Mexico. Hayward’s attempts to claim ignorance of the risks and use the SODDI (“some other dude did it”) defense does not get him or any CEOs off the hook. A company can outsource the work, but not the responsibility for it.

Because of the interrelationship between IT and business strategies, IT and other business managers share responsibility in developing IT strategic plans. Therefore, a governance structure needs to be in place that crosses organizational lines and makes senior management responsible for the success of key IT initiatives.

Reactive Approach to IT Investments Will Fail

Few companies today could realize their full potential business value without updated IT infrastructures and services. Yet many companies still struggle to make the right IT decisions and investments in order to leverage relatively new IT trends—cloud computing and SaaS, big data, analytics, social, and mobile. Making IT investments on the basis of an immediate need or threat—rather than according to IT strategy—might be necessary at times, but reactive approaches result in incompatible, redundant, expensive to maintain, or failed systems. These IT investments tend to be patches that rarely align with the business strategy.

Two of the biggest risks and concerns of top management are (1) failing to align IT to real business needs and, as a result, (2) failing to deliver value to the business. Since IT has a dramatic effect on business performance and competitiveness, the failure to manage IT effectively seriously impacts the business.

IT Strategic Planning Process

IT strategic planning is a systematic process for determining what a business should become and how it can best achieve that goal, as you read in Opening Case 12.1. Typically, an organization will evaluate its full potential using SWOT analysis (Tech Note 12.1) and then will decide how to allocate resources to develop critical capabilities. In practice, competing agendas, tight budgets, poor interdepartmental communication, and politics can turn strategic planning discussions into bar room brawls—if they are not well managed.

Generally speaking, during strategic analysis, an organization scans and reviews the political, social, economic, and technical environments of an organization. For example, any company looking to expand its business operations into a developing country has to investigate that country’s political and economic stability and critical infrastructure. In this case, strategic analysis would include reviewing the U.S. Central Intelligence Agency’s (CIA) World Factbook.

The World Factbook provides information on the history, people, government, economy, geography, communications, transportation, military, and transnational issues for 266 world entities. Then the company would need to investigate competitors and their potential reactions to a new entrant into their market.

Equally important, the company would need to assess its ability to compete profitably in the market and impacts of the expansion on other parts of the company. For example, having excess production capacity would require less capital than if a new factory needed to be built.

CIOs undertake IT strategic planning on a yearly, quarterly, or monthly basis. A good IT planning process helps ensure that IT aligns, and stays aligned, within an organization’s business strategy. Because organizational goals change over time, it is not sufficient to develop a long-term IT strategy and not re-examine the strategy on a regular basis. For this reason, IT planning is an ongoing process. The IT planning process results in a formal IT strategy or a reassessment each year or each quarter of the existing portfolio of IT resources.

Recall that the focus of an IT strategy is on how IT creates business value. Typically, annual planning cycles are established to identify potentially beneficial IT services, to perform cost–benefit analyses, and to subject the list of potential projects to resource allocation. Figure 12.3 illustrates the IT strategic planning process.

Illustration of IT strategic planning process.

FIGURE 12.3 IT strategic planning process.

The planning process begins with the creation of a strategic business plan. The long-range IT plan, sometimes referred to as the strategic IT plan, is then based on the strategic business plan. The IT strategic plan starts with the IT vision and strategy, which defines the future concept of what IT should do to achieve the goals, objectives, and strategic position of the firm and how this will be achieved. The overall direction, requirements, and sourcing—either outsourcing or insourcing—of resources, such as infrastructure, application services, data services, security services, IT governance, and management architecture; budget; activities; and time frames are set for three to five years into the future. The planning process continues by addressing lower-level activities with a shorter time frame.

The next level down is a medium-term IT plan, which identifies general project plans in terms of the specific requirements and sourcing of resources as well as the project portfolio. The project portfolio lists major resource projects, including infrastructure, application services, data services, and security services, that are consistent with the long-range plan. Some companies may define their portfolio in terms of applications. The applications portfolio is a list of major, approved information system projects that are also consistent with the long-range plan. Expectations for sourcing of resources in the project or applications portfolio should be driven by the business strategy. Since some of these projects will take more than a year to complete and others will not start in the current year, this plan extends over several years.

The third level is a tactical plan, which details budgets and schedules for current-year projects and activities. In reality, because of the rapid pace of change in technology and the environment, short-term plans may include major items not anticipated in the other plans.

The planning process just described is currently practiced by many organizations. Specifics of the IT planning process, of course, vary among organizations. For example, not all organizations have a high-level IT steering committee. Project priorities may be determined by the IT director, by his or her superior, by company politics, or even on a first-come, first-served basis.

The deliverables from the IT planning process should include the following: an evaluation of the strategic goals and directions of the organization and how IT is aligned; a new or revised IT vision and assessment of the state of the IT division; a statement of the strategies, objectives, and policies for the IT division; and the overall direction, requirements, and sourcing of resources. The entire strategic planning process is often conducted by an IT steering committee.

IT Steering Committees

The IT Steering Committee is a team of managers and staff that represents various business units that establish IT priorities and ensures that the IT department is meeting the needs of the enterprise. The steering committee major tasks are listed in Table 12.4.

TABLE 12.4 Tasks of Steering Committee

Task Description
Set the direction In linking the corporate strategy with the IT strategy, planning is the key activity.
Allocate scarce resources The committee approves the allocation of resources for and within the information systems organization. This includes outsourcing policy.
Make staffing decisions Key IT personnel decisions involve a consultation-and-approval process made by the committee, including outsourcing decisions.
Communicate and provide feedback Information regarding IT activities should flow freely.
Set and evaluate performance metrics The committee should establish performance measures for the IT department and see that they are met. This includes the initiation of SLAs.

The success of steering committees largely depends on the establishment of IT governance, formally established statements that direct the policies regarding IT alignment with organizational goals and allocation of resources.

Concept Check 12.1

  1. Creating an IT strategic plan requires a deep understanding of:
a. Customer relations
b. Accounts payable
c. Global markets
d. Organization’s business environment
Correct or Incorrect?

 

  1. In the strategic planning process, organizations often perform a ________________________ to evaluate the full potential of a business.
a. 360 degree assessment
b. SWOT analysis
c. Balance scorecard
d. Strategy evaluation
Correct or Incorrect?

 

  1. A strategic plan can be undertaken on all of the following, EXCEPT:
a. Annual basis
b. Quarterly basis
c. Monthly basis
d. Weekly basis
Correct or Incorrect?

 

  1. The IT strategic planning process begins with the creation of a:
a. Strategic technology plan
b. Strategic business plan
c. IT long‐range IT plan
d. Tactical plan
Correct or Incorrect?

 

12.2 Aligning IT with Business Objectives

The goal of a good IT strategy is to achieve business–IT alignment. IT strategy should be an integral part of business planning, otherwise strategic systems would be developed in a piecemeal manner and wouldn’t contribute to strategic vision or enable organizations to respond to market changes (Figure 12.4). Therefore, a primary focus of a firm’s IT strategy for its systems or business IT applications should be to align them with the business needs and use them to achieve strategic benefits.

Illustration of role of aligning IT strategy with business strategy to achieve organizational strategic objectives.

FIGURE 12.4 The role of aligning IT strategy with business strategy to achieve organizational strategic objectives is still one of the most important challenges that IT executives face.

Alignment allows a firm to make the most of its IT investments and increase profitability by attaining accord between its business strategies and plans. Even though firms instinctively expect benefits from IT alignment, many of them are resistant to achieving alignment.

Alignment is a complex management activity and calls for extensive communication and collaboration between IT and corporate leaders. Business–IT alignment can be improved by focusing on the following activities:

  1. Commitment to IT planning by senior management Senior management commitment to IT planning is essential to success.
  2. CIO is a member of senior management The key to achieving business–IT alignment is for the CIO to attain strategic influence. Rather than being narrow technologists, CIOs must be both business and technology savvy. The skill set of CIOs is outlined in Table 12.5.
  3. Understanding IT and corporate planning A prerequisite for effective business–IT alignment for the CIO is to understand business planning and for the CEO and business planners to understand their company’s IT planning.
  4. Shared culture and good communication The CIO must understand and buy into the corporate culture so that IS planning does not occur in isolation. Frequent, open, and effective communication is essential to ensure a shared culture and keep everyone aware of planning activities and business dynamics.
  5. Multilevel links Links between business and IT plans should be made at the strategic, tactical, and operational levels.

TABLE 12.5 CIO Skills to Improve Business–IT Alignment

  • Political savvy Effectively understand managers, workers, and their priorities and use that knowledge to influence others to support organizational objectives.
  • Influence, leadership, and power Inspire a shared vision and influence subordinates and superiors.
  • Relationship management Build and maintain working relationships with coworkers and those external to the organization. Negotiate problem solutions without alienating those impacted. Understand others and get their cooperation in nonauthoritarian relationships.
  • Resourcefulness Think strategically and make good decisions under pressure. Can set up complex work systems and engage in flexible problem resolution.
  • Strategic planning Capable of developing long-term objectives and strategies and translating vision into realistic business strategies.
  • Doing what it takes Persevering in the face of obstacles.
  • Leading employees Delegating work to employees effectively; broadening employee opportunities; and interacting fairly with employees.

The first step in achieving business–IT alignment is to understand business objectives and how IT capabilities can best support business requirements; this way strategic planning will ensure that maximum IT dollars are spent on creating business value for the organization. It’s important for IT to understand where the organization is headed and how technology can help it achieve its goals. Aligning technology with business processes is becoming increasingly important due to the pace of change in technology and the business. From business strategy planning to execution, digital technology has become the foundation for everything enterprises do.

Achieving and Sustaining a Competitive Advantage

A well-thought-out and executed IT strategy that aligns with the business to develop, source, and put in place technology that best supports business processes and goals can give an organization a competitive advantage in the marketplace.

In business, as in sports, companies want to win—customers, market share, position in the industry. Basically, this requires gaining an edge over competitors by being first to take advantage of market opportunities, providing great customer experiences, doing something well that others cannot easily imitate, or convincing customers why it is a more valuable alternative than the competition.

Competitiveness relies heavily on IT agility and responsiveness. The benefit of IT agility is that it enables organizations to take advantage of opportunities faster or more effectively.

Closely related to IT agility is flexibility. For example, mobile networks are flexible—able to be set up, moved, or removed easily, without dealing with cables and other physical requirements of wired networks. Mass migration to mobile devices from PCs has expanded the scope of IT beyond traditional organizational boundaries—making location practically irrelevant.

IT agility, flexibility, and mobility are tightly interrelated and fully dependent on an organization’s IT infrastructure and architecture, as discussed in Chapter 2.

Once an enterprise has developed a competitive edge, it can only be maintained and sustained by continually pursuing new and better ways to compete. Maintaining a competitive advantage requires forecasting trends and industry changes and figuring out what the company needs to do to stay ahead of the game. It demands continuously tracking competitors and their future plans and promptly taking corrective action. It’s important to remember that while IT plays a key role in competitive advantage, that advantage is short-lived if competitors quickly duplicate it.

Two of the most widely used methodologies associated with gaining, maintaining, and sustaining a competitive edge are the Competitive Forces Model and Value Chain Model. Both of these are discussed next.

Porter’s Competitive Forces Model

Michael Porter’s competitive forces model, also called the five-forces model, is a simple but powerful strategic planning tool for understanding the strength of an organization’s competitive position in its current environment and in the environment into which it’s considering moving. Professor Porter discusses his model in detail in a 13-minute YouTube video from Harvard Business School.

The model assumes that there are five important forces that determine competitive power in a business situation and influence a company’s position within a given industry and the strategy that management chooses to pursue. Other forces, including new regulations, which affect all companies in the industry and have a rather uniform impact on each company in an industry, are not included in the model.

The Five Forces

According to Porter, five major forces in an industry affect the degree of competition, which impact profit margins and ultimate profitability (Figure 12.5). While each of the five forces need to be assessed individually, it’s their overall interaction that determines potential competitive advantage. For example, while profit margins for pizzerias may be small, the ease of entering that industry draws many new entrants. Conversely, profit margins for delivery services may be large, but the cost of technology needed to support the service is a huge barrier to entry into the market.

Illustration of competitive forces model.

FIGURE 12.5 Porter’s competitive forces model.

The five industry (or market) forces are as follows:

  1. Threat of entry of new competitors Industries that have large profit margins attract entrants into the market to a greater degree than industries with small margins. The same principle applies to jobs—people are attracted to higher-paying jobs, provided that they can meet the criteria or acquire the skills for that job. In order to gain market share, entrants usually need to sell at lower prices as an incentive. Their tactics can force companies already in the industry to defend their market share by lowering prices—reducing profit margin. Thus, this threat puts downward pressure on profit margins by driving down prices.

    This force also refers to the strength of the barriers to entry into an industry, which is how easy it is to enter an industry. The threat of entry is lower (less powerful) when existing companies have ITs that are difficult to duplicate or very expensive. Those ITs create barriers to entry that reduce the threat of entry.

  2. Bargaining power of suppliers Bargaining power is high where the supplier or brand is powerful, such as Apple, Microsoft, and auto manufacturers. Power is determined by how much a company purchases from a supplier. The more powerful company has the leverage to demand better prices or terms, which increase its profit margin. Conversely, suppliers with very little bargaining power tend to have small profit margins.
  3. Bargaining power of customers or buyers This force is the reverse of the bargaining power of suppliers. Examples are Walmart and government agencies. This force is high when there are few large customers or buyers in a market.
  4. Threat of substituting products or services Where there is product-for-product substitution, such as Kindle for Nook, there is downward pressure on prices. As the threat of substitutes increases, the profit margin decreases because sellers need to keep prices competitively low.
  5. Competitive rivalry among existing firms in the industry Fierce competition involves expensive advertising and promotions, intense investments in R&D, or other efforts that cut into profit margins. This force is most likely to be high when entry barriers are low, the threat of substitute products is high, and suppliers and buyers in the market attempt to control it. That is why this force is placed in the center of the model.

The strength of each force is determined by the industry’s structure. Existing companies in an industry need to protect themselves against these forces. Alternatively, they can take advantage of the forces to improve their position or to challenge industry leaders or move into a new industry. The relationships between the forces are shown in Figure 12.5.

Companies can identify the forces that influence competitive advantage in their marketplace and then develop their strategy. Porter (1985) proposed three types of strategies—cost leadership, differentiation, and niche strategies. In Table 12.6, Porter’s three classical strategies are listed first, followed by a list of nine other general strategies for dealing with competitive advantage. Applying the right kinds of technology support can enhance each of these strategies.

TABLE 12.6 Strategies for Competitive Advantage

Strategy Description
Cost leadership Produce product/service at the lowest cost in the industry.
Differentiation Offer different products, services, or product features.
Niche Select a narrow-scope segment (market niche) and be the best in quality, speed, or cost in that segment.
Growth Increase market share, acquire more customers, or sell more types of products.
Alliance Work with business partners in partnerships, alliances, joint ventures, or virtual companies.
Innovation Introduce new products/services; put new features in existing products/services; develop new ways to produce products/services.
Operational effectiveness Improve the manner in which internal business processes are executed so that the firm performs similar activities better than its rivals.
Customer orientation Concentrate on customer satisfaction.
Time Treat time as a resource, then manage it, and use it to the firm’s advantage.
Entry barriers Create barriers to entry. By introducing innovative products or using IT to provide exceptional service, companies can create entry barriers to discourage new entrants.
Customer or supplier lock-in Encourage customers or suppliers to stay with you rather than going to competitors. Reduce customers’ bargaining power by locking them in.
Increase switching costs Discourage customers or suppliers from going to competitors for economic reasons.

Porter’s Value Chain Model

Another useful strategic management tool is Porter’s Value Chain. The Value Chain Model identifies where the greatest value exists in an organization and how that value can be increased. Understanding how your company creates value and identifying ways to add even greater value are essential in developing a competitive strategy. Porter proposed a general-purpose value chain that any organization can use to examine all of its activities and their relationships to each other. These activities fall into two major categories: primary and support.

Primary activities are those business activities directly involved in the production of goods. Primary activities relate directly to the creation, sale, maintenance, and support of a product of services. The five primary activities are as follows:

  1. Inbound logistics, or acquiring and receiving of raw materials and other inputs
  2. Operations, including manufacturing and testing
  3. Outbound logistics, which includes packaging, storage, delivery, and distribution
  4. Marketing and sales to customers
  5. Services, including customer service

Primary activities usually occur sequentially, from 1 to 5. As work progresses, value is added to the product in each activity. To be more specific, incoming materials (1) are processed (in receiving, storage, etc.) in activities called inbound logistics. Next, the materials are used in operations (2), where significant value is added by the process of turning raw materials into products. Products need to be prepared for delivery (packaging, storing, and shipping) in the outbound logistics activities (3). Then marketing and sales (4) attempt to sell the products to customers, increasing product value by creating demand for the company’s products. The value of a sold item is much larger than that of an unsold one. Finally, after-sales service (5), such as warranty service or upgrade notification, is performed for the customer, further adding value.

A variety of support activities feed into one or more of the primary activities. The four support activities are as follows:

  1. The firm’s infrastructure, accounting, finance, and management
  2. Human resources (HR) management
  3. Technology development, and research and development (R&D)
  4. Procurement, or purchasing

Each support activity can be applied to any or all of the primary activities. Support activities may also support each other, as shown in Figure 12.6.

Illustration of a value chain.

FIGURE 12.6 Porter’s value chain. The arrows represent the flow of goods, services, and data in an organization.

Concept Check 12.2

  1. Alignment is a complex management activity that increases as the pace of ________ competition and _____________ change increases.
a. Global, business
b. Business, technology
c. Global, technology
d. Local, business
Correct or Incorrect?

 

  1. Business‐IT alignment can be improved by focusing on all of the following, EXCEPT:
a. Commitment to IT planning by operational personnel
b. CIO is a member of senior management
c. Understanding IT and corporate planning
d. Shared culture and good communication
Correct or Incorrect?

 

  1. The goal of a good IT strategy is to achieve
a. High revenues
b. Lower costs
c. Business‐IT alignment
d. Customer satisfaction
Correct or Incorrect?

 

  1. Once an organization gains a competitive advantage using IT, maintaining and sustaining the competitive advantage relies heavily on the ___________ and _____________ of IT.
a. Speed and accessibility
b. Agility and responsiveness
c. Responsiveness and speed
d. Agility and accessibility
Correct or Incorrect?

 

12.3 IT Sourcing Strategies

IT strategy guides the investment decisions and decisions on the development, acquisition, and/or implementation of information systems. These strategies fall into two broad categories:

  1. In-house development, in which systems are developed or other IT work is done in-house, possibly with the help of consulting companies or vendors. Typically, ITs that provide competitive advantages or that contain proprietary or confidential data are developed and maintained by the organization’s own in-house IT function.
  2. Sourcing, in which systems are developed or IT work is done by a third party or vendor. There are many versions of sourcing, which had been called outsourcing. Work or development can be sourced to consulting companies or vendors that are within the same country, which is referred to as onshore sourcing. Or the work can be sourced offshore to other countries. Sourcing that is done offshore is also called offshoring. Other options are to lease or to purchase ITs as services. Cloud computing and SaaS have expanded sourcing options significantly.

When legacy systems could no longer provide the functionality needed to solve the businesses’ problems, companies migrated to the cloud or SaaS to connect core systems and apps. At most companies today, one or more types of outsourcing arrangements are part of their IT strategy, including cloud computing, SaaS, and other types of “as services” introduced in prior chapters. How these Xaas are sourced is a topic of high interest.

Sourcing and Cloud Services

As you have read, in its simplest form, cloud computing is a way for companies to procure technology as a service (XaaS), including infrastructure (IaaS), applications (AaaS), platforms (PaaS), and business processes, via the Internet. IT resources no longer depend on capital investments and IT developers to own that resource. IT capabilities can be sourced, scaled on, and delivered on demand without physical location, labor, or capital restrictions. As a result, an enterprise’s cloud strategy plays a role in its sourcing strategy and business growth.

Integrating Cloud with On-Premises Systems

While the concept of cloud is simple, an enterprise’s cloud strategy tends to be quite complex. Cloud is being adopted across more of the enterprise, but mostly in addition to on-premises systems—not as full replacements for them. Hybrid solutions create integration challenges. Cloud services—also referred to as edge services—have to integrate back-to-core internal systems. That is, edge services have to connect and share data with enterprise systems such as order and inventory management, ERP, CRM, SCM, legacy financial, and HR systems and on mobile and social platforms.

Tactical Adoption versus Coordinated Cloud Strategy

Deploying cloud services incrementally results in apps and services that are patched together to create end-to-end business processes. This is a short-sighted tactical adoption approach. While this approach may have been sufficient in the recent past, cloud services are increasingly more sophisticated and numerous. Tactical approaches will cause difficult integration problems—as occurred with adoption of ERP, mobile, social, and big data systems. Cloud adoption needs to occur according to a coordinated strategy. Given the ever-changing cloud services, it will be tough to know how to design a sustainable cloud strategy. For example, a new class of cloud offerings is being built around business outcomes instead of as point solutions. In effect, this would be business outcomes as a service.

Determining cloud strategies and lease agreements that best support business needs may require hiring cloud consultants, such as Accenture, Booz Allen, Deloitte, Gartner, HP, IBM, or others.

Cloud Strategy Challenges

From the outset, the top challenges about migrating to the cloud revolved around cybersecurity, privacy, data availability, and the accessibility of the service. The newer challenges relate to cloud strategy, including integration of cloud with on-premises resources, extensibility, and reliability of the cloud service. Extensibility is the ability to get data into and out of the cloud service. These cloud service challenges need to be addressed before deciding on sourcing solutions.

For example, when Nestlé Nespresso S. A. transitioned from a traditional coffee shop to an online distributor in the single-serving coffee machine category, Nespresso needed to replace its complex ERP. By deploying a cloud integration platform, Nespresso has integrated its ERP, warehouse management systems, and ordering tool. Nespresso now leverages its cloud and traditional IT solutions.

In another case, social network LinkedIn migrated to cloud services to support sales and CRM; it began by using noncustomized, out-of-the-box capabilities (Main and Peto, 2013). As the company grew rapidly, the standard cloud services could no longer support the lines of business. Business processes increasingly needed to be integrated with ERP and proprietary systems to generate sales leads. LinkedIn switched to a cloud-based integration platform that is able to connect its lead generation, financial, and CRM systems and its proprietary apps and data warehouse. Integrating cloud and on-premises systems gives salespeople a single view of the data they need to do their jobs.

Outsourcing Challenges

The migration was far from perfect at first, and hard lessons learned early helped achieve impressive results eventually. Six lessons that eBay learned were as follows:

  1. Manage change by securing the commitment of senior leaders in an overt fashion and by recognizing subtle cultural differences that can undermine initial transition efforts.
  2. Assess organizational readiness for a transition from a mental and technical standpoint and set realistic expectations and manage them actively.
  3. Anticipate risks and formulate a plan for mitigating them, beginning with a strategy for dealing with “loss-of-control” threats, both real and imagined.
  4. Build project management infrastructure that recognizes the “process of transition” needs to be managed as carefully as processes being transitioned. Mapping how the AP process should look posttransition and how it will be managed end to end and by whom is important.
  5. Create a governance mechanism that can discreetly collect feedback from the transition project manager and provide formal executive oversight and guidance. Form an executive steering committee that includes two senior managers from each organization and representation from all business units impacted by the outsourcing.
  6. Properly define how success will be measured, both qualitatively and quantitatively. Identifying the right benchmarks for success and vigilantly measuring efforts against them over time are critical. eBay continued to outsource—transitioning its global vendor/supplier maintenance and general ledger activities.

Factors Driving Outsourcing

Enterprises choose outsourcing for the reasons shown in Table 12.7.

TABLE 12.7 Reason Why Organizations Outsource IT functions

Generate revenue
Increase efficiency
Gain agility to respond to changes in the marketplace
Allow enterprise to focus on core competencies
Cut operational costs
Greater acceptance of offshoring as an IT strategy
Cloud computer and SaaS are proven effective IT strategies
Differentiate themselves from competitors
Reduce burden on internal IT department

Outsourcing Risks and Hidden Costs

As companies find that their business strategy is increasingly tied to IT solutions, the concerns about outsourcing risks increase. Risks associated with outsourcing are as follows:

  • Shirking The vendor deliberately underperforms while claiming full payment, for example, billing for more hours than were worked and/or providing excellent staff at first and later replacing them with less qualified ones.
  • Poaching The vendor develops a strategic application for a client and then uses it for other clients.
  • Opportunistic repricing When a client enters into a long-term contract with a vendor, the vendor changes financial terms at some point or overcharges for unanticipated enhancements and contract extensions.
  • Breach of contract by vendor The vendor fails to carry out the terms of the outsourcing agreement.
  • Inability of vendor to deliver as promised Sometimes outsourcers represent themselves as being more skilled than they actually are and they are unable to deliver the products or services that are promised in the outsourcing agreement.
  • Vendor lock-in In the event that the outsourcing relationship does not go well, it can be difficult to get out of the outsourcing agreement.
  • Loss of Control over data Once the data is on the outsourcers servers, the organization has little control over how and when that data can be accessed and by whom.
  • Lower employee morale IT employees may feel devalued as a result of development and services being performed by an outside source.

Depending on what is outsourced and to whom, an organization might end up spending 10% above the budgeted amount to set up the relationship and manage it over time. The budgeted amount may increase anywhere from 15 to 65% when outsourcing is sent offshore and the costs of travel and cultural differences are added in.

Offshoring

Another IT strategy is to offshore IT development and services. Offshoring of software development has become a common practice due to global markets, lower costs, and increased access to skilled labor. About one-third of Fortune 500 companies outsource software development to software companies in India. It is not only the cost and the technical capabilities that matter. Several other factors to consider are the business and political climates in the selected country, the quality of the infrastructure, and risks such as IT competency, human capital, the economy, the legal environment, and cultural differences.

Duke University’s Center for International Business Education and Research studied actual offshoring results. According to their study, Fortune 500 companies reduced costs by offshoring—63% of the companies achieved over 30% annual savings and 14% of them achieved savings over 50%. The respondents were overwhelmingly satisfied with their offshore operations. Three-quarters (72%) said their offshore implementations met or exceeded their expected cost savings. Almost one-third of the respondents (31%) achieved their service level goals within the first five months of their contracts while 75% did so within 12 months. The study concluded that “offshoring delivers faster results than average domestic improvement efforts.” Even though these are very general results, offshoring success stories ease the fears about the risks of offshoring.

Based on case studies, the types of work that are not readily offshored include the following:

  • Work that has not been routinized.
  • Work that if offshored would result in the client company losing too much control over critical operations.
  • Situations in which offshoring would place the client company at too great a risk to its data security, data privacy, or intellectual property and proprietary information.
  • Business activities that rely on an uncommon combination of specific application domain knowledge and IT knowledge in order to do the work properly.

Outsourcing Life Cycle

Regardless of the services an organization wants to outsource, such as manufacturing, data center, applications management, call center, business process, or supply chain, there are multiple ways to approach outsourcing. As with any significant transformation of an organization’s business model, it is always best to follow an organized and methodical approach. The exact approach chosen will be determined by many things, including the following:

  • An organization’s familiarity with outsourcing in any areas other than the one being currently considered
  • What currently exists in-house that can be used as a foundation for the outsourcing process
  • Level of outsourcing sophistication of the procurement and legal groups
  • Whether an organization is just exploring the possibilities of outsourcing or has definite outsourcing objectives

The Five-Phase Outsourcing Life Cycle

Jeff Richards of CIO Professional Services proposes a five-phase outsourcing life cycle, comprising a total of 12 distinct stages (Richards, 2016).

Depending on an organization’s maturity, changing business conditions, or recognition of new information, it can choose to enter or exit the outsourcing life cycle at any point in the process. Just be aware that each entry or exit point has associated risks, costs, and benefits.

Here is a “top level” description of each phase of the outsourcing life cycle shown in Figure 12.7:

  • Phase 1 This is the preparatory phase, where you assess opportunities and develop your overarching strategy and process- or geography-specific business cases for outsourcing.
  • Phase 2 In this phase, you prepare and issue the request for proposal (RFP), evaluate the proposals that are submitted, and select a service provider.
  • Phase 3 Once a service provider has been selected, the next step is to develop and negotiate the contract that will serve as the framework for your relationship with your new business partner.
  • Phase 4 Once the contract is in place, it’s time to plan and execute the service transition. This is the point at which all of your and the service provider’s efforts either come to fruition or go off the track. Time invested in Phases 1 to 3 will mitigate that risk.
  • Phase 5 Finally, with everything in place, the last phase is all about the ongoing management of the Service Level Agreements (SLAs) and the service provider relationship.
Illustration of five-phase outsourcing life cycle.

FIGURE 12.7 The five-phase outsourcing life cycle.

Using this type of phased outsourcing strategy, organization can optimize what, where, and when they acquire IT assets and services.

Tech Note 12.2 discusses a sourcing challenge and solution.

Today, the critical question is no longer whether cloud computing will be a fundamental deployment model for enterprise systems, such as ERP and SCM. Rather, the question is “How can companies profit from the capabilities that cloud computing offers?”

Organizations use a combinations of IT Strategies:

  • in-house
  • onshore or domestic sourcing
  • offshoring
  • cloud computing
  • SaaS

Managing IT Vendor Relationships

When sourcing IT projects, the starting point in building a positive and strong vendor relationship is vendor selection. If a company makes a bad selection or enters into a vaguely worded service contract, most likely the software, app, or implementation will fail, and the vendor will not be able to resolve the problems fast enough, if at all. Failures are usually followed by lawsuits.

Finding and Selecting a Vendor

To minimize interpersonal or technical conflicts with IT vendors, businesses need to thoroughly research the vendor. It is very important to ask questions about the services and products the vendor will provide and get as many specifics as possible. Also take the time to verify the vendor’s claims about its products and check all references to make sure that the vendor has a proven track record of success. When selecting a vendor, two criteria to assess first are experience and stability:

  • Experience with very similar systems of similar size, scope, and requirements. Experience with the ITs that are needed, integrating those ITs into the existing infrastructure and the customer’s industry.
  • Financial and qualified personnel stability. A vendor’s reputation impacts its stability.

Of course, for innovative IT implementations, vendors will not have experience and one major failure—and the lawsuit that follows—can create instability. If those criteria are not met, there is no reason to further consider the vendor.

Research by McKinsey indicates that a majority of technology executives want to have stronger relationships with their IT suppliers, but they often act in ways that undermine that goal. In fact, many corporate customers lose out on the potential benefit of close relationships by an overemphasis on costs instead of value. Ideally, a customer/vendor relationship is a mutually beneficial partnership, and both sides are best served by treating it as such.

Vendors often buy hardware or software from other vendors. In order to avoid problems with the primary IT vendor, check secondary suppliers as well. Ask the primary vendor how they will deliver on their promises if the secondary vendors go out of business or otherwise end their relationship.

Ask for “Proof of Concept” or A Trial Run

A proof of concept (POC) is a vendor demonstration of a product to see how or how well it works. Requesting a “proof of concept” of a vendor product, puts the old adage “it worked in development” to the test in a production environment to ensure that the product under consideration prove can deliver as promised. The results of a POC need to be measurable for use in the decision-making process. For example, a certain performance level may be used as a threshold for acceptance of a product.

A trial run, or pilot, is a little different. In this scenario, a vendor may offer the option to let you test their products or services in a pilot study or a small portion of the business to verify that it fits the company’s needs.

In either case, if the vendor demo or test adds value on a small scale, then the system can be rolled out on a larger scale. If the vendor cannot meet the requirements, then the company avoids a failure.

Contracts: Get Everything in Writing

SLAs are designed to protect the service provider, not the customer, unless the customer takes an informed and active role in the provisions and parameters.

By making both parties aware of their responsibilities and when they may be held liable for failing to live up to those responsibilities, a strong SLA can help prevent many of the disruptions and dangers that can come with sourcing or migrating to the cloud. The provisions and parameters of the contract are the only protections a company has when terms are not met or the arrangement is terminated. No contract should be signed without a thorough legal review.

There is no template SLA, and each cloud solution vendor is unique. Certainly, if a vendor’s SLA is light on details, that alone may be an indicator that the vendor is light on accountability. Additionally, if a sourcing or cloud vendor refuses to improve its SLAs or negotiate vital points, then that vendor should not be considered.

Concept Check 12.3

  1. Deploying cloud services incrementally that results in apps and services that are patched together to create end‐to‐end business processes is known as a:
a. Operational approach
b. Tactical approach
c. Coordinated strategy
d. Point solution
Correct or Incorrect?

 

  1. More recent challenges related to cloud strategy include all of the following, EXCEPT:
a. Integration of cloud with off‐premises resources
b. Integration of cloud with on‐premises resources
c. Extensibility
d. Reliability
Correct or Incorrect?

 

  1. Factors driving IT sourcing as an IT strategy include:
a. Generate revenue
b. Increase efficiency
c. Focus on core competencies
d. Cut operational costs
e. All of the above
Correct or Incorrect?

 

12.4 Balanced Scorecard

Traditionally, the typical business objective could be summed up simply as to make a profit. As a result, performance metrics have typically been based on quantitative measures such as the following:

  • P&L (profit and loss) reports: revenue, expenses, net profit
  • Cash flow statements: enough cash to pay its current liabilities
  • Balance sheets that reflected the overall status of finances at a certain date

These financial metrics are called lagging indicators because they quantify past performance. As such, they represent historical information and are not ideal tools for managing day-to-day operations and planning.

Today, many managers are frustrated by the inadequacies of traditional quantitative performance measures and have completely abandoned financial measures. However, the majority of managers do not want to have to choose between financial and operational measures. Instead, they want a balanced presentation of measures that allow them to view the company from several perspectives simultaneously.

During a year-long research project with 12 companies at the leading edge of performance measurement, Robert Kaplan and David Norton developed a “balanced scorecard,” a new performance measurement system that gives top managers a fast but comprehensive view of the business. The BSC includes financial measures that tell the results of actions already taken. And it complements those financial measures with three sets of operational measures that drive future financial performance: customer satisfaction, internal business processes, and the organization’s ability to learn and improve. With the help of a BSC, managers can take a 360° perspective of the performance of their organization by translating their company’s strategy and mission statements into specific goals and measures.

The Balanced Scorecard

The balanced scorecard provides companies with a blueprint for selecting strategic measures to improve performance and facilitate strategy implementation by enhancing strategic awareness and closer business–IT alignment.

In 1992, Kaplan and Norton introduced the concept of a BSC in their Harvard Business Review (HBR) article, “The Balanced Scorecard – Measures that Drive Performance” (Kaplan and Norton 2008).

Kaplan and Norton compared the BSC to the screens and indicator displays in an airplane cockpit. They explained that during the complex task of flying an airplane, pilots need detailed information about fuel, air speed, altitude, bearing, and other indicators that summarize the current and predicted environment. Reliance on one instrument can be fatal. Similarly, the complexity of managing an organization requires that managers be able to view performance in several areas simultaneously. A BSC or a balanced set of measures provides that valuable information. What was novel about BSC in the 1990s was that it measured a company’s performance using a multidimensional approach of leading indicators as well as lagging indicators.

The BSC is typically used at the end of the strategic planning process to review performance on a regular basis. For example, in the opening case, Intel took a BSC approach to measure its business performance in the final step of its six-step IT strategic planning process.

Using the Balance Scorecard

The BSC can be used to translate strategic plans and mission statements into a set of business objectives and performance metrics that can be quantified and measured to evaluate how well objectives are being achieved.

Objectives set out what the business is trying to achieve. They are action-oriented statements that define the continuous improvement activities that must be done to be successful, that is, achieve a return on investments (ROI ) of at least 10% in 2017. Well-thought-out objectives should meet the five “SMART” criteria shown in Figure 12.8.

Illustration of Smart criteria objectives: Specific, Measurable, Achievable, Relevant, and Timely.

FIGURE 12.8 Smart criteria objectives.

Select the caption to view an interactive version of this figure online.

The BSC is widely accepted as one of the most influential management ideas of the past 75 years. Using the balanced scorecard methodology, performance is measured and evaluated from four different perspectives to ensure that limited resources are invested to achieve the highest possible ROI. These perspectives are as follows:

  1. Financial To succeed financially, how should we appear to our investors and shareholders?
  2. Customer To achieve our vision, how should we provide value to our customers?
  3. Business processes To satisfy our shareholders and customers, what business processes must we focus on and excel at?
  4. Innovation, learning, and growth To achieve our vision, how will we sustain our ability to innovate, learn, change, and improve?

The BSC method is “balanced” because it does not rely solely on traditional financial measures. Instead, it balances financial measures with three forward-looking nonfinancial measures, as shown in Figure 12.9.

Illustration of Balanced Scorecard (BSC) using four metrics to measure performance: one financial metric and three nonfinancial metrics.

FIGURE 12.9 Balanced Scorecard (BSC) uses four metrics to measure performance—one financial metric and three nonfinancial metrics.

Select the caption to view an interactive version of this figure online.

The BSC is not a template that can be applied to business in general or even to an entire industry. Different market situations, product strategies, and competitive environments require different scorecards. Business units need to devise customized scorecards to fit their mission, strategy, technology, and culture. Some examples of measurement criteria that can be used within each of these perspectives are shown in Table 12.8.

TABLE 12.8 Examples of Balanced Scorecard (BSC) Measurement Criteria

Perspective Examples of Measurement Criteria
Financial
  • Revenue and revenue growth rates
  • Earnings and cash flow
  • Asset utilization
  • Project profitability
Customer
  • Market share
  • Customer acquisition, retention, loyalty
  • Customer relationships, satisfaction, likes, recommendations, loyalty
  • Brand image, reputation
  • Price–value relationship
Internal business processes
  • Cycle times, defect rate
  • Production throughput, productivity rates
  • Cost per process
  • Cost per transaction
  • Safety Incident Index
Innovation, learning, and growth
  • Employee skills, morale, turnover, capacity for change
  • IT capabilities
  • Employee motivation
  • R&D
  • Percentage of revenue from new products/services

Companies use BSCs to improve their strategic planning process by the following:

  • Clarifying or updating a business strategy
  • Linking strategic objectives to long-term targets and annual budgets
  • Integrating strategic objectives into resource allocation processes
  • Increasing companywide understanding of the corporate vision and strategy

Applying the BSC

BSC converts senior management priorities into visible, actionable objectives by identifying ways to measure progress against agreed-upon targets.

Assume that a low-cost airline bases its profitability on the following interrelated factors: lower costs, increased revenue, percent of flights departing and arriving on time, competitive pricing, maximum fly time or minimal time jets are on the ground, and the ability of the ground crew to learn to do their jobs faster. Objectives, measures, and targets are diagrammed and detailed in Figure 12.10.

Illustration of low-cost airline's BSC objectives, measures, targets, and actions to achieve targets.

FIGURE 12.10 Overview of a low-cost airline’s BSC objectives, measures, targets, and actions to achieve targets.

Using the results of the BSC methodology, management teams have an agreed-upon set of objectives and measures that are used to identify and set targets and the actions to achieve them that are appropriate for the company’s business model.

Consider JetBlue and Southwest Airlines—both compete to a large extent on price. Yet JetBlue allows one free checked bag while Southwest allows two free checked bags. Now consider the value drivers—time the jet sits on the ground and on-time arrivals. The time it takes to board passengers impacts the ability to take off, which in turn impacts on-ground time and arrival time. Since JetBlue has assigned seats, the terminal crew can control boarding starting at the back of the plane to minimize bottlenecks in the aisle. In contrast, Southwest has open seating, which typically occurs from the front of the jet and can clog the aisle. Now the differing free-baggage policies make sense because the more baggage brought on board, the longer boarding tends to take. By allowing two free checked bags, Southwest attempts to reduce carry-on bags in order to offset the extra time needed for the open-seating boarding process.

By measuring how well targets for on-ground times and arrival times are achieved, both airlines can determine if their actions are optimal or need to be revised. Based on these examples, it is easier to understand the processes involved in the BSC methodology, which start with the business vision and strategy. The general steps include the following:

  1. Identify performance metrics (as in Table 12.4) that link vision and strategy to results—financial performance, operations, innovation, employee performance.
  2. Select meaningful objectives (Figure 12.10).
  3. Select effective measures and targets (Figure 12.10).
  4. Determine the actions needed to achieve the targets (Figure 12.10).
  5. Implement necessary tracking, analytics, communication, and reporting systems, including sensors, data visualization, mashups, and dashboards via social and mobile channels.
  6. Collect, analyze, and compare performance data with targets.
  7. Revise actions to improve performance gaps and take advantage of new opportunities.

BSC is used to clarify and update the strategy, align the IT strategy with the business strategy, and link strategic objectives to long-term goals and annual budgets.

Concept Check 12.4

  1. A balanced scorecard is a strategic management methodology for evaluating performance based on both ________________ and ________________________ metrics.
a. Input, output
b. Cost, benefit
c. Financial, nonfinancial
d. Fiscal, output
Correct or Incorrect?

 

  1. The four performance metrics of the balanced scorecard are:
a. Financial; customer; business processes; innovation, learning and growth
b. Innovation; learning; growth; financial
c. Financial; customer; innovation; learning
d. Customer; business processes; innovation; growth
Correct or Incorrect?

 

  1. The balanced scorecard converts senior management priorities into visible, actionable objectives by identifying ways to measure ____________ against ______________ targets.
a. Revenue, customer
b. Progress, agreed‐upon
c. Progress, customer
d. Costs, future
Correct or Incorrect?

 

12.5 Strategic Technology Trends

To gain the competitive advantage they need to flourish, companies need to strategically invest in emerging strategic technology to widen their set of core competencies and help them differentiate themselves in the market, expand their existing market, or move into different markets. This might include technologies with a high potential for disruption of the business, end-users, or IT; the need for a major investment; or the risk of being a late adopter of the technology.

Every year, Gartner, Inc. highlights top technology trends that will be strategic for most organizations at the Gartner Symposium/ITxpo. Gartner’s top 10 strategic technology trends for 2017 are described in Table 12.9. IT at Work 12.1 describes how ESSA Academy in England used strategic technologies to improve the student experience.

TABLE 12.9 Top 10 Strategic Technology Trends

Trend Strategic Technology Description/Examples
1 Artificial Intelligence and Machine Learning Robots, autonomous vehicles, consumer electronics
2 Intelligent Apps Virtual personal assistant (VPA), Virtual customer assistant (VCA)
3 Intelligent Things Drones, smart appliances
4 Virtual and Augmented Reality Immersive consumer and business content—mobile, wearables, Internet of Things, sensor-rich environments
5 Digital Twin Dynamic software model of a physical thing of system that relies on sensor data. Used to proactively repair and plan for equipment service, mfg. processes, operate factories, predict equipment failure
6 Blockchain and Distributed Ledgers Chains sequentially grouped value exchange transactions—in bitcoins or other tokens—and records them across a peer-to-peer network. Music distribution identity identification, title registry, supply chain.
7 Conversational System Connection points will expand and greater cooperative interaction between devices will emerge creating foundation for a new continuous and ambient digital experience
8 Mesh App and Service Architecture (MASA) Mobile apps, web apps, desktop apps, and IoT apps link to a broad mesh of backend services to create what users view as one “application.”
9 Digital Technology Platforms Basic building blocks (IS, customer experience, analytics and intelligence, IoT, and business ecosystems) for a digital business. A critical enabler to become a digital business.
10 Adaptive Security Architecture IoT creates new vulnerabilities that will require new remediation tools and processes.

Strategic Technology Scanning

To achieve their corporate vision, organizations need to have a structured process in place to identify suitable strategic technologies. In an era of rapid technological change, technology scanning is a critical strategic activity for any organization. To enhance their IT strategy, every organization needs to continually scan for emerging technologies. Understanding the performance improvements provided by new technologies, such as cost savings or service improvements, can range from incremental to revolutionary. Certain strategic technologies can create a basis for significant improvements, while other technologies may address relatively narrow needs and opportunities.

To be most effective, it’s useful to establish a structured approach to strategic technology scanning. The five steps listed in Table 12.10 provide a framework to guide technology scanning activities.

TABLE 12.10 Five Steps to Technology Scanning

Step Activity
1. General Technology Search Conduct a very broad review of new and emerging technologies that might be beneficial to the organization
2. Technology Mapping Conduct structured investigations into an organization’s performance capabilities and identify the points of leverage for technological developments related to cost, reliability, safety, or capacity (for all competing modes)
3. Systems Modeling Develop and maintain a set of models that can be used to evaluate technological improvements as they affect specific aspects of the organization
4. Customer Requirements Analysis Investigate the requirements of selected groups of customers and identify new ways of doing business; estimate resulting customer benefits in cost, speed, reliability, safety, and capacity
5. Analysis of Specific Technologies Examine specific technologies identified as having potential for enhancing performance

Finding Strategic Technologies

One approach to finding possible strategic technologies is to look at what is going on at major research centers and technology industry conferences, such as COMDEX, IBM Inter-Connect, Google Next, Adobe Summit, and HIMSS. Another approach is to look for entirely new areas of technology that are emerging based on fundamental advances in the technology industry, such as Internet of Things (IoT), digital mesh, artificial intelligence, and cybersecurity.

Investing in Strategic Technologies

Once appropriate new strategic technologies have been identified and assessed, companies need to strategically invest in emerging technologies. Although this might include technologies with a high potential for disruption of the business, end-users, or IT; the need for a major investment; or the risk of being a late adopter of the technology, it is money well spent. Through the purchase of emerging strategic technologies, organizations can gain the competitive advantage they need to flourish, widen their set of core competencies, expand their existing market, or move into different markets.

Concept Check 12.5

  1. Strategic technology has the potential to make ____________ impacts on an organization’s _______________ plans, programs and initiatives.
a. Negligible, short‐term
b. Significant, short‐term
c. Negligible, long‐term
d. Significant, long‐term
Correct or Incorrect?

 

  1. To enhance their strategic vision, companies must ______________ scan for emerging technologies.
a. Occasionally
b. Continually
c. Minimally
d. All of the above
Correct or Incorrect?

 

  1. All of the following are steps to technology scanning, EXCEPT:
a. General technology search
b. Technology mapping
c. Systems development
d. Customer requirements analysis
e. Analysis of specific technologies
Correct or Incorrect?

 

Key Terms

agility

applications portfolio

balanced scorecard

barriers to entry

business objectives

business–IT alignment

business strategy

cloud strategy

competitive advantage

competitive forces model

digital mesh

edge service

extensibility

five-forces model

flexibility

in-house development

IT strategic planning

IT strategy

lagging indicators

leading indicators

offshoring

onshore sourcing

operating plan

opportunities

outsourcing

outsource relationship management (ORM) company

primary activities

project portfolio

proof of concept (POC)

responsiveness

sourcing

strategic planning

strategic technology

strategy

strengths

support activities

tactical adoption approach

threats

trail run

value chain model

value driver

weaknesses

Assuring Your Learning

References

  1. Bloomberg Businessweek. “Outsourcing Advice from the Pros.” September 2, 2013. images.businessweek.com/ss/09/02/0213_outsourcing/10.htm
  2. Cisco on Cisco. “Business Management Case Study: How Cisco IT Improved Strategic Vendor Management,” http://www.cisco.com/en/US/about/ciscoitatwork/case_studies/business_management_dl1.html, accessed on July 17, 2017.
  3. Corporate Knights. “2016 Global 100 Results.” Corporate Knights, The Magazine for Clean Capitalism, Winter 2016 Issue, p.1.
  4. Curry, E. and B. Donnellan. “Implementing Sustainable IT Strategy: The Case of Intel,” Journal of Information Technology Teaching Cases, v. 4, pp.41–48. 2014.
  5. essaacademy.org. 2017.
  6. Gruman, G. “Why you should create a vendor management office.” CIO from IDG 2007.
  7. intel.com. 2017.
  8. Kaplan, R. S. and D. P. Norton, “Mastering the Management System.” Harvard Business Review 86, no. 1, January 2008.
  9. Krishnapura, S., S. Achuthan, B. Barnard, L. Vipul, R. Nallapa, S. Rungta, and T. Tang. “Intel’s Data Center Strategy for Business Transformation.” Intel White Paper. January 2014.
  10. Lee, J. “This Bolton School was Failing – until it gave each pupil an iPod.” The Telegraph, January 2015.
  11. Main, A. and J. Peto. “Cloud Orchestration.” Tech Trends 2014. Deloitte University Press (http://dupress.com/). 2013.
  12. Martin, R. L. “The Big Lie of Strategic Planning.” Harvard Business Review, January–February 2014.
  13. Pipe, M. “Seven Ideas for Using Education Technology,” SecEd, July 2016. Accessed from: http://www.sec-ed.co.uk/best-practice/seven-ideas-for-using-educational-technology/
  14. Richards, J. “Introduction to the Outsourcing Lifecycle.” CIO Professional Services, July 2016. Accessed from: http://ciops.com/blog/163-introduction-to-the-outsourcing-lifecycle#.WMAzMVwsBVo
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset