Guiding the Digital Transformation
Vallabh Sambamurthy Robert W. Zmud
2nd Editionof Organizations
Guiding the Digital Transformation of Organizations By Vallabh Sambamurthy and Robert W. Zmud
Second Edition Copyright © 2017
First Edition Copyright © 2012
All rights reserved. No part of this publication shall be reproduced, distributed, or
transmitted in any form or by any means, electronic or mechanical, including photocopying,
recording, or by any information retrieval system without the prior written permission of the
publisher, except in the case of brief quotations embodied in critical reviews and certain
other noncommercial uses permitted by copyright law. For permission requests, email the
publisher at: [email protected].
Published by Legerity Digital Press, LLC
A catalog record for this book is available from the U.S. Library of Congress.
ISBN 978-0-9857955-9-7
Although every precaution has been taken in the preparation of this book, the
publisher and author assume no responsibility for errors or omissions. Neither is any
liability assumed for damages resulting from the use of this information contained herein.
Ordering information:
For all ordering inquiries, please visit www.ldpress.com, email [email protected] or
call toll free at 855-855-9868. Special discounts are available on bulk purchases by
academic institutions, associations, corporations, and others.
Printed in the United States of America.
Cover Illustration by Aaron Z. Williams
TABLE OF CONTENTS
PART 1. DIGITAL STRATEGY 1
Chapter 1 Digital Innovation and Disruption 2
Chapter 2 Digital Strategy Fundamentals 26 Chapter 3 Digitalized Business Models for Pipeline Ecosystems 44 Chapter 4 Digital Strategy Formulation for Pipeline Organizations 70
Chapter 5 Digital Strategy and the External Sourcing of Capabilities 102 Chapter 6 Digitalized Business Models for Network Ecosystems 123
Chapter 7 Digital Strategy Formulation for Network Organizations 150 Chapter 8 Grappling with the Risks of Digitalization 177 Chapter 9 Executive Mandates: Digital Strategy 206
PART 2. DIGITAL INVESTMENT 225
Chapter 10 The Digital Investment Enigma 226 Chapter 11 Strategic Focus 231
Chapter 12 Value Pathways 252 Chapter 13 Building a Persuasive Business Case 265 Chapter 14 Monetizing Benefits Flows 281
Chapter 15 Implementation Planning 300 Chapter 16 Project Management Planning 317
Chapter 17 Executive Mandates: Digital Investment 346 PART 3. PLATFORM MANAGEMENT 353
Chapter 18 A Perpetual Balancing Act 354
Chapter 19 Business Processes 362 Chapter 20 Business Platforms 383
Chapter 21 Enterprise Resource Planning Systems 401 Chapter 22 Digital Platforms 425 Chapter 23 Platform Management Challenges 441
Chapter 24 Enterprise Architecture Design 450 Chapter 25 Digitalization Governance Design 474
Chapter 26 Digitalization Organization Design 497 Chapter 27 Executive Mandates: Platform Management 513
Appendix Basic Concepts 521
Glossary ……………………………………………………………………………………………… 537
1
PART 1. DIGITAL STRATEGY
Chapter 1 Digital Innovation and Disruption
Chapter 2 Digital Strategy Fundamentals
Chapter 3 Digitalized Business Models for Pipeline Ecosystems
Chapter 4 Digital Strategy Formulation for Pipeline Organizations
Chapter 5 Digital Strategy and the External Sourcing of Capabilities
Chapter 6 Digitalized Business Models for Network Ecosystems
Chapter 7 Digital Strategy Formulation for Network Organizations
Chapter 8 Grappling with the Risks of Digitalization
Chapter 9 Executive Mandates: Digital Strategy
2
Chapter 1. Digital Innovation and Disruption
Today there are clear signs of intense, continuous and unprecedented waves
of economic competition. Traditional industries are being disrupted by the arrival of
new firms and, more significant, the emergence of new industries offering novel ways
of fulfilling customer needs and desires. Firms that were household names at the
turn of the century (Walmart, Sears, Cisco, and Dell) are now replaced with new firms
(Facebook, Apple, Google1 and Tesla).
Since 1983, Fortune magazine has published an annual ranking of the most
admired companies. Though methodology and criteria have varied somewhat over
the years, the overall process has remained remarkably consistent. For the 2016
list, these criteria involved assessments of a candidate firm’s: ability to attract and
retain talented people, quality of management, social responsibility, innovativeness,
product/service quality, use of corporate assets, financial health, long-term
investment value, and effectiveness in doing business globally.2
Table 1-1 provides a ranking of the top-ranked most admired companies from
1983 to 2016. In compiling this listing, three-year intervals and companies’ average
rank in the annual top-ten of most admired companies were used. Note two key
insights. First, a number of companies have multiple appearances, suggesting that
these companies were steered by especially-strong leadership teams able to unravel
1 Google is actually one of the business units within Alphabet, a multinational holding
company formed in 2015 by Google’s founders. The more familiar name of Google is used
throughout this book. 2 For more information, see: http://www.kornferry.com/institute/fortune-worlds-
most-admired-companies#sthash.TqIusyvP.dpuf
3
their firms’ competitive situations, formulate effective business strategies, and
successfully implement these strategies. Not surprisingly, the stocks of these most-
admired companies have proven to be extremely good investments.3 Second, there
are two points of major discontinuity in the table: the first appearing in the latter-
years of the 1990s, and the second in the latter-years of the 2000s. These two
points-of-discontinuity reflect two substantive business disruptions.
Table 1-1 Most Admired Companies: 1983-2016
Years Rank
1 2 3 4 5
2014-2016 Apple Google Amazon Berkshire Hathawaya Walt Disney
2011-2013 Apple Google Amazon Coca Cola Berkshire Hathaway
2008-2010 Apple Google Berkshire Hathaway Toyota Motors Johnson & Johnson
2005-2007 General Electric Starbucks Southwest Airlines FedEx Berkshire Hathaway
2002-2004 Walmart Southwest Airlines General Electric Berkshire Hathaway Microsoft
1999-2001 General Electric Microsoft Walmart Cisco Systems
Dell Southwest Airlines
1996-1998 Coca Cola Microsoft Intel Merck Johnson & Johnson
1993-1995 Rubbermaid Coca Cola 3M
Microsoft Home Depot
1990-1992 Merck Rubbermaid Walmart Proctor & Gamble PepsiCo
1987-1989 Merck Rubbermaid Liz Claiborne 3M Boeing
Phillip Morris
1983-1986 IBM Dow Jones HP Merck Coca Cola
a Berkshire Hathaway is a multinational conglomerate that wholly owns a number of companies (e.g., GEICO, BNSF, Fruit of the Loom, Helzberg Diamonds, Duracell, and McLain Trucking, among others) and enjoys substantial holdngs of other companies (e.g., Johnson and Johnson, Coca Cola, IBM, and American Express, among others).
Significant business disruptions occur when an industry’s incumbents face
one or more challengers whose business models offer far greater value to customers
than the incumbents’ business models and these incumbents are unable to effectively
respond to the ensuing competitive threat. A key element in this definition is that of
3 J. Anderson and G. Smith, “A Great Company Can Be a Great investment,” Financial
Analysts Journal, July/August 2006, pp. 86-93).
4
a business model – a simplified and aggregated conceptualization of the value-
creating, profitability-sustaining activities of an organization. Importantly, not all
business innovations are disruptive. A business innovation that is compatible with
an industry’s established business models generally creates short-term benefits (i.e.,
revenue and profitability gains) for the innovating firm, and long-term benefits (i.e.,
the exposure of previously-uncontested competitive niches) for all incumbents.
The two points-of-discontinuity noted above in Table 1-1 reflect periods of
digital disruption, where (1) incumbents in existing industries faced overwhelming
competitive challenges, and (2) entirely new industries (e.g., Internet sales channel,
Internet search) were created. Two forces explain much of this digital disruption:
unceasing advances in digital technologies and globalization.
Digital technologies refer to the many technologies (encompassing
hardware, software and, most often, sophisticated combinations of hardware and
software) involved in specifying, capturing, processing, storing and transmitting data.
Here, data refers to attributes of objects or events represented in digital (discrete
sets of ones and zeroes) form. Through hardware and software innovations
(especially those associated with microprocessor miniaturization), digital
technologies have experienced sustained, exponential growth in performance relative
to cost. Popularly referred to as Moore’s Law, the capability per dollar of digital
technologies essentially doubles each year – enabling an unending stream of new
technological possibilities. Importantly, these technological innovations yield new
digitally-enabled, value-creating functionalities (e.g., Amazon’s digital ordering
process and fulfillment processes), which can be creatively recombined to produce
new functionalities (e.g., Amazon’s 1-Click ordering process), and so on. It is the
5
confluence of such streams of innovative functionalities that periodically drive truly
substantive business disruptions. Today, five technologies represent the tip of the
spear of digital disruption – social, mobile, analytics, cloud, and the Internet of
Things.
Globalization refers to a process of interaction and, especially, integration
among the people, companies and governments of different nations. The
extraordinary advances in digital technologies have broken through well-established
barriers of space and time, ushering in a largely irreversible globalization of business
characterized by vast streams of data (and information) endlessly moving around the
world. As a consequence, firms are rethinking what it means to be global.
Digitally-enabled globalization is requiring established companies to reinvent
themselves in order to: leverage global capabilities, present a common face to global
customers, and compete with digital startups. Prime examples of such globalized
firms are those providing logistics services (UPS and DHL) and technology services
(IBM and Infosys). As economic activity accommodates emerging markets and
refocuses on local communities, new competitive spaces arise – such as firms focused
on meeting consumers’ localized needs regarding travel information (TripAdvisor and
Feefo), temporary asset use (Airbnb and Zipcar), and personalized services (Uber
and TaskRabbit).
In essence, the mind-set that digital technologies primarily represent a
productivity-enhancing tool is being replaced with a new mindset that recognizes
digital technologies as a platform for strategic innovation, transformation and
disruption. Consider, for example, the fintech revolution – the disruptions currently
6
affecting financial services.4,5 The business models of retail banks have traditionally
sought to meet all of their customers’ financial needs. Here, low-cost checking
accounts serve as ‘loss leaders’ to earn attractive margins in other areas (e.g., home
mortgages, car loans, credit cards, investment management, etc.).
Recently, new entrants to the financial services industry seek to exploit
technological advances along with shifts in consumer behavior gravitating toward
self-service and digitally-enabled transaction channels. They are finding success in
weakening and dismantling the relationships that retail banks have developed over
the years with their customers. Typically, these challengers (startups, established
digital banks, and established firms holding strong, broad-based digital capabilities)
target the more-profitable segments of retail banking, making it clear that they have
little interest (at least for now) in handling all of a person’s banking needs. The
people most attracted to these fintech challengers are millennials, small businesses,
and the underbanked – retail banking customer segments particularly sensitive to
costs and to the enhanced consumer experience provided through digital transaction
channels.
The first wave of the fintech revolution focused on payment transactions (e.g.,
PayPal and Square), which represents about six percent of global banking
transactions. The next waves seem to be converging on retail lending (roughly twelve
percent of global banking transactions, e.g., Affirm and SoFi) and retail
savings/investment (roughly fifteen percent, e.g., CircleUp and Loyal3). These
4 G. Bacso, M. Dietz and M. Radnai, “Decoding Financial-Technology Innovation,”
McKinsey Quarterly, Number 2, 2015, pp. 26-27). 5 M. Dietz, P. Härle and S. Khanna, “A Digital Crack in Banking’s Business Model,”
McKinsey Quarterly, Number 2, 2016, pp. 50-53.
7
disruptive business innovations improve on how incumbent retail banks do business
and are ripe for imitation. Taken together, these financial services innovations are
forcing a reinvention of what it means to be a retail bank.
Most of today’s fintechs, which number in the thousands globally, remain under
the regulatory radar but are quickly attracting attention as they reach meaningful
scale. Why all this entrepreneurial activity? Simply put, the potential rewards are
enormous. Capturing just a tiny slice of the $1 trillion global retail banking market
can deliver very attractive returns for owners and investors.
This ongoing disruption of the financial services industry is not an isolated
exception. Digital competitors are entering all industries, creating a need for
strategic responses by established businesses and by the early new entrants. At the
same time, an organization’s digitally-enabled operational business processes have
become mission critical. There is no room for operational errors, even as
organizations strive to increase their pace of digital innovation.
The objective of this book is to depict how today’s exemplar organizations set
and evolve their digitally-enabled business strategies, or stated more directly – their
digital strategies. In this chapter, we begin this conversation by introducing three
key notions:
The Evolving Nature of Markets and Firms
Three Eras of Digital Disruption
The Evolving Landscapes of Industries
The Evolving Nature of Markets and Firms
Markets and firms are historically regarded as significant mechanisms for the
organization of economic activities. Economic exchanges in a market occurs
8
primarily through pricing mechanisms and contractual mechanisms, whereas
economic exchanges within a firm occurs primarily through hierarchical structures
and control structures. Discrete market exchanges can occur between two people
(C2C, or consumer-to-consumer), two organizations (B2B, or business-to-
business) or between an organization and a person (B2C, or business-to-
consumer). Successful markets bring two parties together such that each party is
confident that the exchange will be evenhanded; that is, one party, the consumer,
receives a sought value-unit at a fair price and the other party, the producer, receives
fair compensation for delivering this value-unit to the consumer.
Successful markets are characterized by three key attributes:
Demand exists for the value-units being exchanged.
The market is profitable.
The market is efficient.
An efficient market exists when maximal opportunities are provided to producers
and consumers to effect transactions with minimal transaction costs. Inefficient
markets are susceptible to market failure, with four conditions explaining a
preponderance of market failures:
One or both parties hold incomplete information about the market, e.g., existence of alternative buyers/sellers, knowledge of the other party and this party’s history of performance, goods/services quality, production costs,
availability of substitute goods/services, etc.
One or both parties are exposed to excessive risk, i.e., trust mechanisms are
lacking or are of inferior quality.
One or more third-parties not directly involved in an exchange or in facilitating the exchange benefit from the exchange, e.g., a ‘kickback’.
One of the parties holds undue influence, e.g., monopoly power or huge size, and dictates the parameters of the exchange to the detriment of the
9
other party.
When one or more of these conditions are present, the likelihood of market
participation decreases and the likelihood of participant dissatisfaction increases.
As the value-units being exchanged increased in complexity and sophistication
as a result of the first (specialized machinery and economies of scale) and second
(railroads and telecommunication) industrial revolutions, firms emerged as an
alternative to markets. Viewed simply, a firm (or, an organization) consists of a
set of operating units coordinated and integrated by a hierarchy of managers,
supported by other employees – all of which are located within an overarching
organizational structure. Each operating unit itself has managers and workers
engaged in specialized economic activities. And, the firm as a whole interacts with
customers and suppliers within a market-focused ecosystem that, typically, engages
multiple markets for goods and services.
Today, the distinctions between markets and firms are blurred via the
emergence of two distinctive, market-focused ecosystems: the pipeline ecosystem
and the network ecosystem.
With the pipeline ecosystem (the dominant ecosystem over the last century;
depicted as Figure 1-1), a producer organization targets a collection of value-units at
one or more consumer segments and fashions a linear value stream involving
numerous upstream (e.g., raw material suppliers, component suppliers, etc.),
midstream (e.g., producers) and downstream (e.g., distributors, retailers, etc.)
organizations to deliver the value-units to consumers. This ecosystem is referred to
as a linear value stream because it involves a sequence of value-adding steps: raw
materials are assembled first into components and then into finished value-units
10
(information, a good or a service) that are delivered to consumers, either through a
complex downstream process facilitated by intermediaries or through a simpler,
direct-to-consumer downstream process. These value-stream steps are often
performed by different organizations (exploiting specialization), but may all be
performed by the producer; such a producer is referred to as being fully vertically-
integrated.
Figure 1-1 The Pipeline Ecosystem
ConsumersProducer IntermediariesIntermediaries
Markets
Material & Component Suppliers
Markets
Upstream Midstream Downstream
The producer organization in a pipeline ecosystem has:
Full authority for determining the targeted consumers and the nature of the
value-units being offered to these consumers.
Full authority for fashioning and overseeing the linear value stream.
Full ownership of the assets used in assembling the finished value-units, as
well as the assets used in any vertically-integrated portions of the linear value chain.
11
The primary market defining a pipeline ecosystem is that between the producer and
the consumer. In a B2C pipeline ecosystem, the predominant consumer is an
individual. In a B2B pipeline ecosystem, the predominant consumer is an
organization. In addition, a variety of secondary markets (usually B2B markets for
raw materials, for component parts, for products to stock a retail store, etc.) are
associated with pipeline ecosystems.
With the network ecosystem (an ecosystem that has become increasingly
visible over the last decade; depicted as Figure 1-2), a network of value-unit
producers and value-unit consumers are brought together by a network orchestrator.
The primary market defining a network ecosystem involves value-unit exchanges
between producers and consumers. The network orchestrator creates and
manages the market environment and the transaction environment within which
these value-unit exchanges occur. Importantly, the network orchestrator neither
determines the nature of the value-units being exchanged nor owns any of the assets
involved in producing these value-units.
12
Figure 1-2 The Network Ecosystem
Producer Network
Consumer Network
Market
Network Orchestrator
Markets
Intermediaries
Material & Component Suppliers
Markets
Upstream Midstream Downstream
What is the difference between a retailer, such as Walmart, and a network
orchestrator, such as eBay? Doesn’t Walmart create a market environment (a retail
store with a finely curated stock of products) within which producers and consumers
are brought together? The difference is that:
Walmart determines which specific products are stocked in each retail store, takes ownership of these products once they have left the manufacturer, has
fashioned very sophisticated linear value streams to bring these products to their stores, and owns many of the logistical assets used in these value
streams.
eBay does not determine the nature of the products to be sold by the producers using eBay’s market environment, never takes ownership of these
products, and has no responsibility for nor owns any of the assets deployed to produce these products or to transfer ownership of the products from
producers to consumers.
As a consequence, Walmart represents a pipeline organization, whereas eBay
represents a network organization.
13
Digital disruption is having profound effects on the roles that humans serve in
market-focused ecosystems, especially as employees of participating organizations.
Digital technologies and humans differ markedly in the types of work tasks each best
handles, and Table 1-2 suggests the probability of different types of work tasks being
performed digitally rather than being performed by humans.
Table 1-2 Probability of Work Tasks Being Performed Digitally
Type of Work
Definition Probability
Learning Acquiring new knowledge by interpreting & integrating captured data and experiences
Situational Awareness
Interpreting environmental & situational cues
Word/Image Analysis
Interpreting the meaning of words (textual & audio) and images (sketches, photos & video)
Numerical Analysis
Performing complex algorithmic operations
Repetitive Physical Activity
Programming robot-like digitalized solutions to carry-out simple & complex physical tasks
Repetitive Data Processing
Programming software to carry-out simple & complex data processing tasks
Lower
Higher
Digital solutions are especially good for executing pre-specified rules, but not
as effective at pattern recognition, complex communication, and creativity – types of
activities that well-informed, talented humans can be exceptional at performing. For
example, think about how important it is during a brainstorming session to quickly
filter out bad ideas, but recognize and enhance the good ideas. It is hard to conceive
that a digital solution could outperform a human with such a work task. Still, the
relentless advances in digital technologies are making significant headway with the
digital enablement of work tasks requiring considerable levels of situational
understanding and prediction. Perhaps the best that can be said for now is that the
14
roles served by digital technologies and by humans in innovative business models
are in flux and will certainly continue to evolve in the future.
Three Eras of Digital Disruption
Figure 1-3 presents timelines for three eras of digital disruption. These eras
reflect the influence of increasing digitization and increasing digitalization.
Digitization refers to the purely technical processes associated with converting
sensed and captured data into binary form, storing and transmitting these binary
data, manipulating these data, and storing/transmitting the outcomes of these data
manipulations. Digitalization, on the other hand, refers to more complex processes
of applying digitization within organizations and within the social and economic
contexts within which organizations are embedded – thence producing changes (often
incremental, but occasionally radical and disruptive) to these organizations and to
their social and economic contexts.
Figure 1-3 Three Eras of Digital Disruption
1950 2200201020001990198019701960
Data Processing & Proprietary Connectivity
Coordination & Open Connectivity
Era 1
Era 2
Era 3
Mobility & Ubiquitous Connectivity
15
The start date for each of the three eras is, at best, an approximation. While
it is fairly easy to identify when a specific digital technology first appeared, it is very
difficult to identify when novel instances of digitalization are applied by early-
adopters. Early-adopters refer to organizations whose leadership teams are
regularly among the first to apply new forms of digitalization. It takes time for early-
adopters to learn about and expose the usefulness of new forms of digitalization and
for these exposed uses to take root across organizations, industries and societies.
While some early-adopters may experience huge competitive gains from their
innovative actions, a greater number experience little gain or suffer losses because
innovative actions tend to be costly and often prove to be ill-founded or ill-timed.
It is important to note that the lapse in time between the start of an era and
when implementations of new forms of digitalization consistently yield significant
value for adopters shortened considerably between the first and second eras, and is
expected to shorten even further between the second and third eras. There are a
number of possible explanations as to why this is the case, and these will be raised
throughout this book. One of these reasons is that the forms of digitalization
emerging in one era, e.g., Era 1, become pervasively adopted over time and are
continuously enhanced, thus providing an ever-expanding digitalization foundation
that is leveraged as newer forms of digitalization emerge in succeeding eras, e.g.,
Eras 2 and 3.
New forms of digitalization are rendered through four engines of digitalization
(i.e., automation, control, empowerment and interaction), and applied within three
domains of digitalization (i.e., operational, analytical and collaborative). The
engines of digitalization refer to four fundamental mechanisms through which
16
digital technologies effect changes within organizations and their broader
social/economic contexts. The domains of digitalization refer to three
fundamental spheres of organizational activity within which digitalization occurs.
The four engines of digitalization (automation, control, empowerment, and
interaction) operate individually or in combination in fabricating new forms of
digitalization. Definitions of and examples of the benefits to be obtained from
applying these digitalization engines are provided in Table 1-3.
Table 1-3 Four Engines of Digitalization
Digitalization Engine
Definition Examples of Realized Benefits
Automation
Simplifying & digitalizing complex tasks & task-sequences, eliminating unneeded tasks, and, as appropriate, performing tasks via digitalization rather than via humans.
•Cost reduction. •Transaction cycle-time improvement. •Responsiveness improvement. •Productivity improvement.
Control
Embedding digitalized rules to identify out-of-control events/situations, such that out-of-control events/situations either do not occur or, if they do occur, are quickly addressed.
•Real-time event/situation monitoring. •Real-time event/situation visibility. •Minimizing the occurrence of inferior decisions & inferior actions.
Empowerment
Providing humans facing decisions with timely, accurate & comprehensive information and with easy-to-use, relevant decision aids & business intelligence tools.
•Broad distribution of and access to data, information & knowledge. •Broad availability of & access to decision aids & business intelligence tools.
Interaction
Enabling humans, digitalized solutions or both to engage in timely, meaningful dialogues (overcoming barriers of space and time).
•Complex & non-routine business activities handled quicker & better . •Problems & opportunities handled quicker & better. •Innovative activities handled quicker & better.
The three digitalization domains (operational, analytical, and
collaborative) are best seen as being complementary. In other words, a specific
digitalization initiative might target, within a specific entity (i.e., one or more of an
organization’s subunits, the entire organization, subunits of a set of cooperating
organizations, etc.): a single domain, two of the three domains or all three of the
17
domains. Definitions of and examples of the benefits to be obtained within each
domain from digitalization are provided in Table 1-4.
Table 1-4 Three Domains of Digitalization
Digitalization Domains
Definition Examples of Realized Benefits
Operational
Organizational activities involved in getting tasks done. The entities engaged in task-related activities could include digitalized solutions, humans, teams, organizational subunits, organizations and/or sets of collaborating organizations.
•Enhanced task effectiveness (accuracy, comprehensiveness, timeliness, convenience, etc.) •Enhanced task efficiency (productivity, cost, error, rework, etc.)
Analytical
Organizational activities involved in improving understandings of what things should be done, what things need to be done, what things can be done, how things are done, and how what has been done is assessed.
•Enhanced decision effectiveness (accuracy, comprehensiveness, timeliness, convenience, etc.) •Enhanced decision efficiency (productivity, cost, error, rework, etc.)
Collaborative
Organizational activities involved in enabling digitalized solutions, humans and/or organizational entities to share data, information & knowledge and to cooperate in making decisions and in getting things done.
•Enhanced task effectiveness •Enhanced task efficiency •Enhanced decision effectiveness •Enhanced decision efficiency
Table 1-5 presents an overview of the key features of each of the three eras
of digital disruption. A few aspects of this table would benefit from a brief introduction
before each of the eras is described. First, an architecture refers to an overarching
design framework specified to (1) maintain established policies, e.g., all digitalized
transaction-handling should make use of a common database, and (2) enable
component interoperability, e.g., all business applications should operate through the
use of an agreed-on set of communications devices. When two or more digital
solutions are interoperable, these solutions are able to seamlessly exchange data
and able to apply these exchanged data. Second, digital technologies can be
proprietary or open. Stated simply, a proprietary technology is tightly controlled
by its developer, while an open technology is available for use (and for modification)
18
by anyone (though some form of payment may be required to gain access to the
technology). Third, the lower part of the table illustrates the relative extent to which
each era exploited the four engines of digitalization. As can be seen below, while
digitalization in Era 1 focused on automation and control, Era 3 digitalization is
characterized by high levels of each of the digitalization engines.
Table 1-5 An Overview of the Three Eras of Digital Disruption
Era 1 •Data Processing •Proprietary Connectivity
Era 2 •Coordination •Open Connectivity
Era 3 •Mobility •Ubiquitous Connectivity
Key Digital Technologies
Computer systems, remote terminals, networks, database management, packaged software
Personal computers, servers, ERP systems, analytics software, World Wide Web
Smart personal devices, social technologies, Internet of Things, Big Data
Digitization Architecture
Centralized Distributed Ubiquitous
Connectivity Architecture
One-to-Many Proprietary
One-to-Many Open
Many-to-Many Proprietary
Many-to-Many Open
Digitalization Architecture
Transaction Handling Decision/Action Coordination Value-Unit Enhancement
Digitalization Purpose
Efficiency Optimization Community-Building
Digitalization Engines
Automation
Control
Empowerment
Interaction
Organizations recognized as digitalization leaders during Era 1 emphasized
automation and control, driving growth and profitability through heightened
efficiency. During this era, most typically, digitization was centralized, connectivity
accentuated establishing proprietary links with preferred suppliers/customers, and
digitalization focused on the handling of transactional data and the use of these data
in supporting operational decisions and actions. Table 1-6 provides a brief glimpse
19
of innovative initiatives introduced by two Era 1 disruptors: American Airlines and
Merrill Lynch.
Table 1-6 Era 1: Innovative Digitalization Initiatives
American Airlines Sabre Reservation System
Merrill Lynch Cash Management Account
Digitalization Realized Benefits Digitalization Realized Benefits
Common database of current flights, routes & pricing offered by multiple airlines.
Desktop-based software allowing travel agents to dial-in to the Sabre System to search for flights & prices and to make direct bookings.
Enabled travel agents to book passenger flights with greater efficiency, speed & flexibility. In this booking process, American used the system to display its own flights before other airlines’ flights, increasing American’s bookings.
Other airlines paid a fee to American for the ability to list their flights and an even higher fee for a priority listing.
American gained valuable intelligence about competitors’ prices & routes.
Integrated database of all of a business customer’s accounts (e.g., savings, checking, brokerage).
Digitalized decision- making system enabling a business customer to log onto their Cash Management Account to track investment opportunities and to execute account- related actions.
Offered business customers a financial management service for maintaining a desired level of liquidity while sweeping daily excess cash into higher-yield brokerage accounts.
The digitalized decision- making system monitored market conditions and executed customer-initiated actions across a customer’s accounts.
Organizations recognized as digitalization leaders during Era 2 continued
emphasizing automation and control, but also made significant headway with
empowerment (via Enterprise Resource Planning systems and business analytics) and
interaction (via the open connectivity offered by the technologies that underlay the
World Wide Web), further boosting growth and profitability by tightly coordinating
decisions and actions. Typically, digitalization was distributed across centralized and
localized sites, connectivity proliferated across value-stream participants via open
one-to-many connections (B2C e-commerce) and proprietary many-to-many
connections (B2B), and digitalization focused on coordinating operational and tactical
decisions and actions both within and across organizations’ boundaries. Table 1-7
20
provides a brief glimpse of innovative initiatives introduced by two Era 2 disruptors:
United Parcel Service (UPS) and Boeing.
Table 1-7 Era 2: Innovative Digitalization Initiatives
United Parcel Service (UPS) Package Flow System
Boeing 777 Parts Tracking System
Digitalization Realized Benefits Digitalization Realized Benefits
Smart (bar-coded) labels are placed on packages, providing detailed delivery information.
Once a package arrives at a Delivery Center, truck loading plans and delivery routes are optimized.
Route details are sent to drivers’ hand-held devices.
Loads are balanced across trucks, drivers & routes.
Routes are optimized to increase efficiency & effectiveness.
Drivers are able to speed up deliveries and to make more deliveries on a route.
Parts delivery processes from suppliers to Boeing capture real-time data (across the globe) on movement, route location, weather conditions and road conditions.
Parts delivery processes are coordinated & optimized (part manufacturing lead times, modes of transport, delivery routes).
Costs are better contained (delivery, inventory, assembly) while handling over 3 million parts from over 500 (domestic & international) suppliers.
Parts arrive as they are needed in the assembly process.
Organizations recognized as digitalization leaders during Era 3 emphasize all
four engines of digitalization: automation, control, empowerment and interaction.
Especially important for heightened empowerment and heightened interaction is the
mobility and ubiquitous connectivity offered through the convergence of smart
personal devices (e.g., smartphones and tablets), the Internet of Things
(miniaturized microcircuitry embedded within all types of products), and the
advanced analytics made possible through Big Data (streams of digital data created
via the real-time capture of messages and events). Along with new efficiency and
optimization opportunities, growth and profitability are being spurred through the
active formation and mobilization of the stakeholder-communities (e.g., material and
component suppliers, services providers, producers, retailers, and/or consumers)
21
that comprise market-focused ecosystems. Today, digitization and digitalization are
both on the verge of being ubiquitous, connectivity is increasingly many-to-many and
open, and digitalization focuses on value-unit (e.g., products, services, and/or
information) enhancement. Table 1-8 provides a brief glimpse of innovative
initiatives introduced by two Era 3 disruptors: LEGO6 and Airbnb.
Table 1-8 Era 3: Innovative Digitalization Initiatives
LEGO LEGO Ideas
Airbnb Community Center
Digitalization Realized Benefits Digitalization Realized Benefits
A digitally-enabled open community where LEGO fans: propose ideas for new LEGO sets (using existing LEGO bricks), review proposed ideas, and vote on proposed ideas.
Ideas receiving 10,000 votes within a year are moved into LEGO’s product development process.
Thousands of fresh and innovative ideas are proposed for new LEGO sets.
LEGO sets obtaining 10,000 or more votes are likely to be market successes.
Since 2014, nine new LEGO sets have evolved from the LEGO Ideas program.
The interactions occurring across the fan community (as ideas are reviewed & actively supported) provides essentially free promotion for LEGO.
A digitally-enabled community of Airbnb hosts where ideas & advice are exchanged, thus easing the effort taken by participants in learning how to succeed as a host.
Topics are personalized to a host’s language and country, hot topics are promoted, and top contributors are listed.
A relatively low cost mechanism for: • Educating & supporting
new hosts. • Establishing & evolving
a desired culture across the host community.
• Building enthusiasm & comradery across the host community.
• Mobilizing local host- communities’ face-to- face sharing and political action.
Revisiting Fortune’s Most Admired Companies
Table 1-9 revisits our synthesis of Fortune’s annual listing of the most admired
companies. Now, however, many of the table cells are color-coded:
Red – digital technology product/service providers
Blue – Era 1 organizations listed multiple times
6 O. El Sawy, H. Amsinck, P. Kraemmergaard and A.L. Vinther, “How LEGO Built the
Foundations and Enterprise Capabilities for Digital Leadership,” MIS Quarterly Executive, June
2016, pp. 141-166.
22
Orange – Era 2 organizations listed multiple times
Green – Era 3 organizations listed multiple times
Two key insights about successful digital strategizing can be gleaned from this table.
Table 1-9 Revisiting Fortune’s Most Admired Companies
Years Rank
1 2 3 4 5
2014-2016 Apple Google Amazon Berkshire Hathaway Walt Disney
2011-2013 Apple Google Amazon Coca Cola Berkshire Hathaway
2008-2010 Apple Google Berkshire Hathaway
Toyota Motors Johnson & Johnson
2005-2007 General Electric
Starbucks Southwest Airlines FedEx Berkshire Hathaway
2002-2004 Walmart Southwest
Airlines General Electric Berkshire Hathaway Microsoft
1999-2001 General Electric
Microsoft Walmart
Cisco Systems Dell
Southwest Airlines
1996-1998 Coca Cola Microsoft Intel Merck Johnson & Johnson
1993-1995 Rubbermaid Coca Cola 3M
Home Depot Microsoft
1990-1992 Merck Rubbermaid Walmart Proctor & Gamble PepsiCo
1987-1989 Merck Rubbermaid Liz Claiborne 3M Boeing
Phillip Morris
1983-1986 IBM Dow Jones HP Merck Coca Cola
First, the highlighted companies in Eras 1 and 2 all represent pipeline
organizations, aside from Berkshire Hathaway.7 In Era 3, however, the highlighted
firms (again, aside from Berkshire Hathaway), represent a pure network
organization, i.e., Google, and two blended organizations, i.e., Apple and Amazon.
7 General consensus suggests that Berkshire Hathaway’s success as a holding company
rests on three factors: acquiring exceptionally well-run businesses, retaining these
businesses’ existing leadership teams and allowing these leaders considerable autonomy to
run their business, and moving slack financial resources across these businesses to take
advantage of temporal and sectoral opportunities.
23
Blended organizations operate both as pipeline organizations and as network
organizations:
Apple produces consumer-oriented technology products via tightly-managed value streams and orchestrates iTunes and Apple Music, markets that bring together communities of music producers and music consumers.
Amazon manages a pipeline-like B2C e-commerce business and orchestrates consumer and business marketplaces, bringing together communities of
sellers and consumers.
We anticipate that organizations’ digital strategies will increasingly incorporate
elements of both pipeline organizations and network organizations.
Second, highlighted organizations in Eras 1 and 2 include technology-
producing firms and technology-using firms. Era 3, however, lacks pure technology-
producing firms. Instead, Apple, Google and Amazon are both producing (alone and
with strategic partners) advanced digital technologies and introducing streams of
digitalization innovations. Additionally, Google and Amazon are technology services
providers. Interestingly, the highlighted Era 2 organizations, i.e., General Electric,
Southwest Airlines and Walmart, were noted for their large and superb technology
groups that, alone and with strategic partners, introduced streams of digitalization
innovations. We anticipate that organizations’ digital strategies will increasingly
incorporate homegrown digitalization innovations.
The Evolving Landscapes of Industries
The constant threat of digital disruption places organizations’ leadership teams
in increasingly hostile and competitive environments. A variety of competitors exist
(nimble digital startups, established companies with strong market positions and
well-honed operational processes, and everything in-between) across all industry
24
sectors. N. Venkatraman8 provides a framework for understanding the industry
forces now at play by identifying the three sets of influential competitors that are
active in most industries today:
Incumbents: These are firms who have been traditionally operating in an
industry for a long time with well-established business models, organization structures, and resource control structures. Many of these incumbents have
attained industry leadership positions by virtue of their mastery over business models. For example, CBS, Disney, ABC, Comcast, Verizon, and AT&T would be considered to be examples of incumbents in the
entertainment and media industry.
Digital Giants: These firms have mastered digitalization and are able to
harness their business models and digitalization expertise to disrupt a wide range of industries. Well-known digital giants include Google (Alphabet), Facebook, Amazon, Apple, and Microsoft, each of whom has demonstrated a
sustained prowess in digital disruption across multiple industries.
Technology Entrepreneurs: These firms are younger or smaller firms that
bring specialized digitalization expertise to innovate, transform or disrupt certain aspects of an industry’s value stream or value-units (i.e., product or
services offerings). Examples of such firms for the entertainment industry would be Sling and Hulu.
Industry strategic landscapes today must be seen as being populated by not only
incumbents, but also by digital giants and technology entrepreneurs. As a
consequence, digital strategists within today’s emerging market-focused ecosystems
must weave together the interests and capabilities held by incumbents, digital giants
and technology entrepreneurs in fashioning the business models most likely to
produce competitive success.
A Recap and Look Ahead
Conventional notions about competitive strategy are being challenged with the
power of digital technologies to provide the means for innovation, organization
8 N. Venkatraman, The Digital Matrix: New Rules for Business Transformation through
Technology, Life Tree Media, 2017.
25
transformation, and market disruption. As firms across all industries are feeling the
heat, it is imperative that fresh ways of thinking are surfaced about the nature of
competition and about what is needed to achieve competitive success. The next
chapter provides insights regarding these fundamental ideas that underlay effective
digital strategies.
26
Chapter 2. Digital Strategy Fundamentals
How should firms master the challenges and opportunities of digital innovation
and disruption? What types of models and mindsets will help managers effectively
lead their organizations in today’s digital economy? The following three sets of
fundamental ideas regarding digital strategy are described in this chapter:
The Goal of Digital Strategy: Agility
The Grammar of Digital Strategy: Business Models
The Logic of Digital Strategy: Competitive Moves
The Goal of Digital Strategy: Agility
In modern competitive arenas, the pursuit of sustained competitive advantage
is an illusion because of the tremendous disruptive pressures facing firms and
industries. Therefore, the hallmark of a successful digital strategy is succinctly
described via the concept of agility. Agility is a firm’s ability to detect potentially
disruptive threats and opportunities and, then, to marshal the resources and
managerial insights required to subdue threats and/or exploit opportunities. Agility
addresses two seemingly contradictory objectives: achieving stability, i.e., the
ability to withstand disruptions by maintaining operational reliability and efficiency;
and, achieving dynamism, i.e., the ability to innovate, transform and disrupt by
demonstrating strategic adaptability, speed and entrepreneurism. In essence, agility
requires organizations to execute a portfolio of business models that simultaneously
account for two aims – ensuring stability in currently-executing operational processes
(so as to meet stakeholders’ expectations and competitors’ performance levels), and
ensuring an ongoing stream of well-founded, future-oriented competitive actions.
27
This duality is reflected in the need for competitively-successful organizations to
exhibit two forms of agility. Adaptive agility refers to the ability to aggressively
introduce incremental enhancements into currently-executing business models,
whereas entrepreneurial agility refers to the ability to aggressively introduce
radical enhancements into currently-executing business models or to introduce new
business models.
Adaptive and entrepreneurial agilities are important because the only sure
thing that can be said about today’s market ecosystems is that they are highly
uncertain as a consequence of:
Finely-tuned and highly-differentiated consumers.
Near-constant value-unit innovation and operational process innovation.
The regular appearance of new entrants (startups, established players from
adjacent markets, digital giants, technology entrepreneurs).
The periodic restructuring of value-streams and participants’ relative influence within market-focused ecosystems.
To paraphrase Project Runway’s Heidi Klum: one day you’re in and the next day
you’re out. Extending, or even maintaining, a strong competitive position demands
a continual stream of well-targeted competitive actions.
Therefore, organizations’ digital strategies are unlikely to take the form of
methodically-stipulated, lengthy (over a two- or three-year planning horizon) and
tightly-coordinated series of competitive actions. Instead, organizations’ competitive
actions are most likely to occur opportunistically or reactively, but in accordance with
a strategic intent that establishes strategic direction and strategic purpose. A
strategic intent directs digital strategists’ thought processes as competitive moves
are formulated and implemented – without dampening the flexibility and autonomy
28
necessary and adaptive/entrepreneurial agilities. A broadly-communicated strategic
intent focuses strategists’ opportunity-seeking, thereby exerting a dominant
influence on the formulation of competitive moves (see Figure 2-1). Even though
organizations’ strategic intents do evolve, they serve the critically important role of
ensuring that organizations’ investments in digital resources are guided in a
consistent fashion across time – increasing the likelihood that new investments
leverage and complement in-place resources.
Figure 2-1 The Influence of Strategic Intents on Competitive Moves
Business Model Enhancement, Replication &
Innovation
Digital Strategists’ Knowledge,
Perspectives & Insights
Competitive Moves
Competitive Outcomes
Strategic Intent
A strategic intent is derived from the knowledge, perspectives and insights
held by digital strategists. In envisioning and evolving a strategic intent, an
organization’s digital strategists are especially influenced by their understanding of
the core capabilities that underlie the value propositions expected to most appeal to
consumers and the extent to which their organization has digitalized these
capabilities – key underpinnings of a business model.
29
The Grammar of Digital Strategy: Business Models
Business models reflect the choices made by organizations’ leadership teams
about how value is created and how profitability is realized. As shown in Figure 2-2,
there are four distinct elements of agile business models:
A value proposition defines how an organization will distinguish itself
within the market(s) that it has chosen to participate. Pipeline organizations distinguish themselves by creating value for consumers. Network organizations distinguish themselves by creating value for participating
communities.
A profit model consists of revenue and cost models. Revenue models
describe where, when, and how sustainable revenue streams materialize. Cost models describe the costs to be borne in producing the revenue streams and how these costs will be controlled to provide requisite levels of
profitability.
Core capabilities refer to the tangible resources (e.g., facilities, machinery,
digital devices, etc.) and intangible resources (e.g., people, knowledge, operational and managerial processes, patents, architectures, etc.) needed
to successfully implement the value proposition and profit model.
Dynamic capabilities refer to the intangible resources (e.g., people, knowledge, relationships, managerial processes, architectures, etc.) needed
to (1) sense and assess opportunities for business model enhancement, replication and innovation, and (2) successfully implement these
enhancements, replications and innovations.
Figures 2-3 and 2-4, respectively illustrate each of these elements via portraits of
agile business models reflective of Apple’s participation in the consumer smart device
market and Walmart's participation in the retail market.
30
Figure 2-2 Elements of an Agile Business Model
Value Proposition
Profit Model
Core Capabilities
Dynamic Capabilities
•What is the value-unit? •Who is the consumer? •What does the consumer desire and expect with regard to this value-unit?
•How is revenue generated? •What is the cost structure? •How is profit created?
What are the resources & activities critical to providing consumers with a value-unit they value and to do so in a profitable manner?
What are the resources & activities critical to ensuring that well-founded business model enhancements, replications & innovations are undertaken to maintain competitive positions within the markets we participate and the new markets we enter?
Figure 2-3
Apple’s Business Model for the Consumer Smart Device Market
Value Proposition Profit Model
Core Capabilities
Dynamic Capabilities
• Value-unit: Consumer smart digital devices • Consumer: Technically-receptive &
technically-savvy segments of the personal smart device market
• Innovative & trend-setting products • Seamless access to content across all digital
media
• High product prices driven by stimulating demand and by limiting supply
• Moderate manufacturing & marketing costs • High margins
• Brand management • Technology patents • Product design & product architecture design • Tightly-directed sales & marketing • Tightly-controlled manufacturing & logistics,
performed by third-parties • Relationships with content providers and
with manufacturing & logistics partners
• Knowledge of new digital technologies • Knowledge of evolving desires of first-
adopter consumers • Knowledge of new digital media and of new
means for accessing digital media • Knowledge of product designers & architects • Knowledge of content management
architects
31
Figure 2-4
Walmart’s Business Model for the Retail Market
Value Proposition
Profit Model
Core Capabilities
Dynamic Capabilities
• Value-unit: Household groceries & products
• Consumer: Cost-sensitive segment of the mass market
• ‘Everyday Low Prices’ • Retail store availability of a broad range
of products, enabling one-stop shopping
• Low prices, low costs • Moderate margin • High volume, high product
turnover
• Store site selection & store layout design • Tailor local inventory to local market • Shelf-space optimization (merchandizing &
replenishment) • Logistics optimization • Supplier relationships
• Knowledge of new digital technologies • Knowledge of evolving shopping-experience
desires of mass-market consumers • Knowledge of digitalization trends &
innovations in retail-store operations and in logistics
• Logistics designers & technologists • Retail store designers & technologists
Value disciplines are a fundamental element of business models and align
the value propositions with the expectations of their consumers.9 Some types of
consumers seek low prices, quality and convenience; organizations pursuing this
consumer adopt the operational excellence value discipline. Other consumers are
more concerned with having their needs and preferences met fully and are willing to
pay a premium for this to occur; organizations pursuing this consumer adopt a
customer intimacy value discipline. Finally, some consumers seek the state-of-
the-art, the trendy and/or the stylish and are willing to pay a premium for this to
occur; organizations pursuing this customer adopt a product leadership value
9 M. Treacy and F. Wiersema, “Customer Intimacy and other Value Disciplines,”
Harvard Business Review, January-February 1993, pp. 84-93.
32
discipline. Table 2-1 summarizes the value propositions and core capabilities
associated with each of the value disciplines.
Table 2-1 The Three Value Disciplines
Value Discipline
Value Proposition Core Capabilities Examples
Operational Excellence
Quality, low-cost value- unit
Reliable, convenient delivery process
Manufacturing, assembly and/or merchandising
Order processing & fulfillment Inventory management Upstream/downstream logistics
Amazon Dell
General Electric FedEx
Walmart
Customer Intimacy
Tailored value-unit Tailored delivery
process
• Micro-segmentation • Consumer relationship management • Advertising & marketing • Campaign management
Amazon Google
Harrah’s Kraft Foods Ritz Carlton
Product Leadership
State-of-the-art, trendy and/or stylish value- units
State-of-the-art, trendy and/or stylish delivery process
Research & development Rapid commercialization Quality assurance After-sales support
3M Apple Intel
Merck Johnson & Johnson
General Electric (GE): Operational Excellence in Action
GE’s consumer appliance business10 adopted the operational excellence value
discipline in the 1980s by introducing the Direct Connect initiative to become a low-
cost, hassle-free supplier to appliance dealers. Historically, the company fully loaded
its dealers – that is, it expected dealers to stock full inventories of appliances by
incentivizing them to purchase full truckloads. This strategy lost favor when the
independent dealers began to face severe competition from lower-priced, multi-brand
chains such as Best Buy.
10 As part of their Industrial Internet business strategy, GE sold their appliance
business to Qingdao Haier in 2016.
33
With the Direct Connect initiative, dealers were no longer required to maintain
their own inventories of major appliances. Instead, they could rely on GE’s virtual
inventory – a digitalized merchandizing and inventory system that allowed the
dealers to retrieve information about available appliances, sell them to their
customers, provide these customers with delivery information, and have the
appliances shipped directly to the customers from GE distribution centers. The Direct
Connect initiative not only reduced the inventory carried by dealers, but provided the
dealers’ customers with access to the full breadth of GE’s appliance product lines. GE
now links this dealer-order processing system to its forecasting and demand planning
processes, enabling GE to manufacture to the product sales rather than to dealers’
inventories.
Since 2011, GE has been transforming itself through a multibillion-dollar
initiative called the Industrial Internet. Essentially, GE has embraced the Internet of
Things and the world of Big Data by embedding sophisticated digitized sensors to its
machines and connecting the ensuing data streams to operational and analytical
platforms. While GE has long embedded sensors in its machines, the data from these
sensors was primarily accessed and used on-site by repair and maintenance
technicians. Today, the huge volumes of data being captured are transmitted to
digitalized platforms enabling a broad spectrum of operational and managerial
processes.
As an example, consider GE’s jet engine business, whose business model is
built around the product leadership value discipline. Noticing that some of its engines
were beginning to require more frequent unscheduled maintenance, GE engineers
aggregated and analyzed real-time functioning, maintenance and performance data
34
for every jet engine in use across the globe. Through this analysis, the GE engineers
were able to identify the problem: engines operated in harsh conditions (e.g., heat,
humidity, dust, smog, etc.) tended to clog, heat up and function inefficiently. By
thoroughly cleaning the engines used on such routes more frequently, engines
operated more efficiently, required less maintenance and exhibited longer peak
lifetimes – saving airlines millions of dollars annually in fuel costs. But, designing,
building, installing, operating and maintaining state-of-the-art, interconnected
machines demands operational excellence.
All of this has dramatically transformed the business model of GE’s jet engine
business. The value proposition involves two value disciplines requiring a broad
range of core and dynamic capabilities; and, the profit model has shifted from being
based solely on revenues from sales transactions to one based on revenues from
sales transactions and from a contracted portion of airlines’ savings from better
performing engines (engine operating and maintenance costs, aircraft miles flown
per year, etc.).
Kraft Foods: Customer Intimacy in Action
In packaged food pipeline ecosystems, the focal market exchange is that
between a shopper and a retailer. For producers like Kraft Foods, the immediate
consumers, or customers, are grocery retailers. By tailoring promotions,
merchandizing and logistics relationships with retail stores (or clusters of stores
associated with the same retail chain), Kraft was among the first firms to apply
analytics in reaching out through retail stores to the stores’ consumers to benefit
both the stores and Kraft.
35
Kraft decentralized much of its marketing to sales teams holding relationships
with retail stores (or store clusters) and built a marketing analytic capability that
combined data from three sources: digitized sales transactions from the retail stores,
demographic and buying-habit data on the customers of 30,000 food stores
nationwide, and an external geo-demographic database organized by nine-digit zip
code. A centralized group of marketing specialists and brand specialists applies
analytics to develop deep understandings of how sales of products, product
categories and brands vary by store, retailer, geographic area, customer segment,
time-of-the-year, etc., and how these sales are influenced by taken-actions, e.g.,
campaigns, coupons, sales, displays, product-shelfing, etc. This centralized group
then consults with the decentralized sales teams as the teams plan for subsequent
retail account interactions, i.e., creating customized, store-level promotional
programs.
More recently, Kraft has broadened their consumer-outreach in three major
ways. First, as Kraft now reaches shoppers through B2C sales channels (pure-play
online retailers such as Amazon and mixed-play retailers such as Target and
Walmart), Kraft’s retail analytics and retailer relationship programs have had to
account for the nuances of e-commerce. Second, while not selling directly to
shoppers, Kraft is building online shopper communities, e.g., social media channels,
www.kraftrecipes.com and the iFood Assistant app, that are used to build awareness
about and promote Kraft products and brands and to interact with shoppers. Third,
the streams of data gathered from these online communities have been incorporated
within Kraft’s analytics platforms – enabling marketing and brand specialists to tap
into the fuzzy front-ends of shopper wants and needs (e.g., flavor trends, absent-
36
but-desired products, in-store or online shopping likes/dislikes, promotions
likes/dislikes, brand perceptions, etc.). Insights such as these, when combined with
the results of more-traditional marketing analytics, can be invaluable for a broad
array of marketing decisions, including: establishing brand pricing strategies, filling
out product lines, planning joint-brand/product promotions (single product
promotions can cannibalize overall sales), and optimizing promotional spending
across media.
Apple: Product Leadership in Action
Following Steve Jobs’ leadership, Apple has very successfully pursued the
product leadership value discipline. Because Apple’s products are perceived by its
customers as innovative, trendy, reliable and easy-to-use - and as providing the
purchaser with peer-group panache - Apple is able to command premium prices for
their products. The firm has accomplished this by maintaining tight control of product
design and development and by reinforcing the Apple brand through stylistic
promotional programs and uniquely designed retail stores.
Apple’s approach to product leadership is not to tap into the leading edge of
consumer trends, but rather to inspire these trends. It is not enough to understand
your customer’s desires - Apple’s objective is to create these desires. Clear examples
of this are the iPod, the iPhone, the iPad and, most recently, the Apple Watch. The
Apple Watch, for example, is not intended to be a smaller, wearable version of the
iPhone. Instead, the Apple Watch is envisioned as a lifestyle accessory that brings
the digital content most meaningful to a person in real-time at the turn of the wrist.
Was this something that the consumer needed before it was released? Not likely.
But, it is Apple’s expectation that, after becoming aware of the usefulness of the
37
Apple Watch, its targeted consumer segments will perceive not only that this need is
real, but that it has always existed.
In order for Apple’s market success to continue into the future, two factors
are crucial: releasing a steady stream of exciting products, and growing its extremely
loyal (some might say insanely loyal) customer base. The first of these factors is
captured with the product leadership value discipline, and the second with the
customer intimacy value discipline. Apple’s more recent focus on customer intimacy
is perhaps best represented by the opening, growth and market success of the Apple
Store. As conceived by Apple, its retail stores are more than just stores. Instead,
the Apple Store is intended to be an inviting and creativity-releasing space where
people are exposed to a variety of enriching experiences: trying out new products,
learning how to do neat things with a product, overcoming product usage problems,
being exposed to new ideas (about technology, art, music, culture, entrepreneurial
startups, etc.), interacting with others on topics of mutual interest, and, most simply,
being entertained. The objective, thus, is to fashion and reinforce stronger consumer
relationships, one at a time.
Final Thoughts about Business Models
As a final point, the digital strategy for a given organization often involves
multiple business models. Multiple business models arise because most organizations
participate in multiple, differing markets. While Walmart’s digital strategy is directed
toward a single, overarching business model, Apple‘s digital strategy incorporates
two overarching business models: one associated with the consumer smart device
pipeline ecosystem, and the other with the iTunes business model that operates as a
network ecosystem. Further, while the digital strategy for a holding company such
38
as Berkshire Hathaway is framed around a single dominant business model, each
subsidiary’s digital strategy is framed around one or more self-contained business
model(s).
The Logic of Digital Strategy: Competitive Moves
The third element of the modern approach to digital strategy recognizes a
dynamic perspective realized through competitive moves and countermoves. Unlike
the traditional perspective on strategy that is based on competing around static
positions, the dynamic perspective emphasizes the continual pursuit of competitive
advantage through innovations in business models, products and services. Agile
firms regularly conduct small-scale, tightly-contained strategic experiments to
learn about potential innovations and disruptions and then adapt their business
models for strategic success. In his recent book, Venkatraman11 describes three
types of competitive moves that collectively represent the logic of digital strategy:
Experimentation at the Edge
Collision at the Core
Reinvention at the Root
Each of these are now briefly described.
Experimentation at the Edge
Today, in virtually every industry, technology entrepreneurs are developing
new digital business models that have the potential to cause dramatic disruptions
and transformations. History is replete with examples of such disruptors: Amazon
11 N. Venkatraman, The Digital Matrix: New Rules for Business Transformation through
Technology, Life Tree Media, 2017.
39
and the retailing industry (1995), Netflix and the movie rental business (1998), Uber
and the people transportation industry (2011), Tesla and the automobile industry
(2014), etc. All firms must direct their managers’ attentions and their resources
toward understanding and recognizing the plethora of business model experiments
that might possibly affect their industry. Consider the many ongoing experiments
occurring today with Bitcoin. Though its implications and business trajectory are not
clear today, no financial services firms can afford to ignore experiments around this
fintech-created opportunity. The leadership teams of industry participants (both
incumbents and new entrants) must manage their attention toward
experimentation at the edge of their industries or ignore them at their own peril.
Collision at the Core
Consider the automobile industry today. Should the automotive
manufacturers still be making cars or are they in the business of mobility solutions?
The smart money would be on the latter and this would have significant implications
for the business models and ecosystems of today’s automobile industry. Apple’s Car
Play entertainment, Google’s Waymo self-driving car technologies, Peloton’s
automated transportation solutions, and Mobileye’s advanced driver assistance
systems are all examples of novel solutions that are likely to affect, in yet
undetermined ways, the core of today’s automotive industry. Every car manufacturer
is reexamining its business models, ecosystems, and offerings to develop the needed
adaptive and entrepreneurial agilities. The jury is out on how we will view cars and
mobility solutions ten years from now and what will be the ownership and
consumption models affecting the fortunes of car manufacturers. However, it is quite
clear that during the past three years, the industry’s business models are undergoing
40
significant transformations. Savvy firms participating in automobile-related
ecosystems are examining a breadth of collision at the core competitive moves
aimed at renovating industry ecosystems and business models by establishing
relationships with digital giants and technology entrepreneurs, committing to
investments in new digital capabilities, and reinventing organization structures and
incentive systems to attract the needed in-house talent.
Reinvention at the Root
It seems we continue to hear, almost daily, about the demise of the traditional
retail industry and the emergence and dramatic growth not just of Amazon, but of
other digital retail firms. The fundamental business models of retailing have been
reinvented and the industry is witnessing a shakeout, with many of the traditional
incumbents on the verge of disappearing. But, some incumbents are doing fine with
their digital transformations (e.g., Walmart, Target, Walgreens, Starbucks, Sephora,
Macy’s, Marks & Spenser, IKEA, Nordstrom, among others). Invariably, these
successful retailers: actively engage in experimentation at the edge and collision at
the core competitive moves, and introduce radical changes to their business models
as they move toward becoming, to varying extents, blended organizations.
Reinvention at the root refers to competitive moves aimed at cannibalizing
traditional capabilities and scaling up significant investments in new digitization and
digitalization capabilities.
The Logic of Digital Strategy Formulation and Evolution
Figure 2-5 depicts the central role served by competitive moves in the process
of digital strategy formulation and evolution – a process that begins and evolves
41
through the knowledge, perspectives and insights held by digital strategists. Four
domains of knowledge, perspectives and insights are especially critical:
Currently-executing business models.
The markets within which these business models are executing.
Markets adjacent to those within which the current business models are
executing. Increasingly, the genesis of radical business model enhancement and business model innovation is derived not only from analyzing the
outcomes of competitive moves within a targeted market, but also from observing the outcomes of other organizations’ competitive moves in adjacent markets – especially when an adjacent market involves
complementary or substitute value-units, similar customer segments, similar value-stream activities, similar strategic partners, etc.
The digitization and digitalization landscapes relevant to the currently- executing business models and to any new business models being formulated, especially as these landscapes affect experimentation at the
edge, collision at the core, and reinvention at the root.
Table 2-2 provides overviews of these four domains. Importantly, the key to
fabricating and evolving effective competitive moves is not necessarily the nature of
the specific planning processes applied (many differing planning processes can lead
to successful outcomes), but rather to ensure that these planning processes actively
involve participants (e.g., digital strategists, leadership team members, functional
specialists, etc.) whom collectively hold and/or have ready access to these four
domains of knowledge, perspectives and insights.
42
Figure 2-5 The Digital Strategy Formulation and Evolution Process
Business Model Enhancement, Replication &
Innovation
Competitive Moves Experimentation at the Edge
Collision at the Core Reinvention at the Root
Competitive Outcomes Targeted Market Adjacent Markets
Digital Strategists’ Knowledge, Perspectives & Insights
Table 2-2 Key Knowledge-Perspectives-Insights Domains
Target Market Adjacent Markets
• Value-units, complements, substitutes
• Consumer expectations • Revenue-generating tactics • Value stream participants &
activities
• Value-units, complements, substitutes • Consumer expectations • Revenue-generating tactics • Value stream participants & activities
Executing Business Models
Digitization & Digitalization Landscapes
• Value proposition • Profit model • Core capabilities • Dynamic capabilities
• Current digitization & digitalization capabilities
• Digital technology advances & innovations • Digitization best-practices, trends &
innovations • Digitalization best-practices, trends &
innovations
43
A Recap and Look Ahead
This chapter has introduced fresh ideas regarding three key elements
associated with the formulation of successful digital strategies. First, digital
strategists must focus on agility as the predominant goal in formulating their
organization’s digital strategy. Successful digital-age firms excel with both adaptive
and entrepreneurial agilities. Second, business model design represents the new
grammar through which an organization’s digital strategy is formulated and
evolved. Digital strategists’ creativity and attention must be focused on business
model design, adaptation, and reinvention in response to a plethora of digitalization
threats and opportunities. Third, the logic of digital strategy formulation and
evolution is based on taking and learning from three types of competitive moves:
experimentation at the edge, collision at the core, and reinvention at the root.
Bolstered by these ideas, we are now ready to examine how digitalization can be
applied to confront digital disruption in, first, pipeline ecosystems and, then,
network ecosystems.
44
Chapter 3. Digitalized Business Models for Pipeline Ecosystems
Over the last century, pipeline ecosystems have been the dominant organizing
paradigm. In just about all established economic arenas, e.g., automotive, packaged
foods, personal care goods, pharmaceuticals, smartphones, mobile communication
services, healthcare services, big box retailers, etc., value-units are delivered to
consumers through tightly-coordinated value streams. This chapter examines the
nature of pipeline ecosystems by describing:
Why Pipeline Ecosystems Exist
Digitalizing Pipeline Ecosystems
Disintermediation, Reintermediation and Intermediary Transformation
Why Pipeline Ecosystems Exist
Figure 3-1 depicts a simplified industry value stream for companies - like Ben
and Jerry’s, Häagen-Dazs, and Baskin Robbins - that produce ice cream (through a
mix of upstream channels) and then market finished products to consumers (through
a mix of downstream channels). In such a pipeline ecosystem, the ice cream
producer determines which ice cream raw materials, flavors and delivery channels
are likely to be most favored by consumers and fashions a value stream to produce
and deliver ice cream products to these consumers. However, if one or more of the
upstream/downstream participants does a poor job carrying out its responsibilities,
or if the ice cream producer does a poor job anticipating the consumers’ expectations
or coordinating value stream work flows, then the consumers’ expectations will not
be met. Further, because of the complexities involved in coordinating value stream
work flows, the producer could choose to perform all of the activities involved with
45
the value stream, i.e., be fully vertically integrated. However, as explained below, it
usually is neither economically nor operationally desirable for the producer to do so.
Three concepts explain why this is the case: economies of scale and scope,
transaction costs, and intermediation.
Figure 3-1
Ice Cream Industry Value Stream
Distributors
Retailers
Ice Cream Production
Ice Cream Storage & Shipping
Packaging Suppliers
Paper Suppliers
Ice Cream
Ingredient Suppliers
Upstream Activities Downstream ActivitiesMidstream Activities Consumers
Retail Store
eCommerce
Ice Cream
Production
Economies of Scale and Scope
Economies of scale refers to the advantages that arise with increased volume
of output, and economies of scope refers to the advantages that arise when a
family of related goods are produced rather than a single good. Viewed most
simplistically: by covering fixed costs with larger activity volume, the cost to execute
the activity drops; by specializing in an activity, the activity’s variable costs can be
reduced through experience, analysis and training; by performing a set of similar
activities, the fixed and variable costs of each activity can be reduced. It is the
46
existence of economies of scale and scope that are at the basis of the consideration
given by most producers to using the services of other organizations to carry out
many, if not most, value stream work activities.
Transaction Costs
Transaction costs are involved with a fundamental market-related decision,
generally referred to as the make-versus-buy decision: when does a company
(individual) decide to make an item or perform an activity itself (herself) rather than
another company (person) make the item or perform the activity? Answering this
question is intuitively simple: compare the total cost of doing it yourself against the
total cost of having someone else doing it for you.
The total cost to produce an item or perform an activity can be represented as
sum of associated production and transaction costs. Production costs are the direct
costs to produce an item or perform an activity; transaction costs are the additional
costs involved when an item or activity is acquired from someone else. Table 3-1
defines common transaction costs.
47
Table 3-1 Common Transaction Costs
Types of Transaction
Costs Description
Search Locating suppliers willing & able to provide goods & services.
Locating buyers willing & able to purchase good & services.
Bid Selection
Assessing bids.
Assessing suppliers/buyers.
Selecting a supplier/buyer.
Contract Negotiation
Determining mutually agreeable contract provisions.
Renegotiating contract provisions.
Bonding Insuring against failure to deliver/purchase.
Insuring against substandard performance.
Legal Insuring against inadequate contract provisions.
Monitoring Monitoring ongoing supplier/customer performance.
Deciding to terminate or renegotiate contract.
Because of economies of scale and scope, organizations specializing in
producing a family of items or performing a family of activities have the potential to
provide higher-quality, lower-cost goods and services than does a non-specialist.
However, acquiring an item or a service from a specialist always involves transaction
costs (refer back to Table 3-1). The key question, thus, becomes: “Overall, is it less
expensive to do it myself or to have the specialist do it for me?” Often, the answer
is to have the specialist do it for you.
Intermediation
Intermediation refers to an organization’s choosing to reach suppliers or end
consumers through another organization, an intermediary, rather than directly.
Say, for example, that you would like a dish of ice cream made by a specific ice cream
producer. You could buy a pint directly from a retail store operated by the producer
or from a nearby grocery store (who buys the ice cream directly from the producer
or, more likely, from a distributor or wholesaler). Unless you live close to a producer
48
retail outlet, the transaction costs (e.g., search, travel, etc.) you would experience
are likely to be quite high. As a result, you would not buy a pint of ice cream directly
from the ice cream producer; instead, you would buy a pint from a nearby grocery
store. Because of such difficulties faced by producers in reaching consumers, most
producers use downstream intermediaries in order to reach a large number of
consumers. A similar logic can be applied in explaining the use of upstream
intermediaries. Table 3-2 describes common activities undertaken by intermediaries.
Table 3-2 Common Intermediary Activities
Types of Activities Performed by
Intermediaries Description
Search Efficiency Locate & procure products/services/information.
Locate suppliers.
Demand Aggregation
Gather orders from multiple consumers and negotiate prices & contracts with producers.
Gather products/services/information from multiple suppliers and negotiate prices & contracts with producers.
Create Packages Buy in bulk and reassemble into packages that meet the needs of specific consumers or producers.
Guarantee Transactions Handle complex transactions.
Insure payments & shipments.
Manage Logistics Delivery of goods: upstream & downstream.
Adding a new intermediary to an existing value stream always introduces
additional costs, as each intermediary naturally wishes to make a profit from their
involvement in the value stream. However, as these additional profits are spread
across the large number of value-units moving through the value stream, it often
proves to be the case that both producers and consumers ultimately benefit from the
presence of the new intermediary.
49
Digitalizing Pipeline Ecosystems
The nature of market-focused ecosystems has evolved dramatically over the
three eras of digital disruption, particularly with regard to the value-units delivered
to consumers, the enabling digitization and digitalization, and the payment and trust
systems employed. Table 3-3 provides an overview of the major changes that have
occurred. The most significant of these changes for pipeline ecosystems are
described below. Each one of the three eras of digital disruption within pipeline
ecosystems is now described, with this section ending with a discussion of how these
changes have resulted in the value streams associated with pipeline ecosystems
being disintermediated, reintermediated and characterized by intermediary
transformation.
Table 3-3 Evolution of Pipeline Ecosystems
Era Value-Units Digitization & Digitalization Exchange Currency
Trust Systems
1 Digital
complements
Data/document standards Point-to-point connectivity Intra- and inter-organizational
(managerial & operational) business process efficiencies
Banking system
Credit/debit card systems
Government & third- party institutions
Contracts Brand Social capital
2 Digital
value-units
Internet One-to-many connectivity Data, process, analytic &
collaboration platforms Social media Omni-channel producer-
consumer interaction
Digitalized payment systems
Third-party digital trust seals
Consumer monitoring (product & producer reviews)
3 Social
complements
Many-to-many connectivity Smart devices Big data platforms Big data analytic platforms Social messaging platforms
Reputation Social capital Bitcoins
Community monitoring
Peer-regulation Self-regulation
50
Era 1
Leadership teams of organization-participants within pipeline ecosystems
expect their operations, staff and managerial employees to be looking for ways to
enhance value-units, cut costs, improve market responsiveness, and accelerate the
development of new, revenue-generating value-units. These beneficial outcomes all
derive from efforts taken to improve organizations’ internal managerial and
operational processes. Figure 3-2 provides a way to conceptualize these processes.12
Primary processes refer to work activities directly involved in delivering value-units
to customers, and support processes refer to work activities that provide direction,
resources and oversight for the primary processes. All too often, however, these
work activities are hindered by constraints – both real (e.g., time, space, resource
limitations, etc.) and imagined (i.e., ingrained in employees’ thinking as a result of
culture, history, inadequate supervisory direction, inadequate training, etc.).
12 This conceptualization is derived from ideas introduced by: M. E. Porter, Competitive
Advantage: Creating and Sustaining Superior Performance, New York: Free Press, 1998.
51
Figure 3-2 A Pipeline Organization’s Managerial and Operational Processes
Indirect Materials & Supplies Procurement
Human Resource Recruitment & Development; Benefits Management
Financial Services; Accounting Services
Business/Digital Strategizing; Administrative Services
Manufacturing
Work-in- Process
Inventory
Quality Control
Direct Materials
and Supplies Procurement
Inbound Logistics
Order Fulfillment
Finished- Goods
Inventory
Outbound Logistics
Sales
Marketing
Merchandising
Customer Support
Reverse Logistics
S u
p p
o rt
P ro
c e
s s e
s P
ri m
a ry
P ro
c e
s s e
s
R&D; New Product Development; New Product Rollout
Digital Technology Services & Management
The availability of new digital technologies, industry data/document standards
and results from analyzing digitized transactional data proved instrumental in
enabling value stream participants to overcome many of the constraints that
otherwise were inhibiting efforts to improve internal processes and external
workflows. Data/document standards allow data and documents to be accessed
and used by value stream participants. For example, many industry groups
developed data and document specifications as a means of facilitating B2B
transaction flows. This was referred to as EDI (Electronic Data Interchange). As
might be expected, EDI made it possible for value stream participants to interconnect
their (increasingly-digitized) workflows. When operational processes improve within
and across a value stream’s participants, two things occur. First, the performance of
the entire value stream improves – to the benefit of all participants, but especially
52
for consumers. Second, as intermediaries are specialized to a greater extent than
are producers, intermediaries are able to more-quickly apply process improvements
to enhance their business models. As a result, intermediaries tended to gain
increased influence in value streams and, correspondingly, to increase their relative
shares of the value being created. However, such gains in the influence of
intermediaries were somewhat attenuated by the abilities of creative producers to
lower their cost structures and to attach digital complements (e.g., better and more
information, information-based services, product/service migration paths, etc.) to
the value-units being delivered to, thereby enhancing the producer’s value-
proposition and strengthening both the producer’s market position and relative
influence within the value stream.
For the most part, Era 1 pipeline ecosystems made use of well-established
payment and trust systems. The only true innovation that occurred was the
emergence of a digitally-enabled payment system: credit and debit card payment
systems.
Era 2
The digital technology that ushered in Era 2 was the development and wide-
spread adoption of the World Wide Web. At its core, the WWW (World Wide Web)
serves as a one-to-many connectivity mechanism enabling organizations (and
individuals) to store data and documents in an online space such that these data and
documents can easily and inexpensively be accessed and used by other organizations
(and individuals). The WWW (along with its enabling technologies) led to three
digitalization innovations that irreversibly disrupted pipeline ecosystems: purely-
digital value-units, platforms, and omni-channel promotion, ordering and delivery.
53
Purely-Digital Value-Units
Like their physical counterparts, purely-digital value-units do not exist in a
vacuum but require a vast enabling-ecosystem. For example, consider a very familiar
physical product – the automobile. In order for you to buy a car directly off of the
sales lot and drive it, a huge number and variety of things must exist: automobile
retailers, service/repair shops, insurance providers, fuel stations, roadways, traffic
lights and signage, traffic laws and regulations, etc. Most important, a
correspondingly huge number of standards need to have been established and need
to be followed in order for the entire automobile ecosystem to operate seamlessly.
A similar enabling-ecosystem needs to exist for purely-digital value-units, such
as digital books, mp3 audio tracks, navigation maps, and digital coupons. Devices
must exist through which a purchased value-unit can be accessed and used, retailers
must exist to offer the value-unit to a consumer and then deliver a purchased copy
to the consumer’s device, and payment systems must exist so that the exchange can
take place between the retailer and the consumer. As with physical goods, many
standards must be established and followed for the ecosystem to operate seamlessly.
Although physical and digital value-units both require enabling-ecosystems,
the markets for physical and digital value-units differ in two major ways. First, the
cost-structures of digital value-units tend to be much lower than the cost-structures
of physical value-units. Second, long-tail effects characterize digital value-unit
markets to a much greater extent than physical value-unit markets.
Relative to digital value-units, physical value units have moderate-to-high
initial costs (e.g., design, testing and marketing) and moderate-to-high variable
production costs (e.g., labor and materials). Let us compare the costs between
54
manufacturing a car and developing a digital book. Car manufacturers incur high
fixed costs (e.g., large plants, sophisticated manufacturing and design technologies,
etc.) and high variable costs (e.g., parts and assembled components, labor). In
contrast, while a digital book may have high initial costs (the labor costs involved in
authoring, editing and formatting the book), a digital book has very low variable
production costs - often approaching zero. This is because the costs of replicating
digital goods are minimal, unlike most physical goods. For example, the 100th car
coming off of an assembly line will cost essentially the same to produce as the first
car off of said assembly line. However, the 100th digital copy of a text book costs
only a minute fraction of the expense involved in producing the first digital version.
The production costs associated with digital goods are dominated by the cost of
producing a first copy, with few constraints limiting growth in demand. Simply put,
digital goods have far more opportunities for large-scale growth than do physical
goods.
The long-tail phenomenon refers to the ability of digital markets to offer a
far broader variety of value-units than could be offered in comparable physical
markets. Participants in physical markets are constrained in the breadth of value-
units being offered because of the costs of holding inventory. Generally, firms strive
to offer the 20% of value-units that generate 80% of sales. It simply is not
economical to cater to the remaining 80%. Consider a hardcopy book that was a
bestseller a year ago, but has since been displaced by more recent bestsellers. Even
though a small demand for this hardcopy book is likely to persist over time, most
hardcopy retailers will keep few, if any, copies of the book on hand due to acquisition
costs and physical storage space constraints. Similarly, consider a book on hiking in
55
the Andes mountain ranges written by an authoritative expert. While there might be
a sizeable demand for such a book among hiking enthusiasts (especially those
planning a near-term hiking expedition in the Andes), the book is unlikely to have
the broad popularity needed to merit space on most hardcopy retailer’s bookshelves
(unless, perhaps, you walk into a bookstore in Cuzco, Peru).
On the other hand, digital retailers are finding it profitable to service the needs
of customers whose tastes represent the more specialized products populating the
long-tail of the demand spectrum. For example, an MIT study from the early 2000s
found that nearly 30-40% of Amazon’s book sales represent products in this long-
tail.13 This ability of digital markets to service the long-tail of demand can be
explained by a number of factors:
Digital retailers experience lower costs of stocking inventory because they do not use physical shelf space to stock and display their products. Instead,
they apply digitalized product inventories, often including products held by other ecosystem participants.
Digital retailers experience lower costs of promotion and advertising via a proliferation of Internet and social media sites.
Digital retailers experience lower acquisition costs.
Digital markets are not constrained by geography. They can reach customers locally, regionally, nationally or globally. At that scale, digitized
retailers can aggregate the demand for niche products to achieve dramatic scale economies.
Digital consumers can make use of digitalized search mechanisms to locate
digital retailers and specific digital value-units.
Digital consumers have access to massive amounts of value-unit-related
information (e.g., reviews of specific value-units or of value-unit categories, such as lists of the best point-and-shoot cameras).
13 E. Brynjolfsson, Y. Hu, and M. D. Smith, "From Niches to Riches: Anatomy of the
Long Tail," Sloan Management Review, Summer 2006, pp. 67-71.
56
Platforms
Value streams in pipeline ecosystems become longer and wider each time
another upstream or downstream intermediary is added. Although each added-
participant offers new capabilities to be leveraged, the complexities involved in
coordinating data, information and material flows between value stream participants
increase as well.
Consider the value stream shown in Figure 3-3. Note that numerous
data/information flows and material flows are involved, and that all of these flows
occur between adjoining participants. Each participant determines demand forecasts
from data and information provided by only the most adjacent participants. Without
access to consolidated data from all participants in a value stream, these forecasts
tend to be error-prone, erratic and worsen over time. Participants experiencing high
levels of demand uncertainty often suffer late deliveries, overstocking, high
expediting costs, stressed employees, dissatisfied customers, and lost revenue.
Figure 3-3
Conventional Value Stream
Tiered Suppliers
Contract Manufacturers
Assemblers
Retailers
Distributors
Consumers
Data & Information Flows
Material Flows
Producer
57
Value stream participants developed tactics to deal with demand uncertainty,
the two most common being vertical integration and stock holding. With vertical
integration, an organization chooses to do more value stream activities itself, thus
shortening and narrowing its value stream. But, in doing so, the advantages gained
through specialization and intermediation are lost. With stock holding, an
organization builds up various kinds of inventories, thus providing buffers that soften
the effects of poor demand forecasts. But, in doing so, higher inventory costs arise
that can lead to higher prices (stressing consumer demand) and/or lower profit
margins.
Era 2 digitalization provided a much better way to cope with the challenges of
long and wide industry value streams. Figure 3-4 depicts a platform-enabled value
stream. In general terms, a platform uses digital technologies to host digital and
digitally-enabled resources. In this case of a value stream platform, these hosted
resources are likely to include: digitized data and documents, digitalized managerial
and operational processes that operate on these data/documents, tools for analyzing
data, and tools enabling employees from participating organizations to interact and
collaborate. By using the resources available through value stream platforms, value
stream participants can: better plan their own work activities; better plan and then
coordinate the data, information and material flows that permeate a value stream;
and, collaborate to resolve problems that arise.
58
Figure 3-4 Platform-Enabled Value Stream
Tiered Suppliers
Contract Manufacturers
Assemblers
Distributors
Retailers
Consumers
Data & Information Flows
Material Flows
Value Stream Platform Data/Documents Processes Analytic Tools Collaboration Tools
Producer
Many successful value stream platforms have been built, owned and
managed by powerful value stream participants. Classic examples include Dell’s
platform for executing its build-to-order business model (see Figure 3-5) and
Enterprise Rent-A-Car’s platform for executing its repair rental car business model
(see Figure 3-6). Considerable efforts have been taken by industry consortiums,
(e.g., electronics manufacturing, automobile manufacturing, chemical production,
etc.), to define and implement platforms to be used across the varied value streams
that comprise these industries’ market ecosystems.
59
Figure 3-5 Dell’s Value Stream Platform
Component Suppliers &
Contract Manufacturers
Dell Consumer
Outbound (Downstream)
Logistics Provider
Inbound (Upstream)
Logistics Providers
Data & Information Flows
Product & Material Flows
Dell’s Value Stream Platform
Contracted Assembler
Figure 3-6 Enterprise Rent-A-Car’s Value Stream Platform
Insurance Companies
Auto Repair Shops
Enterprise Rent-A-Car
Consumer
Enterprise’s Value Stream
Platform
Data & Information Flows
Omni-Channel Promotion, Ordering and Delivery
As Era 2 progressed, advances with WWW technologies accelerated, increasing
the functionality, ease-of-use and availability of value stream platforms. One of the
key targets of platform enhancement involves the variety of channels used for
60
promotion, ordering and delivery activities (see Table 3-4). As a consequence, value
stream participants enlarged the portfolio of channels through which participant
interactions occurred. Such interactions involve data, information and/or material
flows between:
Participants’ digitalized processes (e.g., a producer’s component ordering
system interacts with a supplier’s sales order processing system).
Participants’ employees (e.g., a producer’s purchasing clerk interacts with a supplier’s customer support representative via a series of texts).
A participant’s digitalized process and another participant’s employee (e.g., a producer’s purchasing clerk interacts with a supplier’s order tracking
system).
A participant’s digitalized process and an individual consumer (e.g., a consumer interacts with a producer’s online storefront).
A participant’s employee and an individual consumer (e.g., a consumer interacts with a producer’s customer support representative via an online
chat capability).
Two (or more) individual consumers (e.g., two consumers interact through a
producer’s online customer forum).
Table 3-4 Value Stream Participant Interaction Channels
Medium
Era 1 Channels Era 2 Channels
Promotion Ordering &
Delivery Promotion
Ordering & Delivery
Mass
Radio Television Print
Magazines Newspapers Catalogs
Direct Mail
Retail Store Internet Ads Producer Website Retailer Website Informational Websites Posted Reviews Messaging
email/text
eCommerce B2C B2B
Personal
Telephone Face-to-Face
Mail Services Parcel Services Telephone Face-to-Face
Search-Targeted Ads Messaging
email/text/chat
Messaging
Social
Group Event Avon Tupperware
Group Event Social Media Groups Messaging Interactions Targeted Ads
Blogs
61
Payment and Trust Systems
The accelerating growth of B2C e-commerce witnessed innovations in both
payment systems and trust systems. Purely-digital alternatives, such as PayPal and
Amazon’s 1-Click, have emerged in response to consumers’ desire for more
accessible and convenient payment systems for online transactions. Similarly,
innovations were targeted at increasing consumers’ willingness to engage with e-
commerce retailers (e.g., third-party institutions such as VeriSign) and to purchase
products on a sight-unseen basis (e.g., consumer reviews). Consumer reviews, in
particular, have become a culturally-accepted trust mechanism, despite concerns14
about fake reviews and a tendency for contributed reviews to possess a socially-
influenced bias toward positive ratings.
Era 3
Era 3 digitalization emerged largely as a consequence of the coming together
of smart devices, value-unit social media complements and pervasive connectivity.
A smart device refers to an assembled piece of digital technology (e.g., a product,
a component, a tool, an accessory, etc.) that provides a digital capability to sense,
analyze and act on environmental signals. Table 3-5 describes some familiar but, in
contrast to what is happening today, not-so-smart smart devices. Value-unit social
media complements refer to the opportunities made available to value-unit
consumers to engage with the value-unit’s producer and/or retailer and with other
consumers via social media. Pervasive connectivity is a characteristic of an
14 S. Aral, “The Problem with Online Ratings,” Sloan Management Review, Winter 2014,
pp. 47-52.
62
ecosystem where collections of smart devices across the ecosystem are
interconnected, thus creating opportunities for anywhere, anytime interaction; these
interactions contribute (e.g., sensed data, novel ideas, reviews, etc.) significantly to
business model value propositions. How are individuals (typically, employees and/or
consumers) motivated to contribute to the ecosystem? While (direct or indirect)
monetary payment has traditionally been a dominant primary mechanism, alternative
mechanisms - reputation and social capital - are proving to be equally, if not more,
effective.
Table 3-5
Some Familiar Smart Devices
Device What is Sensed What Action is Taken
Smartphone Screen icon touch An app is launched
Home Thermostat
Ambient room temperature Furnace (air conditioner) turned on when ambient temperature too low (high)
Tire Pressure Sensor
A tire’s current air pressure Dashboard icon lights up when the tire’s air pressure is too low
Smart Refrigerator
The condition of a refrigerator’s water filter
A display icon lights up when the water filter needs to be changed
Vehicle Navigation GPS
Unit
Satellite signals indicating the coordinates of the unit’s geographic location
An icon is positioned on a displayed digital map that indicates the vehicle’s position, direction & speed
Shipment Unit Packaging
Sensor
The force exerted on a shipped unit if and when the unit shifts or drops while in transit
If sufficient force is detected, the shipped unit is returned to the point of origination for damage assessment
Electronic Device Fault-
Diagnosis Temperature of the device
A series of pre-programmed tests are performed on the device’s circuitry
The pervasive connectivity of smart devices can produce huge volumes of
streamed data, popularly referred to as Big Data, to be captured, organized and
analyzed. Era 3 digitalization enables value stream participants to: maintain an
awareness of targeted events occurring across a value stream, as well as within
adjacent value streams; to capture data about these events; and, to apply statistical
63
and mathematical models to these data in developing deeper understandings of the
competitive context, of value stream participants (e.g., raw material suppliers,
component suppliers, services providers, downstream-consumers, etc.), and of
specific competitive situations. Table 3-6 provides two relatively straightforward
examples of the benefits obtainable from Big Data analytics.
Table 3-6 Big Data Analytics Examples
Bicycle Pump Producer Buzz Analytics
City of Boston Street Bump iPhone App
Digitalization
Captured consumers’ messages on social media (Facebook, Twitter, etc.) about bicycle pumps.
Analyzed messages to prioritize pump features and to identify the weaknesses of the producer’s pump vis-a-vis competitors’ pumps: less durable, hose harder to use, and contained a costly but low-ranked built-in gauge.
Tearing down competitors’ products revealed higher- quality components and less bulky packaging.
Drivers turn on app and placed iPhone on car dashboard.
App captures data about potholes encountered (location, estimated depth/size, etc.) and transmits these data to a City of Boston data server.
Captured data cleansed (e.g., non-pothole bumps filtered out) & analyzed to prepare listings of potential potholes to be filled.
Outcomes
Removed pressure gauge and reduced packaging.
Applied cost savings to use higher-quality components.
Potholes fixed before they become major road hazards and while repair costs are relatively low.
Recurrent potholes can signal serious road management problems.
Source
D. Fedewa, G. L. Velarde and B. O’Neill, “Using Buzz Analytics to Gain a Product and Marketing Edge,” McKinsey Quarterly, Number 2, 2016, pp. 14-15.
D. O’Leary, “Exploiting Big Data from Mobile Device Sensor-Based Apps: Challenges and Benefits,” MIS Quarterly Executive, December 2013, pp. 179-187.
This capability to capture, archive and analyze large streams of transaction-
related data has made viable a new trust mechanism: self-regulation. With self-
regulation, an organization captures data associated with critical market-related
transactions, monitors these data for problems, reacts responsively and responsibly
if (and when) problems arise, and keeps (governmental or third-party) regulators
and value stream participants aware of these activities.
64
The Promise of Car Data15
To catch a glimpse of what is on the horizon as Era 3 progresses and intensifies,
let us take a not-so-futuristic look at how Big Data analytics is changing automotive-
related competitive contexts.
During the coming decade, technology entrepreneurs and digital giants are
expected to partner with incumbents in the automotive industry to exploit an
expected surge in the availability of car data and to introduce innovative car-related
features and services for which consumers are expected to be very willing to pay.
What exactly is car data? A short list would include data about: the road and
environmental conditions, the status of a car’s various components (e.g., engine,
battery, tires, etc.) and systems (e.g., power, steering, safety, etc.), vehicle usage
history (e.g., speed, direction, location, past and current trips, etc.),
driver/passenger personal data and preferences, and direct communications from the
vehicle (e.g., phone, text, email, calendar, social media, etc.). At present, a key
unknown is: “Will most people be willing to share this information for free?” Most
observers feel the answer will be Yes given the immediate benefits to be derived by
a vehicle’s driver and passengers (see Table 3-7). What do you think?
15 This section is based on material from: D. Mohr, G. Camplone, D. Wee, T. Moller
and M. Bertoncello, “Car data: Paving the Way to Value-Creating Mobility”, McKinsey
Quarterly, March 2016: https://www.mckinsey.de/files/mckinsey_car_data_march_2016.pdf
65
Table 3-7 Immediate Driver/Passenger Benefits from Sharing Car Data
Safety Time
Real-time emergency calls Early on-scene accident reporting Information to support rescue
services Real-time road hazard warning
Reduced travel time through optimized routing, navigation & traffic management systems
Reduced time to locate parking through connections with parking services
Convenience Cost
Reduced breakdown risk and vehicle downtime through predictive maintenance and connections with repair & spare parts service providers
Concierge services (refueling, carwash, in-trunk delivery)
Overall, a more-connected lifestyle
Reduced insurance cost through pay-as-you-drive insurance schemes
Reduced toll/road tax rates through an automated payment infrastructure
Why is this scenario so appealing to ecosystem participants? The answer lies
in both sides of the profit model component of a business model: generating revenue
and reducing cost. New sources of revenues include: selling or leasing new products
and services to car owners, leveraging car data with other sources of data to push
tailored advertisements to drivers and passengers, and selling/leasing curated car
data to third-parties. New means of cutting costs involve creative uses of car data
and car connectivity to reduce the R&D, production, delivery and marketing costs
associated with automobile-related products and services. In essence, the
connected-car is increasingly being seen as the first step into the store and, when
combined with autonomous driving, as a prime space for retail where producers and
retailers directly interact with a captive consumer.
Disintermediation, Reintermediation and Intermediary Transformation
Over the last two decades, digital disruption has introduced seemingly constant
participant turnover into most pipeline ecosystems. Established organizations are
frequently losing prominence in markets and, not infrequently, exiting markets –
66
think Borders, Blockbuster and Circuit City. Simultaneously, scores of new, highly-
digitalized entrants are participating in these same markets (as well as discovering
new, profitable niches in existing markets or creating entirely new markets).
Today, the ever-accumulating stocks of digitalization capabilities arising from
the three eras of digital disruption have seeded and continue to see radical structural
changes in pipeline ecosystems. The primary drivers of these ecosystem structural
changes are disintermediation, reintermediation and intermediary transformation.
Disintermediation occurs when an intermediary is bypassed, thus shortening and
narrowing a value stream. Reintermediation occurs with the appearance of a new
intermediary, whose presence lengthens and broadens a value stream.
Intermediary transformation occurs when an existing intermediary vertically
integrates, thus becoming a producer. Table 3-8 describes these structural change-
events for the upstream and downstream segments of pipeline ecosystems. Below,
we provide examples of each type of change-event for the downstream context.
67
Table 3-8 Value Stream Structural Change-Events
Downstream
Disintermediation Producer bypasses intermediaries to directly engage in market exchanges with consumers.
Reintermediation
Entry of digitalized retailer, whom facilitates market exchanges between producers & consumers.
Entry of digitalized infomediary (an intermediary dealing solely with data & information), whom identifies sought value-units and/or producers to consumers.
Intermediary Transformation
Intermediary integrates backwards to become a producer creating & delivering value- units to consumers.
Upstream
Disintermediation
Producer bypasses intermediaries to directly engage in market exchanges with raw material suppliers, component suppliers and/or service providers.
Supplier bypasses intermediaries to directly engage in market exchanges with producers and/or bypasses producers to directly engage in market exchanges with consumers.
Reintermediation
Entry of digitalized distributor facilitating market exchanges between producers & raw material suppliers, component suppliers and/or service providers.
Entry of digitalized infomediary identifying sought raw materials, components & services, as well as suppliers/providers, to producers.
Intermediary Transformation
Intermediary integrates backwards to become a producer, creating and delivering value- units to suppliers, intermediaries, producers and/or consumers.
Almost all producers in consumer markets (e.g., clothing, shoes, digital
devices, furniture, grocery products, art, music, etc.) are disintermediating, to
varying extents, their downstream ecosystem via a B2C sales channel. B2C channels
provide many benefits – most are obvious, but some are not-so-obvious - to
producers and to consumers. Producers enjoy: a new revenue-generating sales
channel complementing, rather than cannibalizing, existing sales channels; higher
profit-margins on B2C sales, especially with overstocked items; the opportunity to
directly touch and interact with consumers, building loyalty and engagement; and,
the opportunity to indirectly and directly involve consumers in new product
development activities. Consumers enjoy: access to a producer’s entire product line
and to product-support content; immediate, and often early, access to a producer’s
new and overstocked products; the ability to express feelings of satisfaction and
68
dissatisfaction directly to a producer; opportunities to engage with the producer and
with other consumers in learning about a product and product-related activities; and,
opportunities to influence a producer’s next generation of products. Who loses?
Clearly, the intermediaries, i.e., distributors and retailers, who have been partially or
fully disintermediated.
As described in Table 3-8, there are two primary reintermediation pathways
with downstream ecosystems: the entry of a digitalized intermediary and the entry
of a digitalized infomediary. An infomediary is a digitized intermediary that gathers
content from across the WWW, curates the content and provides access to this
curated content. Amazon’s foray into the retail marketplace for books is the iconic
example of a digitalized entrant serving as disruptive intermediary, and Google’s
reshaping of Internet search is the iconic example of a digitalized entrant serving as
a disruptive infomediary.
Finally, highly-capable and influential intermediaries able to develop deep
knowledge of a pipeline ecosystem may be able to exploit this knowledge to become
a producer of the value-units being delivered to consumers. Two examples nicely
illustrate the breadth of possibilities. Netflix successfully disrupted the pipeline
ecosystem for film and television video not once, but twice: first as a partially-
digitalized intermediary renting DVDs, and later as a fully-digitalized intermediary
streaming video provider. Now, Netflix is producing and delivering its own content,
strengthening its ecosystem influence such that the company is universally
recognized both as one of the industry’s more powerful and innovative players.
Amazon, on the other hand, has followed two very different paths in becoming a
producer. Having by necessity developed (1) deep knowledge of the pipeline
69
ecosystem that creates and delivers books to consumers and (2) strong digital
capabilities as this ecosystem transitioned from hardcopy to digital books, Amazon
has become a successful publisher of digital books through its Kindle Direct Publishing
operation. Again, having by necessity developed superb digitalization capabilities in
executing its massive B2C and B2B business models, Amazon has also become a
successful provider of digitization services (e.g., computer processing power, data
storage, content management, etc.) through its Amazon Web Services operation.
A Recap and Look Ahead
This chapter has both explained the economic foundations that have enabled
pipeline ecosystems to dominate most industries over the past century and the
manner by which digitization and digitalization have transformed pipeline
organizations and pipeline ecosystems over the three eras of digital disruption. Given
this understanding of pipeline ecosystems, the next chapter examines digital strategy
formulation and evolution for pipeline organizations.
70
Chapter 4. Digital Strategy Formulation for Pipeline Organizations
Today, most of the data and documents that move between and within value
stream participants in a pipeline ecosystem, as well as most of these participants’
operational and managerial processes, are extensively digitalized. As a result,
digitized data and documents can be quickly accessed, absorbed and shared,
reassembled for new uses, and analyzed to produce specific answers, fresh insights
and reports. Digitalized processes can be quickly executed, incrementally or radically
modified, adapted to new contexts, and analyzed to recover the knowledge
embedded within a process’s logic. Importantly, the greater the extent of
data/document digitization and of process digitalization, the easier it becomes for an
organization’s leadership team to display adaptive and entrepreneurial agilities.
This chapter builds upon the earlier ideas provided on digital strategy
fundamentals and on pipeline ecosystems by providing insights about the digital
strategy formulation for pipeline organizations. It covers the following topics:
Digitalization and the Value Disciplines
Platform Design
Platforms and the Domains of Digitalization
Digital Strategy Formulation
Digital Strategy Formulation in Practice
Sustaining Held Competitive Positions
Digitalization and the Value Disciplines
Value disciplines are incorporated within an organization’s digital strategies
through a collective mindset and capabilities for execution. Today, many of the
71
needed capabilities are provided through the technical services being hosted on
digital platforms and through the operational and managerial business processes
being hosted on business platforms. Invariably, a business platform makes use of
multiple digital platforms.
Table 4-1 sums up how the engines of digitalization (automation, control,
empowerment and interaction) can enhance business processes associated with each
of the three value disciplines. Two significant trends regarding digital strategies are
reflected in just such investments in digitalized business platforms.
Table 4-1
Enhancing the Value Disciplines via Digitalization
Digitalization Engine
Value Discipline
Operational Excellence Customer Intimacy Product Leadership
Automation
Upstream, midstream & downstream work activities handled quickly, accurately & completely in a less- costly, more-timely manner.
Availability of a broad range of media channels through which customers are touched.
R&D, product commercialization, quality assurance & after-sales support work activities handled quickly, accurately & completely in a less-costly, more-timely manner.
Control
Fewer suboptimal actions taken and quicker sensing of exceptional or changed situational contexts.
Digitalized business solutions & employees touching customers produce fewer suboptimal results.
Digitalized business solutions & employees engaged in R&D, product commercialization, quality assurance & after-sales support produce fewer suboptimal results.
Empowerment
Employees engaged in operational/managerial work produce fewer poorly- informed or ill-informed results.
Employees touching customers are better informed about the customer and the situation.
Employees engaged in R&D, product commercialization, quality assurance & after-sales support are better informed.
Interaction
Digitalized business solutions & employees engaged in work activities exchange more & better data & information.
Customers & customer communities can be engaged across time and space.
Employees engaged in R&D, product commercialization, quality assurance & after-sales support can engage one another, employees of strategic partners & customer communities.
First, well-architected digitalization helps firms develop both adaptive and
entrepreneurial agilities. As more competitors in a market-focused ecosystem
demonstrate these agilities, the pace at which organizations must implement and
respond to competitive actions quickens dramatically. Since the competitive actions
72
taken by competitors emphasize differing value disciplines, organizations striving to
gain a competitive advantage or maintain competitive parity are increasingly forced
to target multiple value disciplines. Vivid examples of this phenomenon were
provided in Chapter 2’s discussions of General Electric and Apple.
Second, many of the core capabilities needed for organizations to achieve
competitive parity are increasingly available from technology providers in the form
of pre-packaged business platforms. Digitally-savvy organizations can quickly
acquire a business platform, integrate the acquired platform within its installed
assemblage of digital platforms and business platforms, and competitively exploit this
expanded set of capabilities. Essentially, such practices find organizations innovating
by imitating other firms’ innovations – a much-faster and less-risky form of
innovation.16 However, such practices only serve to further speed up the pace of
competition within market-focused ecosystems.
Platform Design
Well-architected platforms are the means by which organizations are able to
evolve their business models and execute competitive actions in a timely manner.
But, what exactly is meant by a well-architected platform? A well-architected
platform exhibits an appropriate balance in (1) the stability and agility of the hosted
functionality and (2) the costs of building, enhancing and extending platforms across
functional, unit and organization boundaries. In order to fabricate a well-architected
platform, three design issues must be addressed: modularity; tight-coupling vs.
loose-coupling; and, global vs. local.
16 O. Shenkar, Copycats: How Smart Companies Use Imitation to Gain a Strategic
Edge, Boston: Harvard Business School Publishing, 2010.
73
Modularity
With modularity, each of a platform’s major functionalities, or modules,
operates independent of other functionalities and obtains needed information or
resources from a common coordinating module. Therefore, it is easy to add modules
to or remove modules from the platform. Additionally, once a platform is built, it is
relatively easy to modify any of the platform’s modules.
Tight-Coupling and Loose-Coupling
Tight-coupling and loose-coupling refer to the nature of the interconnections
that enable data, messages and documents to be exchanged between platforms.
With tight-coupling, one or both of the interconnected platforms are modified so
that the data, messages and/or documents being exchanged are consistently
interpreted across both platforms. Because the required modifications require both
time and effort, tight-coupling can be very intrusive for one or both of the platforms.
With loose-coupling, one of two tactics is generally applied:
Some form of interconnection component is used to translate the data,
messages or documents flowing from one platform to the other platform. While time and effort is required to devise the translation rules, once
devised the rules can be applied to facilitate exchanges of the data, messages and/or documents with other platforms.
The functions being executed on each of the platforms conform to the same
set of data/message/document standards (often established by an industry association or by a consortium of powerful industry players). While time and
effort are initially required to negotiate standards and conformance policies, platforms hosting ‘standards-compliant’ functions are relatively easy to interconnect.
Both of the loose-coupling tactics are far less intrusive than tight-coupling.
Figures 4-1 and 4-2 contrast tight-coupling and loose-coupling. In general,
tight-coupling can provide for greater stability (being seamless and using less
74
complex technology, it is easier to harden and secure) and loose-coupling can provide
for greater agility (both the platform and its connections to other platforms are easier
to modify). In terms of cost, initial connection costs are greater with loose-coupling,
but subsequent connection costs tend to be less.
Figure 4-1
Tight-Coupling and Loose-Coupling
data, messages, documents
data, messages, documents
Tightly Coupled
Loosely Coupled
• Interconnection Artifact
• Agreed-to Standards
Module A Module B
Module A Module B
75
Figure 4-2 Contrasting Tight-Coupling and Loose-Coupling
L o
o s e
ly -C
o u
p le
d
T ig
h tly
-C o
u p
le d
• Seamless • Less Complex Technologies • More Intrusive • Best for a One-to-One connection
• Interceded • More Complex Technologies • Less Intrusive • Best for a One-to-Many Connection
Global and Local
The term global, as used throughout this book, refers to a digital solution that
is designed and built to be used by most of an organization’s work units (another
term often used to connote a global digital solution is enterprise-wide). A local digital
solution is designed and built to be used by one or only a few of an organization’s
work units.
Figure 4-3 summarizes the advantages of global and local platforms. Global
platforms are more cost-effective to build, support and modify because associated
costs are spread across a large base of users. Additionally, the digital solutions that
comprise global platforms are highly-leverageable, as these solutions can be reused
as new functionalities are appended to a platform. However, considerable time and
effort is required to negotiate the design of and to implement global platforms (as
well as subsequent modifications to global platforms). Further, it is all too often
76
infeasible to use global platform functionalities to meet a work unit’s needs (e.g., a
functionality unique to the work unit, an innovative functionality, an extremely quick
response to an identified opportunity or problem, etc.). In such situations, fashioning
and implementing a local platform is more effective and timely. That said, an over-
dependence on local platforms can quickly lead to excessive costs: work units
undertake digitization and digitalization projects to gain functionalities that have
already been built by other work units; and, when reuse tactics are followed,
unforeseen complexities invariably arise when integrating and/or interconnecting
independently-designed digital solutions.
Figure 4-3
Contrasting Global and Local Platforms
G lo
b a
l P
la tf
o rm
L o
c a
l P la
tfo rm
• Tailored Solutions • Innovative Solutions • Timely Solutions • More-Easily Implemented Solutions
• Lower-Cost Solutions • Leveraged Solutions • More-Easily Supported & Modified
Solutions
Platforms: Best Practices
It is increasingly accepted that organizations’ platforms, ideally, should be
modularly-designed and that optimal balance should be achieved regarding these
77
platforms being tightly/loosely coupled and being implemented as a global/local
resource. Although platform modularity is a key feature of newly-built and acquired
platforms, most organizations are in the midst of extensive (and expensive) journeys
to re-architect their installed platforms. Achieving an optimal balance in the use of
tight-/loose-coupling is an ongoing endeavor for most organizations – an endeavor
having two overarching design rules:
If a platform is expected to be frequently adapted, then loose-coupling is used to incorporate a bias toward dynamism.
If a platform is expected to be infrequently adapted, then tight-coupling is used to incorporate a bias toward stability.
Achieving an optimal balance in the use of global and local platforms is an ongoing
endeavor for most organizations. However, most organizations have a bias toward
global platforms, with a few exceptions:
Digitalized functionalities expected to serve a single work unit (or a few work units) should be implemented as local platforms.
Digitalized functionalities that must be implemented quickly for competitive reasons should be initially implemented as local platforms (to avoid having
to follow constrained and time-consuming design and implementation policies and processes for global platforms) and then, once proven and stabilized, be considered as candidates for reimplementation as global
platforms.
Digitalized functionalities that apply unproven solutions or that introduce
novel forms of digitalization should be initially implemented as local platforms (to contain risk) and then, once proven and stabilized, be considered for reimplementation as global platforms.
Platforms and the Domains of Digitalization
Today, platforms host most of the capabilities enabling organizations to carry
out day-to-day work activities and undertake competitive actions. This section
78
describes how digital platforms and business platforms have transformed
organizations’ operational, analytical and collaborative domains.
The Operational Domain
Digitalization of the operational domain is directed at two primary aims: event
visibility and channel multiplicity. Event visibility refers to making key events (an
order, a sale, an inventory movement, a shipment movement, a shipment delay,
etc.) and non-events (a consumer leaving without a purchase, an out-of-stock
inventory situation, etc.) known to the individuals and the digitalized solutions taking
action so that appropriate actions can be taken.
Currently available digital technologies have overcome many of the challenges
that previously restricted event visibility. However, it is important to recognize that
event visibility is also affected by cultural practices. If an organization’s work units
are insufficiently incentivized to work together, it can be difficult to get all employees
to dance to the same song. Sales personnel, for example, tend to be rewarded for
sales growth, while manufacturing personnel tend to be rewarded for productivity
and quality control. As a result, manufacturing personnel may decide not to let sales
personnel know about a spike in defect rates – information that the sales unit needs
when interacting with customers. Such issues only intensify with information flows
that cross organizational boundaries. Should a manufacturer let a supplier know the
nuances that underlie customers’ purchasing behaviors? How about if the supplier
also supplies the manufacturer’s prime competitors? Should a component-supplier
let a manufacturer-customer know about an emerging supply chain issue likely to
delay future component shipments? Does your answer change if the manufacturer-
customer could easily switch to other suppliers?
79
Channel multiplicity refers to ensuring that a sufficient mix of
interconnection channels are available to handle the data, messages and documents
flowing to and from individuals and digital solutions so that a preferred channel is
available for use. Channel multiplicity is particularly important when connecting with
humans, as people tend to develop strong preferences for using specific channels for
different interconnection situations. Consider your own behavior, for instance. Do
you communicate most with others who use the same communication channels (e.g.,
email, texting, phone, etc.) that you prefer? Do you tend to use specific
communication channels for communicating specific types of information (e.g.,
texting for good news, but speaking face-to-face for bad news, or vice versa)?
Figure 4-4 depicts a generic operational platform. Note that the platform hosts
an organization’s primary and support processes, as well as the data captured and
used by these processes. Further, these processes extend externally to connect with
the processes of value stream participants through a mix of interconnection channels.
It is by appropriately tuning these processes and by using appropriate interconnection
channels that key events occurring inside and outside an organization are made
visible to individuals and digital solutions.
80
Figure 4-4 A Generic Operational Platform
Global Operational
Database
Support Processes
Primary Processes
Downstream Intermediaries
Consumers
Upstream Intermediaries
Material & Component Suppliers
C h
a n
n e
l M
u lt
ip li
c it
y C
h a
n n
e l M
u lt
ip li
c it
y
C h
a n
n e
l M
u lt
ip li
c it
y C
h a
n n
e l M
u lt
ip li
c it
y
The operational domain is especially important for passenger airlines, such as
Delta Airlines.17 Consumers are very concerned with safety, with on-time departures
and arrivals, and with having their in-flight needs met. Not surprisingly, all airlines
pursue the operational excellence value discipline. Figure 4-5 provides a high-level
view of Delta’s operational platform. Operating a heavy schedule of flights across a
mix of aircraft, routes and airports is like choreographing and directing the largest
ballet ever conceived. Unless all employees and all executing digitalized solutions
are collectively able to maintain a close-to-real-time awareness of the thousands of
events occurring each minute, problems are sure to arise.
17 This discussion of Delta’s operational platform is adapted from material in: J.W.
Ross, P. Weill and D.C. Robertson, Enterprise Architecture as Strategy, Boston: Harvard
University Press, 2006.
81
Figure 4-5 Delta Airline’s Digitalized Operational Platform
Core Data
Primary Processes
Allocate resources Prepare for flight departure Load aircraft Flight departure & closeout Monitor flight Flight arrival & closeout Unload aircraft Clean & service aircraft
Location Flight
Schedule
Maintenance
Equipment
Employees
Aircraft
Customer
Ticket
The Analytical Domain
Digitalization in the analytical domain is also directed at two primary aims:
improving decision processes, and accumulating knowledge about these decisions to
improve operational and managerial performance. Organizations amass analytical
capabilities by providing (suitably-trained) employees with easy-to-use tools with
which to access and analyze comprehensive collections of data. Increasingly, subsets
of these same analytic capabilities are provided to employees of other value stream
participants (e.g., a retail chain’s buyers, a supplier’s manufacturing management
team, etc.).
Figure 4-6 depicts a generic analytical platform. Collections of data typically
reside in either a data warehouse (a single, comprehensive archive of organized
data across multiple spheres of work; e.g., marketing, logistics and manufacturing)
82
or a more focused data mart (a smaller archive of organized data focused on a
specific sphere of work; e.g., marketing, logistics or manufacturing). These data
archives are populated from operational databases, from other internal sources, and
from external sources (e.g., market research firms, economic forecasters,
governmental agencies, etc.). Furthermore, these data are most often analyzed to
achieve one or more of the following four purposes: description, diagnosis, prediction
or prescription. The most common analytical tools used in achieving these purposes
are defined in Table 4-2.
Figure 4-6
A Generic Analytical Platform
Data Warehouse
and/or Data Marts
Global Operational
Database
External Data
Sources
Other Internal
Data Sources
Description Events Objects Situations
Diagnosis Failure Success Event
occurrences
Prediction Events Outcomes
Prescription Optimal actions
Ad Hoc Queries
Predefined Queries
Statistical Analyses
Math. Modeling
Data Mining
Machine Learning
Analytic Purpose
83
Table 4-2 Common Analytical Tools
Analytic Tool Description
Ad Hoc Queries
Data retrieval via user-generated search criteria & display formats.
Predefined Queries
Data retrieval with pre-defined search criteria & display formats.
Statistical Analyses
Descriptive (organizing and summarizing data to better understand the data) & inferential (confidently drawing conclusions from samples of data).
Mathematical Modeling
Combining large amounts of data and sophisticated algorithms to make accurate predictions and to derive optimal solutions to complex problems.
Data Mining & Machine Learning
Discovery of patterns within sets of data that lead to insights regarding the relationships amongst these data.
The analytical domain is important for organizations tailoring value-units for
consumers - especially for a customer-intimacy company like Netflix that strives to
provide subscribers with a customized, fresh experience each time they access the
Netflix content catalog. Figure 4-7 provides a high-level view of Netflix’s digitalized
analytical platform. Netflix has fashioned a huge data archive from three major
sources: subscriber-provided data (a self-profile and content ratings), content data
(largely put together by Netflix staff), and real-time data streams capturing very-
detailed views of subscribers‘ content-viewing behaviors. By analyzing these data
via numerous proprietary algorithms, Netflix is able to optimize the content
recommendations and viewing experiences provided to each subscriber (increasing
engagement and decreasing cancellation likelihood) and is able to make more-
informed decisions about buying, licensing and producing content.
84
Figure 4-7 Netflix’s Digitalized Analytical Platform
Core Data
Critical Analytic
Processes
Predicting & prescribing a subscriber’s content selections.
Diagnosing & predicting actions of subscriber segments.
Prescribing content types/amounts for the current content catalog.
Prescribing how content should be stored & delivered to provide the best subscriber experience.
Prescribing content to acquire, license & produce.
Subscriber ProfilesSubscriber
Real-Time Viewing
Behaviors
Subscriber Content Ratings
Content Attributes
(genre tags, technical data,
artist data, etc.)
The Collaborative Domain
Digitalization in the collaborative domain involves the fabrication of
interaction platforms through which people are brought together virtually, rather
than physically, to jointly accomplish work activities. Such a capability is becoming
increasingly important in today’s highly-competitive, far-flung markets. Often, the
best people to bring together to solve a problem or to tackle an opportunity are
employed by participants across a value stream (see Table 4-3).
85
Table 4-3 Value Stream Collaboration Opportunities
Collaboration Opportunity
Description
Downstream Processes
Employees from manufacturers, distributors & retailers collaborate to better understand consumer demand patterns, to develop joint strategies & tactics for marketing & fulfillment, and to detect & resolve downstream supply-demand imbalances.
Upstream Processes
Employees from manufacturers, raw material & component suppliers, and upstream intermediaries collaborate to better understand procurement & production patterns & costs, and to detect & resolve upstream supply-demand imbalances.
Upstream & Downstream
Logistics
Employees from manufacturers, suppliers, subcontractors, distributors, retailers & logistics providers collaborate to better understand transportation demand patterns & costs, to develop joint strategies & tactics regarding transportation solutions, and to detect & resolve upstream/downstream logistics problems.
Product & Process Design
Employees from manufacturers, suppliers & engineering design firms collaborate to better understand the nature, timeframes & costs of new product/process designs, to develop joint strategies & tactics for enhancing design processes, and to detect & resolve design problems.
There are two basic types of collaboration arrangements. The first involves
recurrent collaborations where the (more or less) same people work on an ongoing
task (e.g., a marketing group consulting with sales teams, a weekly meeting of a
manufacturer’s plant managers, etc.). Typically, a local collaboration platform is
configured and used to support a recurrent collaboration. The second type of
collaboration arrangement is ad hoc and temporary in nature (e.g., a task force
brought together to accomplish a one-time task). Generally, groups engaged in ad
hoc collaborations use global collaboration platforms, with a group’s interactions
facilitated (initially and perhaps longer) by a collaboration specialist.
Figure 4-8 depicts a generic collaboration platform. Each participant has
access to their own digital resources in addition to the resources provided via the
collaboration platform. The platform contains a data archive that holds data and
documents uploaded by the participants as well as data, messages and documents
that are created as participants interact within the various work spaces provisioned
86
through the platform. Figure 4-8 identifies four such work spaces: messaging and
conferencing, idea processing, joint-work and decision making.
Figure 4-8 A Generic Collaboration Platform
Data Archive
oint
Idea Processing Generation Curation Refinement
Messaging & Conferencing
Joint-Work Designing Problem Solving Authoring
Decision Making
Collaboration Spaces
Person
Person
Person
Person
Collaboration platforms are especially important for organizations pursuing the
product leadership value discipline, as new product development often requires the
bringing together of dispersed expertise. A nice example of this can be seen with the
exceptional outcome attained in a project undertaken by Boeing-Rocketdyne, the
major U.S. manufacturer of liquid fuel rocket engines, to produce a next-generation
rocket engine.18,19 The project team consisted of eight individuals (a project team
leader, a concept designer, a combustion analyst, two thermal analysts, a
18 A. Malhotra, A. Majchrzak, R. Carman and V. Lott, “Radical Innovation without
Collocation: A Case Study at Boeing-Rocketdyne,” MIS Quarterly, June 2001, pp. 229-249. 19 In 2005, Boeing sold the Rocketdyne Division to United Technologies Corporation,
which sold the Division to GenCorp in 2013, which merged with Aerojet to form Aerojet
Rocketdyne.
87
manufacturability engineer, a CAD (computer-aided design) specialist, and a stress
analyst) from Boeing-Rocketdyne and two partner-companies. These individuals
were located at different geographic locations as a result of a selection process aimed
at getting the very best talent available involved in the project.
The project lasted for ten months with participants devoting less than 15% of
their work time to the project. Participants met physically only twice: six of the
eight participants were able to get together for a project kick-off meeting (that also
included training on the collaboration tools) and all eight members were able to
physically meet for a project-ending celebration. Table 4-4 describes the
collaboration tools made available to the project team. The engine design that was
produced far exceeded expectations, e.g., the rocket’s thrust chamber had only six
parts (compared to the typical 1,200 parts) and a first-unit production cost of
$47,000 (compared to the typical $4,500,000).
Table 4-4 Next-Generation Rocket Engine Project Collaboration Tools
Collaboration Tool Description
Internet Notebook
Shared work space enabling project team members to create, comment on, reference links to, search & sort entries whose content consists of text, templates, sketches, images and/or hot links to desktop applications.
Electronic Whiteboard Shared workspace enabling project team members to have near-instantaneous access to the same materials.
Project Vault Shared data archive enabling project team members to store & access files via a common file server.
Email Telephone
Voice Conferencing
Available digital communication channels enabling project team members to interact with one another.
88
Digital Strategy Formulation
Table 4-5 presents the overarching strategic challenges that need to be
constantly addressed by pipeline organizations’ digital strategists as these strategists
cope with digital disruption. The first of these strategic challenges addresses how to
handle heterogeneity within the consumer community, which is especially important
for this section’s treatment of digital strategy formulation. If distinct consumer
segments exist and if each segment varies significantly in how it relates to value-
units and associated value propositions, then each segment is likely to require its
own business model. While some of these business models might be expected to
demonstrate considerable similarity, others undoubtedly will not. This section’s
treatment of digital strategy formulation focuses on the design and evolution of a
single business model, with this business model targeting either a homogeneous
consumer community or one of the segments of a heterogeneous consumer
community. Most often, digital strategists are involved with formulating and evolving
multiple business models.
89
Table 4-5 Pipeline Organization Strategic Challenges
Strategic Challenges Key Issues
How differentiated is the consumer community?
Have we segmented, through analytics, the consumer community?
Is a distinctive business model required for each segment?
How can our current competitive positions be
improved?
How can we enhance our customer value proposition and our profit model?
Should we deepen & broaden our core capabilities and our dynamic capabilities?
To what extent can we further exploit the capabilities of value stream participants?
Can we enter an adjacent market by replicating a
currently-executing business model?
Which adjacent markets are most susceptible for one of our currently executing business models?
What type of business model modifications would be required to gain a favorable competitive position in the adjacent market?
Can we create a new market through business
model innovation?
Is it possible to apply our capabilities along with our strategic partners’ capabilities to create an innovative business model that creates a new niche within an existing market or a new market?
How can we sustain successful market
positions?
Can we deter (for some period of time) competitors’ responses to our competitive actions?
Can we keep our business models two or more steps ahead of those of our competitors?
Figure 4-9 provides an overview of the factors driving digital strategists’
deliberations as they deal with the remaining four strategic challenges listed in Table
4-5: deliberations framed by a strategic intent espoused by their organizations’
leadership teams and focused on the four elements of a business model.
90
Figure 4-9
Factors Driving Business Model Enhancement, Replication & Innovation
Business Model Enhancement, Replication &
Innovation
Business Model Deliberations Value proposition Profit model Core capabilities Dynamic capabilities
Strategic Intent
Beliefs about: Consumers’ needs
& desires Core capabilities Dominant value
discipline(s)
Installed platforms Held digitization capabilities New digital technologies Others’ digitalization innovations
Competitors’ actions Adjacent market business
model innovations Socioeconomic trends Cultural trends Consumers’ needs & desires
Strategic Intent
A strategic intent represents a leadership team’s effort to make more-
actionable their organizations’ vision and mission statements, which most-typically
are presented in an aspirational and intentionally-vague manner. In essence, a good
strategic vision answers the question: “What kind of organization do we wish to
become?”; and, a good mission statement answers the question: “What must we
do to achieve this vision?” Table 4-6 provides vision and mission statements for
Apple and Walmart.20,21
20 Apple’s mission and vision statements obtained from: http://panmore.com/apple-
mission-statement-vision-statement 21 Walmart’s mission and vision statements obtained from:
http://panmore.com/walmart-vision-mission-statement-intensive-generic-strategies
91
Table 4-6 Vision & Mission Statements for Apple and Walmart
Vision Statement Mission Statement
Apple
We believe that we are on the face of the earth to make great products and that’s not changing. We are constantly focusing on innovating. We believe in the simple not the complex. We believe that we need to own and control the primary technologies behind the products that we make, and participate only in markets where we can make a significant contribution. We believe in saying no to thousands of projects, so that we can really focus on the few that are truly important and meaningful to us. We believe in deep collaboration and cross-pollination of our groups, which allow us to innovate in a way that others cannot. And frankly, we don’t settle for anything less than excellence in every group in the company, and we have the self-honesty to admit when we’re wrong and the courage to change. And I think regardless of who is in what job those values are so embedded in this company that Apple will do extremely well.
Apple designs Macs, the best personal computers in the world, along with OS X, iLife, iWork and professional software. Apple leads the digital music revolution with its iPod and iTunes online store. Apple has reinvented the mobile phone with its revolutionary iPhone and App store, and is defining the future of mobile media and computing devices with iPad.
Walmart To be the best retailer in the hearts and minds of consumers and employees.
Saving people money so they can live better.
A good strategic intent answers the question: “What must we do specifically
and now to achieve our vision and mission?” In doing so, a strategic intent provides
deliberating digital strategists with a sense of purpose, direction, discovery and
destiny. Invariably, as indicated earlier in Figure 4-9, a strategic intent likely involves
expressions of consumers’ near-term needs and desires and of the value-disciplines
to be embodied for these needs and desires to be met.
Business Model Enhancement, Replication and Innovation
Digital strategists’ deliberations focus on discovering and shaping business
model adaptations likely to strengthen current market positions or to establish
positions in new markets. By far, most formulated competitive moves are taken to
strengthen a current market position.
Business model enhancement, replication and innovation involve distinct
competitive pursuits:
92
Business Model Enhancement: incremental changes are made to one or more of the four elements of business models.
Business Model Replication: a business model proven successful in one market is applied within an adjacent market; most often, this adjacent
market is characterized by value-units, consumers and/or value streams similar to the market where the business model has demonstrated success.
Business Model Innovation: Radical changes are made to one or more of
the four elements of business models or a novel configuration of these elements is fashioned; this novel business model is typically implemented
within a newly-defined niche of an existing market or is used in creating a new market.
Despite the differing trajectories reflected in business model enhancement,
replication and innovation, similar types of adaptations (summarized in Table 4-7)
tend to be observed.
Table 4-7 Business Model Adaptations
Value Propositions Profit Models
Satisfy unmet needs & desires of current consumers about a value-unit and/or the delivery of the value-unit.
Satisfy anticipated needs & desires of current consumers about a value-unit and/or the delivery of the value-unit.
Identify new consumers or a more-finely segment of current consumers and satisfy the needs & desires of this newly-defined consumer segment.
Increase current revenue streams. Add new revenue streams. Reduce cost structures. Identify new pricing mechanisms for
generating revenue by delivering value- units to consumers.
Eliminate unprofitable or less-profitable revenue streams.
Core Capabilities Dynamic Capabilities
Add new digitalization capabilities. Enrich the functionality of currently-
executing platforms. Add new platforms. Harden platforms operating in
environments benefiting from stability. Modularize platforms operating in
environments benefiting from agility.
Modify assessment frequencies. Modify environment scanning reach &
range. Modify digital strategists’ offensive-
defensive orientation. Modify composition of the digital-strategist
group.
For the most part, the profit model adaptations are quite straightforward. The
one profit model adaptation that might not be readily apparent is that involving
pricing mechanisms. A pricing mechanism refers to the means by which a value-
93
stream participant captures its share of the value being created by the value stream.
A variety of value-capture mechanisms exist, with the most common defined in Table
4-8. Often, a business model applies multiple value-capture mechanisms.
Table 4-8
Different Value-Capture Mechanisms
Pricing Mechanism
Price determined as/by …
Cost-Plus A percentage on top of cost of producing and delivering a value-unit.
Competitor-Based Calibrating against competitors’ prices for the same or similar value-unit.
Multi-Tiered The number & sophistication of the features provided in a value-unit variant.
Freemium A multi-tiered mechanism where the base (first-level) tier is free.
Bundling The nature of value-unit aggregations provided to consumers.
Segmented The producer for specific customer segments.
Pay-What-You-Want The consumer.
Fenced Pay-What-You-Want
The consumer selecting a price-segment and the producer after fencing the consumer into this segment.
Demand The real-time demand for a value-unit.
Auction An auctioning mechanism.
Installed-Base The joint cost of an installed-base (e.g., the razor) and the use of this installed-base over time (e.g., the razor blade).
Futures Contracting The predicted demand (at a future point-in-time) for a value-unit.
The modifications to the dynamic capabilities element are not quite as
straightforward. Four types of modifications were listed in Table 4-7:
Assessment frequency – the prescribed frequency by which digital strategists deliberate on a business model or on particular aspects of a
specific business model; and, the continuing-suitability of certain business models and certain business model elements.
Environmental scanning reach and range – the variety of entities (range: substitute value-units, intermediaries, suppliers, etc.) and contexts (reach:
edges of a pipeline ecosystem and beyond) covered in digital strategists’ environmental scanning.
Offensive/defensive orientation – whether the primary objective of the
digital strategists, as a group, is to strengthen or to protect current competitive positions.
Composition of the digital strategists group: the knowledge domains (e.g., value disciplines, core capabilities, cost structures, etc.) and constituencies
94
(e.g., producer subunits, suppliers, intermediaries, consumers, etc.) influentially represented during deliberations.
Each of these modifications produces significant changes in a digital strategy group’s
collective awareness of the need for and nature of business model adaptations and
the effort (time, complexity and cost) associated with digital strategists’ individual
and group deliberations.
Digital Strategy Formulation in Practice
Digital strategies implemented by Finnair and by UPS Supply Chain Solutions
(UPS-SCS) are illustrative of the thought-processes exercised by digital strategists.
In addition, these examples illustrate two not-uncommon trends regarding
organizations’ digital strategies: embracing customer intimacy after having
established a reputation based on operations excellence, and actively involving
consumer communities in co-creating a value proposition. Table 4-9 summarizes key
business model adaptations for the Finnair and UPS-SCS episodes.
Table 4-9 Business Model Adaptations: Finnair & UPS Supply Chain Solutions
Organization Finnair UPS Supply Chain Solutions
Value Proposition
Offer long-haul travelers innovative & valued services
Customized, complex solutions Quick implementations
Profit Model Higher-margin market
segment
• Higher-margin market segment • Low configuration costs • Low implementation costs
Core Capabilities
Institutionalized social media use
Individualized social media use
Modularized solution services Modular architecture Educate digital strategists on
modular architecture Deploy cross-functional teams to
integrate marketing, sales & digitalization specialists
Dynamic Capabilities
Co-creation of new services with customer community
Outward-looking organizational culture
Co-creation of digitalized solutions with customer
Modify investment criteria for digitization & digitalization
95
Finnair22
Finnair is the world’s oldest, midsize airline with a unionized labor force. Like
similar airlines, Finnair embodied the operations excellence value discipline.
However, the company’s high fixed-costs and the influx of low-cost short-haul
competitors had seriously eroded its competitive position – particularly within short-
haul markets.
Exploiting the airline’s geographic advantage (the Helsinki hub provides one of
the fastest routes between Europe and Asia), Finnair’s leadership team had chosen
in 2009 to focus the airline on long-haul Asian routes – a market niche within which
Finnair was relatively unknown. Consequently, a series of competitive actions were
taken to strengthen the airline’s position in the long-haul Asian market, with a key
target area being the creation of innovative services to enrich the airline’s value
proposition for the long-haul consumer.
Finnair’s use of social media technology (SMT) has played a key role in
engaging the consumer community in co-creating these new services - and in the
process enhancing the airline’s image with this consumer community. Heavy usage
has occurred around blogging, Facebook and Twitter, with special attention given to
integrating customer interactions across these SMTs. Importantly, both institutional
(structured, tightly-moderated interactions orchestrated by Finnair employees) and
individualized (unstructured, loosely-moderated interactions with individual
consumers) SMT tactics have been applied. The outcome? Since 2009, around 300
22 This material is adapted from: S.L. Jarvenpaa and V.K. Tuunainen, “How Finnair
Socialized Customers for Service Co-Creation with Social Media,” MIS Quarterly Executive,
September 2013, pp. 125-136.
96
meaningful ideas for new services have been generated, two of which were
implemented in 2013: a book-swapping station at the Helsinki airport, and the
availability of a high-quality vegetarian meal option (for business-class and economy
travelers) on all long-haul flights.
UPS-SCS23,24
UPS is the parent company of UPS-SCS. It was formed in the early 1990s, is
positioned in a mature market for transportation solutions, and has a strong culture
rooted in the operations excellence value discipline. UPS-SCS, on the other hand,
was established in order to pursue a differentiation strategy by developing a wide
variety of specialty services and offering its B2B consumers customized, complex and
comprehensive supply chain solutions.
In the early 2000s, the UPS-SCS leadership team realized that its growth was
about to hit a brick wall. Two factors explained this portending crisis. First, low-cost
competitors had entered the UPS-SCS competitive space and were eating away at
the low-hanging-fruit, i.e., less-complex, less-comprehensive, but profitable
solutions. Second, too many of UPS-SCS’s customer engagements requiring
complex, comprehensive solutions were proving to be unprofitable because of the
high-cost and lengthy lead-time required to design and implement a solution.
The leadership team’s strategy to address this situation involved three
objectives:
23 M. Lewis, A. Rai, D. Forquer and D. Quinter, “UPS and HP: Value Creation through
Supply Chain Partnership,” Case 9B07D002, Ivey Management Services, 2007. 24 A. Rai, V. Venkatesh, H. Bala and M. Lewis, “Transitioning to a Modular Enterprise
Architecture: Drivers, Constraints and Actions,” MIS Quarterly Executive, June 2010, pp. 83-
94.
97
Operational B2B readiness – provide the capability to quickly integrate UPS- SCS services into a customized solution and to seamlessly interconnect this
solution with a customer’s business platforms.
Internal services awareness – increase the working knowledge of UPS-SCS
sales employees and managers about the breadth and depth of UPS-SCS service offerings and how these services could be configured together in producing customer solutions.
Customer familiarity – increase the working knowledge of UPS-SCS sales employees and solution designers about current/potential customers and the
idiosyncrasies that distinguish each customer from its competitors.
Achieving these objectives involved building a number of platforms: a modularized
operational platform hosting and executing the UPS-SCS portfolio of digitalized
solutions; analytical platforms that organized and enabled easy access to information
about services, solutions and customers; and, collaboration platforms enabling
solution designers, sales staff and customers to jointly configure and implement
solutions.
Sustaining Competitive Positions
When competitive actions strengthen an organization’s competitive position,
the organization ideally desires to sustain the gained competitive advantage for as
long as possible (the fifth strategic challenge listed earlier in Table 4-5). For example,
after the successful implementation of a first-mover customer loyalty program aimed
at identifying and retaining high-value customers, increases in market share and
sales revenues are likely to be realized. However, if competitors are able to quickly
imitate the loyalty program, then these initial gains are likely to dissipate as
competitive parity returns to the market.
Digital disruption is making it more difficult than ever to sustain a newly-gained
competitive advantage. As many, if not most, of the digital platforms and business
platforms enabling competitive advantages are readily available today, competitor
98
imitative responses occur promptly and frequently. Further, as these imitative
responders can learn from the innovator’s actions, these responses are often better
and less costly.
The tactic taken most often to sustain a newly-gained competitive advantage
is to construct one or more barriers to competitive retaliation. The less-
penetrable these erected barriers are, the longer the competitive advantage can be
sustained. Piccoli and Ives categorize these barriers into four types (see Table 4-
10):25 digital resources, complementary resources, project management capabilities
and preemption.
Table 4-10
Barriers to Competitive Retaliation
Barrier Characteristics of a Strong Barrier
Digital Resources
Unique and/or rare
Not available from a third-party
Difficult, time-consuming and/or costly to build from scratch
Complementary Resources
Unique and/or rare
Not available from a third-party
Difficult, time-consuming and/or costly to build from scratch
Project Management Capabilities
Complexity of an imitative response
Difficult, time-consuming and/or costly to develop needed capabilities
Preemption
High consumer switching costs
Difficult, time-consuming and/or costly to identify & attract value-stream participants and to build the platforms to coordinate value-stream data, document & information flows
The digital resources barrier is based on an organization’s investment in
unique or rare digital/digitalized assets and capabilities. For example, if an
organization has developed unique capabilities to build, operate and secure value
25 G. Piccoli and B. Ives, “IT-dependent Strategic Initiatives and Sustained Competitive
Advantage: A Review and Synthesis of the Literature,” MIS Quarterly, December 2005, pp.
747-776.
99
stream upstream/downstream platforms and if a gained competitive advantage is
dependent on such a capability, then it would likely take a rival a prolonged period
of time to put in place similar platforms. Just such a barrier was invoked when
Walmart pioneered vendor-managed inventory with Procter and Gamble. Walmart
provided Procter and Gamble with the ability to access Walmart point-of-sale data in
real-time so that Procter and Gamble could monitor Walmart’s store-level inventories
and replenish stock on an as-needed basis.
The complementary resources barrier is based on requirements for unique
or rare non-digital resources in establishing a digitalized competitive advantage.
Harrah’s, for example, has been a pioneer in using analytics to build and exploit
superior customer relationships. However, Harrah’s also undertook a radical
organizational change when it launched its customer-analytics strategic initiative.
Casinos in a chain traditionally operate independent of one another. With the
organizational change, Harrah’s introduced reporting structures and incentives to
build an enterprise-wide customer relationship management culture where customers
are owned by the corporation rather than by a specific casino, and where employees
are expected (and rewarded for doing so) to make decisions on the basis of customer-
related analytics.
Digitalized competitive actions are often implemented as large, complex and
risk-laden projects involving a large number of people holding a variety of skills.
Such projects can be extremely difficult to complete on-time, on-budget and as
specified. The project management capabilities barrier involves the presence of
needed project management capabilities. For example, when Amazon launched its
B2C retail bookstore, a large number of complex activities needed to be carried out
100
well and in a highly-coordinated fashion: building the needed digital and business
platforms; putting in place a powerful and reliable technical infrastructure to host its
online store; establishing efficient, effective and reliable physical operational and
managerial processes (e.g., warehouse operations, order packing and shipping,
customer service, processes, etc.); and, negotiating relationships with value stream
participants (e.g., book publishers and distributors, logistics providers, financial
services firms, etc.). Any competitor would need to possess correspondingly-high
levels of project management capabilities.
A preemption barrier limits competitors’ opportunities and incentives to
undertake retaliatory action. One such barrier involves customer switching costs,
or the costs to be borne by a consumer choosing to move to a competitor’s products
and/or services: learning a new set of product/service interface actions and rules,
changing work practices, out-of-pocket expenses, etc. When substantial switching
costs exist, the competitor must not only induce consumers to switch, but also
compensate the consumer for borne switching costs. For example, while eBay has
faced stiff competition from other auction sites, a key switching cost that works in its
favor is that reputations built on eBay are lost. A second type of preemption barrier
involves the anticipated effort required to identify and attract new value stream
participants and to assimilate these new participants within a value stream’s
platforms. For example, Dell’s success in negotiating the participation of other firms
in its build-to-order pipeline ecosystem proved to be a dominating preemption
barrier.
How effective are these barriers to competitive retaliation in the face of digital
disruption? With competitors reacting faster and faster and with markets increasingly
101
susceptible to new entrants, about the only things that can be said with confidence
are that the length of time any competitive gain can be sustained is growing shorter
and that the best defense is to take the offense; that is, take a second competitive
action before the competition can react to the initial action.
A Recap and Look Ahead
This chapter has examined how digitalization has transformed pipeline
organizations’ digital strategies and digital strategy formulation processes. However,
one critically important topic was not discussed – today’s reality that many, if not
most, of the digitization and digitalization capabilities being applied by both pipeline
organizations and network organizations in taking competitive moves and in
executing business models are externally-sourced, rather than internally-sourced.
Explanations of why this is the case and of the strategic implications of this
phenomenon are covered in the next chapter.
102
Chapter 5. Digital Strategy and the External Sourcing of Capabilities
Pipeline organizations rarely compete solely through their own capabilities.
Instead, they leverage the capabilities of suppliers, service providers, intermediaries,
strategic partners and consumers. While this has always been the case, the two
drivers of digital disruption – ever-accelerating advances with digital technologies
and globalization – have dramatically enhanced the availability, ease-of-
implementation, reliability and cost-attractiveness of externally-sourced capabilities.
As an illustration of what is possible today, consider the publisher of this book:
Legerity Digital Press (LDP). Owned, managed and operated by five individuals
(contributing intangible assets but little else), LDP has no employees and few assets
(e.g., an acquired digitalized accounting system, personal productivity tools, etc.),
other than the digital books that have been published. The vast majority of the
resources applied across LDP’s value stream are provided by external parties: the
digital platform hosting LDP’s website, the digitalized platform hosting LDP’s B2C
storefront, the digitalized platforms hosting payment and banking processes, the
digitalized platforms producing hard copies and course packs, the digitalized
platforms providing sales channels to university books stores and to libraries, and a
provider of advanced accounting and tax services.
While the experiences of entrepreneurial startups like LDP are clearly different
from those of mid- and large-sized organizations, an ever-increasing portion of the
capabilities enabling organizations’ business models have been (or are being)
externalized – that is, handled (in full or in part) by other organizations. The
externalization of a capability, popularly referred to as outsourcing, involves
103
transferring ownership and decision rights regarding a capability, the assets used in
executing the capability, and/or the management of the capability from inside an
organization’s boundary to outside this boundary.
Capabilities are externalized in order to accomplish work activities quicker,
more effectively, more efficiently and/or less costly. By making measured decisions
about which capabilities to externalize and the governance of these externalized
capabilities, significant improvements in organization performance can occur. This
chapter describes how external sourcing is brought into digital strategy formulation
by covering the following topics:
Externalizing Organizations’ Capabilities
Tactics for Lessening Clients’ Dependence on Sourcing Providers
External Sourcing and Digital Strategy Formulation
Achieving External Sourcing Agility at Commonwealth Bank of Australia
Externalizing Organizations’ Capabilities
Organizations apply a broad array of capabilities in developing, marketing,
producing, selling, delivering and supporting the value-units offered to consumers.
It is useful to recognize that this broad array of capabilities can be categorized into
three capability-sets, each of which focuses on a value discipline: operations
excellence, customer intimacy and product leadership.26,27 These capability-sets,
described in Table 5-1, drive distinct operational and managerial processes, benefit
from distinct orientations, and have distinct underlying economics. Because of these
26 M. Treacy and F. Wiersema, “Customer Intimacy and Other Value Disciplines,”
Harvard Business Review, January-February 1993, pp. 84-93. 27 J. Hagel, III, Out of the Box, Boston: Harvard Business School Press, 2002.
104
differences, it can be challenging for any organization to execute all three capability-
sets exceptionally well. As a result, organizations tend to be organized as three
separate units (each focused on a specific value discipline) that are coordinated so
as to operate as a single enterprise. Invariably, though, these units’ distinctive
incentive systems and control systems bump into and work against one another.
Table 5-1 Three Distinct Capability Sets
Value Discipline Capability Set
Operations Excellence
Customer Intimacy Product Leadership
Key Operational
& Managerial Processes
Production
Purchasing
Logistics
Value Proposition Development
Consumer Development
Consumer Retention
Research and Development
Value-Unit Launch
New Market Development
Organization Orientation
Focus
Quality
Cost
Growth
Consumer Responsiveness
Innovation
Adaptation
Underlying Economics
Economies of Scale
Economies of Scope
Economies of Speed
Executive leadership teams thus face a complex trade-off. Should they
unbundle – that is, fully or partially externalize - one or two of these capability-sets
so that their enterprise has a singular strategic/operational focus? Or, should they
maintain all three units within their organization’s boundaries in order to avoid the
challenges that arise in coordinating work across multiple organizations? If the
decision process of unbundling is handled well and if externalized capabilities are
governed well, clear benefits can arise (see Table 5-2).
105
Table 5-2 Benefits from the External Sourcing of a Capability
Benefits How Benefits Are Realized
Operational Efficiency &
Effectiveness
Provider exploits economies-of-scale. Provider uses leading-edge digital resources in enabling offered
capabilities. Provider embeds leading-edge technical, business and managerial
expertise within offered capabilities.
Leverage Provider’s Capital
Provider owns the digital resources enabling offered capabilities. Client transfers to the provider ownership of some (or all) of the digital
resources previously used to enable the externalized capabilities.
Adaptive & Entrepreneurial
Agility
Client replaces fixed costs with variable costs. Provider exploits economies-of-scope & economies-of-speed. Provider uses leading-edge digital resources in enabling offered
capabilities. Provider embeds leading-edge technical, business & managerial expertise
within offered capabilities.
Innovation
Provider exploits economies-of-scale, economies-of-scope & economies- of-speed.
Provider uses leading-edge digital resources in enabling offered capabilities.
Provider embeds leading-edge technical, business & managerial expertise within offered capabilities.
These benefits can be especially attractive when an offshore provider, rather
than an onshore provider, is used. An offshore provider is located in a different
country than the client, and an onshore provider is located in the same country as
the client. Offshore providers can provide appealing rate structures (attributed to
low labor rates, tax incentives, etc.), as well as access to scarce skill-sets, and often
exhibit exceptional production/delivery capabilities as a result of their exploitation of
economies-of-scale, economies-of-scope and economies-of-speed. Additionally,
organizations that aggressively pursue globalization are often able to leverage their
relationships with offshore providers to enrich their understandings of other
countries’ business and social cultures.
The benefits from externalizing capabilities do not come without risk (see Table
5-3), and these risks only intensify when offshore providers are used. Why do these
risks intensify? Note, in particular, the first two risks listed in Table 5-3. First,
106
because an off-shore provider’s employees can exhibit linguistic and cultural
differences relative to a client’s employees, communication can prove troublesome
with seemingly subtle differences in interpretations leading to severe and unexpected
problems. Second, over time and all too often, a client externalizing a capability can
become overdependent on the provider, as internal expertise regarding the capability
is lost (because internal staff is transferred to the provider, assigned other internal
roles or let go). As a consequence, the client’s capabilities to govern the provider’s
performance and to incorporate the externalized capability within digital strategizing
are both reduced. Client-provider misunderstanding and client overdependence on
a provider also exacerbate the remaining risks listed in Table 5-3. Of course, many
other factors (e.g., technical, contractual, legal, political, etc.) also contribute to
these other risks.
Table 5-3 Potential Risks Arising from the External Sourcing of Capabilities
Client Risks How Risks Unfold
Client-Provider Misunderstanding
Failures of client & provider managerial/operational staffs to understand each other’s values, perspectives, objectives, concerns, directions, etc.
Overdependence on Provider
Loss of internal capability expertise and of attention.
Inadequate Efficiency &
Effectiveness
Expected cost reductions not fully realized and those that are realized dissipate over time.
Externalized capabilities and the execution of these capabilities are insufficiently enhanced over time.
Inability to Leverage
Provider’s Capital
Provider fails to refresh the digital resources enabling externalized capabilities.
Client allows transferred digital resources to reappear internally.
Inadequate Adaptive Agility
Provider fails to respond to best-practice adaptations regarding externalized capabilities.
Provider fails to transfer best-practice knowledge regarding externalized capabilities to client.
Inadequate Entrepreneurial
Agility
Provider fails to maintain leading-edge expertise regarding externalized capabilities.
Provider fails to transfer leading-edge expertise regarding externalized capabilities to client.
107
Tactics for Lessening Clients’ Dependence on Sourcing Providers
A particularly troublesome concern whenever capabilities are externalized is
the threat of becoming overdependent on the sourcing provider. Best practices
aimed at forestalling provider-overdependence include:
Maintaining internal expertise regarding externalized capabilities.
Enlarging the set of providers with whom capabilities are externalized.
Establishing effective governance of externalized capabilities.
Among these, the maintenance of internal expertise is most important because it’s
absence precludes the other two practices. Today, the two tactics most commonly
used to enlarge the set of providers are multisourcing and crowdsourcing, and they
are described in the remainder of this section. Tactics relating to governance are
covered in the next section.
Multisourcing
Multisourcing refers to contracting with multiple providers rather than a
single provider. Initially, this tactic involved a client separating the capabilities to be
externalized into relatively independent sets, and then using different providers for
each of these capability-sets. Note, however, that a threat of overdependence
remained. Over time, multisourcing has evolved to become much more
sophisticated, with current best practices advocating:28
A capability-set to be externalized is modularized, such that each of the
modules can be optimized without considering the modules (of this same
28 These steps are derived from: B.A. Aubert, C. Saunders, C. Wiener, R. Denk and T.
Wolfermann, “How Adidas Realized Benefits from a Contrary IT Multisourcing Strategy, MIS
Quarterly Executive, September 2016, pp. 175-194.
108
capability-set or of other capability-sets) with which it might interact.
Providers, possessing comparable capabilities, are identified as suitable
candidates for handling the capability-set to be externalized.
Multiple providers are then selected to handle a subset of each of these
modules, ensuring that considerable overlap occurs in the nature of the modules assigned to the providers.
Provider assessment and reselection procedures are regularly undertaken.
While such practices do introduce increased managerial overhead, the benefits are
many: reduced operational and strategic risks, greater likelihood of finding the best-
fitting provider for a module (or set of modules), and sustained competition among
the providers (e.g., price, quality, responsiveness, reliability, innovativeness, etc.).
A further twist on multisourcing involves incorporating a long-tail perspective.
Here, the selection of providers to handle the externalized capabilities “… combines
a few key partnerships with a dynamically changing and unrestricted number of
smaller contracts with other suppliers.” 29 This long-tail aspect thus embraces and
fosters a flow of new providers offering new capabilities to drive the client’s adaptive
and entrepreneurial agilities.
Crowdsourcing
Crowdsourcing involves externalizing a capability to a community of
individual agents, more popularly referred to as the wisdom of the crowd. The
fundamental idea of crowdsourcing is that a crowdsourcer proposes to a community
of potential contributors the voluntary undertaking of a task that consists of or is
enabled by the capability being externalized. Most often, crowdsourcing reflects a
29 N. Su, N. Levina and J.W. Ross, “The Long Tail Strategy for IT Outsourcing,” Sloan
Management Review, Winter 2016, p. 82.
109
partial, temporary externalization of a capability. Community members contribute to
task accomplishment via a collaboration platform.
The power of crowdsourcing lies in aggregating and integrating knowledge
from diverse, independent contributors. These individual contributors bring with
them personal knowledge and social information, i.e., information formed through
exposure to the contributions of other community members and these members’
expressed confidence in their contributions. When personal knowledge is weak,
people tend to rely more on social information. But, overdependence on social
information (which can be systematically-biased if a community’s members share
common values, backgrounds and experiences) can lead to overconfidence and
groupthink. For this reason, crowdsourcing tends to produce the highest quality
outcomes when the interacting contributors hold diverse sets of personal perspectives
and knowledge.
There are two basic types of crowdsourcing: collaboration and tournament. In
collaboration-based crowdsourcing, contributors collectively create a single task
outcome. Usually, the community collectively generates ideas, selects the most
promising of these ideas, and refines these selected ideas into the single task
outcome. By contrast, tournament-based crowdsourcing involves community
members (working individually or in teams) submitting finalized, independent task
solutions. The crowdsourcer then selects one of these contributed solutions, or
perhaps a few of the solutions, in exchange for financial or non-financial
compensation. Tournament-based and collaboration-based crowdsourcing can be
combined, e.g., by first engaging a community to submit individual solutions, and
110
then collectively engaging the community to evaluate the individually-submitted
solutions and to refine the best of these into a final task outcome.
Table 5-4 defines three common crowdsourcing arenas. Many organizations
have applied crowdsourcing to generate innovative ideas. Most often, this arena finds
an organization (for example: Dell, Finnair, LEGO, Nestle and Starbucks) engaging a
consumer community through social media to generate ideas for enhancing a value
proposition or to extend a product line. But other communities can be targeted, as
well. For example, Zara, the Spanish clothing retailer, targets its internal community
of retail store staff to generate a constant stream of ideas regarding fashion trends -
ideas gleamed from the staff members observing customer behaviors and talking
with customers.
Table 5-4 Three Crowdsourcing Arenas
Arena Description
Generate Innovative
Ideas
Engage a community to generate innovative ideas for improving current value propositions and/or developing new value-units and markets.
Solve a Problem or Accomplish a
Task
Engage a scientific/analytic community to (1) solve a problem or accomplish a task or (2) handle problems/tasks that otherwise would be assigned to internal staff.
Prediction Market
Engage a broad, diverse community to contribute their personal judgments regarding an issue. Contributors both state their opinions and convey the strength of the sentiments underlying these opinions, and then receive almost instantaneous feedback on how their opinions compare & contrast with others’ opinions.
The second crowdsourcing arena targets a community of skilled-individuals to
solve a problem or to handle a recurring task. Notable examples of the former
objective are the tournaments established by Netflix to produce a next-generation
recommendation engine and by NASA to design a laundry system for the
111
International Space Station. Many examples of the later objective exist, especially
with regard to software coding and Big Data analytics.
Prediction markets, the third crowdsourcing arena, targets broad, diverse
communities to predict events or outcomes. While early uses were directed at
election campaigns and sports contests, business organizations (such as Google, Ford
and Best Buy) are realizing considerable value from prediction markets in areas as
diverse as forecasting the sales of about-to-be-introduced video games or songs,
filtering the ideas about to enter a new product development process, designing and
selecting between marketing campaign themes, and selecting projects to be funded.
Prediction markets operate in a manner similar to financial stock markets:
A question is posed to participants (e.g., “Do you wish to buy specific
stock?”).
Participants convey their opinions along with the strength of the sentiments underlying these opinions (e.g., “Yes, and here is what I am willing to pay
for that stock.”).
Participants receive almost instantaneous feedback on how their opinions
compare and contrast with those of other participants (e.g., the current market price for the stock).
Governing the External Sourcing of Capabilities
Table 5-5 describes the challenges that are confronted in the design of the
governance systems used with externalized capabilities. Two key insights should be
gleamed from this table. First, the pragmatic purpose in externalizing a capability is
to externalize the work activities (that is, the operational and managerial processes)
enabled by the capability. As work activities are far more tangible than are
capabilities, work activities tend to be the focus of governance systems. Second,
these challenges underscore the importance of building and then maintaining internal
expertise regarding a to-be-externalized capability – and, accordingly, internal
112
expertise of the work activities enabled by an externalized capability. If a client’s
employees do not possess deep understandings of a work activity, low likelihoods
exist that these employees would be able to negotiate an effective contract with a
provider and to nurture a meaningful trust between themselves and the provider’s
employees carrying out the work activity.
Table 5-5 Challenges in Governing an Externalized Capability
Challenge Description
Understanding of a
Work Activity Enabled by
Externalized Capabilities
Codifying the Work Activity
Specifying what is to be done, how it is to be done and expected performance outcomes
Monitoring the Work Activity
Observing what is being done, how it is being done and performance outcomes
Devising Metrics of Work Activity
Performance
Measuring what is being done, how it is being done and performance outcomes
Developing Trust between Client Employees & Provider Employees
Client employees and provider employees: understand what is expected of one
another are confident that each will perform their
respective work tasks in an ethical, competent & timely manner
are confident that each will adapt to unexpected situations in a manner consistent with relationship objectives.
In devising a governance system for an externalized capability, it is critical to
recognize that all external-sourcing engagements focus on one, two or three goals:
Lowering a capability’s cost structure.
Improving the quality of the capability.
Introducing innovation into the capability.
What varies across arrangements – hence, what varies in the governance systems
being applied - is the relative importance (and presence) of these three goals.
113
Governance system designs for externalized capabilities can be placed on a
tight-governance/loose-governance continuum (see the top half of Figure 5-1). This
is important, as the design used affects the goals realized through an engagement:
tight-governance works best for cost and quality goals, while loose-governance works
best for quality and innovation goals. Of course, engagements rarely strive to
achieve a cost, quantity or innovation goal. As a result, most engagements tend to
involve aspects of both tight-governance and loose-governance (i.e., tight-
governance is applied to some work activities, loose-governance is applied to other
work activities, and more-nuanced governance designs are applied to yet other work
activities).
Figure 5-1
Tight-Governance and Loose-Governance Designs
Contract
Administrative Costs
People Costs
Lengthy Detailed
Short Broad
Tight-Governance Loose-Governance
High
HighLow
Low
Cost-Focus Innovation-FocusQuality-Focus
Table 5-6 contrasts the natures of tight-governance and loose-governance.
Tight-governance, or compliance monitoring, is characterized by a constant,
detailed and deep visibility into how a work activity is being carried out and the extent
to which a comprehensive set of negotiated obligations is being met. If both the
114
client and the provider have digitalized their operational business processes, such a
visibility is relatively straightforward to implement and is accompanied by associated
governance-related costs that are recovered through a lowered risk exposure. With
loose-governance, or intent monitoring, the increased discretion given to the
provider inherently increases this risk exposure – an exposure managed
(accompanied by associated costs) through the client-provider relationship and by
regularly assessing whether or not an engagement continues to prove beneficial for
both the client and the provider. As indicated in the bottom half of Figure 5-1, the
natures of the costs borne with tight-governance and loose-governance are quite
distinct.
Table 5-6
Attributes of Tight-Governance and Loose-Governance Designs
Tight Governance (Compliance Monitoring)
Loose Governance (Intent Monitoring)
Monitoring Philosophy
Precise execution of well- specified work activities
Meet agreed-on overall performance outcomes
Decision Making Philosophy
Defined standards of execution
Joint decision making
Governance Mechanisms
Service Level Agreements (SLAs)
Client-provider oversight board Client-provider management
team Client engagement manager Client-provider execution team
Metrics Detailed specifications of the tasks and outcomes to be monitored and reported
Aggregate specifications of work-related outcomes and risks
Visibility Rights Specific transactions and events
Work-related outcomes
Access Rights Data Knowledge
External Sourcing and Digital Strategy Formulation
External sourcing influences the deliberations of digital strategists in numerous
ways. Consider, for example, the following questions:
What is the portfolio of capabilities being applied, as we gain and sustain
115
advantageous competitive positions?
Realistically, how good are we at executing and continuously enhancing
these capabilities?
Are providers available who are likely to execute and enhance these
capabilities better than we can?
Are some of these capabilities strategically more important than others?
Is handling all of these capabilities ourselves the best way to utilize our
(limited) internal resources?
What would be the risk exposure of externalizing a specific capability or set
of capabilities?
Would we deliver better value to consumers (and to stockholders) if we only hosted internally those capabilities critical to our gaining and sustaining
competitive advantages and relied on best-of-class providers to host most (perhaps all) other capabilities?
As stated earlier, such deliberations are increasingly resulting in organizations
choosing to externalize many, if not most, of the capabilities enabling business
models.
As organizations’ digital strategists and leadership teams become comfortable
with the idea of externalizing capabilities to arms-length providers (via tight-
governance) and to strategic partners (via loose-governance), strategic opportunities
may arise where an organization’s internal capabilities are recognized as being world
class and become the basis of a new business model. If a manufacturing organization
has developed a world-class inventory management capability, why not take over its
suppliers’ or customers’ inventory processes (referred to as vendor-managed
inventory) or offer this capability to other manufacturing organizations? If a
hospitality organization has developed world-class customer support capabilities, why
not spin off a subsidiary offering this capability to other companies?
116
Digital strategists today find themselves regularly considering whether or not
internally-hosted capabilities should be externalized, whether externalized
capabilities should be brought back inside the organization, and whether or not
internal, world-class capabilities should be offered to other organizations. More than
ever before, organizational boundaries seem to be in an almost perpetual state of
flux – a state of flux incessantly driven by the continued advances occurring with
digital technologies and by the forces of globalization.
Digital Strategy Formulation
Figure 5-2 provides an overview of how the external sourcing of capabilities
influences digital strategists’ deliberations. The key element introduced in this Figure
is an explicit categorization of capabilities within the operant strategic intent:
Strategic core capabilities – the capabilities that lie at the heart of an organization’s competitive advantage.
Peripheral core capabilities – the capabilities that are necessary for an organization to gain and maintain its competitive positions, but that are not
a source of competitive advantage.
Commodity capabilities – the capabilities that are required or are otherwise beneficial for an organization to operate and are readily available
from external sources, but do not contribute to competitive positions (aside from their absence).
Strategic core capabilities are seldom considered for external sourcing – and only
when a trusted world-class provider exists that is able to outperform the organization
now and into the future. Peripheral core capabilities should always be candidates for
external sourcing – aside for capabilities for which an organization demonstrates
word-class performance. Commodity capabilities should be externally-sourced in the
absence of a strong business case for not doing so.
117
Figure 5-2 Influence of External Sourcing of Capabilities on Digital Strategizing
Business Model Enhancement, Replication &
Innovation
Business Model Deliberations Value proposition Profit model Core capabilities Dynamic capabilities
Strategic Intent Beliefs regarding capabilities Strategic core Peripheral core Commodity
Internally-sourced capabilities Externally-sourced capabilities New providers Innovative provider business
models
External sourcing of capabilities by competitors
External sourcing of capabilities in adjacent markets
Consumers’ beliefs & preferences about the external sourcing
With digital disruption, it is important to recognize that today’s peripheral core
capabilities may very well become tomorrow’s strategic core capabilities or
tomorrow’s commodity capabilities. (Similar statements could just as well be said
about strategic core capabilities or commodity capabilities.) Why do we see, over
time, movements in organizations’ core capabilities across these three categories?
Four explanations should immediately come to mind:
Existing markets and business models evolve over time and eventually
disappear, while new markets and new business models regularly emerge.
Existing participants regularly leave markets, while new participants
regularly appear.
Organization’s internally-hosted capabilities improve and diminish with time.
Existing digital technologies incessantly improve, but eventually get replaced
by technological innovations providing lower costs, improved performance and new capabilities.
118
Business Model Adaptations
Table 5-7 lists the main pathways through which the external sourcing of
capabilities contributes to organizations’ business model adaptations. Most of these
adaptations are quite straightforward and, hence, are not discussed. However, the
adaptations regarding value propositions may benefit from some elaboration.
Table 5-7 Business Model Adaptations Associated with External Sourcing
Value Propositions Profit Models
Meet consumer preferences regarding external sourcing.
Modify if and how a capability is sourced to become more aware of and more responsive to ecosystem events & trends.
Exploit provider capabilities to increase current revenue streams, add new revenue streams and reduce cost structures.
Reduce or reallocate investments in internal assets.
Renegotiate, replace or eliminate unprofitable or less-beneficial external- sourcing engagements.
Core Capabilities Dynamic Capabilities
Externalize a capability. Re-internalize an externalized capability. Enhance a capability or add a new capability
via external-sourcing. Harden or modularize platforms via the
external-sourcing of enhanced or new capabilities.
Reassign capabilities into the strategic core, peripheral core and commodity categories.
Enhance environment scanning aimed at identifying and nurturing new providers.
Modify the composition of the digital- strategists group (including strategic partners’ digital strategists).
First, consumers are heard to voice a bias against the external sourcing of
capabilities – perhaps most commonly observed with customer support processes,
but extending as well to consumers’ preferences regarding external sourcing in
general. As a consequence, insourcing a previously-externalized capability may serve
as an effective competitive move – especially when an organization has begun to
embrace the customer intimacy value discipline and/or if most competitors have
externalized the capability.
Second, an organization’s proximity to innovative upstream and downstream
ecosystems is critical for the organization to demonstrate agility in modifying value
119
propositions. Employees directly in touch - physically and, most importantly,
culturally - with consumers and with ecosystem participants are simply far better
able to identify, incorporate and act upon significant events and trends. As a
consequence, it is not uncommon today to observe organizations: transferring to
onshore providers those capabilities that were previously externalized to offshore
providers, and deciding to internally host capabilities that were previously
externalized.
Achieving External-Sourcing Agility at Commonwealth Bank of Australia30
The strategic advantages of demonstrating agility with regard to the external
sourcing of capabilities – that is, easily shifting capabilities from being internally
sourced to being externally sourced (or vice versa), and shifting the handling of a
capability from one provider to another provider – should be obvious. Organizations
demonstrating and maintaining agility significantly enhance the likelihoods of their
business models maintaining alignment with today’s dynamic competitive
environments. But, is agility with external sourcing feasible and cost-effective? The
experience of the Commonwealth Bank of Australia (CBA) indicates that it is both
feasible and cost-effective.
CBA is a large, multinational bank headquartered in Sydney, Australia. It has
built a strong reputation as a leading worldwide commercial user of digital
technologies (in regard to both spending and innovation). The banking sector is
especially challenging for digitalization, given the importance of consumer trust – a
30 This section has been adapted from: D. Schlagwein, A. Thorogood and L.P. Willcocks,
“How Commonwealth Bank of Australia Gained Benefits Using a Standards-Based, Multi-
Provider Cloud Model,” MIS Quarterly Executive, December 2014, pp. 209-222.
120
trust based largely in consumer perceptions regarding the security, reliability and
availability of digitalized banking services.
CBA has taken three different approaches to external sourcing over the past
twenty years:
1996: CBA externally sourced much of its digitization and digitalization to
EDS (now part of Hewlett-Packard). This single-provider, ten-year contract emphasized fixed fees, guaranteed transaction volumes and lowered costs. Having reduced its internal digitalization-related staffing, CBA’s executive
leadership in the early 2000s realized that the bank had lost much of the internal capabilities necessary to launch digitally-enabled competitive
actions.
2006: CBA transitioned to a multisourcing approach to the external sourcing of capabilities. Specifically, the bank launched initiatives to rebuild internal
digitalization capabilities and to negotiate/manage individual sourcing contracts with a portfolio of external providers. By the end of the 2000s,
CBA had rebuilt its internal digitalization capabilities. However, a new concern had arisen: accelerating digitalization costs.
2010: CBA initiated a multi-provider, cloud-based approach to the external sourcing of capabilities. Cloud computing promised a cost-effective, pay-as- you-go approach to external sourcing and a means to launch competitive
actions quicker and less-expensively. By 2016, this new approach to external sourcing had resulted in significant digitalization-related cost
reductions and significant improvements to the bank’s adaptive and entrepreneurial agilities.
What exactly is CBA’s multi-provider, cloud-based approach to external sourcing? To
answer this question, a very brief introduction to cloud computing is needed.
Cloud computing involves provisioning a pool of digital assets and digitally-
enabled services such that these services can, on demand, be accessed and applied
by clients via the Internet. Cloud computing solutions provide individuals and
organizations with suites of capabilities in either private or public clouds, where these
clouds may be located close to or very distant from the client. The economics of
cloud computing are based on the sharing of a pool of resources across many uses
and many users, such that significant economies of scale and scope are realized.
121
CBA’s multi-provider, cloud-based model has three layers (see Figure 5-3).
The top layer consists of the business platforms that execute CBA’s operational and
managerial processes. The bottom layer includes internal (designed and operated by
CBA’s technology group), private external and public clouds – all of which comply
with CBA’s cloud standards. CBA collaborated with several cloud providers and other
strategic partners to develop and mandate these cloud standards. The middle layer,
which consists of a cloud management system, matches the digitalized applications
hosted in the top-layer business platforms to the bottom-layer digital platforms
(within which data processing and storage actually occurs). The primary purpose of
the cloud management system is to dynamically determine which provider’s cloud
should execute an application and to assign this application to that cloud. This cloud
management system is located inside CBA’s firewall, and CBA manages and controls
the system. Actual computing could take place on either side of the firewall according
to the cloud management system’s on-demand allocations.
Figure 5-3
CBA’s Multi-Provider, Cloud-Based External Sourcing Model
Cloud Management System
Internal
Cloud
External
Private
Cloud
External
Public
Cloud
External
Public
Cloud
External
Public
Cloud
Business Platforms
122
The cloud management system executes operational and managerial
processes on-the-go, depending on current cloud workloads, the prices and service
level agreements negotiated with providers, and general requirements for security,
reliability and availability. In addition, the structure shown in Figure 5-3 makes it
relatively easy, as long as architectural standards are met, to enhance business
platforms, to replace business platforms or to add new business platforms. Finally,
this structure is not limited by the number of connected cloud-providers, and it allows
for the rapid connection of newly-contracted providers and the rapid disconnection of
terminated providers.
A Recap and Look Ahead
Organizations implementing competitively-successful business models must be
able to quickly and competently apply numerous digitized and digitalized capabilities,
many of which are quite sophisticated and some of which have only recently emerged.
It would be simply impossible for any organization to accomplish this on their own
today. This chapter has explained why and how organizations externally source
many, if not most, of the capabilities being applied, and then described how the
external sourcing of capabilities is factored into organizations’ processes for digital
strategy formulation.
While the external sourcing of capabilities is important for both pipeline
organizations and network organizations, it is especially critical for network
organizations given these organizations’ intense reliance on digital platforms and
business platforms in the launch and evolution of their business models. The next
chapter describes the nature of business models within network ecosystems.
123
Chapter 6. Digitalized Business Models for Network Ecosystems
Today, when you use your smartphone or tablet to post content on Facebook
statuses, to tweet, exchange photos, or search for information on the Internet, you
expect these types of Internet-based services to be provided mostly free-of-charge.
In economic terms, this amounts to a vast consumer surplus being provided by
organizations offering such services. Why do organizations (e.g., Facebook, Twitter,
WhatsApp, Google, etc.) offer these free services? The not-so-subtle answer is quite
straightforward – to generate revenue streams (via advertising or access fees) by
enabling other organizations to touch an expanding network of consumers or to gain
access to information about these consumers.
But, how does this occur? Most often, it occurs through the creation of a
network (market-focused) ecosystem, with the core transaction of the market being
the free service: a Facebook post, a Twitter tweet, a WhatsApp photo-share, or a
Google Internet search. The core transaction of a network ecosystem is the
primary market exchange activity driving both producers and consumers to an
ecosystem’s market platform. The market platform of a network ecosystem is the
organized collection of digital and business platforms that hosts the content and
functionalities that establish, operate and govern the ecosystem’s market. In order
to better grasp the nature of a network ecosystem, let’s take a closer look at Google
and Facebook. Also, for the ease of understanding, we will refer to the networks
being brought together within a network ecosystem as communities.
The core transaction enabled by Google is a consumer’s search for specific
content (some unit of information) believed to exist on one or more producer websites
124
(see Figure 6-1). Note especially the third community involved with Google’s
ecosystem: advertisers. Having developed state-of-the-art search algorithms and an
innovative auction scheme for selling advertising associated with specified search
outcomes, Google has built a business model that profitably monetizes Internet
search by attracting large customer and advertiser communities. Interestingly,
considerable overlap does exist across the three communities interacting through
Google’s search platform: website producers and advertisers do Internet searches
(that is, act as consumers), website producers do advertise, and advertisers do place
content on websites.
Figure 6-1
Google’s Network Ecosystem
Consumers Seeking
Information
Advertisers Producers of Websites
• Relevant, useful information
• Ease of use • Access from anywhere
• Increased traffic • Revenue opportunities • Access to network of
advertisers
• Access to network of potential buyers
• Measurable ROI on ads • Precise campaign control:
pay for clicks
Google’s Market
Platform
The core transaction enabled by Facebook is a person’s posting of content
(accompanied by Facebook immediately notifying the consumer’s friends of the
posting). As depicted in Figure 6-2, the person posting content is a member of a
producer community and the friends wishing to see the posted content are members
125
of a consumer community. Somewhat unique to social media sites, these consumer
and producer communities essentially overlap their memberships (aside from pure
lurkers within the consumer community). Note also that Facebook’s ecosystem
involves two additional communities: advertisers and Facebook App producers.
Facebook generates revenue streams from these advertisers and App producers.
Figure 6-2 Facebook’s Network Ecosystem
Consumers Seeking Content
Advertisers Producers of Content
• Relevant, useful content
• Ease of use • Access from
anywhere
• Increased traffic • Revenue opportunities • Access to network of
advertisers
• Global audience of potential buyers
• Measurable ROI on ads • Precise campaign control:
pay for clicks
Facebook’s Market
Platform
Producers of Facebook
Apps
• Access to networks of consumers & producers
• Revenue opportunities
• Access to network of advertisers
This chapter introduces intuitive ways of thinking about network ecosystems
and about the digital and business platforms used to orchestrate the market spaces
established by network ecosystems. The following topics are covered:
Why Network Ecosystems Exist
Crowd-Based Capitalism
Digitalizing Network Ecosystems
Blended Organizations
126
Why Network Ecosystems Exist
In explaining the economic concepts that underlie network ecosystems, we use
the example of a simplified hypothetical social media ecosystem (see Figure 6-3).
Here, community members take on the roles of producers and consumers in order to
share content. By sharing content – and, hence, gaining exposure to each other’s
likes, dislikes, experiences and perspectives - members enrich their relationships
with each other. What is the value proposition that drives a person to join,
participate, and remain in a social media ecosystem? It is the promise of more-
intensively sharing content with individuals with whom a personal relationship
already exists or of sharing content with individuals with whom no (or, at best, a
casual) personal relationship currently exists, but with whom a richer personal
relationship is desired.
Figure 6-3 Simplified Social Media Ecosystem
Consumers Seeking Content
Producers of Content
Social Media
Platform
Social Media Community
127
This social media ecosystem value proposition is driven by what economists
refer to as network effects. Stated simply, as the social community grows linearly,
the number of possible relationships amongst the community’s members grows
exponentially: 1 member - 0 possible relationships, 2 members – 1 relationship, 4
members – 6 possible relationships, 12 members – 66 possible relationships, 100
members – 4,950 possible relationships, and so on. Bigger networks, as a general
rule, are more valuable to participants; thus, network effects give network
ecosystems with the largest participant communities an advantage that is hard for
competitors to overcome. We explore network effects further, starting with two-
sided markets, moving on to multi-sided markets, and concluding with a discussion
of winner-take-all markets - the competitive endgame of a market-focused network
ecosystem.
Network Effects
Network effects, or what economists term a network externality, refer to
situations where the worth of or demand for a value-unit grows as an exponential
function of the number of current consumers of a value-unit and/or the number of
complements available to these consumers. A complement increases the perceived
worth of a value-unit. A good example of a complement would be the apps available
for a particular social media ecosystem, e.g., apps that make it easier to manipulate
and share content across the ecosystem. Would you be more inclined to join a social
media ecosystem that had more or fewer of your current friends as participants?
And, is this more likely for larger or smaller social media ecosystems? Now, given
two social media ecosystems comparable regarding the likelihood of you being able
to share content with your friends, would you prefer the ecosystem with more or
128
fewer valued complements (e.g., an image manipulation app)? And, would app
producers be more inclined to create apps for larger or smaller social media
ecosystems? This is the power of network effects!
How can firms capture the opportunities available through positive network
effects? Positive network externalities occur only when a customer network is
satisfied with – better yet, enthused about – the value-unit being offered. Much of
Apple’s surge in product success (iPod, iPhone, iPad, iTunes, iMusic, etc.) is a direct
result of positive word-of-mouth chatter. In contrast, negative customer experiences
and perceptions can be devastating.
The competition between HD DVD and Blu-ray as the standard for DVD players
provides an example of network externalities in action. Consider this quote from
Matthew Smith, a former SVP of merchandising for Blockbuster:31 “The consumers
are sending us a message. I can’t ignore what I’m seeing. Blockbuster has been
renting both Blu-ray and HD DVD titles in 250 stores since late last year and found
that consumers were choosing Blu-ray titles more than 70 percent of the time.”
Relatively quickly, word-of-mouth and consumer purchase decisions led to a positive
network effect for Blu-ray titles, subsequent growth in the number of Blu-ray titles
offered for sale or rent relative to the number of HD titles, and Blu-ray ultimately
winning the DVD standards war.
Because of the power of network effects, it is critical for network ecosystems
to exploit the influence of word-of-mouth and enlist their communities in growing
both community membership and member participation within a community.
31 R. Harris, “Blu-ray vs. HD DVD: Game Over,” http://blogs.zdnet.com/storage/?p=149.
129
Another tactic for capturing network effects with network ecosystems is to carefully
define the architectural standards enabling connectivity and interoperability and
promote these standards such that the standards become dominant in the network
ecosystem market space. Winning standards wars is critical as this increases the
number and variety of complements available to participants. A primary factor
behind Microsoft’s dominance in PC operating systems was the wide variety of
software applications compatible with the Windows operating system. This reinforces
the dominance of Windows in the market for PC operating systems. Firms become
successful in standards wars either by leveraging their brand and existing market
presence (e.g., a Microsoft, an IBM, an Apple, a Google, etc.) or by forming alliances
with other firms and collectively engaging in persuasive tactics to influence an
industry-wide movement toward a favored standard (e.g., Bluetooth, GSM for
mobility services, Android for smart phones, etc.).
Two-Sided Markets
A key notion for understanding the nature of network ecosystems involves the
economics of two-sided markets.32 With a two-sided market, the ecosystem
owner/builder – the network orchestrator – brings together two distinct communities
to engage in value-unit exchanges. Most typically, this is accomplished by growing
one side of the market as a means of attracting participants to the other side of the
market. The two sides of the network ecosystem are perhaps best thought of as a
subsidy-side and a money-side, with the ecosystem’s market platform providing
32 T. Eisenmann, G. Parker and M. Van Alstyne, “Strategies for Two-Sided Markets,”
Harvard Business Review, October 2006, pp. 92-101.
130
the rules, functionalities and resources to attract participants and to facilitate value-
unit exchanges. As a general rule, the subsidy-side is provided incentives to
participate in a network ecosystem as the primary role of the subsidy-side is to attract
the money-side, from which revenues are generated. The basic idea, thus, is to grow
the subsidized community to the point that its size becomes sufficient to attractive
money-side participants willing to pay a fee to gain access to the subsidy-side
participants.
As an example of a two-sided market, consider Figure 6-4, which depicts a
generic job-recruiting network ecosystem, e.g., CareerBuilder, Monster, Job.com,
etc. The subsidy-side is the community of individuals looking for a job. By heavily
subsidizing (free?) participation and by offering useful rules (e.g., privacy),
functionalities (e.g., resume-builder) and resources (e.g., career advice content), a
large pool of job candidates is built. If this pool of job applicants is large and of high
quality (e.g., broad ranges of skills and experiences), a high likelihood exists that a
sizable pool of recruiters will be attracted despite the participation fees being charged
to these recruiters (typically, a recruiter might be charged a modest fee to post a job
opportunity, a slightly larger fee for each match that occurs, and a much larger fee
if and when an applicant is offered a position).
131
Figure 6-4 Generic Job Recruiting Network Ecosystem
Applicants
(Consumers of Jobs)
Recruiters
(Producers of Jobs)
Market Platform
Rules Functionalities Resources
Another, quite different, example of a two-sided market involves Adobe and
its Adobe Reader and Adobe Acrobat software (see Figure 6-5). Before Adobe Reader
and Acrobat were released, the established standard for sharing and printing
documents was a tool called PostScript. In order to make inroads into the lucrative
document creation software market, Adobe made its document reader software freely
available (subsidizing the consumers of digital documents) and encouraged adopters
to share information about Adobe Reader and how to obtain it. With positive word-
of-mouth by a large number of Adobe Reader adopters, Adobe Reader became the
de facto standard for document reading and sharing. Once Adobe Reader became
the dominant document reader for viewing any type of document, Adobe was able to
sell its document-creation software, Acrobat, to all types of document creators:
publishers, law firms, authors, etc. While Adobe continues to give Adobe Reader
132
away for free, it generates sizeable revenues through its Acrobat software (now
available only by lease, a more-profitable pricing tactic).
Figure 6-5 Adobe’s Two-Sided Market Business Strategy
Consumers of Digital Documents
Producers of Digital Documents
Market Platform
Software Products to Download
User Authentication & Account Management
Payment Systems Customer Support & User Manuals
What is important about Adobe’s strategy? Adobe could have enjoyed the
benefits of network effects by only offering Adobe Reader - by standardizing their use
around it, consumers of digital documents would be able to easily exchange
documents and read them on any type of device. However, would this positive
network effect benefit Adobe to the same extent it benefited Adobe’s customers? In
other words, would Adobe have been able to eventually sell Adobe Reader at a price
sufficient to generate a lucrative profit? What price could it charge without hurting
its ability to build a critical mass of document reader users? Adobe recognized that
rather severe limits existed regarding what people would be willing to pay for a
document reader. But, Adobe also recognized that it could generate substantial
133
revenue from document-creation software given that it could achieve a large,
installed base of Adobe Reader users.
Figure 6-6 provides a more nuanced depiction of the logic underlying a two-
sided market. Note that two types of positive network effects are in play. The first
is called the same-side effect and refers to the possibility of network effects with
each side of the market. In the case of Adobe, as more people adopt Adobe Reader
for viewing documents, each is presented with more opportunities to easily share
documents. This represents a positive, same-side network effect for the adopters of
Acrobat Reader. Potential same-side network effects exist, as well, for document
producers. As more producers adopt Adobe Acrobat for document creation, more
opportunities arise for these producers to exchange content in order to create
bundled offerings.
Figure 6-6 Same-Side and Cross-Side Network Effects
Side #2 Side #1
Market Platform
Same-side effect
Cross-side effect
134
The second type of positive network effect is called a cross-side effect. This
refers to the potential value that one side derives when there are more participants
on the other side. Again, using the Adobe example, adopters of Adobe Reader benefit
as more producers adopt the Adobe Acrobat document creation software (because of
the increase in the number of compatible digital documents), and document
producers benefit with an increase in the number of consumers reading digital
documents through the use of Acrobat Reader (a larger consumer market for
produced digital documents).
So far, our discussion has been based on the assumption that same-side and
cross-side network effects are always positive. This is not the case, as these network
effects could be negative. Refer back to the job recruiting network ecosystem
portrayed earlier as Figure 6-4. Are the same-side network effects positive or
negative? Does a growing pool of job applicants benefit each applicant participating
in the ecosystem? Does a growing list of recruiters benefit each recruiter participating
in the ecosystem? Possibly not, as this may translate into greater competition among
applicants for the best jobs, as well as greater competition among recruiters for the
best candidates. Even though each side benefits from positive, cross-side network
effects, the potential for negative, same-side network effects could limit the number
of job seekers or job providers willing to participate in the ecosystem.33
33 The way job recruiting network systems typically deal with negative, cross-side
network effects is to segment the pools of available jobs and applicants into ‘sub-markets’
that become more-level playing fields for both recruiters and applicants.
135
Multi-Sided Markets
Increasingly, today’s network ecosystems are designed as multi-sided markets
rather than as two-sided markets. A multi-sided market involves more than two
actively participating communities. In this chapter’s introduction, we described a
three-sided market (the Google search network ecosystem) and a four-sided market
(the Facebook social media network ecosystem).
With multi-sided markets, each added community presents an opportunity to
generate additional revenue streams. Facebook, for example, receives revenue from
advertisers and from app producers. But, this potential for increased revenue is
accompanied by three management challenges:
Creating and then evolving attractive value propositions for each
participating community.
Identifying and optimizing positive same-side/cross-side network effects.
Identifying and minimizing negative same-side/cross-side network effects.
As the number of communities participating in a multi-side network increases, the
complexity of these management challenges tends to increase in a nonlinear fashion.
Winner-Take-All Markets
Increasingly, the payoff gap between being the best competitor in a market
and the second-best is widening into a canyon. This applies to labor markets (e.g.,
professional athletes), to technology markets (e.g., technology producers), and
especially to network ecosystems. In explaining the nature of winner-take-all
markets, we begin with the most straightforward context – that of a digital
product/service.
136
As positive network effects drive more consumers to adopt a product or
service, the product/service can gain a critical mass of adopters and become
dominant in its market space. This same phenomenon occurs with network
ecosystems. A critical mass of network ecosystem participants is achieved when the
momentum produced by an ecosystem’s positive network effects is unlikely to be
reversed by the entry into the market space of an appealing new network ecosystem,
regardless of how appealing this new ecosystem’s value-units might be. Think of the
market dominance held by Microsoft Windows and Office, by Google’s Android and
Gmail, and by Blu-ray DVD players and movies. In each of these cases, the
respective markets are said to have tipped over with the winner crowding out rival
products or services. A winner-take-all market, thus, refers to a market where
the potential exists that a critical mass of consumers will adopt one producer’s
products/services.
Nintendo’s entry into the home video gaming market nicely demonstrates how
competition unfolds in winner-take-all markets. In 1985, Atari was the dominant
firm in the video game market. By Christmas 1986, the Nintendo Entertainment
System (NES) had emerged as a very popular product, creating positive network
effects with both customers and, importantly, game developers, in turn attracting
even more customers. At some point, the market tipped over to Nintendo as the
dominant competitor. Once this occurred, game developers were willing to produce
their software exclusively for Nintendo for a two-year period – indicating the
significant rewards winners can obtain in winner-take-all markets. Microsoft’s
business strategies with its operating systems and its Office software suite reflect
similar competitive dynamics.
137
Network ecosystems are particularly susceptible to winner-take-all markets.
Three factors tend to characterize winner-take-all network ecosystems:
Strong producer economies of scale.
Strong positive cross-side network effects.
High consumer switching costs.
The latter factor is especially important. When participating in a competitor network
ecosystem is perceived as being costly (i.e., a non-trivial investment is required to
participate in a network ecosystem and this investment is then lost in moving to a
different ecosystem), consumers will be reluctant to either participate in multiple
network ecosystems or to switch ecosystems.
Importantly, not all market spaces are susceptible to winner-take-all market
dynamics. Consider the market space for daily deals, e.g., Groupon and
LivingSocial.34 Many early investors believed that strong cross-side network effects
would produce high stock valuations for Groupon and for LivingSocial. However, as
consumers participating in Groupon and in LivingSocial experienced very low
switching costs, little allegiance was shown to any one market platform with
consumers instead skipping through multiple platforms looking for the most attractive
deals. As one might expect, the high valuations have yet to materialize.
Generally, a market space susceptible to winner-take-all dynamics is most
likely to be seen as a winner-take-all network ecosystem when:
Participants experience significant, positive network effects.
34 A. Haigu, “Strategic Decisions for Multi-Sided Platforms,” Sloan Management
Review, Winter 2014, pp. 71-80.
138
Participants are reluctant to move to a competing ecosystem.
One of the network ecosystems begins to attract a majority of the new
participants entering the market space.
This same ecosystem attracts an accelerating flow of participants from
competing ecosystems.
Competition in early-stage winner-take-all network ecosystem market spaces can be
fierce. More profitable competitors, because they are more profitable, are able to
invest more in R&D and to provide greater incentives to participants - enabling their
participating communities to grow even faster. This intense competition often results
in winner-take-all market spaces being dominated by just a few firms (two or three,
at most).
Crowd-Based Capitalism
The past decade has witnessed a reemergence of bartering, the earliest type
of market-focused ecosystem, in the form of crowd-based capitalism – that is, a
two-sided market that brings together two crowds, or communities, of individuals:
one community possessing an under-used asset or skill (the value-unit) and the other
possessing a short-term need for such an asset or skill. This new bartering ecosystem
differs from the original in two important ways:
The medium for the short-term sharing of the value-unit is money. In other words, the person that owns the shared value-unit gets paid by the person being granted short-term use of the value-unit.
The market is enabled through a digitalized market platform built, managed and owned by a third-party, the network orchestrator.
139
This form of market-focused ecosystem is the basis for what is popularly referred to
as to as the sharing economy.35 Essentially, digital technologies (e.g., the Internet,
interconnected smart devices, social media, payment systems, trust systems, etc.)
are extending peoples’ options for obtaining goods and services beyond family,
friends, neighborhood stores and national/global retailers toward crowds of
entrepreneurs.
Table 6-1 lists some of the crowd-based network ecosystems that have
emerged over the last decade. As you look over this listing, notice the attributes of
value-units likely to be shared via crowd-based capitalism: low-use and high-value.
Low-use implies unused capacity (of an asset) or idle time (of a skill-provider); high-
value infers that the value-created – the consumer payment subsequently
appropriated and shared by a producer (an asset-owner or skill-provider) and a
network orchestrator – will exceed the costs associated with an exchange.
35 A. Sundararajan, The Sharing Economy: The End of Employment and the Rise of
Crowd-Based Capitalism, MIT Press, Cambridge, MA, 2016.
140
Table 6-1 Examples of Crowd-Based Network Ecosystems
Crowd-Based Network Ecosystem
Value-Unit Examples
Educational Services Idle Skill Capacity SkillShare,TradeSchool, Udemy
Freelance Work Idle Expertise Capacity Amazon Mechanical Turk, InnoCentive, TopCoder, Upwork
Fundraising Idle Capital AngelList, FundiingCircle, Kickstarter
Handyman Chores Idle Labor Capacity Handy, TaskRabbit, TimesFree
High-End Fashion Unused Clothes Designer24, Rendevoux, Rent My Wardrobe, Rent the Runway, StyleLand
Lodging Unused Housing Capacity Airbnb, CouchSurfing
Personal Services Idle Labor Capacity Lux, Postmate, Shyp, Washio, Wag
Philanthropy Idle Capital DonorsChoose, Kiva
Transportation Unused Automobile
Capacity BlaBlaCar, Getaround, Lyft, Turo, Uber, Zipcar
Digitalizing Network Ecosystems
Network ecosystems existed prior to the eras of digital disruption. For
example, three pervasive pre-digital network ecosystems were those involving (as
network orchestrators) real estate brokerages, independent insurance agencies and
travel agencies. In these network ecosystems, the network orchestrator (via the
work processes shown in Figure 6-7):
Built up a portfolio of offerings from a producer community.
Attracted a consumer community.
Enriched producers’ offering creation capabilities.
Enriched consumer demand.
Matched the needs of individual consumers with the producer’s offerings.
Facilitated both exchange transactions and exchange fulfillment.
Worked to retain the members of the producer and consumer communities.
With digitalized network ecosystems, the vast majority of work processes are carried
out through a market platform (i.e., a collection of digital platforms and business
141
platforms). The digitization and digitalization reflective of the three eras of digital
disruption (see Table 6-2) have produced two types of effects on network
ecosystems. First, the pre-digital network ecosystems have either radically
transformed themselves through both digitalization and specialization or have exited
their markets. Second, scores of new network ecosystems have emerged and
continue to emerge (see Table 6-3).
Figure 6-7 A Network Orchestrator’s Managerial and Operational Processes
Indirect Materials & Supplies Procurement
Human Resource Recruitment & Development; Benefits Management
Financial Services; Accounting Services
Business/Digital Strategizing; Administrative Services
Matching Consumer Demand
With Producer Supply
Growing a Producer
Community
Growing a Consumer
Community
Transaction Execution Efficiency & Safety
Exchange Fulfillment Execution & Safety
Retaining Producer
Community
Retaining Consumer
Community
S u
p p
o rt
P ro
c e
s s e
s P
ri m
a ry
P ro
c e
s s e
s
R&D; New Services Development; New Services Rollout
Digital Technology Services & Management
Facilitating Producer
Value-Unit Creation
Stimulating Consumer Demand
142
Table 6-2 Evolution of Network Ecosystems
Era Value-Units Digitization & Digitalization Exchange Currency
Trust Systems
1 Digital complements
Data/document standards Point-to-point connectivity Intra- and inter-
organizational (managerial and operational) process efficiencies
Banking system
Credit/debit card systems
Government & 3rd- party institutions
Contracts Brand Social capital
2 Digital value- units
Internet One-to-many connectivity Data, process, analytic and
collaboration platforms Social media Omni-channel producer-
consumer interaction
Digitalized payment systems
3rd-party digital trust seals
Consumer monitoring (product & producer reviews)
3 Social complements
Many-to-many connectivity Smart devices Big Data platforms Big Data analytic platforms Social messaging platforms
Reputation Social capital Bitcoins
Community monitoring
Peer-regulation Self-regulation
Table 6-3 Examples of Network Ecosystems
Era Variation Examples Community 1 Community 2 Community 3
1
Services Platform Visa, MasterCard Producing
Organizations Banks Consumers
Digital Architecture Microsoft’s PC
Operating System Application Producers
PC Producers Consumers
2
B2B Horizontal Marketplace
Alibaba.com, Thomasnet.com
Producing Organizations
Advertisers Consuming
Organizations
B2B Vertical Marketplace
e-Steel, Farms.com
Producing Organizations
Advertisers Consuming
Organizations
B2C e-Commerce Amazon
Marketplace Producing
Organizations Advertisers Consumers
C2C e-Commerce eBay, Craigslist Producers Advertisers Consumers
3
Search Platform Google Content
Producers Advertisers
Content Consumers
Social Media Platform
Twitter Content
Producers Advertisers
Content Consumers
Crowd-Based Capitalism
Airbnb, Uber Asset/Skill
Owner Advertisers
Asset/Skill User
143
Era 1
Two types of network ecosystems emerged during Era 1. The first of these
applied proprietary, point-to-point connectivity to create new markets based on
digitalized services. Perhaps the most familiar example is that of credit card
providers, such as Visa and MasterCard. By establishing a digitalized (in part)
services platform, merchants were able to offer a convenient, safe payment channel
to consumers and banks gained a new revenue stream.
The second type of network ecosystem that emerged involved proprietary
architectures for digital products and these product’s complements. By promoting
and licensing a product architecture that tips over a market, the architecture’s creator
is able to sustain high-margin sales for a lengthy period of time. Perhaps the most
familiar example of this is that of personal computer (PC) operating systems, such
as Microsoft OS (and then Windows). The Intel PC operating system market tipped
over to Microsoft OS because the PC application software community gave priority to
developing products to run on OS (and then on Windows) – increasing the likelihoods
that software producers would gain large revenue streams and that consumers
purchasing PCs would be able to run needed software.
Era 2
The availability of one-to-many connectivity enabled by the Internet triggered
a rapid growth in network ecosystems. Four distinct types of e-commerce
ecosystems emerged: B2B horizontal (producers offering a broad range of value-
units to any type of consumer-business) marketplaces, B2B vertical (producers
offering value-units to consumer-businesses in a single industry) marketplaces, B2C
marketplaces, and C2C marketplaces.
144
B2B marketplaces generally operate in the upstream portions of industry value
streams. Connecting (raw material and component) suppliers to producers, these
intermediaries aim to disintermediate established supplier-producer relationships
with the promise of a more efficient market. The value-propositions of these B2B
marketplaces vary considerably, as reflected in the four levels of functionality that
can be established between producers and consumers: information exchange, value-
unit exchange/fulfillment transaction execution, logistical flow coordination, and
collaboration enablement.
B2C and C2C marketplaces generally operate in the downstream portions of
industry value chains. Connecting finished goods producers to consumers, these
intermediaries aim to disintermediate established retailer-consumer relationships,
again with the promise of a more efficient market. Notice in Table 6-3 (shown earlier)
that the example given for an Era 2 B2C network ecosystem is Amazon Marketplace
rather than Amazon, given Amazon Marketplace’s objective of bringing together a
broad community of small producers to interact with Amazon’s consumer community.
Two examples of C2C marketplaces, eBay and Craigslist, are used to illustrate the
variety that exists. For example, eBay utilizes an auction pricing mechanism and
offers the parties of value-unit exchanges a range of transactional and fulfillment
services, while Craigslist utilizes fixed prices and offers little in the way of
transactional and fulfillment services.
Era 3
The digital technologies associated with the third era of digital disruption –
most notably many-to-many connectivity, smart devices, social messaging and peer
regulation – triggered a fresh, explosive wave of network ecosystems focused on
145
enabling and exploiting individuals’ desires to maintain anytime, anywhere
connections with the people, institutions and opportunities that are most important
to them. As listed earlier in Table 6-3, the dominant types of Era 3 network
ecosystems involve digital services (e.g., search, photo sharing, music sharing, etc.),
social media, and crowd-based capitalism. As many of these network ecosystems
involve participants and activities outside of the purview of established markets and
institutions, new forms of community-based and peer-based trust systems have
emerged. For example, there are limited regulations at present to assure consumers
of the accuracy of host-provided Airbnb lodging descriptions. In response, Airbnb
has implemented two trust mechanisms: the capturing and reporting of consumers’
lodging reviews, and host identity verification systems that combine the digitized
social capital of social media with governmental ID infrastructures. In addition,
Airbnb proactively involves hosts and consumers in developing and evolving
standards and expectations guidelines that must be agreed-to by hosts and
consumers.
Blended Organizations
Today’s most successful organizations are increasingly exhibiting the qualities
of both pipeline ecosystems and network ecosystems, and in the process becoming
a blended organization. This primarily occurs via one of two approaches:
An organization operates multiple, largely independent business models,
some of which are executed as a pipeline organization and others as a network organization.
A pipeline organization incorporates a private or semi-private network- ecosystem as a means of enhancing efficiency, effectiveness or both.
Each of these approaches is briefly described.
146
The organization that best illustrates the first approach of operating both
pipeline ecosystem and network ecosystem business models is Amazon. Amazon’s
initial business model was that of a pipeline ecosystem retailer: interacting physically
with suppliers to stock product inventories, then interacting digitally with customers
to sell these products, and then interacting physically and digitally with third-party
package delivery providers in fulfilling customers’ purchases from Amazon’s brick-
and-mortar distribution centers. Over time, Amazon has expanded its portfolio of
business models to include operating as:
A pipeline ecosystem retailer that stocks, sells and delivers digital products
and smart devices.
A pipeline ecosystem producer of digital technology services for businesses
and for individuals.
A network ecosystem orchestrator of media streaming services.
A network ecosystem orchestrator of B2B and B2C marketplaces.
While Amazon’s various business models are targeted at distinct markets, they all
make extensive use of Amazon’s world-class capabilities to design, build, operate and
evolve digital platforms and business platforms.
The second approach to becoming a blended organization involves a focus on
upstream, internal and/or downstream processes.
With regard to upstream processes, for many producers (e.g., automobiles,
durable appliances, electronic products, etc.) a few of the raw materials used in
procured components represent a significant percentage of production costs. Part A
of Figure 6-8 portrays a traditional upstream value stream for a pipeline
manufacturing organization. Note that value stream participants engage with two
largely-independent markets: Market 1 involves raw material suppliers and
147
component suppliers, and Market 2 involves these component suppliers and the
producers. Because of the potential for supply/demand imbalances and information
asymmetries, component suppliers tend to be disadvantaged in Market 1, passing on
market inefficiencies to the manufacturer in the form of higher prices and logistical
delays in Market 2. Part B of Figure 6-8 introduces the notion of a supply hub as a
means of overcoming these potential market inefficiencies in this upstream portion
of the traditional pipeline value stream.36 Here, the manufacturer creates a pseudo-
market (Market 3) within the established market for raw materials. After aggregating
raw material requirements and production plans across all component suppliers, a
producer is able to apply a comprehensive understanding of component supplier
demand (volumes and timings) in negotiating prices with raw material suppliers on
behalf of the component suppliers.
36 A. Agrawal, A. De Meyer and L.N. Van Wassenhove, “Managing Value in Supply
Chains: Case Studies on the Sourcing Hub Concept,” California Management Review, Winter
2014, pp. 23-54.
148
Figure 6-8 Introducing a Supply Hub into a Pipeline Ecosystem Value Stream
Component Suppliers
Markets
Raw Material Suppliers
Producer Component Suppliers
Markets
Raw Material Suppliers
Producer
A. Traditional Value Stream B. Raw Material Supply Hub
1 2
3
With regard to internal processes, organizations can obtain a variety of benefits
(e.g., productivity, employee goodwill, reputation enhancement, etc.) by employing
a private network ecosystem solely inside their boundaries. The platforms used with
such internal marketplaces can be developed in-house or licensed from a third-party
platform-provider. A nice example of using a private market ecosystem is that of
Zimride, the ride-sharing platform that Lyft’s founders licensed to universities and
businesses as a private ride-sharing service used solely by a subscribing
university’s/business’s employees.37 Zimride provides a useful benefit for employees
in the form of a convenient and safe mechanism for solving employees’ commuting-
to-work problems and positions the organization as being socially-responsible, a
quality likely valued by many of the organization’s stakeholders.
37 R. Lawler, “Lyft-Off: Zimride’s Long Ride to Overnight Success,” TechCrunch, August
29, 2014: https://techcrunch.com/2014/08/29/6000-words-about-a-pink-mustache/
149
With regard to downstream processes, Table 6-4 provides examples of three
organizations that have appended C2C marketplaces as complements to their
traditional sales channels. When carefully conceived and executed, the network
effects engendered can be exploited to enrich a brand and grow the consumer base
without cannibalizing pre-existing sales channels.
Table 6-4 Introducing a C2C Marketplace into a Pipeline Ecosystem Value Stream
Pipeline Organization
Network Ecosystem Strategic Value
Ikea Group Ikea Family loyalty program community: members post & sell used Ikea items.
Supports Ikea’s eco-friendly ethos.
Opens up room in members’ homes for new Ikea items.
Patagonia Partnership with eBay: consumers easily sell used Patagonia clothing items.
Supports Patagonia’s eco-friendly ethos.
Increases the visibility of the Patagonia brand both online and on the street.
DM (German
Drugstore Chain)
Sponsors & arranges clothing swap events, at which makeup/styling products & techniques are demonstrated.
Generates new consumers in the targeted demographic.
Enriches brand by leveraging the green spirit of sharing rather than buying.
Gains brand visibility as these events are featured on social media and by fashion bloggers.
A Recap and Look Ahead
Network ecosystems, as introduced and fleshed out in this chapter, represent
a rapidly increasing segment of most countries’ GNPs. In the process, existing
markets and industries are being transformed and new markets and industries are
being formed. The next chapter examines the digital strategy formulation process
for network orchestrators, regardless if a network orchestrator offers a market
platform for a public or private network ecosystem.
150
Chapter 7. Digital Strategy Formulation for Network Organizations
Within a network ecosystem, market participants connect and conduct
interactions with one another using a market platform provided by a network
organization – the network orchestrator. While interacting, market participants make
use of platform content/functionality to exchange data, exchange items of value
(e.g., value-units, monetary payments, etc.), and collaborate in co-creating new
value-units.
This chapter discusses digital strategy formulation within network
organizations. Because of the huge variety of network ecosystems, our discussion
will be in the form of general concepts and frameworks – that are then grounded
through two different network organizations (see Figure 7-1 and Table 7-1):
TopCoder38,39 and Metropia40. TopCoder is an established organization that has
constituted a single network ecosystem handling all of TopCoder’s work activities;
Metropia is a relatively young organization that aims to constitute many local
(geographically-bound) network ecosystems.
38 H. Tajedin and D. Nevo, “Value-Adding Intermediaries in Software Crowdsourcing,”
47th Hawaii International Conference on System Sciences, IEEE, January 2014, pp. 1396-
1405. 39 H. Tajedin, D. Nevo and R.W. Zmud, “Beyond Matching: Intermediaries’ Market
Design and Market Development Roles in Software Development Crowd Markets,” working
paper, Rensselaer Polytechnic Institute, January 2017. 40 The Metropia material has been gathered by one of this book’s authors through
interviews with two members of Metropia’s leadership team, including the founder/CEO.
151
Figure 7-1 The Communities Participating in TopCoder and Metropia
Clients Developers
Market Platform
TopCoder
Commuters
Market Platform
Metropia
Mobility Service
Providers
Merchants Government
Agency
Table 7-1 Describing and Contrasting TopCoder and Metropia
TopCoder Metropia
Core Transaction
Delivering a solution (software code) that satisfactorily meets a client’s specification (a software project)
Provide an optimal mobility solution for moving the commuter from point A to point B
Community 1 Clients
(money-side) Commuters
(money-side)
Community 2 Developers
(subsidy-side) Mobility Providers
(subsidy-side)
Community 3 Merchants
(subsidy-side)
Community 4 Government Agencies
(money-side)
Market Geographic Scope
Global Local
Maturity Established Young
Founded in 2001, TopCoder offers crowdsourced software design and
development services to (mostly North American Fortune 500) clients across
numerous industries. As of May 2015, TopCoder had built a community of over
152
700,000 developers, of which nearly 20% were active. Metropia was founded in 2010
as a Mobility-as-a-Service (MaaS) platform for commuters in congested urban areas.
At the time this case material was collected, Metropia was in five urban areas (Austin,
El Paso, Houston, New York City and Tucson) and was in various stages of rolling out
platforms in five additional urban areas.
The chapter introduces intuitive ways of thinking about the digital strategies
formulated by network organizations as they establish and evolve network
ecosystems by covering the following topics:
Business Models for Network Organizations
Strategic Intent for Network Organizations
Market Design and Market Platform Design
Digital Strategy Formulation
Sustaining a Network Organization’s Market Position
Business Models for Network Organizations
Business models for network organizations (see Figure 7-2) differ from those
of pipeline organizations in two primary ways:
The presence of an additional business model element – the number of communities interacting through a network organization’s market platform.
The existence of a unique value proposition and a unique profit model for each of the interacting communities.
Typically, two of these interacting communities are directly associated with the core
transaction: the producer and the consumer of the value-unit(s) being exchanged via
the constituted market. Other interacting communities are then attracted by the
opportunity to touch producer participants, consumer participants, or both. A
network organization’s success is ultimately linked to (1) the (continuing) presence
153
of engaging value propositions for each of the interacting communities, and (2) a set
of community profit models that additively produce a profitable revenue stream.
Figure 7-2 Business Models for Network Organizations
Community Value
Propositions
Community Profit Models
Core Capabilities
Dynamic Capabilities
Number of Communities
Similar to pipeline organization business models, network organizations deliver
value propositions and profit models through sets of core capabilities and dynamic
capabilities. As might be expected, these capabilities tend to vary somewhat with
regard to the community (or communities) being targeted. Consequently, capability
development and management requires the balancing (for effectiveness and
efficiency purposes) of local (a single community) and global (all communities)
interests.
Table 7-2 provides an overview of TopCoder’s business model. Here,
tournament-style crowdsourcing is applied to incentivize a developer community (the
producer) to deliver software solutions (the value-unit) to a client community (the
consumers). Importantly, the client community is the money-side of the market,
while the developer community is the subsidy-side. Client software projects are
broken into a series of contests (project specification, architecture design, version
154
specification, version design, version coding/testing, etc.), with three (or so) winning
solutions selected for each contest. The client accepts one of these winning solutions
as the overall winner and the project-related work then moves on to the next contest.
The core transaction is contest design and fulfillment – the delivery of a satisfactory
contest solution to a client.
Table 7-2 TopCoder’s Business Model
Business Model Element
Description
Client Community Value Proposition
Obtain quality code (e.g., tested against specifications, secure, etc.) within agreed-on schedule and budget.
Client Community Profit Model
Clients pay subscription fee. Clients provide contest incentives (payments to winning
developers).
Developer Community Value Proposition
Earn income, acquire new skills, demonstrate skills and interact with forward-looking technologists.
Developer Community Profit Model
No associated revenue stream (the developer community is the subsidy-side of this network ecosystem).
Core Capabilities
Software development & software development management. Translating software development projects into contests. Contest design & fulfillment. Acquiring, developing and retaining community participants. Creating a sense of community for participants.
Dynamic Capabilities Sensing & identifying software development trends &
innovations. Sensing & identifying new participant sources.
Metropia’s business model (summarized in Table 7-3) is more complex. The
core transaction involves a commuter desiring to move from point A to point B by
selecting one of a number of offered mobility solutions: self-navigation (driving,
walking, bicycling), toll roads, car-pooling, ride-sharing, car-sharing, bike-sharing,
ride-hailing, various mass transportation modes, etc. The mobility service portfolios
vary across the local market platforms, and the offered solutions are produced
through the application of sophisticated traffic algorithms on massive collections of
historical and streaming traffic-related data. The commuter earns reward points for
selecting solutions that contribute to the common good, and these reward points are
155
exchanged for goods/services at participating merchants. Each local platform is
supported by one or more governmental agencies, motivated by a desire to improve
the transportation common good by changing commuter behaviors and by obtaining
enhanced capabilities for collecting and analyzing transportation-related data.
Table 7-3
Metropia’s Business Model
Business Model Element Description
Commuter Value Proposition Provide optimal mobility solutions for going from point A to point B. Provide reward points for contributing to the common good .
Commuter Profit Model Subscription fees & transaction fees.
Provider Value Proposition Gain exposure with the commuter community. Gain revenue from servicing the commuter community.
Provider Profit Model Negotiated mobility services costs.
Merchant Value Proposition Build reputation with commuter community.
Merchant Profit Model Exchange goods/services for reward points.
Government Agency Value Proposition
Enhance commuting common good. Obtain mobility-related data. Obtain knowledge from Big Data analytics.
Government Agency Profit Model
Revenue (from developing, launching & enhancing local market platforms).
License fees (from Big Data/analytics products & services).
Core Capabilities Traffic optimization & Big Data analytics. Interconnect market platform with government/provider processes. Relationship management (all communities).
Dynamic Capabilities Sensing and identifying new mobility services and providers. Sensing and identifying new government regulations.
Strategic Intent for Network Organizations
A strategic intent directs, rather than constrains, organizations’ digital
strategists’ thought processes as competitive actions are formulated and as the
capabilities necessary for implementing these and future competitive actions are
developed. With pipeline ecosystems, strategic intents are established to emphasize
and evolve a dominant consumer value proposition – and, hence, the capabilities that
enable the value disciplines (i.e., operational excellence, customer intimacy and/or
product leadership) that underlie this value proposition. Given the multiplicity of
value propositions that co-exist with network ecosystems, these organizations’
156
strategic intents tend to be considerably broader than those of their pipeline
organization counterparts. In essence, network organizations’ digital strategists face
a more complex and more dynamic competitive space than do pipeline organizations’
digital strategists - think about not only juggling more balls, but balls that are
erratically moving about.
Table 7-4 illustrates the primary value propositions offered by TopCoder and
Metropia. As suggested, all three value disciplines are critical to the competitive
success of both of these organizations.
Table 7-4
TopCoder’s and Metropia’s Value Propositions
Community Value Proposition
Value Disciplines
Operational Excellence
Customer Intimacy
Product Leadership
TopCoder
Clients Obtain software code that meets specifications within agreed-on schedule & budget.
Developers Earn income, develop skills, demonstrate skills and interact with forward-looking community.
Metropia
Commuters Obtain optimized mobility solutions & reward points.
Providers Gain exposure to and services revenue from the commuter community.
Merchants Build reputation within the commuter community.
Government Enhance the transportation common good, access a new source of traffic data, and enhance Big Data analytic capabilities.
Market Design and Market Platform Design
The competitive moves taken by a network organization’s leadership team can
be viewed, conceptually, as focused on one of two levels of design: market design,
or moves aimed at enhancing the efficiency of the constituted market; and, market
platform design, or moves aimed at building market platform content/functionality
157
in order to enhance community participants’ satisfaction with offered value
propositions. Table 7-5 describes each of these design levels by providing the
primary attributes serving as each level’s focus and offering examples of competitive
moves addressing these attributes. While moves taken at either of these design
levels can affect both market efficiency and participants’ satisfaction, distinguishing
competitive moves in this manner can ease the cognitive and communication efforts
of leadership team members and of digital strategists as they formulate their
organizations’ digital strategies. It is also important to note that taken competitive
moves can be initially implemented by fully-digitalized processes (i.e., built into a
platform’s functionality) or by staff being supported through digitalized processes.
Over time, the operational and managerial processes associated with competitive
moves handled initially by humans are typically digitalized as the processes are
institutionalized.
Table 7-5 Market Design and Platform Design
Attribute Targets of Competitive Moves
Market Design
Market Thickness
Recruitment of community members. Retention of community members.
Market Congestion
Maintenance of an effective balance in community sizes. Occurrence of value-adding matches.
Market Safety
Perceived fairness & trustworthiness of market transactions. Perceived trustworthiness of platform content. Perceived level of platform security.
Market Platform Design
Core Transaction Fulfillment
Core transaction fulfillment rate. Participants’ satisfaction with community value propositions.
Ease-of-Use Participants’ abilities to access platform functionality & content.
Data & Information Exchange
Participants’ abilities to contribute data & information. Participants’ abilities to interact with other participants.
Adaptability Ease of adding or removing: communities, participants, platform
functionalities & platform content.
158
Market Design
The objective of market design is to create the conditions most conducive to
efficient market operation. Three such conditions are suggested as being most
important:41,42
Market thickness: ensuring sufficiently large numbers of producers and
consumers such that a strong likelihood exists that satisfactory producer- consumer matching will occur.
Market congestion: ensuring the ease by which producers and consumers
are able to consider a sufficient number of alternatives in arriving at a satisfactory match.
Market safety: ensuring that market transactions are sufficiently safe such that producers and consumers are willing to reveal or act on confidential information and are willing to keep the transactions inside the market.
Let’s now look more closely at each of these market design attributes.
A classic example for understanding market thickness is that involving credit
cards. What do you, as a consumer, value in a credit card? While things like reward
programs and interest rates are obviously important, you would not even consider a
credit card unless it was accepted by most of the merchants you patronize. What
leads a merchant to decide to accept a specific credit card? While setup costs and
transaction fees are clearly important, a merchant would hesitate to invest in a card
that was not held by a sizeable portion of the merchant’s customers. Invariably, the
decision by producers or consumers (or, in general, market participants) to join a
specific network ecosystem is largely a function of the size of the cross-side
community. Successfully resolving this chicken-and-egg problem represents a major
41 A.E. Roth, “What Have We Learned from Market Design?,” The Economic Journal,
March 2008, pp. 285-310. 42 H. Tajedin, Three Essays on Crowdsourcing as a New Mode of Organizing, 2016
Doctoral Dissertation, Schulich School of Business, York University, Toronto, CA.
159
challenge for network organizations. Further, because of the learning costs borne by
participants engaging with a new market platform, ensuring sufficient market
thickness requires a simultaneous focus on attracting and on retaining participants.
Your first thoughts when hearing the term congestion is likely to bring up
images of difficulties faced by participants as they navigate through a market
platform in order to locate attractive value-unit matches. While such navigation
challenges can certainly deter market platform use and hinder market efficiency,
market congestion tends to be most problematic when the demand for available
value-units is highly skewed, resulting in too few participants being able to satisfy
their needs through a marketplace. To counter demand skewness, network
orchestrators need to undertake initiatives aimed at balancing demand by (1)
attracting or developing producers of the in-demand value-units, and/or (2)
educating consumers on how available value-units in less demand might as well
satisfy their needs.
Many potential threats to market safety arise when market participants
interact and carry out transactional exchanges via a market platform, such as:
Is my exchange partner trustworthy?
Is the market platform content trustworthy?
Will all data or information I provide in carrying out a market transaction be treated in a confidential and protected manner?
Will the value-unit(s) delivered to me meet my expectations?
Will the value-unit(s) delivered to me be free of intellectual property or licensing concerns?
Can I be confident that financial exchanges will be carried out in a secure and protective environment?
160
If potential market participants develop safety-related concerns, one of two things is
most likely to occur. First, many of these potential participants will simply decide not
to participate. Second, many of the participants who do decide to participate will end
up identifying, but not consummating, a match; instead, matched participants will be
motivated to consummate the match (along with associated revenue streams)
outside the market platform.
Many of the competitive moves taken by TopCoder and by Metropia have been
aimed at enriching market design, with associated market platform functionality put
in place to enable or support the taken moves. Tables 7-6 and 7-7 illustrate these
market design competitive actions for, respectively, TopCoder and Metropia.
Table 7-6
TopCoder’s Market Design Competitive Moves
Primary Processes
Market Design
Attribute Competitive Moves
Grow Developer Community
Thickness Talent teams engage in on-campus campaigns. Talent teams run algorithm challenges (competitions).
Grow Client Community
Thickness Sales teams target, market to and interact with potential clients.
Enrich Developer Skills
Congestion Account teams induce clients to offer projects requiring hot skills. Internal R&D offers projects requiring hot skills.
Enrich Client Demand
Congestion Account teams broaden clients’ views of what can be done via software
development crowdsourcing and on the crowds’ capabilities.
Match Developers with Contests
Congestion Account teams work with clients to break projects into contests. Account teams modify contests not attracting sufficient developers.
Enrich Solution Fulfillment Safety
Safety Staff managers and developer co-pilots monitor projects & contests. Staff & developer-crowd assess solution completeness/trustworthiness. Contest appeals process for non-winning developers.
Retain Developers Thickness Contest reviews & project management increasingly outsourced to the
developer community. Enrich the developer community through events & developer forums.
Retain Clients Thickness Long-term contracts, strong client relationships, and the provision of
rich metrics regarding contest, project & client success.
161
Table 7-7 Metropia’s Market Design Competitive Moves
Primary Processes Market Design
Attribute Competitive Moves
Grow Commuter Community Thickness
Partner with government agency in promoting platform.
Partner with an organization sponsoring a traffic-congesting event to promote platform.
Add a Provider Thickness Leverage government agency (permitting &
regulatory) relationships with providers.
Grow Government & Merchant Communities
Thickness Establish program managers/teams.
Enrich Commuter Perspectives
Congestion Programs directed at broadening commuters’
understandings of mobility alternatives.
Enhance Data/ Algorithms Congestion Continual improvement
Enhance Platform Safety Safety
Reengineer reward points schemes, processes & algorithms to detect and to prevent fraud.
Commuter data shared only in aggregate forms.
Retain Commuters Thickness Threat of losing accumulated reward points.
Retain Government Agencies Thickness Threat of losing data/analytic capabilities.
Market Platform Design: Digitalizing the Operational Domain
Table 7-8 describes five major operational purposes of all network
organizations’ market platforms. Most of the activities listed should be familiar to
you, but one may not: ancillary transactions. As explained earlier, the core
transaction refers to the market exchanges that bring a producer community and a
consumer community together. Ancillary transactions refer to transactions
associated with the value propositions that bring communities other than producers
and consumers to the platform. Perhaps the most familiar example of this distinction
can be seen with Google. Google’s core transaction involves finding satisfactory
matches between consumers’ search cues and producers’ website content. Google’s
ancillary transactions involve the placing of and clicking on the advertisements that
show up along with search results.
162
Table 7-8 Operational Purposes of Network Organizations’ Market Platforms
Platform Purpose
Associated Activities
Community Hosting
Adding a new community. Removing an existing community.
Community Member Hosting
Adding a new community participant. Providing functionality & content through which participants can
develop & promote their needs & capabilities. Removing an existing community participant.
Matching Facilitation
Providing functionality & content enabling participants to identify matches aligned with sought value propositions.
Providing functionality enabling participants to select a match.
Core Transaction Facilitation
Providing functionality & content to negotiate & execute transactions.
Providing functionality & content to verify completed transactions.
Ancillary Transaction Facilitation
Providing functionality & content to negotiate & execute transactions.
Providing functionality & content to verify completed transactions.
A number of critical operational performance requirements are reflected in
Table 7-8: ease-of-use (simplicity, multi-channel convenience, mobility and
flexibility), efficiency in executing platform functionalities, cost-effectiveness
(especially with regard to subsidy-side communities), scalability (as communities
grow rapidly), and adaptability (adding/removing communities, participants,
functionalities and content). Collectively, these performance requirements dictate
that network organizations’ market platforms adopt particular architectural features:
many-to-many connectivity, modularity, the tight-coupling of modules delivering
global (i.e., used by multiple communities, including internal staff) functionalities,
and the loose-coupling of modules delivering local (i.e., used by a single community)
and experimental functionalities.
163
Market Platform Design: Digitalizing the Analytical Domain
The nature of network ecosystems – that is, communities with large numbers
of members, participants’ interaction within and between communities, participants’
navigation through the market platform provided by a network orchestrator,
participants’ transaction exchanges, etc. – results in the capture and generation of
huge amounts of data. These data can then be stored and organized for a variety of
analytical purposes, including:
Learning about each community in order to better understand and anticipate community members’ capabilities, perspectives, desires, needs and expectations in order to grow/retain community members, to enhance value
propositions and to enhance profit models.
Learning about participants’ platform navigation behaviors, as well as
participants’ use of platform functionality and content, in order to improve ease-of-use, to enhance community value propositions and to enhance profit
models.
Learning about the core transaction and, if they exist, ancillary transactions in order to better understand, improve and predict fulfillment success in
order to enhance value propositions and to enhance profit models.
Importantly, the capabilities fashioned to undertake such analyses can be used by
network organization staff and by participants. Figures 7-3 and 7-4, respectively,
illustrate some of the ways in which TopCoder and Metropia are digitalizing the
analytical domain.
164
Figure 7-3 Digitalizing the Analytical Domain at TopCoder
Example Core Data
Example Analytic
Processes
Diagnosing & predicting the success of a proposed project.
Prescribing how projects should be broken up into contests.
Predicting contest success and prescribing contest modifications.
Metrics production for contests, projects, clients, developers & matching.
Project, contest & matching post-mortem analyses to identify areas for primary process improvements and to identify hot developer skills.
Project Data
Client Profiles
Contest Data
Developer Profiles
Primary Process Performance
Data
Figure 7-4 Digitalizing the Analytical Domain at Metropia
Example Core Data
Example Analytic
Processes
Traffic flow modeling – overall and for each mobility service.
Scheduling routines – overall and for each mobility service.
Routing routines – overall and for each mobility service.
Determining reward points for commuter trip selections.
Commuter behavior modeling.
Mobility Provider Profiles
Commuter Profiles
Historical Transportation
Data
Merchant Profiles
Commuter Trip, Common Good,
Provider & Merchant Outcomes
Streaming Transportation
Data
Commuter Services
Usage Data
Market Platform Design: Digitalizing the Collaborative Domain
A primary function of network organizations’ market platforms involves the
facilitation of information exchanges – between community members, between the
165
members of different communities, and between network organization staff and
members of different communities. These information exchanges are crucial, as such
exchanges enable participants to learn about offered value propositions and to decide
whether or not to participate further (and, ultimately, take advantage of offered value
propositions).
These information exchanges occur through one-to-one, one-to-many and
many-to-many connections. Importantly, establishing a connection involves much
more than providing the necessary connectivity. As these information exchanges
tend to be directed toward specific purposes (e.g., exploring or negotiating a potential
match, learning more about a value-unit or value-proposition, co-creating an idea or
value-unit, etc.), sophisticated digitalized collaboration environments are established
– environments characterized by specific functionalities, content and behavioral rules.
Given the heterogeneity present across the members of most interacting
communities, a variety of collaboration modes (messaging, social media,
conferencing and collaboration tools) are typically provided to participants. Tables
7-9 and 7-10, respectively, illustrate some of the digitalized collaboration
environments that have proved invaluable for TopCoder and Metropia.
166
Table 7-9 Digitalizing the Collaborative Domain at TopCoder
Collaboration Environment
Examples
Messaging & Conferencing
Peer-to-peer messaging: client/developer, staff/client, staff/developer, staff/staff, and developer/developer
Forums: client/developer, staff/client, and staff/developer.
Ideas Processing Identifying hot technology trends & skills.
Joint-Work Space
Project & contest monitoring. Project design (contests, deliverables). Contest software design (specifications, architecture). Contest software coding/testing. Assessing contest solution completeness &
trustworthiness.
Decision-Making Processes
Setting contest incentives. Modifying contests & contest incentives. Ranking contest solutions (selecting winners).
Table 7-10 Digitalizing the Collaborative Domain at Metropia
Collaboration Environment
Examples
Messaging & Conferencing
Peer-to-peer messaging: commuter/commuter, staff/commuter, staff/government, staff/provider, and staff/merchant.
Forums: staff/commuters and staff/government.
Social Network Commuters.
Joint-Work Space
Real-time resolution of traffic congestion hot spots. Improving algorithm accuracy & reliability. Big Data analytics: staff/staff and staff/government. Market platform functionality development. Promotional campaigns.
Decision-Making Processes
Reengineering of reward schemes. Product launch. New market platform (urban area) launch.
Digital Strategy Formulation
The task facing network organizations’ digital strategists is quite daunting. In
addition to having to confront many of the same strategic challenges as those facing
pipeline organizations’ digital strategists, network organizations’ digital strategists
have to design and build a market ecosystem from scratch and motivate participants
167
to engage in value-unit exchanges through the market platform. The heightened
complexity facing network organizations’ digital strategists is perhaps best
understood through the five strategic challenges summarized in Table 7-11. We
begin this section by discussing these five strategic challenges. Then, we describe
how digital strategists evolve their organizations’ business models.
Table 7-11 Network Organization Strategic Challenges
Strategic Challenges Key Issues
How fast should each community grow?
How can we overcome the chicken-and-egg challenge? Is it possible to exploit side-switching? How can we keep a balance in community sizes?
Which pricing mechanisms should be applied to each
community?
Which communities should be subsidized and which represent viable sources of profit?
How will a particular pricing mechanism affect participant behavior or community growth?
Should price-differentiated functionality levels be used?
Should a new feature be added?
Is the expected benefit greater than the expected cost? Will one or more communities be negatively affected?
Should transactions and participant behaviors be
regulated?
Which types of market failures are most likely to occur? Which community members should be allowed to join? What should members of each community be able to do?
How many communities should connect to the
business platform?
How does the presence of a community influence other communities’ value propositions?
How does the presence of a community affect platform complexity?
What is the economic viability of a community?
How Fast Should each Community Grow?
When a network organization first launches its market platform, the first hurdle
to overcome is the chicken & egg problem: producers only wish to participate in a
market with a large pool of potential consumers, and consumers only wish to
participate in a market with a large pool of potential producers. Table 7-12
summarizes a selection of tactics that can be used to resolve this chicken & egg
168
problem.43 And, in certain situations, growth can be accelerated by promoting side-
switching. With side-switching, existing producers become consumers and/or
existing consumers become producers (e.g., with Airbnb, short-term renters often
decide to become hosts, and hosts often become short-term renters).
Table 7-12
Tactics for Overcoming the Chicken & Egg Problem
Tactic Description
Follow-the-Rabbit Build a producer community by incenting members to create value-units, which in turn will attract a consumer community.
Piggy-Back Connect with members of an existing community - either a producer community to gain access to value-units or a consumer community (if value-units already exist).
Seeding Attract an ancillary community by first growing the producer and/or consumer community to which the ancillary community is attracted.
Marquee Provide incentives to attract highly-visible and influential participants (producers or consumers), whose presence attracts other participants.
Pipeline Begin as a pipeline organization to build a targeted producer or consumer community; then, attract other communities desiring to interact with this first community.
Big-Bang Marketing
Invest heavily in traditional push marketing strategies to attract the communities critical to the in-play business model.
Micromarketing Begin by targeting a niche market whose producer & consumer communities are already interacting.
However, if one side grows too fast, negative network effects are felt: too
many consumers leads to insufficient supply, resulting in unsatisfied consumers; too
many producers leads to insufficient demand, resulting in unsatisfied producers. It
can be difficult, if not impossible, to retain or to regain an unsatisfied participant.
How can the threat of negative same-side network effects be managed? Three
common tactics are (1) invest in growing an undersized community, (2) impose rules
43 G.G. Parker, M.W. Van Alstyne and S.P. Choudhury, Platform Revolution: How
Networked Markets are Transforming the Economy – And How to Make Them Work for You,
2016, New York: W. W. Norton.
169
that constrain the behaviors of members of the oversized community (e.g., limit the
number of allowed transactions), and (3) segment the market so as to increase the
likelihood of successful matches within each segment.
What Pricing Mechanisms Should Be Applied to each Community?
With few exceptions, communities are brought to a network organization’s
market platform for one of two reasons: to serve as a revenue source (a money-
side), and to attract other communities that can serve as revenue sources (a subsidy-
side). Determining an appropriate profit model for each community is critical because
of the powerful growth dynamics of network ecosystems:
Charging (or charging too much) for access will limit or reduce community
size.
Charging (or charging too much) for feature use will inhibit participants’
engagement with the business platform.
Charging (or charging too much) for value-units will reduce demand.
Charging (or charging too much) for production will reduce supply.
Generally, pricing mechanisms are imposed on the members of a community when
these members are able to use the market platform to extract value from the
members of another community. The greater the value being appropriated, the
greater the price that can be imposed.
Often, pricing mechanisms can also be imposed on subsidy-side communities,
providing a revenue stream from the subsidy-side. This can occur if the value
proposition is highly-attractive and unique (i.e., not available elsewhere), and if these
subsidy-side community members are likely to accept some level of access/usage
charges. That said, it is wise to never charge any participant for services he/she has
become accustomed to receiving for free. Instead, add new features to the value
170
proposition, attach the charges to these new features, and continue to make the
base-level (initial) features available for free to community members.
Should a New Feature Be Added?
An infinite variety (limited only by creativity and capability) of new, ideally
innovative, features can be added to a market platform to enhance the value
propositions offered to the platform’s interacting communities. Generally, these
deliberations about new features are quite straightforward: add any new feature
whose acquisition and implementation costs are less than the value being created.
However, if the new feature being considered is not viewed as a benefit by all
communities or, even worse, if the new feature portends to bring some participants
in conflict with other participants, this decision can become quite challenging. In
such situations, the trade-offs to be reasoned across communities can be extremely
difficult to navigate, especially prior to the new feature’s actual implementation. For
this reason, network organizations often engage in strategic experimentation to
assess the likely impacts of new platform features. With a strategic experiment, a
new feature is implemented – but only for a limited set of participants and a limited
set of transactions – and relevant data is captured that can be analyzed in
determining the positive and negative impacts of the feature. Further, digital
strategists need to recognize that short-term revenue gains (from one community)
may need to be bypassed so as not to alienate participants (from another community)
and that it is not always best to favor the community that brings in the largest share
of current revenues, as this community may not be the most important source of
future revenues.
171
Should Transactions and Participant Behaviors Be Regulated?
Some regulation is indispensable as a means for preventing market failures,
i.e., an improperly-functioning (or collapsing) network ecosystem:
Insufficient information and transparency in the market with respect to the
value-units and payments being exchanged can result in low-quality participants driving out high-quality participants.
Excessive competition within an interacting community or an unwillingness by a community’s members to maintain their capabilities reduces the value being created in the market and, hence, the market’s attractiveness to other
interacting communities.
Accordingly, network organizations develop regulations targeted at participants’ use
of a market platform’s content and functionalities.
These regulations are most often imposed to force a trade-off of quality over
quantity. The strength of any cross-side network effect is ultimately a function of
the number and the quality of the market exchanges taking place. If, over time, a
growing proportion of market exchanges are seen by participants as decreasing or of
low quality, the positive cross-side effect will attenuate – eventually becoming a
negative cross-side effect that results in the market’s collapse.
How Many Communities Should Connect to the Market Platform?
The advantages of attracting a new community to a network ecosystem’s
market platform are often very appealing to digital strategists. The addition of a new
community raises the promise of additional positive cross-side network effects, the
promise of a new revenue source, and the promise of greater scale.
However, adding a new community does not always result in positive
outcomes. If not mindfully thought out and carefully timed, a new community can
produce: negative cross-side network effects (when the new community’s value
172
proposition conflicts with aspects of the value propositions of one or more existing
communities), increased operational and strategic complexity, and increased
operational costs. Further, a tendency exists for innovativeness to be dampened as
additional communities are added. Here, the radicalness of a functional innovation
targeted at one community is toned down to maintain the acceptability of the
functionality to other communities, appropriating little value from this functionality
enhancement.
Evolving Network Organizations’ Business Models
The strategic challenges summarized in Table 7-11 serve as a backdrop that
pervades digital strategists’ deliberations as they evolve their organizations’ business
models via competitive moves targeting market design, market platform design, or
both. Figure 7-5 overviews the factors typically considered in fashioning specific
competitive moves.
Figure 7-5 Factors Driving Business Model Evolution
Business Model Evolution
Business Model Deliberations Number of communities Value propositions Profit models Core capabilities Dynamic capabilities
Strategic Intent
Beliefs about: Communities’ needs &
desires The core transaction &
adjacent transactions Same-side & cross-side
network effects Core capabilities Dominant value
discipline(s)
Installed platforms Held digitization capabilities New digital technologies Others’ digitalization innovations
Natures of adjacent (competitive & substitute) markets
Adjacent market business model innovations
Socioeconomic & cultural trends
173
A taken competitive move typically affects multiple elements of a business
model. Table 7-13 organizes a sample of TopCoder’s competitive moves by the
primary business model element affected. Examples of this include:
Having platform-related R&D carried out by the developer community via
contests both incents developers to participate in the market and develops their capabilities. In addition, the R&D project outcomes produce
functionality improvements that can enhance the client communities’ value proposition, as well as TopCoder’s capabilities and the community profit models.
Providing incentives for non-winning developers clearly enhances the developer community value proposition, thus finding more developers willing
to invest their time and effort in contests (and in the process honing their capabilities by participating in a greater variety of contests). The client community value proposition is also enhanced, as retaining and honing the
capabilities of the developer community increases the likelihoods that matches will be found for clients’ projects and that these projects will be
satisfactorily fulfilled. Finally, by growing the developer and client communities and by improving project fulfillment rates, TopCoder’s
community profit models are likely to improve.
The above examples illustrate that a taken action targeted at one purpose often spills
over to affect other purposes. It is important to remember that such spillovers are
not always positive. Clearly, fashioning successful competitive moves for network
organizations requires considerable analysis – that often must be performed quickly
and imprecisely given the fast-moving dynamics of network ecosystems.
174
Table 7-13 Examples of TopCoder’s Competitive Moves
Business Model Element
Business Model Evolution
Communities None observed.
Value Propositions
Platform R&D carried out as contests. Transferring software development management tasks (contest-
co-pilot, solution assessment, solution appeals process, etc.) to the crowd.
Incentives to ensure winners of a project’s completed contests are available to interact with participants in the project’s subsequent contests.
Crowd-engaged appeals process regarding winning solutions. Imposing a 30-day time period for vetting winning solutions.
Profit Models Incentives provided for non-winning developers.
Core Capabilities
Contest success prediction. Contest fulfillment. Client capability development. Crowd skill development. Develop crowd into a community.
Dynamic Capabilities None observed.
Table 7-14 similarly lists some of Metropia’s competitive moves directed at
specific business model elements. Which of these are likely to spillover to other
business model elements?
Table 7-14
Examples of Metropia’s Competitive Moves
Business Model Element
Business Model Evolution
Communities Host private mobility service markets (e.g., car-pooling, ride-sharing,
etc.) for use by a specific organization’s employees.
Value Propositions
No platform subscription fees for commuters at initial launch. Develop a personalized mobility health checkup functionality that
uses data on a commuter’s commuting behavior to broaden the commuter’s mobility perspectives and to offer the commuter customized trip solutions.
Customized consulting services for government agencies. Customized performance reports provided to participating
commuters, providers, merchants & government agencies.
Profit Models Commuter subscription fees added as a local platform matures, the
platform’s portfolio of mobility services broadens, and commuter platform interactions are personalized.
Core Capabilities Big Data transportation analytics consulting services. Commuter & government agency capability development.
Dynamic Capabilities
None observed.
175
Sustaining a Network Organization’s Competitive Position
Two pathways exist for sustaining a network organization’s market position,
with the preferred path depending on whether or not winner-take-all market
dynamics apply:
Winner-take-all market dynamics - apply: act quickly to become one of the
two or three dominant firms in the market space and then sustain this market position.
Winner-take-all market dynamics - do not apply: grow both the market
space and the firm’s share of the market space more deliberately by evolving a business model that becomes increasingly attractive to all
interacting communities, and then sustains (or increases) this market position.
Our focus here is on sustaining a strong market position in the face of the constant
threat of digital disruption, regardless of the above market-position pathways.
Perhaps this most important insight for digital strategists is the realization that
a focus on just amplifying positive cross-side network effects cannot guarantee the
barriers to entry that protect a firm from existing competitors and from new entrants.
Attention must also be directed at finding ways to:
Impose switching costs on participants.
Drive down market platform costs (the average costs to host communities, to facilitate participant interactions, and to execute transactions), thus
making it cost-prohibitive for new entrants to enter the market space.
Continuously improve market platform ease-of-use.
Introduce business model innovations, especially those related to community
value propositions and profit models.
Quickly imitate (ideally with enhancements) competitors’ and new entrants’
business model innovations.
176
Network ecosystems are powerful and hard-to-replicate because of their inherent
community dynamics. However, achieving and then sustaining a strong market
position is difficult, requiring high levels of both strategic vigilance and creativity.
A Recap and Look Ahead
While network organizations represent a smaller share of nations’ GNPs than
do their pipeline organization counterparts, this rapidly growing segment of most
nations’ economies is spurring much of the digital innovation (and digital disruption)
being observed today. This chapter has described how digitalization is applied within
network organizations, as well as the processes used by network organizations to
formulate their digital strategies.
While well-reasoned digital strategies have become a dominant driver of
competitive success for both pipeline organizations and network organizations, the
pervasive digitalization that results can raise serious threats for organizations’
leadership teams. The next chapter examines these threats, and the tactics being
applied to attenuate the threats.
177
Chapter 8. Grappling with the Risks of Digitalization
The enabling nature of digital disruption might best be captured by three ideas:
pervasive digitization, pervasive connectivity and pervasive mobility. Invariably,
pipeline ecosystem participants and network ecosystem participants find themselves
constantly accessing and exchanging digitized content (e.g., data, information,
goods, services and currencies) and it is precisely these type of activities that are
creating an abundance of competitive opportunities for digital strategists able to act
smartly and nimbly.
However, the technological underpinnings of organizations’ digital strategies
also pose significant strategic risks. If digitalization risks are not appropriately
addressed by organizations’ leadership teams, the competitive wins that are realized
are likely to be short-lived, at best. Consider what happened in January 2003 when
a small (376 bytes) data virus infected a single processing device with the Slammer
worm.44 After launching itself onto the Internet, it infected close to 100,000 large
computer systems worldwide in just 30 minutes. The impact was chilling: air and rail
transport were delayed, electrical and pipeline utilities were interrupted, ATMs were
disabled, call centers were shut down, etc. In today’s highly digitized, connected and
mobile world, a single person’s lapse can quickly spread across the platforms to which
the person is directly or indirectly connected.
Nothing demonstrates the challenges presented to digital strategists better
than the paradox surrounding the capture and use of personal data. Data privacy
44 T. Goles, G. White and G. Dietriech, “Dark Screen: An Exercise in Cyber Security,”
MIS Quarterly Executive, June 2005, pp. 303-318.
178
concerns exist wherever personally-identifiable or other sensitive information is
captured, collected, stored and used. That said, tomorrow’s waves of digitalization
innovation and growth will surely involve intelligent analytics, highly-customized
goods and services, and always-available mobile connectivity offering one-touch
transactions, where these transactions require the collection and use of vast
quantities of personal data: socio-demographic data, location data, transaction
histories, etc. People can be motivated – through the expectation that the value of
the goods and services obtained will outweigh potential liabilities – to allow the
capture and collection of these data, but only if trust is established and maintained
that any collected personal data will be protected and will not be used in the absence
of permission to do so.
A key factor differentiating those organizations able to successfully exploit
digitalization for competitive purposes is a set of strong capabilities for managing
digitalization risk. Supporting evidence for the value of managing digitalization risk
is illustrated by a study that found voluntary disclosures of initiatives aimed at
reducing digitalization risks improved organizations’ stock prices by, on average,
6%.45 Effective digitalization risk management, however, involves much more than
enhancing an organization’s cybersecurity. The real challenge is to achieve an
effective balance in stability (as evidenced by efficient, secure, reliable and available
platforms) and agility (as evidenced by a readiness to formulate and implement
timely and innovative competitive moves).
45 L. Gordon, M. Loeb and T. Sohail, “Market Value of Voluntary Disclosures Concerning
Information Security,” MIS Quarterly, September 2010, pp. 567-594.
179
Managing digitalization risks in a manner that balances stability and agility is
a participation sport that demands the involvement of all of an organization’s
members. With the aim of providing a mindset and a foundation conducive for
effectively managing digitalization risk, this chapter covers the following topics:
Nature of Digitalization Risks
Risk Management: A General Overview
Digitalization Risk Management Practices
The Board of Directors and Digitalization Risk Management
Accounting for Digitalization Risks in Digital Strategy Formulation
Nature of Digitalization Risks
A digitalization risk refers to the likely occurrence of digitalization-related
incidents that have the potential to negatively impact an organization’s operational
performance and/or competitive position. What are these negative impacts? A useful
way of thinking about these negative effects is the following loss categories:
Financial loss: theft; fraud; extortion; destruction of uninsured facilities,
equipment and materials; drops in stock valuations; regulatory fines; legal fees, court awards and out-of-court settlements; etc.
Revenue loss: short-falls in revenue streams or lost revenue streams traced to operational disruptions, reputation loss, the inability to respond effectively to competitors’ actions, etc.
Intellectual property loss: thefts of digitized ideas, innovations and other forms of creative expression (e.g., trade secrets, blueprints, digitalized
processes, proprietary digital content, digital strategies, business models, etc.).
Reputation loss: depreciation of an organization’s image or of its brands
that undermines the trust and goodwill held by participants in the various market-focused ecosystems with which the organization participates.
180
These negative impacts can be huge. Consider, for example, the losses suffered by
the TJX Companies after a security breach46 (reported in late 2006) that enabled
hackers to obtain data from over 45 million customer payment cards.47 Access into
the TJX Companies’ s business platform was gained by digitally eavesdropping on the
POS transactions associated with the in-store customer return process. It has been
estimated that the direct costs (the largest portion of which involved contacting and
offering assistance to affected customers) to the TJX Companies for the breach might
have been as high as $1.6 billion.48 Other of these direct costs involved obtaining
legal advice, internal investigations, public relations and regulatory fines. However,
these direct costs do not include the very sizeable revenue and stock valuation losses
that occurred during 2007.
Figure 8-1 provides a visual framework simplifying the complexities of the
digitalization risk context. Here, three entities are brought together: a set of threats,
a set of targets, and the actors most significantly associated with the occurrence of
digitalization-risk incidents. Table 8-1 lists the loss categories typically associated
with each of the types of threats and targets.
46 A security breach refers to an incident that results in the confirmed disclosure of
data to an unauthorized third-party. 47 W. Xu, G. Grant, H. Nguyen and X. Dai, “Security Breach: The Case of TJX
Companies, Inc.,” Communications of the Association of Information Systems, Vol. 23,
November 2008, pp. 575-590. 48 C.R. Speechlys, “The Real Cost of a Data Breach,” Lexology, November 12, 2012:
http://www.lexology.com/library/detail.aspx?g=2aaa771a-2523-4e60-a0bc-306db8323d0e
181
Figure 8-1 Framing the Digitalization Risk Context
Threats
Digitalization Risks
Business Platform Operations
Digital Assets
Internal Controls
Targets
Legal & Regulatory
Natural Disaster
Actions of a Competitor
Platform Architectures
New Digital Technology
Outsiders Cybercriminals
Terrorists Hacktavists
Ecosystem Participants
Insiders Employees
Senior Executives
A c to
rs
Inability to Respond
Malicious Intrusion
External Sourcing
Digitalization Capabilities
Table 8-1 Losses Typically Associated with Digitalization-Risk Threats and Targets
Loss Categories
Threats
Malicious Intrusion Financial, Revenue, Intellectual Property, Reputation
Natural Disasters Financial, Revenue, Intellectual Property, Reputation
Legal & Regulatory Financial, Revenue, Reputation
New Digital Technology Revenue, Reputation
Actions of a Competitor Revenue, Reputation
External Sourcing Financial, Revenue, Intellectual Property, Reputation
Inability to Respond Revenue, Intellectual Property, Reputation
Targets
Business Platform Operations Revenue, Reputation
Digital Assets Financial, Revenue, Intellectual Property, Reputation
Internal Controls Financial, Reputation
Platform Architectures Financial, Revenue, Reputation
Digitalization Capabilities Financial, Revenue, Reputation
Let’s take a look at the actors (described in Table 8-2). Actors are associated
with threat incidents in two ways. Most often, actors are thought of as the
perpetrators of malicious intrusions – or, acts of commission. Cybercriminals (by
182
far the most common type of perpetrator), terrorists and hactavists clearly
instigate digitalization-risk incidents, as can ecosystem participants and
organizations’ employees (either acting alone or collaborating with others).
Table 8-2
Actors Associated with Digitalization-Risk Incidents
Actor Description
Outsider
Cybercriminal Uses hacking techniques & tools in order to take illegal actions for financial gain or to take over digital assets in order to launch a series of illegal actions.
Terrorist Uses hacking techniques & tools for the purpose of causing harm & havoc within an established geo-political order.
Hactavist Uses hacking techniques & tools for the purpose of bringing attention to a social or political issue.
Ecosystem Participant
Pipeline ecosystem participants (suppliers, upstream intermediaries, downstream intermediaries, consumers) and network ecosystem participants (members of interacting communities), who connect to organizations’ business/market platforms to facilitate ecosystem transactions.
Insider
Employee Operational, staff & managerial employees, who connect to the organization’s business platform to carry out their work roles.
Senior Executive
Members of the leadership team, whom are collectively responsible for: seeding & overseeing digital strategy formulation & implementation, setting policies for digitalization, and allocating the resources necessary for effective digitalization.
Just as serious, though typically overlooked, are the acts of omission traced
back to organizations’ employees and senior executives. It is not uncommon for
employees to claim ignorance of their organizations’ digitalization-risk
policies/procedures or to be lax in following these policies/procedures. Because of
employees’ acts of omission, organizations experience greater likelihoods of
experiencing losses regarding three, in particular, digitization-risk incidents:
malicious intrusion, natural disasters and legal/regulatory violations. Even more
problematic, it is not uncommon for organizations’ most senior executives to abdicate
some, if not most, of their managerial and fiduciary responsibilities regarding seeding
and overseeing digital strategy formulation and implementation, setting policies for
183
digitalization, and for allocating the resources necessary for effective digitalization.49
Because of senior executives’ acts of omission, organizations have a greater
likelihood of experiencing incidents regarding all nine digitization-risk threats.
Figure 8-2 illustrates the relationships between threats and targets. Acts of
commission, i.e., malicious intrusion, are most often directed at two threat targets:
business platform operations and digital assets. Business platform operations
refers to the execution of an organization’s digitalized operational and managerial
processes that are hosted on business platforms (and on market platforms); and,
digital assets refer to the digital technologies (hardware and software), digitized
data, and digitization/digitalization capabilities applied in configuring digital platforms
and business platforms. The most common incidents directed at business platform
operations are denial-of-service attacks, where the aim is to disrupt business
continuity either by flooding a platform with transactions, dramatically increasing
transaction volumes (slowing response times) or by inserting a virus that damages
the processing being performed on a platform (hence, shutting down the platform or
producing processing faults that result in the platform being shut down for repair).
The most common incidents directed at digital assets involve theft of digital content,
with content then being used for criminal or business-espionage purposes.
49 A. Masli, V. Richardson, M.W. Watson and R.W. Zmud, “Senior Executives IT
Management Responsibilities: Serious IT-Related Deficiencies and CEO/CFO Turnover,
Management Information Systems Quarterly, September 2016, pp. 687-708.
184
Figure 8-2 Associations Between Threats and Targets
Legal & Regulatory
Natural Disaster
Actions of Competitors
New Digital Technology
Inability to Respond
Malicious Intrusion
Business Platform Operations
Digital Assets
Internal Controls
Platform Architectures
External Sourcing
Digitalization Capabilities
Acts of omission play out across all five threat targets as needed digitalization-
related investments and policies are either not pursued or pursued ineffectively and
as sanctioned digitalization-related investments and policies are poorly implemented
and/or followed. The consequences of not attending to business platform operations
and to digital assets were addressed in the preceding paragraph. An organization’s
internal controls refer to the processing logic and rules embedded within digitalized
financial reporting systems to ensure the correct handling of financial transactions
and the accuracy of produced financial reports. If an organization’s internal controls
are in error or incomplete, the organization’s financial systems are susceptible to
malicious intrusions and the organization – along with its CEO and CFO – are subject
to penalties under the Sarbanes-Oxley Act. If organizations’ platform architectures
are not designed and maintained so as to remain aligned with these organizations’
digital strategies, it is unlikely that appropriate stability/agility balances can be
185
achieved. Finally, organizations lacking the digitalization capabilities to quickly
respond to competitors’ actions or to introduce innovative business models are
unlikely to maintain, let alone enhance, their competitive positions.
Prior to moving on to discussions of risk management and risk management
tactics, let’s briefly examine each of the digitalization-risk threats.
Malicious Intrusions
A malicious intrusion refers to a perpetrator’s success in getting through an
organization’s security-related defenses, i.e., the systems software and digitalized
work procedures aimed at identifying and authenticating all physical and digitized
attempts to access an organization’s digitalized business platforms and digital assets.
Successful intrusion usually begins via either phishing or through a POS device, but
then moves on to a wide gamut of abuses: theft, fraud, sabotage, denial-of-service
attacks, viruses, worms, website defacement, electronic eavesdropping, etc. As
these perpetrators and the hacking tools and techniques they use get better and
better, the time it takes to compromise a victim just gets shorter and shorter.
Today’s public and private digital infrastructures are becoming so large and so
complex that they are beyond the control of any one organization. As a result, no
matter how prudently an organization moves forward with security policies,
procedures and programs, the organization remains exposed to the threat of
malicious intrusion. The objective should not be to prevent all malicious intrusions,
but rather to prevent less-sophisticated intrusion attempts and to minimize the
damage caused by more-sophisticated intrusion attempts through quick detection,
removal and repair.
186
Natural Disasters
Natural disasters (e.g., tornadoes, hurricanes, earthquakes, tsunamis,
nuclear emergencies, collapsed dams, broken gas or water pipes, etc.), are worst-
case scenarios for any organization. If affected directly by a natural disaster,
business operations might be nonfunctional for days, weeks or months – resulting in
significant, if not catastrophic, revenue losses. Even if affected only indirectly by a
natural disaster, most organizations are likely to suffer some disruption to their
inbound/outbound logistics flows. While it is impossible to predict the occurrence of
such events, all organizations need to be prepared to act to minimize the effects of
and quickly recover from any operational disruptions. The implications of critical
business platforms becoming unavailable can be devastating, especially as ever-
greater portions of organizations’ business processes – the lifeblood of most
organizations’ revenue streams – are digitalized.
As natural disasters are unpreventable, the digitalization risk emphasis is on
achieving a graceful degradation in platform operational performance and a quick
recovery. Graceful degradation means that operations affected by a natural
disaster do not immediately shut down, but instead gradually slow down, allowing
time for affected operations to be shifted to other physical locations prior to a
complete shutdown. Both graceful degradation and quick recovery are typically
achieved by designing multiple redundancies into operational sites and activities. For
example, the physical sites housing digitalization operations are outfitted with backup
power systems, have all platform content (data and software) backed up on a regular
basis (say, every two hours) at a distant recovery site, and might even have all
processing activity instantly mimicked at the distant recovery site.
187
Legal and Regulatory Requirements
Organizations today face a broad array of digitalization-related legal and
regulatory requirements requiring protective actions most often aimed at
preventing harm to others. Included among these regulations, that originate from
federal, state and local governmental agencies, are those aimed at:
Protecting personal data (about customers, employees, visitors, etc.) that is collected, held, processed and provided to others.
Ensuring the security and accuracy of financial transactions and reports.
Requiring data collection and information reporting by organizations whose
products, services and work activities are environmentally-sensitive.
Requiring data collection and information reporting by organizations whose products, services and work activities are potentially harmful to consumers
or employees.
Organizations (and, possibly, specific employees) found noncompliant with statutory
requirements can suffer legal and civil penalties, as well as significant reputation
losses.
What makes the digitalization-related environments especially confusing and
complex is that the nature of regulations (statutory versus voluntary, breadth and
depth of coverage, sanctions for noncompliance, etc.) varies considerably across geo-
political boundaries (e.g., cities, states, nations, the EU, etc.). Table 8-3 describes a
few of the more well-known digitalization-related regulations facing U.S.
organizations.
188
Table 8-3 Examples of U.S. Digitalization-Related Regulations
Regulation Description
Family Educational Rights & Privacy Act of 1974
Educational agencies & institutions receiving funding from the U. S. Department of Education are required to provide students with access to their education records, an opportunity to seek to have the records amended, and some control over the disclosure of information from the records.
Health Insurance Portability & Accountability Act of 1996
Health care providers, insurance providers and employers are required to safeguard the security & privacy of patients’ health records and personal data.
Gramm-Leach-Bliley Act of 1999
Financial institutions are required to protect the security & privacy of the financial information that they collect, hold and process.
Sarbanes-Oxley Act of 2002 Publicly traded companies are required to provide assurance of the security, accuracy & reliability of their financial reporting systems.
State Security Breach Notification Law (First enacted
by California in 2002)
50 States have enacted Security Breach Notification laws requiring businesses to make notifications regarding security breaches. While no similar Federal law exists, bills have been introduced.
Payment Card Industry Data Security Standard
(Initially released in 2004)
Created by the Payment Card Industry Security Standards Council, this standard applies to all institutions that hold, process or exchange cardholder information. The standard strives to prevent credit card fraud through increased controls around data and its exposure to compromise.
New Digital Technologies
The continued advancements with digital technologies result in seeming
endless arrivals of innovative digital products and services, as well as innovative
digitalized solutions from both established and new vendors. While all new
technologies are largely untested when first released, those organizations able and
willing to subject a seemingly-relevant new technology to early assessment and
experimentation stand to gain the most from adopting that technology. Likewise,
those organizations that delay their assessing of what turns out to be a game-
changing technology are likely to have dug themselves into a deep competitive hole.
Actions of Competitors
The business model enhancements and innovations of established
organizations and startups pose a constant threat to any organization. While this has
189
always been the case, what is new today is the rapidity with which competitively-
meaningful actions appear and the fact that the organizations taking action
increasingly lie beyond the boundaries of the primary market ecosystems within
which an organization participates.
What is perhaps most insidious are the rapid inroads that a new competitor
can achieve regarding market share. This can be especially damaging when an
innovative business model creates a protectable, highly-profitable niche within an
existing market, subsequently drawing away participants from established
competitors and attracting a majority of new market participants.
External Sourcing
Most typically, an externalized capability takes the form of a digitalized process
developed by a provider (or another third-party) hosted on the provider’s business
platform and accessed by the client via public or private Internet connections. When
managed well, external sourcing provides an organization with significant cost,
operational and strategic benefits. But, along with these benefits comes a heightened
exposure to digitalization risk. Table 8-4 lists the digitalization risks, organized by
target, most commonly attributed to external sourcing.
190
Table 8-4 Digitalization Risks Associated with External Sourcing
Target Digitalization Risks
Business Platform
Operations
Operational gains (efficiency, security, scalability, etc.) not realized.
Provider platforms insufficiently enhanced, over time.
Digital Assets Provider platforms lack sufficient security. Data captured by or created by externally-hosted processes are
typically owned by the provider (unless otherwise negotiated).
Internal Controls
Processes executed on provider platform lack sufficient transaction & reporting integrity.
Platform Architectures
Provider platform architectures insufficiently enhanced, over time.
Provider platform architectures lose, over time, an acceptable stability/agility balance.
Digitalization Capabilities
Loss of internal-to-the-client digitalization capabilities. Provider fails to enhance digitalization capabilities. Provider fails to transfer new digitalization capabilities.
Inability to Respond
The most debilitating digitization risk – though the risk that perhaps receives
the least attention – is the inability to respond to competitors’ actions. Given the
power of network effects (affecting consumer communities in pipeline ecosystems
and all communities in network ecosystems), organizations must act effectively and
quickly to meet or, ideally, to advance competitors’ competitive actions. An
organization failing to act or acting in an ineffective or untimely manner is sure to
suffer some erosion in market position – an erosion that will only spiral in the face of
a continuing stream of competitors’ actions.
What is the root cause of an inability to respond to a competitor’s action? A
number of factors come to mind:
A delay in becoming aware of the competitor’s action.
An incomplete understanding of the competitor’s business model.
An incomplete understanding of how the competitor executed the
191
competitive action.
Inconsistencies between in-place platform architectures and the
architectures needed to implement an effective response.
Deficiencies in one or more of the platforms needed to implement an
effective response.
Deficiencies in one or more of the digital assets needed to implement an effective response.
Deficiencies in one or more of the capabilities needed to implement an effective response.
Delays encountered in resolving deficiencies in platforms, digital assets and capabilities.
And, as might be expected, failure to respond in an effective and timely manner
increases when more than one of these factors apply to the situation-at-hand.
Risk Management: A General Overview
Risk management is a topic that applies across all aspects of organizational
life, including digitalization. The aim of this section is to provide a general
introduction to the topic area.
It is important to recognize, first of all, that the intent of risk management is
not to eliminate risks, but to manage risks. Risk is an inherent aspect of
organizational life. While we can perfectly predict how an engineered system will
perform, it is impossible to perfectly predict how humans (e.g., operational
employees, managers, executives, consumers, suppliers’ employees, intermediaries’
employees, consultants, etc.) will perform. And, even if you could predict human
behavior by limiting the available choices, would you want to? Investments
promising high returns are generally riskier than investments promising low returns
precisely because we cannot predict the outcomes of high-return investments very
192
well. By limiting the choices available to humans, you also limit the potential for
individuals to act creatively and innovatively.
Risk management strives to accomplish two objectives: creating awareness
and a common understanding across an organization’s members about the existence
and nature of a risk domain; and, putting in place risk management policies,
procedures and programs to ensure that the critical risks in the domain are
appropriately addressed by appropriate individuals. In accomplishing these
objectives, risk management involves three activities: risk planning, risk assessment
and ongoing risk control.
Risk Planning
Risk planning establishes the contexts within which risk management
activities are carried out. Risk planning begins by identifying and categorizing the
areas of risk most likely to affect an organization. Next, each risk area is assigned
an owner. It is the risk owner’s responsibility to perform regular risk assessments,
and to actively manage associated risks. Then, overall risk management policies
need to be developed that provide a context within which risk owners can implement
area-specific risk management policies, procedures and programs. Finally, high-level
objectives are devised to articulate the importance of risk management. Examples
of such high-level objectives might include:50 “Protecting the integrity and security
of client and corporate information is the responsibility of every employee.”; and,
50 Adapted from: H.A. Smith and J. McKeen, “Developments in Practice XXXIII: A
Holistic Approach to Managing IT-based Risk,” Communications of the AIS, December 2009,
p. 525.
193
“We need to embed an attention to digitalization risk management into all work
processes, business functions, work roles and positions, and employees.”
Risk Assessment
During risk assessment, each risk owner, usually with the support of in-
house experts and external consultants, estimates the risk exposure associated
with each of the risk areas for which the owner is responsible. Usually, some variant
of the following formula is used:
Risk Exposure = (Probability of Risk Occurring) X (Expected Loss If Risk Occurs)
Organizations specializing in overall or domain-specific risk management have
considerable knowledge, experience and data that can be tapped to produce
estimates of risk probabilities and expected losses. Just remember that these generic
estimates are only starting points that need to be tailored to the nuances of a given
organization and that expected losses should include both tangible and intangible
losses, as well as short-term and long-term losses. The risk of underestimating
expected losses is that an organization is then likely to under-invest in risk-related
policies, procedures and programs.
Once a risk area has been assessed, the owner must decide (again, with input
from others) how risks are to be addressed. Three actions are possible, alone or in
combination:
Risk assumption: Accepting that losses are likely to arise if and when an incident occurs in a risk area, covering these losses through internal funds
and third-party insurance.
Risk deterrence: Taking action to reduce the likelihood that an incident will occur in a risk area.
Ongoing risk control: Monitoring a risk area such that the incident
194
occurrences are detected and resolved before excessive losses occur.
The risk assessment matrix shown as Figure 8-3 provides general guidance on
selecting an appropriate strategy for a risk area. Risk areas with low incident
probabilities and low expected losses can reasonably be assumed without taking
further action, while risk areas with high incident probabilities and high expected
losses require sophisticated strategies involving combinations of risk assumption, risk
deterrence and ongoing risk control.
Figure 8-3
Risk Assessment Matrix
Monitor continuously to immediately mitigate detected risk incidents
Take preemptive action to reduce the incident likelihood
Monitor continuously to immediately mitigate detected risk incidents
Take preemptive action to reduce the incident likelihood
Monitor continuously to immediately mitigate detected risk incidents
Monitor regularly to mitigate detected risk incidents
Monitor continuously to immediately mitigate detected risk incidents
Take preemptive action to reduce the incident likelihood
Monitor continuously to immediately mitigate detected risk events
Simply assume the risk Monitor regularly to mitigate detected risk incidents
Monitor continuously to immediately mitigate detected risk events
Expected Loss If a Risk Event Occurs
High
High
Medium
Medium
Low
Low
Ongoing Risk Control
Ongoing risk control involves monitoring for risk incidents, detecting that an
incident is about to occur (ideally) or has occurred (more likely), and taking action to
mitigate any losses arising from the incident. Risk mitigation involves tempering
(as much as possible) the consequences of a risk incident by taking corrective actions.
Prior to implementing ongoing control procedures, the risk owner needs to determine
195
the level of cost and effort to put into the procedures. Figure 8-4 illustrates the
complexity of this decision. The rational risk owner desires to neither under-invest
or over-invest in ongoing risk control. Here, again, heavy use is made of others’
knowledge and experience.
Figure 8-4
Determining the Cost of Ongoing Risk Control
Cost
Risk
Expected loss in the Absence of Risk
Deterrence/Mitigation
Cost of Risk Deterrence/Mitigation
Sweet Spot
An Exercise in Digitalization Risk Assessment51
An important element of the Coors Brewing Company’s marketing strategy
involves having retailers place eye-catching point-of-sales (POS) displays in their
stores. In implementing this strategy, Coors works with third-party marketing
partners and third-party providers to produce these display materials. However,
Coors owns the business processes that engage distributors and retailers in ordering
these POS display items. To motivate POS display orders, Coors provides each
51 This hypothetical exercise (used for illustrative purposes only) was developed by the
authors based on material from: J. Buffington and D.J. McCubbery, “Coors Brewing Company
Point of Sales Application Suite: Winning Mindshare with Customers, Retailers, and
Distributors,” Communications of the AIS, Volume 13, 2004, pp. 81-96.
196
wholesaler and retailer with a budget that can only be used to order POS display
items. Coors anticipates that at least some of the wholesalers and retailers will find
the display materials valuable in their efforts to increase sales and, in turn, that they
will order (display materials) beyond the Coors-provided funding.
Coors’ solution for digitalizing the business processes enabling distributors and
retailers to order promotional materials involved the building of a local (loosely
connected to other business platforms) business platform hosting five sets of
functionalities:
Internet Interaction Portal: Enables distributors and retailers to
communicate with Coors and to gain access to the digitized business processes.
Ordering General Materials: Enables distributors and retailers to order general promotional materials.
Ordering Licensed Materials: Enables distributors and retailers to order licensed (i.e., NFL logos) promotional materials.
Ordering Customized Materials: Enables distributors and retailers to design
and order customized promotional materials.
Retail Store Display Placement: Enables distributors and retailers to visualize
and optimize, through the use of digitalized tools, the physical placement of promotional materials within a retail store.
These functionalities were collectively aimed at achieving three main objectives:
increasing sales of Coors products, having distributor and retailer staffs performing
much of the work autonomously, and building stronger relationships with the
distributors and retailers.
Now, consider a risk assessment that might have been performed by the risk
owner for this digitalized business platform. Table 8-5 summarizes this risk
assessment. Given this assessment, it would be reasonable to expect that a
digitalization risk management strategy put forward by the risk owner would involve:
197
Deterring and mitigating malicious intrusions, through the local business platform, into Coors’ global digital platforms and business platforms.
Ensuring that any future decision process to externalize any of the digital platforms enabling the local business platform carefully examine the
providers’ capabilities to secure their platforms against malicious intrusions.
Establishing a vigilance regarding the potential for competitors to introduce retail shelf space innovations that could prove effective in taking market
share away from Coors’ products.
Establishing a vigilance regarding the development of analytics technologies
and solutions aimed at the retail shelf space context.
Table 8-5 Risk Assessment for Coors’ POS Display Business Platform
Threat Situational Assessment Incident
Probability Expected
Losses
Malicious Intrusion
• Coors is a prominent firm selling a product (alcohol) that could be considered controversial.
• Internet exposure & distributor/retailer connectivity.
• Low loss exposure with the local business platform. • High loss exposure with global platforms.
High Low (local)
High (global)
Natural Disasters
• Favorable geographic location (Colorado front range).
Very Low Moderate
Legal & Regulatory
• Limited access to financial systems. • Limited privacy concerns.
Low Low
New Digital Technology
• Analytics technologies. • Collaboration technologies.
Moderate High
Actions of a Competitor
• Retail floor & shelf spaces are highly competitive commodities.
High High
External Sourcing
• Business platform unlikely to be externalized. • Digital platform likely to be externalized.
Moderate Moderate
Inability to Respond
• Analytic capabilities focused on optimizing the use of retail store shelf space.
Moderate High
Digitalization Risk Management Practices
Digitalization risk management practices (i.e., policies, procedures and
programs) cover a very broad range of complex and ever-moving topics – topics for
which it is impossible to do justice in a few pages of text. To provide a glimpse of
what organizations are doing, this section describes a few of the current practices
regarding one threat area: that of malicious intrusions. This threat area was selected
for two reasons. First, since significant cyber-security breaches are reported on by
198
news media on a regular basis today, most people are well aware of the topic.
Second, cyber-security breaches can result in huge financial losses, the size of which
is increasing annually. Data from 2010, for example, indicated that the average cost
of a security breach exceeded US $7 million.52
As a selection of the more common risk management practices for combating
malicious intrusions are described, note that a mix of technical and social mechanisms
are required. All too often, it seems, much more attention is given to the technical
practices, with the just-as-critical social practices being overlooked and/or
underfunded.
Securing Digital and Business Platforms Against Malicious Intrusions
It is impossible for any organization to fully protect itself against malicious
intrusions. That said, all organizations need to understand the intrusion risk
exposures of their digital and business platforms and take commiserate steps to both
harden these platforms and detect (and mitigate) any intrusions that occur.
Hardening a platform involves installation of hardware, software and
physical impediments that increase the effort required by a perpetrator, such that all
but the most determined perpetrators either bypass the platform (moving on to
easier targets) or are so hindered that they quickly give up. Detection involves
putting in place software and manual scanning processes that identify problematic
behaviors transpiring within digital platforms and business platforms.
52 R. Appan and D. Becic, “Impact of Information Technology (IT) Security Information
Sharing among Competing IT Firms on Firm’s Financial Performance: An Empirical
Investigation,” Communications of the Association of Information Systems, Vol. 39, 2016, pp.
214-241.
199
Perhaps the most recognized hardening tactics involve the use of firewalls,
encryption technologies, access control mechanisms, and physical barriers to develop
multi-layered defensive shields around an organization’s digital and business
platforms. Less prominent is identity management software that seeks to identify
(“Who are you?”), authenticate (“Can you prove your identity?”) and authorize
(“What are you allowed to do?”) attempts, legitimate and illegitimate, to access
platforms and their contents. The most difficult of these questions is
authentication. As the technology improves and costs drop, authentication
methods are moving away from examining what you know (e.g., a password) to
examining something you have (e.g., biometrics such as the use of fingerprints, iris
scans, voice scans, etc.).
The most familiar detection tools are those directed at viruses (i.e., malicious
software code), that have eluded the barriers erected in hardening a platform. Less
visible are the huge investments organizations make in (1) capturing and then
analyzing the streams of digitalized transactions being executed on digital and
digitalized platforms, and (2) embedding processing logic into the software handling
these transactions to identify and reroute problematic transactional events.
Intra-Organizational Information Sharing Regarding Malicious Intrusions
As emphasized earlier, digitalization risk management is a participation sport
demanding the involvement of all employees. However, organizations’ employees
demonstrate wide variance in: their awareness of, knowledge of and sensitivity to
security breaches; their platform access privileges; their willingness to act in
compliance with security breach policies and procedures; and, their abilities to act
appropriately in the face of a security breach.
200
Because of these variances, many organizations are including comprehensive
intra-organizational information dissemination and sharing programs as prominent
components of their efforts to prevent and mitigate malicious intrusions. These
programs typically include:
Awareness Training: All employees are made aware of the basics of cyber-
security risk management (both work-related and home-computer use) and, specific to each employee, those risks most likely to arise as employees carry out their day-to-day work activities.
Platform Usage Training: Each employee interacting with a specific digital or business platform is provided with the knowledge and skills to effectively
deal with the digitalization risks associated with that platform.
Specialized Training: All technology professionals and all risk owners are provided with advanced education to develop the capabilities needed for
them to carry out their assigned responsibilities.
Technical Support: All employees are provided ready access to a cyber-
security support group that can answer questions that arise regarding the risk of malicious intrusions and that can aid an employee when faced with a
probable or actual security breach.
Extra-Organizational Information Sharing about Malicious Intrusions
Organizations’ leadership teams are increasingly recognizing the value of the
external sharing of information about security breaches. Initially, most organizations
were reluctant to report on security breach incidents because of the expectation that
most stakeholders (e.g., consumers, value stream participants, strategic partners,
securities analysts, etc.) would react negatively, at least in the short-term. However,
201
the consequences of reported security breaches, while still negative, have been
declining over time.53,54 Three explanations for this decline are:
More effective remediation and disaster recovery by firms, as well as a decrease in customers refraining from doing business with firms that experienced a security breach.
The U.S. Government’s promotion, since 1999, of industry-based trade associations known as information sharing and analysis centers (ISACs). As
of 2016, there are eighteen sector-based ISACs coordinated under a National Council of ISACs.
The enactment of federal and state security breach notification laws.
As more organizations actively gather and share information on digitalization-
risk threats, vulnerabilities and incidents, as well as best practices in digitalization
risk management, their capabilities to combat malicious intrusions will only improve.
Rather than feeling as if they are working alone against an increasingly hostile world,
organizations’ risk specialists and risk owners will increasingly find themselves
coordinating with and collaborating with their peers in other organizations, including
competitors, in order to drive informed decision making.
The Board of Directors and Digitalization Risk Management
As a general rule, those organizations most successful in applying digitalization
for competitive purposes have developed exceptional capabilities in digitalization risk
management. But, who, ultimately, is accountable for the quality of an organization’s
53 L. Gordon, M. Loeb and L. Zhou (2011), “The Impact of Information Security
Breaches: Has There Been a Downward Shift in Costs?”, Journal of Computer Security, Vol.
19, No. 1, 2011, pp. 33–56. 54 S. Goel and H.A. Shawky, "The Impact of Federal and State Notification Laws on
Security Breach Announcements," Communications of the Association for Information
Systems: Vol. 34, January 2014, pp. 37-50.
202
digitalization risk management capabilities? With a public firm, it is the firm’s Board
of Directors.
However, most Boards of Directors have only gradually – and grudgingly –
stepped up to their oversight responsibilities regarding digitalization risk
management. For example, studies55,56,57 of Boards of Directors portray the following
practices:
Board members are not actively recruited for their digitalization expertise. Few executives of organizations recognized as digitalization leaders are
members of Boards of Directors.
Very limited discussions of digitalization take place at Board meetings.
When digitalization is discussed at Board meetings, these discussions tend to
be after-the-fact updates regarding recent, significant digitalization initiatives.
Most of this limited discussion of digitalization occurs in Board committee meetings. Most often, this committee tends to be the audit committee,
where the issues raised are done so in reaction to a problematic event.
Few Boards of Directors have a committee focused exclusively on digitalization.
Overall, a state of complacency regarding digitalization continues, with Board
members believing that their organization’s leadership team has a solid handle on
managing the risks of digitalization. That said, a growing number of exceptions to
this general depiction can be observed in recent trends regarding Boards of Directors
and digitalization.
55 S. Huff, P. Maher and M. Munro, “Information Technology and the Boards of
Directors: Is there an IT Attention Deficit,” MISQ Executive, June 2006, pp. 55-68 56 M. Parent and B. Reich, “Governing Information Technology Risk,” California
Management Review, Spring 2009, pp. 134-152. 57 S. Andriole, “Boards of Directors and Technology Governance: The Surprising State
of the Practice,” Communications of the CAIS, Volume 24, Article 22, 2009, pp. 373-394.
203
What should be the role of Boards of Directors in managing digitalization risk?
Three Board responsibilities are most important. The Board of Directors must assure
that their organization is not overly exposed to digitalization risks that threaten
business continuity, regulatory compliance and competitive success. In order for
these responsibilities to be met, Boards of Directors need to adopt best practices such
as:58,59
Bringing members with digitalization experience and expertise onto the Board.
Regularly inviting senior executives whose work responsibilities involve strategically-critical digitalization initiatives to Board meetings.
Systematically including digitalization issues on the agenda of full Board
meetings. For the most part, the focus of these discussions needs to address strategic rather than tactical issues, including Board reviews of all
major digitalization-related assets, investments and initiatives.
Establishing a Board digitalization committee.
Accounting for Digitalization Risks in Digital Strategy Formulation
Digitalization risks affect digital strategists’ thinking in two ways: by adding
layers of complexity onto their efforts to enhance existing business models and to
innovate with new business models, and by requiring that the requisite capabilities
are in place to enable both business model formulation and business model
implementation. Table 8-6 describes how each of the four elements of business
models are influenced.
58 M. Bloch, B. Brown and J. Sikes, “Elevating Technology on the Boardroom Agenda,
McKinsey Quarterly, 2013, No. 1, pp. 99-103. 59 H. Sarrazin and P. Willmott, “Adapting Your Board to the Digital Age,” McKinsey
Quarterly, 2016, No. 3, pp. 89-95.
204
Table 8-6 How Business Models Are Affected by Digitalization Risks
Value Propositions Profit Models
Provide value in return for personal data that is captured, archived and/or used.
Ensure the security, and hence the trustworthiness, of digital platforms and business platforms.
Comprehensively and accurately account for the digitalization risk management costs associated with developing, implementing and evolving a business model.
Core Capabilities Dynamic Capabilities
Digitalization risk management capabilities (accounting for all threat areas).
Tuning of digital strategists’ environmental scanning regarding: Digitalization threats. Digital technologies. Strategic capabilities. External sourcing providers. Competitors’ business model
innovations.
Increasingly, critical features of the value propositions being offered to pipeline
ecosystem consumers and network ecosystem participants are dependent on
personal data provided by or collected about individuals. If an individual feels the
quid pro quo is inadequate, the individual is unlikely to engage, partially or fully, in
market ecosystem interactions. Similarly, market ecosystem participants lacking
trust in the platforms enabling a value proposition would be expected to refrain from
platform interactions.
The long-term expectation from aggregating the profit models associated with
a business model is that the business model will prove profitable. However, if a
business model’s risk exposure requires extensive digitalization risk management
capabilities, and if the investment and operating costs associated with these
capabilities are not fully accounted for in the business model’s aggregated profit
models, then what might appear initially to be a very successful business model is
likely to become a huge liability over time.
205
If nothing else, this chapter’s content should have driven home the point that
in a world of pervasive digitalization, digitalization risk management has become a
core capability for all organizations and a strategic capability for some (e.g., financial
services organizations, e-commerce organizations, cloud-based organizations, etc.).
If digitalization knowledge and experience is not represented within organizations’
senior leadership teams, as well as within the Board of Directors of private firms,
then it becomes unlikely that a strong digitalization risk management capability will
be developed.
Finally, and most importantly, as extensive digitalization pervades an
organization’s strategies and operations, the breadth of the organization’s dynamic
capabilities must span an increasingly-wide gamut of markets, competitors, strategic
partners, strategic capabilities and digital technologies.
A Recap and Look Ahead
Competitive success in the face of digital disruption requires organizations’
leadership teams and digital strategists to demonstrate relentless vigilance with
regard to digitalization opportunities and, as covered in this chapter, digitalization
threats. But, how can such a mindset be established within an organization’s
members? In the next chapter, six actions aimed at just such an objective are
described.
206
Chapter 9. Executive Mandates: Digital Strategy
Today, leadership teams are likely to find themselves spending an
inordinate amount of time examining the opportunities and threats pervasive
digitalization poses to their organization, their industry, their employees and
themselves. The digitalization of pipeline ecosystems and network ecosystems, of
the products and services being exchanged within these ecosystems, and the core
capabilities driving competitive success continues at an incessant pace. Most
worrisome, perhaps, is a realization that it is increasingly difficult to predict the
source and direction of the next potentially-damaging move by a competitor.
Then, once a competitive attack has occurred, deciding how to respond
becomes just as perplexing. The options seem endless:
Doing nothing at all, hoping that the attack will dissipate quickly with minimal effect.
Distracting your existing customers from the competitor’s move through surface-level enhancements to the value propositions offered to these
customers.
Boosting the effectiveness of your executing business model through a series of digitalization initiatives.
Quickly imitating the attack (as best as is possible given held-capabilities), hoping to ride the wave, limit the damage and capture some of the new
value being created.
Introducing a well-thought-out but small-scale disruption of your executing business model in order to capture a niche in or to redefine your current
market space or to create a new market space.
Aggressively reallocate resources from the digitally-threatened market space
to a digitally-promising one that matches well with your core capabilities.
207
If anything, arriving at an effective competitive response can prove to be a greater
challenge than recognizing and understanding the implications of a threatening move
by a competitor.
So, how should organizations’ leadership teams position themselves and their
organizations for incessant digital disruption? The first step is to acknowledge that,
while digital technologies are the basis of digital disruption, digital technologies are
not the basis of effective digital strategy. Instead, what is critical is the adoption of
a digitalization mindset across the leadership team (and, ideally, all of an
organization’s members), the building of a digitalization culture across the
organization, and the infusion of key notions into the thought-processes of digital
strategists. The following six mandates are offered to senior executives desiring to
maintain their organizations’ competitiveness in the face of digital disruption:
Embrace a Digitalized Ecosystem Mindset
Innovate and Iterate for Digitalization Success
Invest in Data and Analytics
Evolve Processes and Platforms at Multiple Speeds
Track and Valuate Intangible Digital Assets
Cultivate a Digitalization Culture
Embrace a Digitalized Ecosystem Mindset
The dominant mindset held by many, if not most, senior executives today is
that their organizations operate in a well-defined competitive space, engage in
mostly-linear upstream and downstream processes, and execute a relatively-stable
business model. But, digitalization shakes up the competitive space in many ways:
incumbent competitors are reinventing themselves; new entrants (startups, digital
208
giants, technology entrepreneurs, etc.) regularly emerge; and, suppliers,
intermediaries and consumers are demonstrating increasing flexibility in deciding
with which organizations to interact and with which markets to participate, as each
seeks out the value propositions that best meet their ever-evolving desires and
requirements.
Successful leadership teams today are increasingly adopting a digitalized
ecosystem mindset – that is, a view of competitive spaces as markets characterized
by high rates of business model evolution/innovation, high levels of information
sharing and value co-creation by market participants, and high rates of participant
entry/exit. In such competitive environments, competitive success largely hinges on
leadership teams: looking outward first, and then inward; and, developing
capabilities to identify, assess, engage, collaborate with and disassociate from
strategic partners.
The primary intent driving the digitalized ecosystem mindset is to become the
partner of choice in each market space in which an organization participates. What
makes an organization an attractive partner in the face of digital disruption? A
deceptively short list of desired qualities includes:
Capable, creative digital strategists (often referred to as chief digital officers) across an organization’s operating and staff units, able to
orchestrate (internally and externally) innovative, value-adding digitalization initiatives.
A talented, digitally-savvy workforce.
Efficient, secure, adaptable and interconnected platforms that can be connected to or decoupled from quickly and with little investment.
Two organizations whose leadership teams are noted for having demonstrated
digitalized ecosystem mindsets are General Electric (GE) and LEGO.
209
Recognizing that it needed to transform itself into a modern digital business,
GE has invested over $1 billion to position itself to become a competitive leader of
the emerging, highly-digitalized market ecosystems within which it was already and
would be participating.60 To infuse a digitalized ecosystem mindset into the firm’s
executive leadership, GE consolidated each business unit under a chief digital
officer (CDO), with these CDOs reporting to the business unit CEOs. Importantly,
these CDOs have approval authority for digitalization-related investments. GE has
also gone on an ambitious hiring spree, bringing in thousands of new software
engineers, user-experience experts, and data scientists to acquire needed skillsets
and embed the right innovation mind-set.
After having verged on defaulting on its debt in the early 2000s, LEGO has
again become a thriving business once its leadership team adopted a digitalized
ecosystem mindset in which there was no longer a separate digital strategy that was
aligned with business strategy, but rather a corporate business strategy executed
through digitalization.61 The three core elements of LEGO’s overarching digitalized
business strategy involved: product innovation and the product ecosystem; digital
marketing; and, a transition toward global, rather than local, platforms. Key
initiatives put in place to enable this overarching strategy included: distributing much
of the corporate information technology function into business units; appointing CDOs
60 T. Catlin, L. Harrison, C.L. Plotkin and J.r Stanley, “How B2B Digital Leaders Drive
Five Times More Revenue Growth than Their Peers,” McKinsey Quarterly, October 2016,
http://www.mckinsey.com/business-functions/marketing-and-sales/our-insights/how-b2b-
digital-leaders-drive-five-times-more-revenue-growth-than-their-peers 61 O.A. El Sawy, P. Kraemmergaard, H. Amsinck and A.L. Vinther., “How LEGO Built
the Foundations and Enterprise Capabilities for Digital Leadership,” MIS Quarterly Executive,
June 2016, pp. 53-64.
210
within business units for the purpose of orchestrating digitalized innovation;
nurturing an experiment, learn and iterate capability across the firm, leveraging the
complementary digitalization capabilities of LEGO’s ecosystem partners;
implementing flexible and open engagement platforms, while reducing complexity and
maintaining security in enterprise platforms; and, hiring flexible, dynamic and adaptable
employees able to cope with task and position changes and to work on digitalization
projects anywhere in the firm.
Innovate and Iterate
LEGO’s tactic of innovation via iteration is not uncommon among digitalization
leaders. Being a first-mover (or, an early adopter) with a new digital technology or
a new digitally-enabled functionality is fraught with risk. Will the technology work as
expected, and at what cost? Will enhancements to customers’ or employees’
interactive experiences be favorably received and, hence, contribute to improving the
value propositions of executing business models or lead to the creation of new
business models? Will the operational improvements made possible by new
functionality improve the profit models of executing business models or enable an
executing model to be applied to an adjacent market space? Iteration – that is,
engaging in a series of mindful strategic experiments – allows the proponents of an
innovation to gain some of the innovation’s anticipated benefits while still learning
about and improving the innovation.
Amazon, for example, uses an internal experimental platform to evaluate
improvements to its websites and products through a factual, experimental approach
211
to constant innovation.62 If anything, the number of these experiments is increasing
over time – as can be observed from an April 2014 letter to Amazon shareholders
that reported the number of these experiments growing from 546 in 2011 to 1,092
in 2012 to 1,976 in 2013.
Successful digitalization requires that organizations transform how they think
about innovation in two key ways. First, digitally-savvy talent must be deeply
involved with innovative initiatives at every stage: creating the idea, improving the
concept, building early prototypes, assessing the viability of these prototypes,
designing and launching a series of strategic experiments, and, finally, incorporating
the innovation as a standard way of doing business. Second, at their start, successful
digitally-enabled innovations are almost always kept separate from the standard way
of doing business. By separating innovative initiatives from normal operations, two
things occur: it becomes easier to attract creative, digitally-savvy talent to work on
the initiatives, and the innovative initiatives are less likely to be impeded by
entrenched ways-of-thinking, policies and procedures.
At some point, leadership teams need to make a critical decision: “Is a
successful digital innovation maintained as a separate entity or is it folded into the
standard way of doing business?” The ultimate goal for any established organization
is to develop capabilities that competitors are unable or unwilling to imitate.
Consequently, most leadership teams will want to eventually integrate the digital
innovation with the rest of the organization. Doing so creates a seamless digital-
physical experience, enables greater efficiency via economies of scale and scope,
62 P. Bell, “Sustaining an Analytics Advantage,” Sloan Management Review, Spring
2015, pp. 21-23.
212
permits better coordination, avoids duplicated effort, and facilitates timely
communications and decisions. But, what if an organization’s established business
models are severely threatened by a digital innovation? In such situations, it just
might be best to keep separate the innovative business models and the established
business models, letting these compete for market share until only one is left.
Invest in Data and Analytics
Increasingly, the most telling pathway to value creation through digitalization
involves applying analytic models to the vast quantities of data permeating digitalized
market ecosystems. To take advantage of this pathway, an organization must
possess the capabilities to recognize the value potential of data streams that are both
fleeting and voluminous, and to capture, organize, analyze and apply these data in
value-creating ways. Thus, investing smartly and proactively in the technologies,
tools and talent needed to position an organization such that it is able to quickly and
effectively exploit data-related, value-creating opportunities as they arise can pay
huge dividends over time.
What exactly are these value-creating opportunities? Invariably, the
immediate answer to this question involves being able to combine data and analytic
models by using:
Transactional data along with efficiency and effectiveness metrics to improve operational process (upstream, internal, downstream) performance and managerial process (decisions, coordination, oversight) performance.
Customer/client, community, product, service and promotional data along with market, industry and macroeconomic data to better understand
customer/client/community motivations and behaviors, product/service portfolios, and market and business model viabilities.
213
Less obvious, however, are data monetization opportunities. Data monetization
refers to the bundling together of well-defined sets of data and analytic models such
that the intangible value of data is transformed into something of tangible value. Two
primary approaches to data monetization exist.
With the first approach, streams of data involved in an organization’s
operations are captured, cleaned and repackaged (via analytics) such that the data
become valuable to other organizations. Think of the vast amounts of data a big box
retailer collects on POS devices, which can be complemented by associated
customer/geographic data. Or, think about the vast amounts of data collected by
auto insurance companies on the devices installed by car owners to monitor driving
behavior. Or, consider that one oil rig with 30,000 sensors may examine only one
percent of the data collected because it uses these data to detect and control
anomalies63 – ignoring the value of the data in supporting drilling optimization and
oil/gas prediction activities, when combined with similar data from hundreds of other
rigs. Such data products can be sold directly to organizations desiring to use the
data or to third-party data marketplaces.
With the second approach, an organization offering specialized services to
clients can use historical client-engagement data to develop optimized algorithms
that can then be applied to data collected on a new client engagement, enabling
superior services to be provided to this new client at a price-point below that of many,
if not most, competitors.
63 J. Deichmann, K. Heineke, T. Reinbacher and D. Wee, “Creating a Successful
Internet of Things Data Marketplace, McKinsey Quarterly, October 2016,
http://www.mckinsey.com/business-functions/digital-mckinsey/our-insights/creating-a-
successful-internet-of-things-data-marketplace
214
Consider, for example, ExcelShore, a digitalized tool developed by Cybage, an
Indian technology services provider.64 Initially conceived as tool for analyzing
Cybage’s internal resources, ExcelShore analyzes collected client data (e.g., the
client’s business history, current operations, prospective projects and resources; data
about the client’s industry; etc.) to generate solution recommendations for the client,
as well as a customized dashboard used by ExcelShore staff to manage the client
engagement. With ExcelShore, Cybage is able to offer fee structures (to its clients)
that are generally 20-25 percent lower than the fee structures offered by its larger-
scaled competitors – without compromising service quality or consistency.
For another example, consider the strategy followed by Littler, a global
employment and labor law practice, in unbundling many of the tasks involved in
delivering services to clients by assigning these tasks either to knowledgeable people
(possibly contractors) with pay scales below those of specialized attorneys or to
digitalized products with automation and analytics capabilities, depending on the level
of sophistication involved.65 Now, instead of billing clients for the hours its attorneys
spend on claims, Littler uses a fixed-fee pricing model based on productivity (per
grievance or complaint) for certain of its legal services. This change has resulted in
lower legal costs for clients (figures ranging from 10-35 percent), enabling Littler to
win new business.
64 A. Kathuria and B. Yen, “The Art of Winning an Unfair Game: Cybage & India’s IT
Industry,” Communications of the Association for Information Systems, Vol. 37, 2016, pp.
753-766. 65 M. Sawhney, “Putting Products into Services,” Harvard Business Review, September
2016, pp. 83-89.
215
Evolve Processes and Platforms at Multiple Speeds
Organizations embarking on a digitalization journey almost always face a
recurring challenge – projects targeted at enhancing digitalized products, services,
engagement platforms and customer/community-facing processes tend to be more
numerous and to move at a much faster pace than projects aimed at enhancing the
mission-critical and house-keeping transactional processes and platforms that keep
an organization running and compliant with regulators. This in itself is not a problem.
What is a problem is that sooner or later – actually, mostly sooner – the process or
platform that evolves at a fast pace must be interconnected to and synchronized with
processes or platforms that evolve at a slower pace; and, it is with these efforts
aimed at interconnection and synchronization that serious problems can arise:
Fast-paced projects are slowed down or derailed.
Processes or platforms that must be quick, efficient, reliable and secure
begin to exhibit performance problems.
Governance systems put in place to ensure process/platform stability
impede process/platform agility (or vice versa).
What can an organizations’ leadership teams do to minimize such problems?
Actually, the challenge is more severe than might be inferred from the above
discussion. All organizations today depend on digitalized processes executed from a
mélange of digital platforms and business platforms. Depending on the nature of the
processes hosted on a platform, a platform’s design could:
Emphasize stability, agility or both.
Emphasize operational excellence, customer intimacy and/or product
leadership.
Evolve at a rate to maintain alignment with the rate at which crucial
ecosystem elements change; this could be a fast rate, a slow rate, or
216
anywhere in between.
Think of a juggler having to keep a set of balls moving despite the fact that each ball
is also moving in a unique orbit around a central orbital point. So, ideally, these
processes and platforms are not evolving at two rates of speed or at three rates of
speed, but at many rates of speed. Process owners and platform owners across the
organization must evolve their processes/platforms at very different rates of speed
and, over time, are likely to have to adjust these rates of speed.
So, again, what can an organization’s leadership team do? An easy, quick,
one-size-fits-all solution just does not exist. Instead, a leadership team needs to
fashion, over time, a new and consistent set of organization, platform and governance
models:
Organization Design: establishing process and platform management reporting structures to enable seamless process/platform design, development, operation and evolution.
Platform Design: transitioning to modular platform architectures, a consistency in module interfaces, and an understanding of when and where
to use tight or loose inter-platform and intra-platform connections.
Governance Design: redesigning an organization’s expansive collection of planning, control and budgeting systems to facilitate, rather than inhibit, an
appropriate rate of evolution for each process and platform.
While organizations’ leadership teams may not possess the expertise involved in
carrying out these activities, it is critical that leadership teams provide direction and
oversight. Issues related to reporting structures, to platform architecture and to
negotiations regarding priorities, investment funds and operating budgets are
precisely those that can produce severe intra- and inter-unit conflicts – conflicts that
often can only be resolved by an organization’s most senior executives.
217
Track and Evaluate Intangible Digital Assets
Two forms of capital underlay organizations’ digitalization success. The first
involves tangible digital assets, or the commodity technologies (e.g., servers,
routers, messaging services, Internet standards and software, etc.) that serve as the
building blocks of digital platforms and of business platforms. Invariably,
organizations’ investments in tangible digital capital appear as capital investment on
company books.
The second type of capital involves intangible digital assets, such as:
Market, product, services and platform designs that attract, engage and
retain large numbers of ecosystem participants.
Operational and analytical processes that capture, organize and exploit data
regarding market events, about operational and managerial activities, and about participant beliefs, expectations, behaviors and perspectives.
Knowledge and skills held by an organization’s employees as well as its partners’ employees.
Digitalization reputation acquired by an organization.
Well-known examples of intangible digital assets are Amazon’s and Netflix’s
recommendation engines, both of which have contributed significantly to each
company’s revenue growth and served as long-lived competitive barriers.
Conventional accounting invariably treats intangible digital capital as an expense,
rather than as a capital investment, thus creating an investment disincentive (at least
in the short-term).
With little guidance from conventional accounting methods regarding how to
track and attach financial value to intangible digital assets, many organizations’
financial groups perform this task poorly or not at all. As a consequence, an
organizations’ leadership teams have little solid evidence on which to assess their
218
organizations’ investment in digitalization over time or to compare these investments
against that of competitors. Both a retailer lacking rich data on consumers or a bank
unable to control the capture of customer data (because customers access banking
services through a third-party digital platform) face increasingly daunting competitive
disadvantages. Organizations’ leadership teams must ensure that their organizations
have taken on the difficult tasks of:
Reclassifying expenditures to separate out intangible digital assets.
Tracking the spending on intangible digital assets (typically overlooked by
accounting procedures).
Assigning appropriate value to investment in intangible digital assets.
Treating these investments, minimally with regard to digital strategy
formulation, as capital investments rather than current expenses.
Cultivate a Digitalization Culture
Acquiring and developing technology-based capabilities – such as those based
on Big Data, Big Data analytics and cloud services – are obviously crucial to
digitalization success. However, consider the issues presented as mandates for
executive action: mindsets, innovation, experimentation, data monetization,
operating at multiple and variable speeds, and a preoccupation with intangible assets.
Each of these, at their core, reflect aspects of a digitalization organization culture.
Organization culture is one of those terms that are intuitively understood but
that prove difficult to define simply. Suffice it to say that an organization culture
is comprised of the assumptions, values and norms of behavior collectively held by
an organization’s members. Spend time observing how an organization’s members
act and interact, and you will inevitably come away with an understanding of the
organization’s culture. The more time spent observing, the richer the understanding.
219
This same thing happens as new employees sense and adopt the particular culture
of their organization and act accordingly.
In stable environments, executives tend to rely on what has been learned from
past experiences to build the system of policies, directives, rules, routines and top-
down reporting relationships that mold employees’ perspectives and actions. In
volatile environments, however, organization structures that protect and exploit
current mindsets and capabilities often induce strategic inertia, where attention and
investment is given to things that no longer matter. As has been recurrently
emphasized, environments beset with the constant threat of digital disruption are
anything but stable. As the drivers of this instability are strongest at the edges of
organizations and at the edges of market-focused ecosystems, the importance of
local knowledge and strategic agility intensifies. As a result, executives striving to
position their organization for digitalization success are advised to transition their
organizations and themselves toward a very different organization culture, a
digitalization culture that largely relies on the capabilities and judgments of
employees – working alone and in small groups – holding local knowledge and
unencumbered by bureaucratic or overly-burdensome hierarchical constraints.
What does this emerging digitalization culture look like? A good starting
point is to recognize how digitalization is enabling us, as we carry out our consumer
and employee roles, to achieve better outcomes from taken-actions:66 we are being
given more options, more information about these options, and more permission to
act as we think best. To grasp what is implied by – and gained from – a culture that
66 B. Libert, M. Beck and J. Wind, The Network Imperative: How to Survive and Grow
in the Age of Digital Business Models, Boston, MA: Harvard Business Review Press, 2016.
220
first and foremost relies on employees’ capabilities and judgement, consider the
following two illustrations.67
An Asian insurance company hosted an intensive digitalized jam session over a 48-hour period, assigning 120 participants to ten cross-functional teams and tasking these teams, via a friendly competition, to redesign how
customers processed their healthcare claims. The final outcome produced went far beyond the initiative’s original scope – effectively eliminating the
need for processing customers’ claims.
A telecom company wanted to both shorten its product-development time (six months, on average, from start to active-trial) and include employee
training and internal pilots within this shortened time period. A mixed team of product managers, digital technology professionals and engagement-
experience experts tore apart the company’s old process and laid out a simpler, automated approach that allowed customers of its fiber, mobile, and TV services to access service in three quick steps. They conceived,
tested, and built the new process in less than twelve weeks.
Rather than attempting to define the elements that come together to form a
digitalization culture, we illustrate a digitalization culture in practice through the
efforts taken by Valve Corporation’s leadership team to transform the firm’s
organization culture.68
Beginning as a video game company, Valve has evolved into a digital
distribution platform, known for products such as Steam and SourceForge. Valve’s
self-reported revenues per employee and profit per employee metrics exceed those
of Facebook and Google, signaling quite vividly that Valve is succeeding in a fast-
67 T. Catlin, L. Harrison, C.L. Plotkin and J. Stanley, “How B2B Digital Leaders Drive
Five Times More Revenue Growth Than Their Peers, McKinsey Quarterly, October 2016.
http://www.mckinsey.com/business-functions/marketing-and-sales/our-insights/how-b2b-
digital-leaders-drive-five-times-more-revenue-growth-than-their-peers 68 The discussion of the Valve Corporation has been adapted from materials in: T. Felin
and T.C Powell, “Designing Organizations for Dynamic Capabilities,” California Management
Review, Summer 2016, pp.78-96.
221
moving environment requiring constant agility, strategic innovation, and market
adaptation.
A key factor behind this success is Valve’s culture, which emphasizes the firm’s
dependence on employees’ capabilities and judgements (as reflected in the Valve
new employee handbook). Employees are expected to:
Steer, without asking for approval, the firm toward opportunities and away from risks.
Constantly be looking for more valuable ways to spend their time.
Allocate up to 100% of their time to self-directed projects.
Why such a dependence on the initiative of individual employees? In environments
demanding that competitive opportunities and threats are quickly sensed and
responded to, the immediate challenge for organizations’ leadership teams is to
effectively leverage the information, knowledge and capabilities held by the
organizations’ members and applying these in collective decision-making. Thus, a
paramount task of the leadership teams of organizations seeking digitalization
success is to ensure:
Employees are in constant contact with relevant elements of the competitive
environment and with other individuals (both inside and outside the organization) holding relevant information, knowledge and capabilities.
Employees are provided the motivation, time and resources to learn from, share with, and collaborate with these other individuals.
Valve’s leadership team has gone beyond traditional decentralization toward radical
decentralization by giving talented specialists in product research, design and
engineering full autonomy to propose projects, recruit project teams, establish
budgets, set timelines, and ship products to customers.
222
Nonetheless, it is important to recognize that radical decentralization has
advantages and disadvantages. As a guiding principle, radical decentralization gives
authority to those who operate closest to the action – that is, to individuals, groups
and units holding specialized knowledge and operating at an organization’s edges,
thereby facilitating local creativity and experimentation while minimizing bureaucratic
roadblocks. What radical decentralization lacks is the assurance that taken-decisions
and taken-actions are vetted by affected-others (individuals, groups and units) and,
if needed, adjusted. Allowing for such assurance, however, takes time. In an era of
digital disruption, it does not take much of a delay to significantly reduce the benefits
actually realized from a competitive action.
To address this quandary, Valve employs mechanisms referred to as social
proofs – a social influence mechanism aimed at producing coordinated behavior
among individuals. As Valve’s leadership team sees it, a purposeful system of social
proofs provides an effective counterweight to the chaotic tendencies of radical
decentralization.
The primary behavioral mechanism driving Valve’s social proofs is self-
selection; that is, employees vote with their feet. They assess markets for new
opportunities, gather information about existing projects and teams, and decide by
themselves whether to join an existing team or to form a new project. Obviously,
not all the decisions made by employees are optimal, for the employee or for Valve.
However, experience at Valve suggests that, in the aggregate, the choices made by
talented, empowered individuals provide insightful, reliable and low-cost predictions
of where and how fast the market is moving.
223
While self-selection empowers the right people to make decisions, it does not
by itself overcome the disadvantages of radical decentralization. Not wanting to
impair employees’ initiative by putting in place multiple approval layers, Valve’s
leadership team conceived a method of social convergence referred to as the rule of
three. Learning from experience, Valve’s leadership team recognized that it was a
rare occurrence for one or two individuals, regardless of reputation or capability, to
command enough information or resources to sense, shape and seize a sizeable
market opportunity. Under the rule of three, new projects are only considered for
approval when at least three individuals come together to propose a project. The
rule of three, thus, provides a light-touch intervention that allows Valve to stimulate
innovation and to limit the chaos that can otherwise debilitate radical
decentralization.
A Recap
It is important to recognize that the six mandates just described are neither
silver bullets nor readily implemented. The policies and practices put in place in one
organization may or may not work when applied within another organization.
Instead, in approaching each of the mandates, an organization’s leadership team
needs to interpret the mandate through a lens that reflects the organization’s in-
place culture, human talent, digitalization history and competitive environment. Such
an assessment should suggest how the spirit of the mandate is best applied as well
as the steps to be taken to implement the refashioned mandate.
As an organization’s leadership team begins to achieve progress in diffusing
these six mandates across their organization, a number of things should begin to
occur, including:
224
Existing policies and practices will increasingly be questioned.
Employees will increase the amount of time they spend interacting with
others outside their areas of immediate responsibility.
Decisions will increasingly be expected to be justified through facts, e.g.,
analyzed data.
The volume of innovative ideas bubbling up across the organization should increase.
While a surge in such behaviors might be unnerving to some of an organization’s
managers and executives (at least in the near term), it is precisely these type of
behaviors that will enable an organization’s digital strategists to engage in the
dialogues and debates that ultimately generate timely and successful digital
strategies.
225
PART 2. DIGITAL INVESTMENT
Chapter 10 The Digital Investment Enigma
Chapter 11 Strategic Focus
Chapter 12 Value Pathways
Chapter 13 Building a Persuasive Business Case
Chapter 14 Monetizing Benefits Flows
Chapter 15 Implementation Planning
Chapter 16 Project Management Planning
Chapter 17 Executive Mandates: Digital Investment
226
Chapter 10. The Digital Investment Enigma
Organizations of all types are exposed to unprecedented demands to digitalize
– both imitatively and innovatively – their products, services and processes to survive
and to thrive in the face of digital disruption. Relentless technological progress and
the astonishing creativity being observed – especially that rendered through the
Internet, social media and Big Data analytics – are creating new avenues for gaining
and sustaining competitive advantages. Given such an environment, then, it is not
at all surprising that organizations’ executives and managers regularly find
themselves developing, championing and/or approving digital investments – many of
which are transformational, risky and expensive!
Making decisions about digital investments is certainly not new. Business
investments enabled through or supported by digital technologies have been a core
element of many organizations’ strategies since the mid-1990s. Many of these
investments have paid off well: operational and managerial processes are improved;
costs are reduced; interactions with customers and suppliers occur more quickly,
more securely and more conveniently; the launching of new products and new
services occurs more quickly and more often; and so on.
Still, many managers – particularly organizations’ most senior executives –
remain skeptical about the value of any digital investment, let alone a large-scale
digitalization initiative. When you think about it, this skepticism is quite
understandable. Achieving success with digital investments can be very challenging,
especially when an investment: depends on new technologies; introduces new
products or services; requires people to change their perspectives and behaviors;
227
disrupts established procedures; is directed toward an immature market space; etc.
Under-performing – and failing – digital investments are not rare events, and any
manager burned in the past by an underperforming digital investment is likely to view
new digital investments with considerable skepticism. Competitively, the logic behind
a new digitalization initiative may seem clear; pragmatically, however, digital
investments are too often seen as risky, bottomless money pits likely to produce
meager, if any, long-term financial returns.
Unfulfilled expectations regarding past digital investments produce three
negative outcomes. First, when anticipated benefits do not materialize, the
competitive positions sought are not attained. Second, most decisions to fund a
specific investment proposal invariably means that one or more other investment
proposals will not be funded. The higher a proposal’s cost, the higher are these
opportunity costs. Third, any manager disenchanted by past digital-related
investments is less inclined to believe the business cases offered in support of new
digital investments. Over time, it becomes increasingly difficult for proponents of
digitization or digitalization proposals to develop persuasive business cases.
In an ideal world, the realized financial returns from a funded investment
proposal exceed, not just achieve, the proposal’s promise. Realizing a proposal’s
promised benefits demands attention to two related activities: building a persuasive
business case, and mindfully overseeing the implementation of the funded proposal
such that the proposal’s promised benefits are realized. Our objective is to enable
readers to excel in both of these activities. To begin this journey, we describe the
three most common reasons why digital investments do not realize their promised
benefits:
228
The benefits were never there.
The benefits were overstated.
Inadequate efforts were taken to achieve the benefits.
As each reason is introduced, avoidance actions are presented and linked to the ideas
being presented in this part of our book.
The Benefits Were Never There
Sometimes, a proposed digital investment is ill-conceived from the start. In
other cases, an idea has considerable merit, but is inadequately thought through.
Problems arise for numerous reasons. The competitive action might be ill-conceived
because of flawed understanding of the market space or of participant preferences,
an ill-conceived profit model, insufficient or absent capabilities, etc. Alternatively,
the problem might lay with the enabling digital technologies: critical technologies
might not yet work as promised, the requisite internal technology capabilities might
be lacking, a poor understanding of a provider’s offered services or capabilities may
exist, etc. And, while a proposal’s strategy and enabling-technology might look fine
when initially considered, key assumptions and predictions built into the proposal can
turn out to be dead wrong.
A well-conceived investment proposal possesses a clearly articulated strategic
focus, is supported by a business case that describes how these aims will be achieved,
and is based on realistic assumptions and predictions. These issues are addressed
through discussions of the strategic focuses commonly applied in framing digital
investments, six value pathways through which digitization and digitalization
investments most often achieve their strategic aims, and the critical assumptions and
229
techniques involved in fashioning and monetizing an investment proposal’s business
case.
The Benefits Were Overstated
Even when proponents of a digital investment proposal have identified
meaningful strategic aims and articulated how these aims will be achieved, they can
then err by overstating benefits, understating costs, or both. The psychology behind
such behaviors is pretty straightforward: “Our calculation of a $250,000 net benefit
might not be high enough. Why don’t we fudge the numbers a bit in order to bump
up to a $400,000 net benefit? If the project unfolds as we think it should, this higher
target is certainly achievable. Let’s just be really confident when selling our ideas to
senior management.” The problem, obviously, is that it might be very difficult to
achieve a $400,000 net benefit – an outcome that senior management now not only
expects to see but considers achievable.
How do you go about building a compelling, yet realistic, business case? What
should you be looking for in assessing a business case that has been proposed to
you? We will be describing how persuasive business cases are built and how the
benefits flows and costs flows associated with these business cases are monetized.
Inadequate Efforts Were Taken to Attain the Benefits
Perhaps the most common mistake finds the managers charged with
implementing a funded proposal failing to effectively carry out all the activities
necessary for promised benefits to be fully realized. Seemingly, the implementation
of almost every funded digitalization proposal turns out, after-the-fact, to be much
more challenging than originally thought. If critical implementation activities are
executed poorly, inadequately resourced or ignored altogether, you can be assured
230
that some promised benefits will not be realized, that some specified costs will be
understated, and/or that some unspecified costs will emerge.
We provide discussions regarding the activities that need to be taken in order
to increase the likelihood that a digital investment’s promised benefits will be
realized. Specifically, management-oriented discussion of implementation planning
and project management planning are provided.
A Recap and Look Ahead
Today, an ever-increasing portion of organizations’ activities have been or are
in the process of being digitalized. Consequently, it is difficult to identify an executive
or manager in an organization that has not had to develop the business case for,
champion or approve a digital investment. The chapters comprising this part of our
book should enable you to build a persuasive business case for a digital investment
proposal, to know what to look for in assessing someone else’s investment proposal,
and to understand what is involved in implementing a funded proposal. We conclude
this part of the book by offering senior executives a set of high-level principles to be
implanted across their organizations to increase the likelihoods that well-reasoned
digital investments will be funded and that the promised benefits from these
investments will be realized.
231
Chapter 11. Strategic Focus
The abilities to recognize valuable digital opportunities and to explain to others
the rationales that underlay these opportunities are important skills for all managers.
Twenty-five years ago, relatively few senior managers found themselves involved
with digital investment decisions as such decisions, to a large extent, were handled
by organizations’ technology executives and managers. But, things have
dramatically changed.69 In 1987, for example, U.S. corporations’ investment in
digital technologies per employee averaged around $1,500. By 2004, that amount
had more than tripled to over $5,000 per employee. Today, U.S. corporations spend
more on digital technologies each year as they do on offices, warehouses and
equipment.
Why this increased spending on digital technologies? There are two rather
obvious answers. First, the traditional form of industrial economies, the pipeline
ecosystem, has been extensively digitized and digitalized. Digitization refers to the
purely technical processes associated with converting sensed and captured data into
binary digits, storing and transmitting these data, and both performing operations on
these data and storing/transmitting the outcomes of these operations; and,
digitalization refers to the application of digitization within organizations and the
social and economic contexts within which these organizations are embedded. As
depicted in Figure 11-1, a pipeline ecosystem finds a producer (actually, many
competing producers) offering products and services to a consumer community
69 A. McAfee, “Mastering the Three Worlds of Information Technology,” Harvard
Business Review, November/December 2006, p. 141.
232
(typically comprised of multiple consumer segments) and fashioning a linear value
stream involving numerous upstream (e.g., raw material suppliers, component
suppliers, etc.) and downstream (e.g., distributors, retailers, etc.) participants.
Increasingly, the operational and managerial processes being executed across this
value stream are digitalized and hosted on business platforms, which in turn are
enabled through technology services provided through digital platforms.
Figure 11-1 The Pipeline Ecosystem
ConsumersProducer IntermediariesIntermediaries
Markets
Material & Component Suppliers
Markets
Upstream Midstream Downstream
Second, digitization and digitalization are spawning new forms of economic
organization, the most significant of which is the network ecosystem. As depicted in
Figure 11-2, a network ecosystem finds an organization – referred to as the
network orchestrator – designing, operating and evolving a market platform
(comprised of digital platforms and business platforms) that brings together multiple
communities to exchange information, products and services. Within a network
233
ecosystem, the vast majority of market-related, participant interactions (within a
community and between communities) occur through this market platform.
Figure 11-2 The Network Ecosystem
Producer Network
Consumer Network
Market
Network Orchestrator
Markets
Intermediaries
Material & Component Suppliers
Markets
Upstream Midstream Downstream
The extensive digitalization of pipeline ecosystems and of network ecosystems
has resulted in exceptional competitive successes being enjoyed by organizations
possessing finely-tuned digitalization capabilities. However, spending on
digitalization has reached heights where it cannot be ignored by organizations’ most
senior executives. Unrestrained spending on digitalization is most certainly a thing
of the past, if it ever existed at all.
Two researchers, Andrew McAfee and Erik Brynjolfsson, after analyzing data
about digitalization investment and organization performance, have made two
particularly striking observations useful in grasping how and when digital investments
234
produce significant value for the investing organization.70 First, more-digitalized
firms tend to operate in more-turbulent business environments. When you think
about it, this is quite intuitive as organizations facing turbulent environments are
likely to stand the most to gain from the speed and response advantages of
digitalization. Second, McAfee and Brynjolfsson found:
With more-digitalized organizations, higher-performing organizations achieved about a 50% higher average gross margin than lower-performing
organizations.
With less-digitalized organizations, higher-performing organizations achieved
about a 20% higher average gross margin than lower-performing organizations.
Clearly, the performance implications from making the right digitalization investment
decisions at the right time are much more important for more-digitalized
organizations than for less-digitalized organizations.
What should you take away from these observations? First, not all of today’s
organizations need to invest in risky digitalization projects. If your competitive
environment is relatively stable (i.e., products, services, processes, facilities and
equipment, and market participants change rather slowly), you are generally better
off delaying a digital investment until other organizations have convincingly
demonstrated the value of the investment. Second, while digitalization can deliver
significant performance gains, the majority of these gains flow to those organizations
that have invested most heavily in digitalization. Importantly, the organizations
investing most heavily in digitalization are likely to have developed strong digitization
capabilities and, perhaps more important, strong digitalization capabilities.
70 A. McAfee and E. Brynjolfsson, “Investing in the IT that Makes a Competitive
Difference,” Harvard Business Review, July/August 2008, pp. 98-107.
235
Digitization capabilities refer to an organization’s readiness to: apply digital
technologies, digitized content and technology services; manage digital platforms;
and, attract, manage and retain highly-skilled technology professionals.
Digitalization capabilities refer to an organization’s readiness to attract, manage
and retain individuals highly skilled in: identifying digitalization opportunities,
building and assessing business cases for digitalization investments, implementing
funded digitalization investments, managing business platforms, and achieving the
strategic aims sought through digitization.
This chapter covers what might be considered the most crucial of these
digitalization capabilities – conceptualizing and articulating the strategic focus of a
digital investment. If the proponents of a digitalization investment idea are unable
to clearly describe both their intentions and the target of these intentions, then it is
unlikely that others will be able to contribute in significant ways to the co-creation of
a digitalization proposal. Organizations lacking individuals possessing this capability
are likely to experience significant difficulties in beginning, let alone successfully
completing, digitalization initiatives. The topics covered include:
The IT Productivity Paradox
Strategic Focus
Impacting Overall Financial Performance
The IT Productivity Paradox
Despite organizations’ ever-increasing investment in digitalization, consistent
evidence of positive returns from these investments has not always been apparent.
In fact, quite mixed evidence existed until the mid-1990s, which led economists to
236
coin the term IT productivity paradox after Robert Solow observed, “We see
evidence of the computer age everywhere except in the productivity statistics.”71
A productivity gain occurs when it becomes possible to carry out a given
amount of work with fewer resources. Evidence of economy-wide productivity gains
from digitization are all around us. Think of your favorite airline, bank or grocer:
Airlines offer online reservations and have built business processes for ticketless travel with self-service check-in.
Retail banks have used their investments in ATMs and online banking to drive down the unit cost of operations in customer-facing activities.
Retail groceries have negotiated electronic replenishment processes with their suppliers to dramatically reduce stock-outs and the cost of moving stock from the supplier through distribution centers to the retail store.
Most of these productivity gains have greatly benefited the consumer. Examples of
improvements in consumer welfare include: 24x7 product/service availability,
lower prices, less chance of a desired product being out-of-stock when you attempt
to purchase it, more product/service choice, more information (prices, availability,
reviews, etc.) about products and services, and a greater tailoring of products and
services to your specific needs.
But, many, if not most, of these gains in consumer welfare occurred without
corresponding profitability gains by the organizations investing in digitalization.
Consider, for example, the first firm in an industry to introduce a 24x7 online
customer support capability. The innovating firm may initially observe improvements
in customer satisfaction, sales growth and market share. However, if competitors
quickly take imitative actions, then a competitive equilibrium soon returns: customer
71 R. Solow, “We'd Better Watch Out,” New York Times Book Review, July 12, 1987, p.
36.
237
satisfaction, sales growth and market share all return to where they were before the
innovating firm transformed the market space by providing the 24x7 online customer
support capability. Long-term, the only clear winner seems to be the consumer.
Since the mid-1990s, however, the accumulating body of economic evidence
has shown that superior decisions about when, where and how to invest in
digitalization can improve an organization’s performance across areas as diverse as
cost structures, sales growth, profit margins and stock prices. While numerous
factors are involved in explaining organization-specific performance gains, two
factors stand out above all.
First, organizations making superior digitalization decisions have invested
heavily to build and interconnect large stores of digitized content and an increasing
number of digitalized operational and managerial processes. With more content
being digitized and accessed by digitalized processes, a tipping point is reached where
new sources of business value, heretofore unavailable, arise. For example, by
bringing diverse sets of data and analytic tools to a decision-making situation, the
decision situation can be more comprehensively assessed – producing significantly
enhanced outcomes. And, by seamlessly interconnecting digitalized processes (e.g.,
interconnecting new product development processes, market research processes,
and manufacturing design processes), not only are each of the processes enhanced
but the combined effects can produce outcomes which previously were unattainable
or even unimagined. Each additional digital investment unveils a string of new
possibilities.
Second, organizations making superior decisions about digitalization have
invested heavily to increase their digitalization capabilities. As digitalization
238
capabilities develop broadly and deeply across an organization, the organization’s
managers and professionals are increasingly able to combine their abilities and
experiences to identify and assess digital investments, to make savvy decisions about
which of these investments to fund, and to successfully implement the funded
investments such that anticipated benefits are realized. These digitalization
capabilities largely hinge on individuals’ abilities to envision the strategic aims sought
by a proposed digitalization investment. We examine these strategic aims next.
Strategic Focus
Adapting and extending a framework introduced initially by researchers Jeanne
Ross and Cynthia Beath, Table 11-1 identifies the four strategic focuses that are the
targets of most digitalization investments, the value drivers of each of these strategic
foci, and associated performance metrics. We begin by providing brief overviews of
the key concepts used in this table:
A business model reflects an organization’s value-creating strategy.
The digitized content and digitalized functionalities enabling business models are hosted on business platforms.
Business platforms are enabled through the technology services provided by digital platforms.
A value driver refers to a core factor underlying anticipated performance gains.
239
Table 11-1 Digitalization Strategic Aims
Strategic Focus Value Drivers Performance Metrics
Digital Platform Operations & Technology
Services
• Digital technology performance-price ratios
• Digitization capabilities • Digitalization capabilities
• Costs of operations • Quality of services (security,
responsiveness, reliability, availability, scalability)
Business Platform Efficiency
• Digitization capabilities • Digitalization capabilities • Business platform first-order learning
• Transaction cycle times • Sales & general administrative costs • Inventory costs & ratios • Customer/participant support costs
Business Platform
Effectiveness
• Digitization capabilities • Digitalization capabilities • Business platform first-order learning • Market ecosystem first-order learning
• Sales revenue & market share • Customer/participant loyalty & share
of wallet
Business Model
Innovation
• Digitization capabilities • Digitalization capabilities • Business platform first-order learning • Market ecosystem first-order learning • Business platform second-order
learning • Market ecosystem second-order
learning
• Rate of new product/service introductions
• New product/services sales growth & gross margin
• Rate at which new communities are engaged
Digital Platform Operations and Technology Services
Digital investments are almost always, to some extent at least, aimed at
improving digital platform operations and services. Digital platform operations
refers to activities involved in planning, designing, running, managing and evolving
the technology services required to enable and support an organizations’ business
platforms, that in turn host organizations’ operational and managerial processes.
Examples of digital platform operational activities include: managing and operating
hundreds or thousands of servers, managing data storage devices, managing and
operating local area networks, etc. Technology services refer to the digitized
functionalities and the technical support provided to an organization’s employees
and, increasingly, to its customers and suppliers. Basic examples of such services
include: electronic mail, document copying and printing, help desks, website design,
establishing network interconnections, Internet-enabled messaging and chatting, etc.
240
The incessant advances occurring with digital technologies are relentlessly
increasing these technologies’ performance-price ratios: processor speeds and
memory sizes increase, while prices decrease; storage device capacity increases,
while access times and prices decrease; communications bandwidth and speed
increase, while prices decrease, etc. As a result, organizations have found it
advantageous to regularly upgrade or replace their installed digital platforms. In
addition to upgrading and replacing digital platforms, digitalization leaders also invest
to improve the knowledge and skills of their technology professionals and,
consequently, their digitization and digitalization capabilities – enabling future
improvements aimed at digital platforms, business platforms and business models.
The distinction between investing in new digital technologies and investing to
improve digitization/digitalization capabilities is critical as it makes clear the
distinction between the value to be derived directly from installing a new digital
technology (such as new storage devices or more sophisticated data management
software) and the value obtained from deploying the digital technology in smarter
and more creative ways. Saying that you have developed a particular capability
implies that you are now able to bring together and apply a particular set of resources
to achieve a desired outcome. Most organizations are more or less equal in their
ability to acquire and install digital technologies. However, organizations are not
equally blessed with the abilities to apply these technologies in a superior manner
and, in doing so, dramatically improve an organization’s business platforms and
business models.
241
Business Platform Efficiency
A second target of digitalization investments is business platform
efficiency, e.g., improving the cycle times and costs associated with one or more of
the business processes being hosted on a business platform. A specific investment
initiative might be targeted at the platform itself (affecting all of the platform’s hosted
business processes) or at a limited set of these hosted business processes.
A business process refers to a sequence of work tasks that converts inputs
into outputs, and these work-task sequences can involve operational activities,
managerial activities, or both. Business process inputs and outputs can be digital in
nature, non-digital in nature, or some combination of both. Generally, business
platform efficiency is increased as more of these inputs and outputs are digitized.
Business processes consist of operating procedures and business rules.
Operating procedures specify each of the tasks that comprise a business process
(e.g., obtaining required inputs, producing specified outputs, the nature of the
decisions and actions to be taken in transforming inputs into outputs, whom is
involved with these decisions and actions, etc.), as well as the relationships among
these tasks (e.g., which tasks must occur before other tasks can be started, how a
task’s outputs serve as inputs to other tasks, etc.). Business rules describe the
conditions that must be met when taking actions or making decisions. For example,
the creation of a purchase requisition might involve the following business rules:
If the purchase amount is less than $500, then the requisition does not need
to be approved by a department head.
If the purchase amount is greater than $500, but less than $5,000, then the requisition needs the approval of a department head.
If the purchase amount is greater than $5,000, then it must be approved by
242
both a department head and a divisional finance director.
Business process efficiency gains are achieved by automating (i.e., replacing
humans with digitalized solutions) and rationalizing (i.e., eliminating processing
steps, waste, errors, delays, etc.) operating procedures and business rules. Table
11-2 describes a business platform critical to the core business models of FedEx, Dell,
Walmart and Southwest Airlines. Exploiting their exceptional digitization capabilities
and digitalization capabilities, all four of these organizations fine-tuned the efficiency
of these business platforms and, as a consequence, obtained industry-leading
positions.
Table 11-2 Business Platform Efficiency Enhancement Examples
Company Business Platform Description
FedEx Package Tracking
Placing a digitized identifier on each package, installing readers throughout the logistics network, capturing the identifier & a time stamp for package movements, and maintaining these data in an accessible database.
Dell Customer Order
Scheduling
Specifying component delivery & assembly timings for a customer order and communicating these timings to suppliers & logistics partners.
Walmart Retail Store Shelf
Replenishment
Capturing & archiving product purchase activity at the retail-store level, and analyzing these purchase data to determine the replenishment cycles for restocking products at specific retail stores.
Southwest Airlines
Aircraft Ground- Handling
(Turnaround)
Maintaining accurate & timely data on aircraft arrival/departure times & passenger loads, and then scheduling (and rescheduling) aircraft servicing requirements based on these data.
Initiatives that apply digitalization to improve business platform efficiency
most often engage participants in first-order learning with regard to the targeted
business platform. First-order learning engages participants in refining their
understandings – and, as a result, the collective understanding – of a business
process, but does not substantially change the assumptions and foundational
243
reasoning on which these understandings are based. Consider, for example, a
customer support business platform. First-order learning takes an organization’s
existing approach to customer support and strives to incrementally improve this
current approach as knowledge is gained about what is working well and what is not
working well. It is only natural in a well-run customer support operation to expect
customer support staff to identify problems, find solutions for these problems, and
then embed these solutions within ongoing customer support work activities. Such
incremental knowledge accumulation represents the learning curve often observed
with repetitive work activities.
Business Platform Effectiveness
A third target of digitalization investments is business platform
effectiveness, or improving the quality of the platform (e.g., convenience,
availability, security, etc.) or the quality of one or more of the hosted business
processes (e.g., ease-of-use, accuracy, responsiveness, comprehensiveness,
reliability, etc.). The value drivers for business platform effectiveness tend to be
similar to those affecting business platform efficiency, with the addition of first-order
learning about the market ecosystem within which a business operates. Learning
about a market ecosystem involves better understanding the natures of the products
and services being exchanged within the ecosystem and better understanding both
the natures of each of the communities (e.g., consumers, producers, suppliers,
intermediaries, competitors, etc.) participating in the ecosystem and the motivations
that underlie community members’ decisions to participate. Referring back to Table
11-2, FedEx, Dell, Walmart, and Southwest Airlines have each proven to be
244
exceptional in their abilities to apply digitalization to improve the effectiveness of the
identified business platforms.
Business Model Innovation
The fourth target of digitalization investments involves organizations’ business
models – more precisely, initiatives focused on disrupting one or more market spaces
through business model innovation. A business model is a simplified and
aggregated conceptualization of the value-creating, profitability-sustaining activities
of an organization. Regardless of whether an organization is one of many producers
competing in the same market ecosystem or a network orchestrator that has
fashioned its own market ecosystem (typically within a market space populated by
competing market ecosystems), the organization’s business model consists of four
distinct elements:
A value proposition defines how an organization will distinguish itself within the markets that it has chosen to participate through its ability to
attract consumers (for organizations competing in pipeline ecosystems) or the members of participating communities (for organizations competing in network ecosystems).
A profit model consists of revenue and cost models. Revenue models describe where, when and how revenue streams materialize. Cost models
describe the costs to be borne in producing the revenue streams associated with the value proposition and how these costs will be controlled to provide requisite levels of profitability.
Core capabilities refer to the tangible resources (e.g., facilities, machinery, digital devices, etc.) and intangible resources (e.g., people, knowledge,
operational and managerial processes, patents, architectures, etc.) needed to successfully implement the value proposition and profit model.
Dynamic capabilities refer to the intangible resources (e.g., people,
knowledge, relationships, managerial processes, architectures, etc.) needed to (1) sense and assess opportunities for business model innovation and (2)
successfully implement these innovations.
245
Figures 11-3 and 11-4, respectively, depict a business model applied by Apple and
by Walmart (both of which are pipeline organizations); and, Tables 11-3 and 11-4
depict business models applied by TopCoder and Metropia (both of which are network
organizations).
Figure 11-3
Apple’s Business Model for the Consumer Smart Device Market
Value Proposition Profit Model
Core Capabilities
Dynamic Capabilities
• Value-unit: Consumer smart digital devices • Consumer: Technically-receptive &
technically-savvy segments of the personal smart device market
• Innovative & trend-setting products • Seamless access to content across all digital
media
• High product prices driven by stimulating demand and by limiting supply
• Moderate manufacturing & marketing costs • High margins
• Brand management • Technology patents • Product design & product architecture design • Tightly-directed sales & marketing • Tightly-controlled manufacturing & logistics,
performed by third-parties • Relationships with content providers and
with manufacturing & logistics partners
• Knowledge of new digital technologies • Knowledge of evolving desires of first-
adopter consumers • Knowledge of new digital media and of new
means for accessing digital media • Knowledge of product designers & architects • Knowledge of content management
architects
246
Figure 11-4 Walmart’s Business Model for the Household Goods Retail Market
Value Proposition
Profit Model
Core Capabilities
Dynamic Capabilities
• Value-unit: Household groceries & products
• Consumer: Cost-sensitive segment of the mass market
• ‘Everyday Low Prices’ • Retail store availability of a broad range
of products, enabling one-stop shopping
• Low prices, low costs • Moderate margin • High volume, high product
turnover
• Store site selection & store layout design • Tailor local inventory to local market • Shelf-space optimization (merchandizing &
replenishment) • Logistics optimization • Supplier relationships
• Knowledge of new digital technologies • Knowledge of evolving shopping-experience
desires of mass-market consumers • Knowledge of digitalization trends &
innovations in retail-store operations and in logistics
• Logistics designers & technologists • Retail store designers & technologists
Table 11-3
TopCoder’s Business Model
Business Model Element
Description
Client Community Value Proposition
Obtain quality code (e.g., tested against specifications, secure, etc.) within agreed-on schedule and budget.
Client Community Profit Model
Clients pay subscription fee. Clients provide contest incentives (payments to winning
developers).
Developer Community Value Proposition
Earn income, acquire new skills, demonstrate skills and interact with forward-looking technologists.
Developer Community Profit Model
No associated revenue stream (the developer community is the subsidy-side of this network ecosystem).
Core Capabilities
Software development & software development management. Translating software development projects into contests. Contest design & fulfillment. Acquiring, developing and retaining community participants. Creating a sense of community for participants.
Dynamic Capabilities Sensing & identifying software development trends &
innovations. Sensing & identifying new participant sources.
247
Table 11-4 Metropia’s Business Model
Business Model Element Description
Commuter Value Proposition Provide optimal mobility solutions for going from point A to point B. Provide reward points for contributing to the common good .
Commuter Profit Model Subscription fees & transaction fees.
Provider Value Proposition Gain exposure with the commuter community. Gain revenue from servicing the commuter community.
Provider Profit Model Negotiated mobility services costs.
Merchant Value Proposition Build reputation with commuter community.
Merchant Profit Model Exchange goods/services for reward points.
Government Agency Value Proposition
Enhance commuting common good. Obtain mobility-related data. Obtain knowledge from Big Data analytics.
Government Agency Profit Model
Revenue (from developing, launching & enhancing local market platforms).
Licenses fees (from (Big Data/analytics products & services).
Core Capabilities Traffic optimization & Big Data analytics. Interconnect market platform with government/provider processes. Relationship management (all communities).
Dynamic Capabilities Sensing and identifying new mobility services and providers. Sensing and identifying new government regulations.
Devising innovative twists to an existing business model (e.g., Amazon’s one-
click purchase feature) or conceiving of a truly innovative business model (e.g.,
Google’s search platform) requires a special kind of thinking – popularly termed out-
of-the-box thinking – about digital platforms, about business platforms, about market
ecosystems, and about how digitalization can be creatively applied to disrupt the
nature of competition within a market ecosystem. This type of learning is referred
to as second-order learning, where pre-existing ideas and assumptions are up-
ended and looked at with a fresh and open mind. Well-known and very successful
outcomes of inspirational second-order learning within pipeline ecosystems can be
observed with FedEx’s overnight delivery business model, Dell’s build-to-order
business model, Walmart’s Everyday Low Prices business model, and Southwest
Airline’s no-frills, short-haul, have-fun business model. Table 11-5 describes these
four business model innovations. And, just about every early entrant into a network
248
ecosystem market space – think Airbnb, Kickstarter, Uber, TaskRabbit, Groupon, etc.
– has applied an innovative business model.
Table 11-5 Four Pipeline Organization Business Model Innovations
Company
Business Model Elements
Customer Value Proposition
Profit Model Enabling Capabilities
FedEx • Overnight delivery • Guaranteed
delivery
• High margins • Controlled logistic
costs • Customer self-service
• Package visibility • Logistical coordination • Data management
Dell
• Customer- configured products
• Low-cost products
• Competitive prices • Minimal inventories • Industry-leading
cash management
• Product design • Supply chain coordination • Supplier/partner
collaboration
Walmart • Everyday low prices • Product availability
• Industry-leading cost structures
• Sales volume
• Local store merchandising • Supply chain coordination • Supplier/partner
collaboration
Southwest Airlines
• Low fares • Satisfying customer
experience
• Competitive fares • Industry-leading cost
structures • Customer self-service
• Aircraft/terminal operations • Route portfolio
management • Employee relations
Impacting Overall Financial Performance
The end-game objective sought from all organization investments is to improve
the organization’s bottom line: a larger profit for a for-profit organization and a
balanced budget (along with a larger rainy-day fund) for a non-profit organization.
The potential for realizing significant financial gains from digitalization investments
will generally be greater with initiatives that are larger in size and in scope.
Realistically, though, just how much overall financial improvement might be expected
from digitalization investments having differing strategic foci?
Figure 11-5 offers general guidelines about the likelihood of an organization
experiencing an overall financial performance impact from digital investments. In
Figure 11-5, the thicker the arrow going towards Overall Financial Performance, the
249
greater is the likelihood that an impact will be realized. The successful
implementation of a new, innovative business model is likely to have a direct and a
sizable impact on an organization’s overall financial performance. On the other hand,
investments targeted at improving digital platforms most likely will have little direct
impact on overall financial performance – but, improvements in digital platforms
often indirectly impact an overall financial performance via effected business platform
enhancements and/or business model innovations. An example of such an indirect
impact would be an investment to upgrade the servers supporting all of an
organization’s customer-facing websites. While these server upgrades would have
very little immediate financial performance impact, the upgrades should improve the
responsiveness of the customer-facing websites and, in doing so, improve customer
ease-of-use and satisfaction, both of which are likely to spur increased revenues.
Figure 11-5 Impact of Digitalization Investments on Overall Financial Performance
Digital Platform Operations &
Technology Services
Business Platform Efficiency
Overall Financial
Performance
Value Risk
D ig
it a
l I n
v e
s tm
e n
ts
Business Platform Effectiveness
Business Model Innovation
Note also that two aspects of overall financial performance are depicted in
Figure 11-5: value and risk. Value refers to the size of an anticipated financial gain
250
and risk refers to the likelihood that this anticipated financial gain will be realized.
The thickness of the horizontal arrows in Figure 11-5 reflects the potential impact of
digitalization investments on value and on risk. Digitalization investments targeted
at digital platforms generally have little direct impact on an organization’s financial
performance, but relatively little risk is involved. On the other hand, digital
investments targeted at improving business platform effectiveness generally have
sizable direct impacts on an organization’s financial performance, but considerable
risk is present. This risk might arise, for example, because the changes to a business
platform may have been ill-conceived or because the employees expected to engage
with the new business platform revert back to their old ways of doing things. In
either case, some promised benefits may never be realized.
The point just made in the prior paragraph underscores the reality that the
outcomes anticipated from digital investments often require that affected employees
and ecosystem participants must often change their behaviors if anticipated financial
gains are to be realized. Operational personnel are expected to carry out new work
practices, managers are expected to apply better decision processes and/or to act in
a timely fashion, customers are expected to react favorably to product improvements
and to engage with service improvements, and suppliers, intermediaries and strategic
partners are expected to take advantage of newly-exposed content or improved
interorganizational data flows. Such behavioral changes tend to be much more
difficult to put into place than are technology changes.
A Recap and Look Ahead
For better or worse, digitalization has become the dominant enabler of
organizations’ competitive actions – with organizations possessing greater
251
digitalization capabilities outpacing competitors possessing lesser digitalization
capabilities. All competitive actions (be they proactive or reactive in nature) start as
someone’s idea that is fleshed out and then bounced off others. Normally, the greater
the number and variety of contributors, the better the final product. And, the clearer
is a digitalization investment’s strategic focus, the more likely it is that others’
contributions will be on-target and value-adding.
Still, far too many executives, managers and professionals lack an adequate
appreciation of how digital investments are affecting, or might affect, their
organizations’ competitive success and, subsequently, their organizations’ financial
outcomes. This chapter has identified the four targets – digital platform operations
and technology services, business platform efficiency, business platform
effectiveness, and business model innovation – that most often serve as the strategic
focus of digitalization investments. By making clear both an investment’s strategic
focus and the importance of the investment to the organization’s bottom line,
proponents of an investment opportunity are more likely to attract the attention and
interest of others. The next chapter drills deeper into the relationship between a
proposed investment and financial performance outcomes by identifying six value
pathways by which digital investments most commonly affect performance outcomes.
252
Chapter 12. Value Pathways
Invariably, or so it seems, the proponents of a newly-conceived digital
investment believe that the best way to gain support for this investment is to claim
that it will provide their organization with a competitive advantage. In reality, few
digital investments provide the investing organization with a competitive advantage.
Instead, most digital investments are aimed at improving – usually in an incremental
rather than radical fashion – the functionalities already present on digital platforms
or on business platforms.
Consider, for example, a bank’s mobile personal banking solution, or a retail
store’s self-checkout system, or an airline’s mobile check-in application. The very
first introduction of such functionalities provided the investing organization with a
(typically short-lived) competitive advantage. But, once a novel digitalized
functionality is found to be well-received by market participants, imitative
investments by competitors return the market ecosystem to a competitive parity and
are not considered as initiatives taken to gain a competitive advantage. Further,
ensuing investments taken to improve the efficiency or effectiveness of either this
functionality or of the platform hosting the functionality typically have slight, if any,
competitive impact. Of course, a stream of incremental improvements taken over a
period of time may accumulate into a significant competitive advantage, especially
as these investments build on one another – but any one of these investments by
itself is unlikely to produce a competitive advantage.
253
As a rule, justifying any type of investment on unsound grounds just does not
work. Or, worse, the pitch seemingly does work, but only to set expectations that
can never be met.
Organizations undertake digital investments for a variety of reasons. Building
off of the strategic focus concept, each of the topics of this chapter describes one of
six value pathways that collectively reflect how value is created through digitization
and/or digitalization:
Mandate Value Pathway
Digital Platform Renewal Value Pathway
Business Platform Enhancement Value Pathway
Competitive Necessity Value Pathway
Competitive Advantage Value Pathway
Options Generator Value Pathway
Mandate Value Pathway
Organizations regularly make digital investments in response to mandates, or
directives, by external parties. Table 12-1 lists the sources (along with examples) of
many of the mandates imposed on U.S. organizations. Some of these mandates
reflect the requirement to regularly modify installed digital platforms and business
platforms (e.g., accounting system revisions emanating from annual state and federal
tax law changes, the seemingly weekly Microsoft Windows security updates, etc.).
Other mandates occur infrequently, such as changes required in publicly-owned
organizations’ financial reporting systems in response to new governmental
legislation, such as the Sarbanes-Oxley Act of 2002, or the demand imposed on a
producer by a powerful consumer (e.g., a big box retailer) to modify the producer’s
254
downstream-facing business processes. The digital investments associated with the
mandate value pathway are directed toward reducing an organization’s risk
exposure. In other words, by complying with the mandate, the organization reduces
its susceptibility to non-compliance penalties, to possible lawsuits or to lost revenues.
Table 12-1
Sources of Digitalization Mandates
Mandate Source Examples
Federal & State Regulators
• SEC Sarbanes-Oxley requirements • EPA requirements • Privacy requirements
Federal & State Agencies
• Tax agency rules and regulations • Social Security Administration rules
& regulations
External Auditors • Internal control requirements • Business continuity requirements
Technology Vendors • Software upgrades • Hardware upgrades
Strategic Partners • Interorganizational data flows • Interfacing business platform • Interfacing digital platform
Figure 12-1 illustrates this mandate value pathway. There are two primary
(but often intertwined) ways by which digital investments address external
mandates. First, digital investments can remove deficiencies in the business
platforms or specific business processes affected by a mandate. An example of such
a deficiency would be efforts taken to bolster the internal controls built into
accounting or financial information systems in response to Sarbanes-Oxley
regulations. Second, the digital platforms (or the technical services being executed)
enabling these business platforms can be enhanced. For example, another aspect of
the Sarbanes-Oxley regulations involves the necessity of building operational
redundancies into the digital platforms hosting accounting and financial systems to
255
ensure that these systems continue to operate if and when hardware devices,
software systems or networks fail or are crippled.
Figure 12-1 Mandate Value Pathway
Business Processes
Digital Platform(s)
Compliance with
Mandates
Reduced Risk
Exposure
Investment
Business Platform(s)
Digital Platform Renewal Value Pathway
The digital platform renewal value pathway refers to the regular
refreshing of hardware and software technologies that leverage the performance-
price advances experienced with digital technologies and that broaden and deepen
an organization’s digitization/digitalization capabilities. Two avenues typify how the
digital platform renewal value pathway contributes to organizations’ financial
performance improvement (see Figure 12-2). First, upgrading the technology
services used in enabling or supporting business platforms can translate into
operational efficiencies. A common example might involve upgrading the dedicated
servers supporting an Internet sales platform, thereby reducing the per-transaction-
cost of handling an Internet sale. Second, if a digital platform overhaul is broad and
deep, then associated meaningful overall cost-structure improvements may result.
For example, externally sourcing the operation and ownership of an organization’s
256
data centers may reduce the organization’s asset base (e.g., installed digital
technologies, technology professional staff engaged in operating and maintaining
these technologies, etc.) such that a meaningful improvement in the organization’s
return-on-assets metric is observed.
Figure 12-2
Digital Platform Renewal Value Pathway
Business Processes
Digital Platform(s)
Enhanced Business Platforms
Improved Financial
Performance
Investment
Business Platform Enhancement Value Pathway
The business platform enhancement value pathway (the most common
of the value pathways) involves investments aimed at producing significant (most-
often, incremental) improvements to existing business platforms. As depicted in
Figure 12-3, these business platform enhancements are directed at automating
operational and managerial processes, at improving the efficiency and effectiveness
of these processes, and at more fully tapping into the innate talents of the humans
engaged with these processes. Examples might include: providing customers with a
greater variety of ordering or payment options, providing managers with more timely
and accurate data on work-in-process statuses, making it easier for patients at a
medical clinic to update their personal data and medical histories, etc.
257
Figure 12-3 Business Platform Enhancement Value Pathway
Business Processes
Digital Platform(s)
Business Platform
Enhancement
Improved Financial
Performance
Investment
Business Platform(s)
Human Capital
Competitive Necessity Value Pathway
The competitive necessity value pathway reflects organizations’ digital
investments taken in response to competitors’ actions. These responses are most
commonly undertaken for one of two reasons. The first reason refers to an
organization formulating and implementing a competitive action after a key
competitor has struck an action that meaningfully diminishes the organization’s
executing business model. In the absence of a responsive action to enhance – or
replace – this executing business model, some degradation of the organization’s
market position, i.e., market share, reputation, etc., is sure to occur.
The second reason refers to an organization enhancing the business processes
executing on its business platform such that these business processes meet or exceed
what are now recognized as best practices within a market ecosystem within which
the organization participates. Best practices represent the operational and
managerial processes that need to be executed if an organization is to maintain its
258
competitiveness within a market ecosystem. In the absence of best-practice business
processes, some degradation of an organization’s market position is sure to occur.
While a competitive necessity digital investment might have produced short-
term financial performance gains for first-movers, the value of the investment for
most market-ecosystem participants is derived from reducing the competitive risk
exposure that would otherwise arise (see Figure 12-4).
Figure 12-4 Competitive Necessity Value Pathway
Business Processes
Digital Platform(s)
Business Model Enhancement
or Business Platform
Enhancement
Reduced Risk
Exposure
Investment
Business Platform(s)
Human Capital
Competitive Advantage Value Pathway
Some organizations, typically market ecosystem leaders aggressive in their
use of digital technologies and with a high level of digitalization capabilities,
undertake investments aimed at creating business models that will dramatically
differentiate themselves from rivals. While the risks (lowered likelihoods of success
along with high implementation costs) of being a first-mover dissuade many
organizations from such strategies, successful competitive-advantage investments
can provide an organization with significant short-term financial returns and, if the
gained-advantage is sustained, significant long-term financial returns.
259
There are two major tactics followed in applying the competitive advantage
value pathway (see Figure 12-5): building sets of distinctive information capabilities
(most frequently for controlling work activities and/or empowering employees or
customers), and building sets of distinctive business processes. Innovative
information capabilities and innovative business processes, when well-targeted and
well-executed, can enable business models whose value propositions and profit
models go well beyond those being executed by their competitors.
Figure 12-5 Competitive Advantage Value Pathway
Distinctive Business Processes
Digital Platform(s)
Business Model Enhancement
or Business Model
Innovation
Financial Performance Improvement
Investment
Business Platform(s)
Distinctive Human Capital
Distinctive Information Capabilities
Progressive Insurance serves as a vivid example of how enhancing information
capabilities can empower market ecosystem participants and, in turn, dramatically
disrupt the ecosystem. Traditionally in the automobile insurance industry, customers
were given a phone number to call to report an accident involving their insured
automobile. During this call, the customer was assigned a claim number and asked
to visit the insurer’s claim center at a pre-appointed time. At that date and time, the
insurer’s claims adjuster examined the damaged vehicle, determined the extent to
which damages would be covered, and approved a certain payment to the customer.
260
Customers experienced a variety of delays with this business model, the most
important of which were delays in gaining repair approval and receiving payment
from the insurance company.
Progressive Insurance innovatively used digitalization to execute a very
different business model. Roving claims adjusters are able to quickly arrive at an
accident site (usually within fifteen minutes) and, once at the site, use mobile
technologies to register the claim and look up data about the customer, the policy,
and repair histories for the damaged automobile. Finally, while still at the accident
site, the claims adjuster is able to arrange for the automobile to be repaired or to
provide immediate payment to the customer. Progressive Insurance has aggressively
sought ways to empower their employees and, in the process of doing so, distinguish
themselves from other automobile insurance companies.
The other primary tactic for using digitalization to differentiate an organization
competitively involves executing distinctive business processes that fundamentally
change the nature of competition within a market ecosystem. To a large extent, the
business model put into play by Progressive Insurance has done just this. Another
vivid example comes from what might be seen as an unexpected market ecosystem
– the cement industry.
In the mid-1990s, Cemex, a Mexican cement manufacturer, realized that it
was stuck in a commodity business in which price was the primary basis of
competition and where prevailing best practices found cement manufacturers
guaranteeing building-site cement deliveries within a three-hour time window. In
the process of devising a strategy for growing both sales and margins, Cemex realized
that their larger customers would be willing to pay a higher price for ready-to-pour
261
concrete if guarantees were provided that the concrete would be delivered
consistently and reliably within a twenty-minute time window.
Sensing their ability to move into a previously nonexistent market niche,
Cemex built three distinctive business processes for their large customers:
A convenient, responsive and changeable ordering process through which
contractors provide project details, including dates and times when specific mixes of ready-to-pour concrete are needed.
A coordinated manufacturing/delivery planning process enabling Cemex to
schedule when trucks should leave a manufacturing facility loaded with the appropriate mixes of ready-to-pour concrete in order to meet the delivery
guarantee.
A dynamic operational delivery process able to automatically adjust delivery schedules and routes based on weather and traffic conditions, as well as
developments occurring at a building-site.
These new business processes required numerous digitalization investments.
Internet portals were used to provide customers a convenient, easy-to-use means of
placing orders. Delivery trucks were equipped with two-way radios so that a dispatch
center could continually re-route trucks to destinations, if necessary. Satellite space
was leased to facilitate communication and coordination between manufacturing
facilities and trucks across wide geographic areas. Automated decision systems were
implemented that used continually-updated weather and traffic conditions to adjust
manufacturing and delivery schedules. As a result, Cemex has changed the basis of
competition in the cement industry, becoming a leading global competitor.
Options Generator Value Pathway
The options generator value pathway finds an organization investing in
new digitization and/or digitalization capabilities and recognizing up-front that:
although the anticipated near-term benefits will not cover investment costs, the
newly-acquired capabilities will provide the means for obtaining future benefits.
262
Importantly, while some of these future benefits might be clearly envisioned at the
time of the investment, most are not. Typically, then, while the options generator
value pathway provides some immediate financial performance improvements, the
primary investment motivation is to create options for taking yet-to-be-determined
competitive actions – thereby reducing the investing organization’s long-term
competitive risk exposure (see Figure 12-6).
Figure 12-6 Options Generator Value Pathway
Future Digitalization Capabilities
Digital Platform(s)
Future Business
Platforms
Reduced Risk Exposure
Investment
Business Platform(s)
Future Digitization Capabilities
Financial Performance Improvement
Consider, for example, a full-service financial services organization such as
Bank of America. In deciding to offer its customers a suite of mobile personal banking
services, two approaches might be taken. With the first approach, the bank might
introduce the needed digital platforms and business platforms via a piece-by-piece
basis, fully justifying associated investments as each new set of new mobile banking
services is introduced. Following such a strategy, the first banking service
implemented might enable customers to check the status of checking and savings
accounts from a smartphone or tablet. This might be followed, in turn, by
263
implementing services enabling customers to: transfer funds between accounts,
deposit checks, pay a bill, send money to someone else, or link to an investment
account, etc. The advantage of such a piece-by-piece approach is that the
investment required to offer each new mobile banking service is relatively small. The
disadvantage is that fundamental changes might be required for already-installed
digital and business platforms with each subsequent step, resulting in high overall
investment costs.
With the second approach, the bank makes a larger initial digitalization
investment to build a robust (scalable, adaptable, secure, etc.) mobile banking
platform from which just about any type of mobile banking service could be launched.
Building this robust banking platform generates many future options (i.e., the
capability to launch a variety of services, flexibility in deciding when to launch a
specific service, flexibility regarding the nature of each launched service, the ability
to easily change the nature of an already-launched service, etc.). The advantage of
this second approach is two-fold: the strategic flexibility provided, and the likelihood
that the total cost of launching a complete set of mobile banking services will be
lower than that experienced through the step-by-step approach. The primary
disadvantages include the much larger initial investment (an investment that might
never be fully recovered if only a few mobile banking services are actually launched
from the platform) and the delay experienced in launching an initial set of banking
services.
A Recap and Look Ahead
Awareness of the six value pathways described in this chapter should make it
easier for you to both explain to others the justification for a digital investment that
264
you support and understand the justifications made by others for the investments
that they support. You may find that a single value pathway captures the essence of
a proposed investment. Or, as more often is the case, you may find that multiple
value pathways need to be combined in order to paint a complete picture of a
proposed investment’s bottom-line impact:
An initiative proposed to meet the requirements of an external mandate might also upgrade certain digital platform components and incrementally
enhance the affected business processes.
An initiative proposed to meet the demands of a powerful customer might
introduce new digitization capabilities likely to prove invaluable, both now and in the future, in enhancing numerous other business platforms.
Tracing through the distinct value pathways involved in such proposals are sure to
suggest ways to embellish a storyline, with each of these embellishments appealing
to different stakeholders.
Generally, however, convincing others to support an investment proposal
requires more than providing an understandable storyline. Organizations’ investment
funds tend to be a scarce resource, with numerous proposals competing for a limited
resource pool. An effective investment proposal must be both understandable and
persuasive. What is involved in building a persuasive business case for a digital
investment is covered next.
265
Chapter 13. Building a Persuasive Business Case
Fresh thoughts about exploiting digitization and digitalization for competitive
purposes can, and do, originate from just about anywhere inside (technology or
business professionals, technology or business managers, front-office or back-office
employees, etc.) or outside (ecosystem participants, consultancies, news media,
etc.) of an organization. While the spark leading to a proposed digital investment
might have materialized out of thin air, a persuasive business case justifying the
investment does not. Developing a compelling, yet believable, business case requires
a good bit of science (the structure and content of a strong business case), but even
more art (packaging the business case so that it resonates with an audience).
This chapter focuses on the science of business case development. In
accomplishing this aim, the following topics are covered:
The Innovation Cycle
Financial Business Cases and Strategic Business Cases
Building Strategic Business Cases
Building Financial Business Cases
The Innovation Cycle
Before any newly-conceived idea for enhancing an organization’s performance
can become a reality, individuals from across the organization need to be convinced
of the idea’s worth. It is especially important that a broad collection of executives
and senior managers are supportive: those having authority over investment funds,
those having authority over the resources required to implement the idea, and those
likely to be affected, directly or indirectly, by the idea’s implementation. All
266
investment opportunities require resources, and access to these resources is always
hotly contested.
Many, if not most, digitalization initiatives involve innovative aspects, and
transforming an innovative idea into a funded project is especially challenging. By
definition, an innovative idea involves doing new things. Managers hearing pitches
for an innovative idea are almost always going to experience difficulties in grasping
the essence of and the implications of the idea, leading to considerable uncertainty
regarding the idea’s worth. With digitalization initiatives, uncertainty is likely to exist
regarding, among other factors: the amount of resources required; the nature of the
anticipated benefits and the likelihood that these benefits will actually be realized;
the validity of vendor or consultant claims; the technology challenges that might
arise; the natures of the capabilities needed; and, the likely reactions of employees
and of ecosystem participants.
Figure 13-1 depicts the typical flow observed in transforming an innovative
idea into a funded project. This flow is referred to as the innovation cycle because
it applies to all types of ideas for improving an organization’s competitiveness, not
just the ideas involving digitalization.
267
Figure 13-1 The Innovation Cycle
Envision an Innovative
Idea
Mobilize Support
Build the Business
Case
Funding Approval
Implement the Idea
Broaden & Deepen Support
Refine the Business
Case
Yes
No
The innovation cycle begins with someone envisioning how an organization’s
performance might be dramatically improved. While one person may initially come
up with an idea, a core group of proponents typically forms around the idea, and this
group works together to promote the idea’s merits and to identify (and resolve)
potential problems or limitations before others point these out.
Next, this core group of proponents engages in actions aimed at mobilizing
support for their idea. This mobilization of support typically involves:
Expanding the core group by attracting others willing to attach their reputations to the idea and to contribute to efforts to improve the idea.
Identifying within this core group a set of champions, or individuals highly skilled at influencing others to grasp an innovative idea’s worth. Champions are especially good at figuring out what is important to someone else and
then framing the benefits of an idea such that these benefits are grasped and understood.
Identifying and recruiting a small but influential group of senior executives able to effectively interact with their peers in arguing for and politically defending the idea. These individuals are the idea’s executive sponsors.
268
Then, these proponents develop a business case that identifies the value to
be created if the innovative idea is funded and successfully implemented. A
persuasive business case convincingly argues how the idea will achieve specific
benefits and demonstrates that these benefits outweigh invested resources.
Persuasive business cases for digitalization investments achieve this objective in two
ways. First, a persuasive business case is expressed in business terms, not technical
terms. Second, in building and selling a persuasive business case, proponents
engage affected-others early, often and meaningfully. Achieving broad and deep
support for an innovative idea is a communication-intensive activity aimed both at
identifying and attracting new supporters and at identifying and overcoming the
concerns of detractors. As this activity unfolds, the business case is regularly
reexamined, reframed and revised.
The innovation cycle comes to a close with the funding decision, or the actions
of the responsible authority – with the number of and hierarchical-level of involved-
individuals depending on the amount of investment funds requested and the
implementation scope – to release (or not release) the resources required for the
idea’s implementation. Positive funding decisions are most likely when proponents
have attracted an extensive, politically-powerful base of supporters. If a positive
funding decision does not occur, proponents often work to, first, improve the business
case and, then, to broaden and deepen support – such that the idea might be
favorably assessed at some future time.
269
Strategic Business Cases and Financial Business Cases
Persuasive business cases are comprised of two components: a strategic
business case and a financial business case. These two types of business cases
complement and strengthen one another.
A strategic business case creates a narrative that places a proposed
investment within its competitive context in order to accentuate the investment’s
strategic importance. This is usually accomplished by applying one or more value
pathways: the mandate pathway, the digital platform renewal value pathway, the
business platform enhancement value pathway, the competitive necessity value
pathway, the competitive advantage value pathway, and the options generator value
pathway.
A financial business case examines an investment proposal from a
quantitative, benefits-costs perspective. In other words, do an investment’s benefits
flows exceed its costs flows and, if so, by how much? Typically, financial valuation
metrics, such as net present value (NPV) or internal rate of return (IRR), are used to
compare an investment’s valuation against a set target (a specified hurdle rate) or
against competing proposals.
Not surprisingly, digital investment proposals that obtain funding usually
possess a strong strategic business case and a strong financial business case. The
financial business case provides a depiction of anticipated financial performance
outcomes, and the strategic business case richly describes the why, where, when,
and how of these financial outcomes. But, strong business cases are rarely
constructed quickly. As suggested by Figure 13-2, a first-draft strategic business
case is applied in seeding the analyses leading to a first-draft financial business case.
270
However, in putting together this first-draft financial business case, the logic
underlying the strategic business case is likely to be questioned, debated and
improved – resulting in a more compelling and a more realistic second-draft strategic
business case. This refined strategic business case is used to produce a second-draft
financial business case, and so on.
Figure 13-2 Synergistic Relationship Between Strategic and Financial Business Cases
Strategic Business Case
Financial Business Case
Version 1
Strategic Business Case
Financial Business Case
Version 2
Are investment proposals with less-than-persuasive financial business cases
ever approved? It certainly happens, but generally only after a very persuasive
strategic business case (that effectively leverages supporters’ experiences, insights
and intuitions) has been put together.
Building Strategic Business Cases
Developing a convincing strategic business case is especially critical when an
investment proposal is difficult to monetize – which refers to attaching realistic dollar
values to benefits flows in the financial business case. Consider, for example, a
proposal that exploits the capture of digitalized transactional events to introduce a
271
loyalty program. Such a program might reward customers/clients for repeat sales,
community members for contributing content, community members for furthering a
collective goal, etc. If the loyalty program being considered is truly innovative, it
might be very difficult to identify comparable (operating in similar market
ecosystems) and implemented (providing the potential to obtain performance
outcome data) programs. In such a situation, it would be critical to include attention-
grabbing talking points in the strategic business case, such as:
How and why digitalization is essential for implementing the loyalty program.
How and why the implemented loyalty program would enhance the
organization’s competitiveness.
How and why this enhanced competitiveness would produce, directly or
indirectly, financial performance improvements.
How this enhanced competitiveness could be sustained over time.
Building Financial Business Cases
The task of building a persuasive financial business case for a proposed digital
investment may initially seem to be a rather straightforward exercise: accumulating
the anticipated benefits and costs in order to produce a net benefits figure. In all but
the simplest cases, however, this exercise proves to be quite challenging for three
reasons. First, the logic applied to arrive at a proposal’s financial impact is typically
influenced by a far greater number of factors than initially thought. Second, the
realization of many, if not most, of a proposal’s financial benefits is delayed, often
for a considerable period of time. Third, the monetization of a proposal’s financial
impacts typically can be difficult. The ideas provided in this section should enable
272
you to deal successfully with the first and second of these reasons, with the discussion
of benefits monetization covered in the next chapter.
Costs Flows Associated with Digital Investment Proposals
Table 13-1 lists the major types of costs associated with digital investment
proposals. A persuasive financial business case needs to account for all such costs.
The most surefire way for a proposal’s proponents to lose personal credibility is for
them to provide costs estimates that end up being significantly less than the costs
actually experienced.
Table 13-1
Costs Categories for Digital Investment Proposals
One-Time Costs Recurring Costs
Purchases of digital assets required for digital platforms and/or business platforms.
Costs (utilities, digital asset license fees, technology services, salaries of employees, fees paid to service providers, etc.) involved in operating & maintaining installed digital platforms and/or business platforms.
Salaries of employees (technology and business professionals) involved in implementing the (digitization and/or digitalization) initiative.
Salaries of employees (technology and business professionals) involved with and the fees paid to consultancies & service providers for implementing planned enhancements to the installed digital platforms and/or business platforms.
Fees paid to consultancies and/or service providers contracted for implementing the (digitization and/or digitalization) initiative.
Site preparation costs. Work disruptions associated with: • Maintenance of digital platforms and/or
business platforms. • Implementation of planned enhancements
to the installed digital platforms and/or business platforms.
Work disruptions during the implementation of the (digitization and/or digitalization) initiative.
Four aspects of Table 13-1 are especially important. First, costs can be one-
time costs or recurring costs. One-time costs refer to costs that are felt prior to
the operation of a proposal’s installed digital platforms and business platforms (see
Figure 13-3). Recurring costs come into play once the new digital platforms and
business platforms begin to be used and are borne repeatedly over the life of these
platforms.
273
Figure 13-3 One-Time Costs versus Recurring Costs
Year 0 Year 1 Year 2 Year 3 Year 4 Year 5
Initial Implementation
Ongoing Operations and Planned Enhancements
One-Time Costs
Recurring Costs
I n
s ta
ll a
ti o
n
Second, monetizing a proposal’s costs flows does tend to be straightforward,
given that these costs are relatively easy to research and estimate. Costs that are
easily monetized are referred to as tangible and those that are difficult to monetize
are referred to as intangible. While most of these costs tend to be tangible,
intangible costs do arise. For example, changing to a new set of digitalized business
processes is certain to disrupt, to some extent, day-to-day work activities. Such
work disruptions can produce a variety of unfavorable consequences, e.g., fewer
transactions are handled in a given amount of time, an increase in errors is
experienced, a decline in employee morale is observed, etc. While it may be easy to
predict that such disruptions are likely to occur, it can be very difficult to estimate in
advance their extent and the associated dollar values. Proponents of a digital
investment must recognize that some intangible costs are likely to be present and
274
subsequently apply their experience, insight and intuition to identify these costs and
to arrive at credible dollar costs estimates.
Third, it is becoming increasingly common with both digitization and
digitalization proposals that costs are attributed to global and local components. In
other words, the digitization or digitalization capabilities being developed are
intended to be used by multiple work units – with global costs attributed to platform
functionalities applicable to all affected work units and local costs attributed to
platform functionalities applicable to just one, or a few, of the affected work units.
While global costs typically represent the vast majority of a proposal’s overall costs,
the unique needs of work units can require specialized digital assets or enhanced
employee training. Generally, the greater the extent of work-unit specialization, the
greater a proposal’s overall costs.
Finally, a majority of the costs associated with digital investment proposals
take the form of easily-monetized, one-time costs incurred early in a project’s time
horizon. In contrast, as discussed next, a majority of the benefits associated with
digital investment proposals tend to be difficult to monetize and to accumulate
gradually over time, with peak benefits flows occurring late in a project’s time
horizon.
Benefits Flows Associated with Digital Investment Proposals
Table 13-2 provides examples for each of the three primary ways that digital
investments contribute to an organization’s financial performance:
Cost-Reducing benefit: existing cost structures are lowered.
Cost-Avoiding benefit: planned but yet-to-be-experienced costs are
avoided.
275
Value-Enhancing benefit: revenues and/or margins are increased.
A digital investment might be characterized by benefit flows reflecting one, two or all
three of these benefit types. Consider how a digitalization proposal targeted at
improving an organization’s customer support capability might include all three of the
benefit types. If each customer support representative is able to handle 20% more
customers during a work shift, then the cost of a customer engagement decreases,
lowering the cost structures of the products being supported. This productivity
increase may also enable the organization to postpone for three years an already-
budgeted 25% increase in the number of customer support personnel. Finally, by
improving the quality of the customer engagements (as perceived by the customer),
along with improving staff productivity, a 0.5% increase in product sales over the
next year is anticipated.
Table 13-2
Benefit Types for Digital Investment Proposals
Benefit Type Examples
Cost-Reducing
• Lower staffing levels. • Lower cost-of-goods-sold. • Lower inventory costs. • Lower cost of storing a gigabyte of data. • Lower lost sales due to stockouts.
Cost-Avoiding
• No need to hire the additional staff (whose funding has already been approved) to handle expected increases in work volume.
• No need to build a planned distribution center.
Value- Enhancing
• Higher gross margin (with stable cost structures). • Higher rate of sales growth. • Higher rate of repeat sales. • Higher rate of new product introduction. • Higher rate of product/service improvement.
Four aspects of the benefit types listed in Table 13-2 are especially
noteworthy. First, as with costs, benefits can be categorized as being tangible and
intangible. In the customer support example just described, the cost-reduction and
276
cost-avoidance benefits are fairly tangible, while the value-enhancement benefit is
quite intangible. Estimates of monetized cost-reducing and cost-avoiding benefits
are usually readily available from organizations’ archived accounting data/reports.
On the other hand, deriving estimates for value-enhancing benefits is typically much
more challenging as these benefits often arise from new, possibly innovative, market-
focused activities. Most often these benefits reflect either revenues from selling or
licensing goods and services (transaction-based or subscription-based) or revenues
from fees paid by advertisers and third-party producers (again, transaction-based or
subscription-based). The more intangible are these benefits, the more difficult it is
to monetize the benefits and convince others of the projected financial impacts.
Consider the case of an auditing firm that is thinking about investing in a
collaboration platform to be used by its community of staff auditors to post and access
practical knowledge (e.g., new techniques, best practices, client-issue resolution
tactics, etc.) and to interact with one another in resolving client-related issues as
these issues arise. The costs of such an investment are quite clear: the salaries of
platform designers and programmers, the cost of servers to host the interaction
platform and the knowledge platform, auditor training costs, and the expected costs
of ongoing platform operations and maintenance. What is the business value
expected to be gained from this investment? While some reduced costs (less rework
and auditor-hours) and avoided costs (reduced need to hire new audit staff) may be
realized, the primary benefits are associated with enhancing audit-engagement
effectiveness by improving auditors’ capabilities to better meet clients’ expectations
and satisfaction, leading to increased audit revenues. But, project proponents may
experience difficulty convincing others of the validity of these value-enhancing
277
benefits. One approach for convincing others is to point to other auditing firms that
have already experienced and publicized gains from collaboration platforms. We will
cover another way of doing this in the next chapter.
Second, similar to the notions of global and local costs, the benefits flows of
digital investments possess global and local components. Here, the overall benefits
flow is a composite of the benefits flows realized by each involved work unit, as well
as the benefits flows arising from the coordinated actions of these work units.
Viewing things realistically, it is unreasonable to expect that the local benefits flows
will be uniform across all these work units. Adoption and usage rates will vary (often
considerably), as will the extent to which installed functionalities align with the needs
of each work unit. It would not be uncommon, say, for a new set of functionalities
to be implemented at five work units, with two of these units expected to use it
heavily and three units expected to, at best, use it moderately. Expected benefits
flows must realistically anticipate and account for such variations in functionality-
uptake across work units.
Third, it is important to recognize that most benefits flows are fully realized
only with the passage of time. There are two reasons for this. First, since new
functionalities are typically phased-in over time (by work unit, by geographic location,
by functionality, etc.), realized benefits flows tend to grow incrementally and
unevenly. Second, it takes time for employees to learn about, adapt to and apply
new functionalities. Consider, for instance, a digitalization proposal aimed at
reducing HR costs by providing the employees of a global manufacturing organization
(comprised of eight work units) with self-service HR capabilities. A phased-
deployment is being followed, with two operating units being switched over to the
278
new HR environment every six months. Few employees will immediately begin to
use all of the provided capabilities, with most employees transitioning to the new HR
environment over time and at varying rates of speed. Rather than assuming that
100% of the projected benefits would accrue immediately after installation, it might
be more reasonable to expect that a five-year benefits flow would capture, say, 15%
of full benefits after the first six months, 35% of full benefits at the end of Year 1,
60% of full benefits after eighteen months, 85% of full benefits at the end of Year 2,
90% of full benefits after 30 months, 95% of full benefits at the end of Year 4, and
100% of full benefits at the end of Year 5. Of course, the specific percentages to
apply in such a situation would depend on a variety of factors.
Finally, a very common benefit associated with digital investments relates to
empowering affected employees to work smarter and quicker and by relieving them
from routine work activities that have been fully automated. If the resulting
productivity benefits result in lower staffing levels (i.e., fewer employees are needed
and unneeded employees are terminated), the associated benefits flow becomes
quite tangible as the organization’s payroll is directly and immediately reduced.
Often, however, no employees are actually terminated. Instead, the argument is
made that employees will now be able to spend more time on more-valuable work
activities – a benefits flow that is highly intangible and fraught with a looming
credibility peril. A mistake frequently made in building a financial business case is to
assume that the value of such an intangible benefit is calculated by multiplying the
time saved (e.g., hours on an annual basis) by these employees’ pay (e.g., hourly or
monthly pay rate). In reality, only a portion of this time saved is likely to be
converted into new, value-adding work activities and the value of these new work
279
activities may or may not produce a real value greater than these employees’
salaries. In estimating such intangible benefits, the focus needs to shift to
convincingly translating this time saved into actual performance outcomes (e.g.,
lower cost structures, higher revenue flows, greater margins) likely to be realized by
enabling the employees to focus their attentions to higher value-adding work
activities.
Summary
Table 13-3 summarizes the above discussions of digital investment costs and
benefits by providing a checklist of issues to consider when building a financial
business case for a digital investment proposal.
Table 13-3
Checklist for Building a Financial Business Case
Costs Flows
One-Time Costs Tangible (most) & Intangible (some).
Recurring Costs Tangible (most) & Intangible (some).
Global Costs Affecting all involved work units.
Local Costs Affecting only individual involved work units and/or specific groups of involved work units.
Timing Front-ended (most).
Benefits Flows
Cost-Reducing Tangible (most) & Intangible (some).
Cost-Avoiding Tangible (most) & Intangible (some).
Value-Enhancing Tangible (some) & Intangible (most).
Global Benefits Produced by coordinated actions of all involved work units.
Local Benefits Produced only by the actions of individual involved work units and/or specific groups of involved work units.
Timing Back-ended (most).
Employee Productivity Attribute to employees’ incremental, direct contributions to overall financial performance improvement.
A Recap and Look Ahead
Proponents of digital investment proposals face a daunting challenge.
Invariably, the number of competing investment opportunities being assessed far
280
outstrips the investment funds that are available. Recognizing that contending
investment proposals compete against one another, it becomes critical for a
proposal’s proponents to clearly describe how their proposal contributes to financial
performance improvement. For this to occur, a proposal must be easily understood
by the targeted audience, must appeal to this audience, and must be believed by this
audience. Without a doubt, the largest hurdle facing most proponents of digital
investment proposals involves monetizing the benefits flows within financial business
cases such that these numbers are both appealing and believable. This is the topic
of the next chapter.
281
Chapter 14. Monetizing Benefits Flows
Invariably, the benefits flows serving as the core line of reasoning justifying a
digital investment proposal tend to be intangible rather than tangible. If the logic
behind these numbers is perceived as being somewhat sketchy (or, as more often is
the case, simply inadequate), the benefits-side of the financial business case is likely
to be discounted by those assessing a proposal. While this discounting might not be
overt, be assured that it happens.
The only way proponents can combat such discounting is to carefully navigate
a tightrope of aggressiveness (covering all of a proposal’s anticipated benefits flows)
and cautiousness (being realistic and conservative in monetizing a proposal’s benefits
flows). This chapter provides techniques for and examples of how to monetize the
set of benefits flows associated with a digital investment proposal. Similar tactics
can be followed in monetizing a proposal’s costs fialslows. The topics covered
include:
Touch Point Analysis
Financial Analysis Techniques and Sensitivity Analysis
Monetization in Practice: Digital Platform Renewal at BioGen
Monetization in Practice: Intel’s Value Dials Methodology
Touch Point Analysis
Touch point analysis is a technique for monetizing a digital investment
proposal’s benefits flows by specifying where and how to-be-implemented capabilities
impact an organization’s financial performance by tracing through the manner by
282
which organization and/or market ecosystem activities are being touched by
digitization, by digitalization or by both.
Touch point analysis begins by assessing how a proposed digital investment
might be expected to enhance each of the three domains of digitalization (see
Table 14-1 for definitions and examples of each domain). More specifically, the
question to ask is: How might the proposed investment improve …
Transaction handling and coordination within operational domains as key events are sensed and responded to. Digital investments are often aimed
at: increasing transaction speed, volume, accuracy and timeliness; increasing the breadth of events, transactions, documents and situations that are handled digitally; and, increasing the end-to-end
comprehensiveness by which sensed events are responded to, regardless of where an event occurs or whom is involved.
Decision formulation and execution within analytical domains as choices are made (by humans or by digitalized solutions) regarding: what can be
done, what needs to be done, what should be done, how it is done, and when it is done; and, as the outcomes associated with executed decisions are assessed. Digital investments are often aimed at: improving decision
accuracy, speed, comprehensiveness, consistency, etc.; and, at increasing the extent to which all knowledgeable and affected individuals are
meaningfully involved with a decision, regardless of an individual’s physical location.
Human interaction leveraging within collaborative domains as efforts are
made to optimize the local/global outcomes associated with work activities. Digital investments are often aimed at better integrating the knowledge,
perspectives and beliefs held by the individuals associated with a work activity.
A proposal’s strategic business case, as it exists when touch point analysis
commences, is likely to guide the identification of specific improvements within each
of the digitalization domains. Collectively, then, these identified improvements
provide a digital investment’s initiating set of touch points.
283
Table 14-1 Digitalization Domains
Digitalization Domains
Definition Examples of Realized Benefits
Operational
Organizational activities involved in getting tasks done. The entities engaged in task-related activities could include digitalized solutions, humans, teams, organizational subunits, organizations and/or sets of collaborating organizations.
•Enhanced task effectiveness (accuracy, comprehensiveness, timeliness, convenience, etc.) •Enhanced task efficiency (productivity, cost, error, rework, etc.)
Analytical
Organizational activities involved in improving understandings of what things should be done, what things need to be done, what things can be done, how things are done, and how what has been done is assessed.
•Enhanced decision effectiveness (accuracy, comprehensiveness, timeliness, convenience, etc.) •Enhanced decision efficiency (productivity, cost, error, rework, etc.)
Collaborative
Organizational activities involved in enabling digitalized solutions, humans and/or organizational entities to share data, information & knowledge and to cooperate in making decisions and in getting things done.
•Enhanced task effectiveness •Enhanced task efficiency •Enhanced decision effectiveness •Enhanced decision efficiency
Once a proposal’s touch points have been identified, the analysis proceeds by
tracing out the paths through which each touch point is expected to affect bottom-
line outcomes. Two sets of ideas should prove especially useful in describing these
paths. First, a proposal’s strategic focus (or strategic focuses) should identify the
specific digital platforms, business platforms and/or business models being impacted.
Second, four engines of digitalization (see Table 14-2 for definitions and benefits
examples) should be invaluable in helping you to explain how a proposed digital
investment will affect one or more of the targeted digital platforms, business
platforms and/or business models. More precisely, we suggest that you determine:
How will a digital platform’s operations or the services being hosted by the
digital platform be enhanced (or be created) through automation, control, empowerment or interaction?
How will a business platform’s operations or the business processes being hosted by the business platform be enhanced (or be created) through automation, control, empowerment or interaction?
284
How will a business model’s value propositions, profit models and capabilities be enhanced (or created) through automation, control,
empowerment and interaction?
How do these digital platform, business platform and/or business model
enhancements affect the organization’s competitiveness within the market ecosystems with which it participates?
How does this enhanced competitiveness translate into specific financial
performance outcomes?
Table 14-2
Engines of Digitalization
Digitalization Engine
Definition Examples of Realized Benefits
Automation
Simplifying & digitalizing complex tasks & task-sequences, eliminating unneeded tasks, and, as appropriate, performing tasks via digitalization rather than via humans.
•Cost reduction. •Transaction cycle-time improvement. •Responsiveness improvement. •Productivity improvement.
Control
Embedding digitalized rules to identify out-of-control events/situations, such that out-of-control events/situations either do not occur or, if they do occur, are quickly addressed.
•Real-time event/situation monitoring. •Real-time event/situation visibility. •Minimizing the occurrence of inferior decisions & inferior actions.
Empowerment
Providing humans facing decisions with timely, accurate & comprehensive information and with easy-to-use, relevant decision aids & business intelligence tools.
•Broad distribution of and access to data, information & knowledge. •Broad availability of & access to decision aids & business intelligence tools.
Interaction
Enabling humans, digitalized solutions or both to engage in timely, meaningful dialogues (overcoming barriers of space and time).
•Complex & nonroutine business activities handled quicker & better. •Problems & opportunities handled quicker & better. •Innovative activities handled quicker & better.
A key element of touch point analysis involves visually portraying the path of
a touch point’s effects via an impact path diagram. Visually portraying a touch
point’s effects has two important benefits. First, the impact path diagram enables a
target audience to more easily grasp the logical reasoning being voiced. Second, and
more important, the impact path diagram – rather than the proponents of a digital
285
investment proposal – is critiqued, debated and improved, ultimately producing more
appealing and believable benefits flows.
Consider a digital investment proposal to implement an online sales platform
(for Internet sales), an online platform containing rich product information (that
supports both the Internet and traditional sales channels), and that applies the digital
platforms built to enable the online sales platform to improve the traditional sales
platform. As pictured in Figure 14-1, there are four touch points leading to four
competitiveness effects. A first competitiveness effect creates a new customer
segment – individuals whom had never used the traditional sales channel, but would
be attracted to an Internet sales channel. This new customer segment becomes the
source of new sales revenues. A second competitiveness effect is an improvement
in existing-customers’ satisfaction, attributed to the online sales platform, the online
product information platform, and an empowered sales staff. These existing-
customers might use either or both the online and traditional sales channels. These
more-satisfied customers are expected to increase their rates of repeat sales, thereby
increasing sales revenues. A third competitiveness effect involves improvements to
the productivity of the traditional sales staff, which would be more empowered and
would benefit from using the new platform capabilities introduced as a result of the
digital investment. By improving the productivity of the traditional sales staff,
planned staff additions would no longer be needed – thus reducing overall sales cost
structures. The fourth and final competitiveness effect reflects digitalization
enhancements to the traditional sales platform, again reducing sales cost structures.
286
Figure 14-1 Impact Path Diagram: An Online Sales Platform
O n
li n
e S
a le
s
P la
tf o
rm
O n
li n
e P
ro d
u c t
I n
fo rm
a ti
o n
P
la tf
o rm
Margin IncreaseLess Need
For Planned
Additions to the
Sales Staff
More Repeat Sales
New Customers Greater
Sales Revenues
More-Satisfied Existing
Customers
Touch Points Competitiveness
Effects Financial Impacts
Lowered Sales Processing Cost
Structure
Digital Investments
Customer Convenience
Customer Empowerment
Sales Staff Empowerment
Sales Transaction Efficiency
Improvement
Greater Sales Staff Productivity
I m
p ro
v e
d
T ra
d it
io n
a l
S a
le s
P la
tf o
rm
Identifying a proposal’s touch points and developing an associated impact path
is only a first step in the development of a financial business case. The critical activity
that follows involves estimating the dollar-values for each of the financial impacts.
In the case of the online sales platform (Figure 14-1), these dollar-value estimates
would require answers to a number of questions, including:
How many new customers would be attracted by and use the new Internet
sales channel? What is the average order amount for such a customer? What are the rate of and the average order amount of repeat orders?
How many of these new customers would also begin to use the traditional sales channel? What is the average order amount for such a customer? What are the rate of and the average order amount of repeat orders?
How many existing customers would begin to use the Internet sales channel? How many would switch over completely to the Internet sales
channel?
For existing customers continuing to use the traditional sales channel, how will the average order amount, customer satisfaction, and rate and amount
of repeat orders change?
287
What is the relationship between customer satisfaction and the size/rate of repeat orders?
For the sales representatives staffing the traditional sales channel, what level of productivity improvement is likely to be observed?
For the improved traditional sales platform, how much will the processing cost of a transaction decrease?
Who is best positioned to provide believable answers to such questions? Most likely,
the individuals building this financial business case would find themselves talking to
sales managers, marketing managers, sales representatives and accountants, as well
as consultants, technology vendors and contacts in other retail organizations.
Figure 14-2 provides another example. Here, an auditing firm is considering
a digital investment proposal targeted at building two business platforms: an audit
knowledge platform to be used by the firms’ community of staff auditors to post and
access knowledge about new techniques, best practices and client-issue resolution
tactics, and an auditor community interaction platform enabling the firm’s staff
auditors to interact with one another and with clients in resolving client-issues as
these issues arise. Figure 14-2 depicts two touch points and four competitiveness
effects. A first competitiveness effect is an expected increase in client satisfaction,
which should lead to the auditing firm experiencing increased client revenues and a
higher rate of repeat engagements. A second and a third competitiveness effect find,
respectively, higher satisfaction levels and higher productivity levels associated with
the firm’s staff auditors, both of which can be attributed to these individuals’
heightened learning opportunities and higher performance levels. As staff auditor
satisfaction increases, turnover rates should fall and the recruitment of new auditors
should be easier – both of which contribute to lowered auditor recruitment costs. A
final competitiveness effect finds the increases in auditor effectiveness and efficiency
288
resulting in a lowered client-engagement cost structure, with this lowered client-
engagement cost structure expected to increase the firm’s margin.
Figure 14-2 Impact Path Diagram: Auditor Collaboration Platforms
A u
d it
o r
C o
m m
u n
it y
I n
te ra
c ti
o n
P
la tf
o rm
A u
d it
K
n o
w le
d g
e
P la
tf o
rm
Margin Increase
Lowered Auditor
Recruitment Costs
More Repeat Engagements
Client Satisfaction
Greater Sales
Revenues
Greater Audit- Engagement Productivity
Touch Points Competitiveness
Effects Financial Impacts Digital
Investments
Auditor Effectiveness
Auditor Efficiency
Auditor Satisfaction
Lowered Audit- Engagement
Cost Structure
For a third and final example, consider an investment by a social networking
site (e.g., Facebook, LinkedIn, etc.) to deploy a messaging functionality within its
platform. Clearly, the individuals engaging with others through the social networking
site would already be using other messaging applications, such as those on these
individuals’ smartphones. Why, then, would the social networking site introduce a
proprietary messaging functionality? As seen with the impact path diagram portrayed
in Figure 14-3, the answer is very straightforward. Two competitiveness effects are
expected to arise as the site’s members switch to the proprietary messaging
functionality. First, members finding it convenient to use the messaging functionality
will spend more time on the site as (1) it is likely that members’ messaging-partners
will also be members of the site, and (2) members will not have to leave the site
289
(physically or cognitively) to send an outgoing message or receive an incoming
message. Once an individual leaves a site, they may not immediately return to the
site. The more time spent by members on the site, the greater the opportunities for
advertisers and for producers of complementary goods and services. Second,
members finding it convenient to use the messaging functionality will be motivated
to encourage any messaging-partners whom are not members to become members,
thus increasing the membership growth rate. More members directly translates into
more opportunities for both advertisers and producers of complementary goods and
services.
Figure 14-3
Impact Path Diagram: Social Networking Messaging Functionality
M e
s s a
g in
g
F u
n c ti
o n
a li
ty
Greater Fees from Producers of Complementary
Goods & Services
Increased Time Members Spend
on Platform
Greater Fees from
Advertisers
Touch Points Competitiveness
Effects Financial Impacts Digital
Investments
Member Convenience
Increased Membership Growth Rate
(from Members Recruiting New
Members)
Financial Analysis Techniques and Sensitivity Analysis
Once a digitization proposal’s benefits and costs flows have been monetized,
financial analysis techniques are applied in assessing the attractiveness of the
investment. Typical financial analysis techniques used include:
290
Net Present Value (NPV): calculates the expected monetary gain or loss from an investment by discounting benefits and costs flows, using a required
rate of return.
Internal Rate of Return (IRR): calculates the discount rate at which the
present value of expected cash inflows balances with the present value of expected cash outflows.
Payback Period: calculates the length of time for an investment’s benefits
flows to balance out its costs flows. In other words, it is the point-in-time when accumulated cash inflows begin to exceed accumulated cash outflows.
Each of the above (as well as other) financial analysis techniques possess specific
advantages and disadvantages, and organizations and individuals have preferences
regarding which is most informative in certain situations. Experience suggests that
it is best to view these financial analysis techniques as complements rather than as
substitutes. Demonstrating that a digitization proposal promises to produce
significant financial performance gains through the lenses of multiple, meaningful
financial analysis techniques usually increases a proposal’s appeal and believability.
In their most-often used forms, most financial analysis techniques assume that
projected benefits and costs flows will occur with certainty. However, there are many
reasons why the assumptions used in monetizing benefits and costs flows may prove
erroneous:
Key assumptions are too optimistic, too pessimistic or just flat wrong.
Important factors may have been omitted (intentionally or unintentionally).
The organization or the competitive environment may change from when an
analysis was performed, thus fitting poorly with the investment context that exists when a funding decision is being made.
Consequently, it is always desirable to demonstrate the robustness of a proposal’s
anticipated financial performance impacts through a sensitivity analysis. In a
sensitivity analysis, the numbers inserted into a financial analysis are
291
systematically varied so as to account for differing assumptions and varying
competitive conditions. Analyses with subsequently consistent results over a wide
range of assumptions and environmental conditions are said to be robust, and more
robust analyses are always more believable than are less robust analyses.
Monetization in Practice: Business Platform Renewal at BioGen72
We now illustrate the monetization of benefits flows through two examples.
The first example (presented below) describes the efforts taken to renew digital
platforms and business platforms at a biogenetics firm. The second example
(presented in the next section) describes a benefits monetization methodology
developed and used by Intel.
BioGen is a biogenetics firm whose scientists are dependent on being able to
digitally log samples, gather data automatically from analytical instruments, perform
mathematical calculations, track sample progress, produce data reports for
customers, and provide a database of raw data for archival retrieval. The business
platform that enables most of the BioGen R&D laboratory’s digitalized business
processes is the laboratory network system (LNS) – a highly-customized platform
installed eight years ago. No longer supported by the vendor, LNS is suffering an
increasing number of (mostly minor, but occasionally major) software and hardware
breakdowns. Over the last three years, budgetary requests for upgrading or
replacing the current LNS have been denied. Finally, senior management has
expressed a willingness to consider a proposal to both replace the current system
72 This case example is adapted from: “Biogenetica: San Jose ITSA Replacement,”
developed by B.C. Wheeler and G.M. Marakas, Kelley School of Business, Indiana University,
1999.
292
and resolve some of its deficiencies, the most important of which is the significant
amount of time R&D laboratory managers currently spend monitoring day-to-day
operations. The proponents of the LNS proposal have developed what they believe
to be a strong financial business case.
When the existing LNS was initially justified, the business case that was built
focused on efficiency and productivity improvements to enable the BioGen R&D
laboratory to meet increasing workloads without hiring additional staff. As a by-
product of removing operator involvement in data collection and transcription, data
quality was improved. The objective of meeting operational workloads without hiring
new staff was not only achieved, but surpassed: the current workload is estimated
at 160,000 tests per year against the maximal target of 120,000 tests per year used
with the earlier business case – without any new staff being hired and staff in some
areas, such as quality control, being reduced. It is generally accepted by BioGen’s
executives that the existing LNS has produced at least $200,000 in annual staff
savings, the equivalent of five full-time employees (FTEs). In addition, the
capabilities of the existing LNS in enhancing R&D laboratory operation, audit trailing,
and data validation proved critical in the laboratory’s success in gaining accreditation.
If the existing LNS is not replaced and subsequently fails in a dramatic manner,
the BioGen R&D laboratory would:
Not be able to meet its current workload without increasing staff resources.
Be forced to revert to manual operations with a subsequent loss in productivity (i.e., the need to increase the laboratory staff by 5 FTEs) and
the possible introduction of data transcription and manipulation errors.
Not be able to provide the timely data needed to fulfill regulatory obligations, placing laboratory accreditation in jeopardy and requiring that
most procedures and audit mechanisms be redesigned and rewritten.
293
Not be able to produce the data and support currently being provided to senior management and to other departments such as marketing.
The proposal to replace and enhance the LNS involves three phases. Phase 1
involves the selection of a vendor. Phase 2 involves the design, installation and
deployment of the new LNS. Phase 3 involves ongoing maintenance and support of
the new LNS. Table 14-3 summarizes the cost estimates associated with each phase.
Table 14-3 Estimated Costs for the BioGen LNS Renewal Proposal
Project Phase
Activity Estimated
Costs Explanations
1 Project planning $ 8,000
2
Network Software Acquisition $ 150,000 Maximum of 30 Network Users
Network Software Customization
$ 80,000 1 FTE (IT Professional)
Network Hardware Acquisition $ 20,000
Interface Software Acquisition $ 20,000
Software Implementation and Testing
$ 160,000 2 FTEs (IT Professionals)
Other Hardware Acquisition $ 90,000 Personal Computers, Printers, etc.
Pre-Installation User Training $ 10,000
Project Management $ 62,000 ½ FTE (IT Manager)
TOTAL $ 592,000
3 Network Maintenance and Trouble-Shooting
$ 60,000 Annually
A number of tangible and intangible benefits have been identified that could
be included within the LNS renewal financial business case. It was decided, however,
to build a very conservative financial business case – one that restricted the benefits
to those that were applied in justifying the current LNS. These benefits flows are:
Continued avoidance of any need to hire additional laboratory staff (five FTE for a total of $200K annually).
Increased productivity (+33%), without an increase in headcount, allowing
the laboratory staff to be reduced by an additional FTE ($40K annually).
Anticipated benefits that are not being monetized include:
294
Opportunities for a further productivity increase (at least 10%) with the existing headcount (e.g., by faster system response times and additional
automation of equipment interfaces).
Reduced management time on laboratory operational activities (repairing
obsolete hardware, resolving system problems).
Improved management control and reporting.
Improved ease of use, particularly for temporary/replacement staff.
Retaining laboratory accreditation.
Using a system life of seven years after installation, the resulting financial analysis
produced positive outcomes (shown as Table 14-4). A sensitivity analysis increasing
costs by 20% still produced positive financial outcomes (NPV = $ 91,000; IRR =
18%; Payback = 4 years).
Table 14-4
Conservative Financial Business Case for the LNS Renewal Proposal
Years
1998 1999 2000 2001 2002 2003 2004 2005
Benefits Flows ($1000)
240 240 240 240 240 240 240
Costs Flows ($1000)
-600 -60 -60 -60 -60 -60 -60 -60
Net Benefits ($1000)
-600 180 180 180 180 180 180 180
Cumulative Net Benefits ($1000)
-600 -420 -240 -60 120 300 480 660
Discount Rate = 12%
Net Present Value (NPV) -=$198,000
Internal Rate of Return (IRR) = 23%
Payback Period = 3.3 Years
Just How Persuasive is this Business Case?
If you were BioGen’s senior management, would you find this financial
business case to be persuasive? Have all costs been appropriately considered? Have
all the potential risks been considered? For example, costs might very well be
295
expected in resolving problems that arise in migrating users from the old LNS to the
new LNS, in dealing with post-installation user training and support, or in assuring
that accreditation requirements are being met with the newly-implemented LNS.
Do the monetized benefits seem reasonable? If the existing LNS were to
disappear with the laboratory reverting to manual operations, is it reasonable to
assume that the workload would require the rehiring of five full-time employees?
Might not laboratory work process and equipment improvements have occurred over
the past decade, reducing some of these historical staffing needs?
Should an effort have been made to monetize the intangible benefits? What
is the risk exposure from losing accreditation (e.g., having to use third-party,
accredited laboratories for many testing procedures)? What would it cost to maintain
accreditation were the existing LNS to fail? Is it more reasonable to expect the
existing LNS to fail completely or to only partially fail? Could sensitivity analyses be
used to examine a range of failure scenarios? How much management time is likely
to be saved, and how much of this ‘saved’ management time would actually be
productively applied (and how would it be productively applied)?
In building a financial business case, it is often difficult to know how
comprehensive and detailed the business case should be. A point will always be
reached where the value gained from additional analysis is less than the incremental
cost. The key in determining when to stop involves understanding your target
audience and what this audience expects to see. Just how conservative are they?
Will they be receptive to the monetizing of intangible benefits? Do they expect to
see robust sensitivity analyses? Are they more likely to approach the funding decision
with a bias for or against the proposal? Ideally, your own experiences, as well as
296
your organization’s existing proposal evaluation policies, guidelines, procedures, and
templates should provide you with insight as to the depth of analysis expected in a
financial business case.
Monetization in Practice: Intel’s Value Dials Methodology73
Intel, a leading semiconductor firm, uses a very pragmatic approach in
directing and facilitating the development of financial business cases for proposed
digital investments. With Intel’s Value Dials Methodology, a set of key performance
indicators (see Table 14-5) are used in framing all digital investment proposals.74
When executed well, the Value Dials Methodology results in the building of financial
business cases that fit extremely well with Intel’s business strategies. Hence, these
financial business cases are likely to be understood and appreciated by executives
across the organization.
73 M. Curley, Managing Information Technology for Business Value, Intel Press, 2004. 74 Adapted from M. Curley and R. Lansford, “Using an IT Business Value Program to
Measure Benefits to the Enterprise,” White Paper, Intel Information Technology, 2009.
297
Table 14-5 Value Dials Methodology: Key Performance Indicators
Key Performance Indicators
Equation
Days of Inventory (Value of One Day) x (Days of Inventory Removed) x 15% (Weighted Average Cost of Capital)
Days of Receivables (Dollar Value of Receivables) x (Days of Receivables Removed) x 15% (Weighted Average Cost of Capital)
Days of Payables (Dollar Value of Payables) x (Days of Payables Added) x 15% (Weighted Average Cost of Capital)
Headcount Reduction or Avoidance
(Number of Headcount Reduced or Avoided) x (Average Burden Rate for Region and Job Type)
Employee Productivity (Number of Employees Affected) x (Time) x (Average Burden Rate) x (50%)
Employee Turnover (33% of Annual Burden Rate and Region and Job Type) x (Number of Headcount Turnover Avoided)
Removing Unneeded Technology Solutions or
Business Solutions
Cost of Operating and Maintaining the Technology Solutions and/or Business Solutions
Materials Discount (Prior Materials Pricing) – (Current Materials Pricing)
Hardware and Software Purchase Avoidance
Total Cost of the Hardware and/or Software Avoided
Table 14-5 (Cont.)
Value Dials Methodology: Key Performance Indicators
Key Performance Indicators
Equation
Other Cost Avoidance (Actual Unit Cost Reduction) and/or (Quantified Increase in Margin) and/or (Total of Actual Costs Avoided)
Factory Uptime Increase (Value of Product) x (Volume Increase)
Scrap Reduction (Total Value of Scrap Reduced and/or Avoided)
Business Process, Business Continuity and Security Risk Avoidance
(Value of Risk) x (Probability of Occurrence)
Time-to-Market (Value of Increased Market Segment Share) x (Number Weeks Accelerated to Market)
Open New Markets (Increased Volume) x (Average Selling Price)
Optimize Existing Markets (Increased Volume) x (Average Selling Price)
Cross-Selling (Increased Volume) x (Average Selling Price)
Solidifying Intel’s Being Selected as a
Vendor of Choice Increased Value of Intel’s Stock Price
Direct Income Total Amount of Income Generated by the Sale to External Companies of an Internally Developed Product or Service
298
Consider, for example, a proposed digital investment targeted at increasing
employee productivity and the quality of customer interaction associated with the
customer order-handling processes within one of Intel’s manufacturing operating
units. After working the numbers, proponents arrive at performance gain estimates
for four key performance indicators (see Table 14-6): days of inventory, volume of
daily orders handled, employee head count reduction, and market segment share
increase.75 By applying the Value Dials Methodology, what initially may have seemed
to be a set of quite intangible benefits have been transformed into financial outcomes
that have high likelihoods of being understood by the executives responsible for the
funding the digital investment proposal.
Table 14-6
Anticipated Financial Outcomes for Four Key Performance Indicators
Key Performance
Indicator
Current State of the
Indicator
Anticipated State of the
Indicator
Value (Annual)
Days of Inventory
30 28.5 $ 3,000,000
Daily Orders Handled
20 35 $ 500,000
Head Count 900 850 $ 5,000,000
Market Segment
Share 55% 56% $ 33,000,000
A Recap and Look Ahead
The ideas presented so far should enable you to contribute in meaningful ways
when fashioning a proposal for a digital investment. Meaningfully monetizing the
business case is especially important, as the result should be a proposal that is more
persuasive, more easily defended against critics, and more likely to be funded.
75 Adapted from M. Curley, Managing IT for Business Value, Intel Press, 2004, p. 93.
299
Once a digital investment proposal has been funded, the likelihood that
promised benefits are realized becomes dependent on the effectiveness of the
funded-proposal’s implementation. Two related-but-distinct planning tasks must be
accomplished. First, implementation planning is performed to accurately specify all
the activities to be carried out when implementing the digital investment. Second,
project management planning orchestrates the execution of these implementation
activities. In fact, a rough, first-cut effort at specifying a proposed investment’s
implementation plans and project management plans needs to occur when building
the investment’s financial business case. It is only by anticipating what will be
involved in successfully implementing a digital investment that all needed activities
and resources will be included in the financial business case.
300
Chapter 15. Implementation Planning
Successfully implementing a funded digital investment proposal involves
numerous activities, even when the investment is seen as being relatively
straightforward. As the digital platforms and business platforms associated with an
investment’s implementation increase in number, sophistication and/or
innovativeness, the number and complexity of these implementation activities
increase as well, but at an exponential rather than linear rate. If critical
implementation activities are overlooked (or worse, intentionally skipped to reduce
costs to speed up an implementation), the most likely outcomes are either that an
investment’s actual implementation costs end up far exceeding those specified in the
proposal’s financial business case or that the proposal’s promised benefits are only
partly, if at all, realized.
Implementation planning involves identifying all the activities likely to be
required in successfully deploying a digital investment. Successful deployment
usually requires two types of activities: those undertaken to acquire (and, if needed,
to build) and install digital platforms and business platforms; and, those undertaken
to motivate and train the individuals who will be using, operating and managing the
newly-installed digital platforms and business platforms. This second set of activities
is especially important because, increasingly, digital investments require affected-
individuals to acquire new skills and to change their behaviors, often in dramatic
ways. This chapter thus covers two topics:
The Implementation Process
Organizational Change
301
The Implementation Process
Figure 15-1 portrays the implementation process, depicted as a five-stage
process.76 The implementation process involves the activities required in moving
an idea for a digital investment forward and obtaining funding, for designing and
installing digital and business platforms, and for taking steps to ensure that the
investment’s promised benefits are attained. Tables 15-1 and 15-2 describe the work
activities, beneficial outcomes, and potential problem areas associated with each of
the five implementation process stages.
Figure 15-1
The Implementation Process
Approval &
Funding Configuration
Installation &
Shakedown Inertia
Onward &
Upward
Pre-Installation
Installation & Beyond
76 The names of the stages of the implementation process are taken from: M.L. Markus
and C. Tanis, “The Enterprise System Experience – From Adoption to Success,” in R.W. Zmud
(Ed.), Framing the Domain of IT Management, Cincinnati: Pinnaflex Education Resources,
2000, pp. 173-207.
302
Table 15-1 Pre-Installation Implementation Process Stage
Stage Activities Beneficial Outcomes
Potential Problem Areas
Approval &
Funding
• Develop/evolve strategic business case
• Develop/evolve implementation plan
• Develop/evolve financial business case
• Recruit champions & executive sponsors
• Communicate funding outcome to affected parties
• Understood competitive context
• Understood implementation context
• Vision of the desired future
• Galvanized support • Obtained funding
• Inadequate, unrealistic strategic and/or financial business cases
• Oversold business cases • Inadequate, unrealistic
implementation plan. • Excessive or insufficient
funding
Configuration
• Select & train implementation participants
• Finalize designs of digital & business platforms
• Carry out pre-installation change management
• Finalize implementation plan • Build digital & business
platforms • Test system interconnections
• Preparedness & involvement of all affected parties
• Mindful analyses and designs
• Comprehensive planning
• Thoroughly tested digital & business platforms.
• Insufficient involvement of affected parties
• Inadequate participant training
• Inadequate vendor and/or service provider contracts
• Insufficient resources • Inadequate testing
Table 15-2 Post-Installation Implementation Process Stages
Stage Activities Beneficial Outcomes Potential Problem Areas
Installation &
Shakedown
• Perform data cleanup & data conversions
• Perform change management activities
• Build & implement a user support capability
• Design and implement platform operations & maintenance procedures
• Competent users • Well-performing
digital & business platforms
• Harvested low- hanging fruit
• Operational problems • Disrupted business operations • Poorly trained, disinterested
and/or resistant users
Inertia • Engage in fire-fighting
• Inadequately-prepared users • Underutilized digital & business
platforms • Unrealized benefits • Disenchanted users/executives
Onward &
Upward
• Re-envision & optimize digital/business platforms
• Enhance user capabilities • Redesign authority and
incentive structures
• Innovating users • Effective/efficient
digital & business platforms
• Realized anticipated & unanticipated financial outcomes
• Insufficient executive attention
• Insufficient resources • Inadequate user training
and/or support
303
While the first three implementation process stages can be complex, costly
and time-consuming to carry out, the activities comprising each should be fairly easy
to grasp. An implementation project begins with the approval & funding stage,
where a business case is developed to gain funding approval and, hence, access to
the resources needed for implementation. Typically, the costs flows associated with
this stage are not included in an investment’s business case. Once funding is
obtained, the project moves into the configuration stage, where (1) digital
platforms and business platforms are designed, acquired and/or built, assembled,
and tested, and (2) pre-installation change management activities are carried out.
The configuration stage is followed by the installation & shakedown stage. Here,
the completed digital platforms and business platforms are installed and platform
users, operators and managers are provided the support necessary for carrying out
their platform-related work activities.
What often follows next is an unintended inertia stage. All too often, once a
technology or business solution has been installed, the personnel assigned to handle
implementation activities are assigned to other duties, and platform users, operators
and managers focus their attentions back to their primary work duties. Unless
otherwise incentivized or inspired, these platform users, operators and managers
tend to adopt a do-just-what-is-required attitude toward the newly-installed
platforms. When an implementation effort terminates with this inertia stage, many
– if not most – promised benefits never materialize.
Not all implementation efforts move into or remain in an inertia stage, but
instead transition to an onward & upward stage. In the onward & upward stage,
additional funding is released, which re-energizes all implementation participants. As
304
a result, new learning occurs regarding the nature of the installed platforms, how
these platforms can enhance work practices, and how these work-related
enhancements can positively impact the performance of individuals, work units, the
investing-organization, and the market ecosystem(s) within which the investing-
organization participates. This re-energizing of an implementation’s participants
increases not only the likelihood that promised benefits will be fully realized, but also
increases the likelihood that unanticipated benefits will as well be realized.
Understanding how the net benefits flow associated with a proposal’s financial
business case play out over the five implementation stages is useful in grasping the
full implications of not moving into the onward & upward stage. The point-in-time
net benefits flow reflects the difference between accumulated benefits and
accumulated costs. Figure 15-2 traces out this net benefits flow, with the dotted line
representing an equilibrium point where benefits are fully offset by costs.
Figure 15-2 Net Benefits Flow for a Hypothetical Digital Investment
Time
Zero Net Benefit Flow
A p
p ro
v a
l
& F
u n
d in
g
C o
n fi
g u
ra ti
o n
I n
s ta
ll a
ti o
n &
S
h a
k e
d o
w n
I n
e rt
ia
O n
w a
rd &
U p
w a
rd
Pathway 1
Pathway 2
305
Benefits begin to be realized once digital platforms and business platforms
have become operational. This realization of benefits is likely to be slow at first, but
then accelerates once most shakedown activities (work disruptions, software bug
resolutions, employee skill-building, fine-tuning of new work practices, etc.) subside.
Many, if not most, of the benefits realized during this installation and shakedown
stage involve what are referred to as a project’s low-hanging fruit, or benefits that
materialize without much effort being exerted. Examples of low-hanging fruit
include: replacing costly, inefficient hardware with less expensive, more efficient
hardware; elimination of unneeded software licenses; business process
enhancements gained by eliminating human labor and by reducing transaction error
rates; etc.
While some low-hanging fruit is almost always present, the portion of the
promised benefits from digitization proposals that can be characterized as low-
hanging fruit seems to be shrinking with time. Today, digitalization usually involves
sophisticated uses of technology combined with new ways of working and thinking
about work (e.g., synchronizing task and work flows; enriching decision making
through collaboration and predictive modeling; resolving operational problems by
accumulating and applying new knowledge about the root causes of the problem;
recognizing competitive opportunities, in a timely fashion, within redefined product-
markets; etc.). Importantly, these more-sophisticated digitalization applications
provide higher, but riskier, levels of financial performance gain.
While an implementation effort remains in the inertia stage, few benefits
beyond those associated with low-hanging fruit tend to be realized. Instead,
operating and maintenance costs associated with the newly-installed digital and
306
business platforms accumulate, eroding the gains obtained by picking the low-
hanging-fruit (see Pathway 1 in Figure 15-2).
However, a very different storyline is possible. Pathway 2 in Figure 15-2
indicates an implementation effort that has moved into the onward & upward stage.
(A third pathway is also possible where an implementation effort never enters an
inertia stage, but instead moves immediately into the onward and upward stage.)
With this new storyline, the implementation effort is re-energized after the new digital
and business platforms have been installed, experienced and experimented with.
What has to happen for an implementation effort to be re-energized after the
installation & shakedown stage? Heightened, rather than dissipated, attention needs
to be focused on implementation participants and on platform users, operators and
managers in order to sustain these individuals’ learning about the newly-installed
platforms and about their changed work practices. As depicted by Pathway 2 in
Figure 15-2, additional costs (e.g., salaries of implementation participants, new
digital technologies, lengthier periods of work disruption, etc.) are likely to
accompany this re-energization of the implementation effort. But, more often than
not, this additional investment soon pays for itself with accelerating benefits flows.
While the value of such a late-stage influx of energy and resources might seem
obvious in hindsight, it tends to be difficult to anticipate and to justify within a
financial business case. When implementation planning does not explicitly account
for this second burst of investment, the implementation effort is either very slow in
moving into the onward & upward stage or never enters into it at all.
307
Organizational Change
As introduced in this chapter’s introduction, the promised benefits from digital
investments increasingly require that affected individuals (employees, value-stream
participants and/or market ecosystem participants) learn about and adapt to new
digital platforms, new business platforms, new behavioral contexts and/or new
behaviors. Organizational change, broadly, refers to such requirements to adapt.
The extent of adaptation required – and, hence, the extent of anticipated
organizational change – may be minor, substantial or anywhere in between, and, is
likely to vary considerably across the affected-individuals. Stated in another way,
organizational change occurs when previously-accepted rules of the game no longer
apply.
The greater the extent of organizational change, the greater the effort (that
is, additional implementation activities and associated resources) required for
change-related activities – thus increasing the time and the cost to implement a
funded digital investment. Analyses of the expected extent of organizational change
should always be a part of the processes followed in fashioning strategic business
cases, implementation plans and financial business cases.
A method for assessing the extent of anticipated organizational change
involves estimating the effect of a digital investment on the five design elements
described in Table 15-3: strategies, structures, prescribed routines and
practices, members’ competencies and digitalized solutions. These five design
elements, when considered as a group, constitute the basic nature of a social
organization: why it exists (strategies), how it accomplishes its purpose (structures,
308
routines and practices), and the capabilities (member competences and digitalized
solutions) applied in accomplishing this purpose.
Table 15-3 Social Organization Design Elements
Design Element Description
Strategies The objectives sought by the members of a social organization.
Structures
The authority, accountability, planning, control, coordination, incentive and relationship systems established to guide & direct the behaviors of the members of a social organization such that sought objectives are achieved.
Prescribed Routines & Practices
Sequences of operational & managerial activities (action and decision tasks) that are executed either by the members of a social organization or by digitalized solutions. If prescribed routines and practices are followed, the likelihood is increased that sought objectives are achieved.
Members’ Competencies
The capabilities (acquired through education, experience and training) required of the members of a social organization in achieving sought objectives.
Digitalized Solutions
The digitally-enabled functionalities (hosted on digital platforms & business platforms) that are directly applied toward achieving sought objectives or that otherwise support/enable the members of a social organization.
These five elements of organization design are characterized by
interdependence; that is, each design element has the potential to influence the
other design elements and to be influenced by these other design elements. When
two design elements influence one another, reciprocal interdependence is said to
exist. The questions posed in Table 15-4 provide a starting point for assessing the
amount of organizational change likely associated with implementing a digital
investment.
309
Table 15-4 Questions Useful in Assessing the Extent of Organizational Change
Question Reasoning
How many of the design elements are expected to be affected?
The greater the number of design elements affected, the greater the assessment effort and the greater the amount of change to be managed.
Do changes in certain design elements induce changes in other design elements?
Interdependencies between design elements usually requires more sophisticated assessments.
If change in one design element induces change in another element, is this change reciprocal?
Reciprocal interdependence between design elements usually requires more sophisticated assessments and lengthens the time required to stabilize the social organization after associated digital platforms & business platforms have been installed.
How many installation sites are involved?
Increasing the number of installation sites usually requires a greater assessment effort and a greater amount of change to be managed.
How consistent is the nature of the expected change across installation sites of a multi-site implementation?
Inconsistency across installation sites usually requires more sophisticated assessments.
In order to better grasp the significance of these questions, consider the
following examples:
An investment upgrading the standard tablet used across all of an
organization’s work units that does not affect work routines or practices would require a minimal effort in managing organizational change, as the
only change-inducing design elements would be a digitalized solution (the new tablet) and employee competencies (how to use the new tablet).
An investment digitalizing previously non-digitalized work routines in order
to increase the efficiencies of these work routines; however, this digitalization project would have no effect on the organization’s strategies or
structures, and the installed-functionality would be consistent across all installation sites. This digital investment would require a greater change-
management effort than would the prior investment (the tablet refresh) because three design elements are affected: digitalized solutions, employee competencies, and work routines. Further, certain of these changes are
likely to be reciprocal: in the process of learning new skills, the employees involved may request that changes be made to the digital interfaces (i.e.,
the desktops, tablets, smartphones, etc.) used to access the digitalized functionality hosted on installed business platforms – and possibly to the digitalized work routines.
An investment similar to that just described, but now the functionality of the newly-digitalized work routines would vary across each of multiple
installation sites. This increases the effort of managing organizational
310
change since the training and support to be provided to the installation sites must be tailored to the digitalized functionality to be experienced at each
site.
An investment exploiting a variety of digital technologies to introduce
innovative digitalization capabilities aimed at dramatically modifying the currently-executing business model is likely to require a very significant change management effort as reciprocal changes are likely to be felt across
all five of the design elements.
Assessing the Extent of Organizational Change: The Wentworth Projects77
Healthcare services in the Australian State of New South Wales (NSW) are
carried out by ten Area Health Services (AHSs), which operate under the
administrative oversight of the NSW Department of Health (DOH). Each AHS
operates its own network of hospitals, clinics and associated facilities.
The DOH provided most of the business platforms used by the AHSs since each
individual AHS lacked the resources or funding to develop their own information
systems, i.e., digitalized operational and managerial processes. Because clinical
information systems were given priority over administrative information systems, a
large backlog of digital investment requests existed for administrative information
systems.
In response to this backlog, the finance director for the Wentworth AHS came
up with an idea: if the AHSs pooled their resources, they could form business platform
development consortiums to develop the needed administrative information systems.
After a favorable response was received from the other AHSs, a steering committee
was formed to identify high-priority business platforms. Then, voluntary consortiums
77 The material in this section is abridged from: R. Sharma, P. Yetton and R. Zmud,
“Implementation Costs of IS-enabled Organizational Change,” Information and Organization,
April 2008, pp. 73–100.
311
were formed, on a case-by-case basis, to develop each high-priority platform. Once
a platform had been developed, each of the consortia AHSs then decided whether or
not to adopt and implement the platform.
Three of these platforms are described in Table 15-5: Datapower, Vmoney and
Mimate. Importantly, note from Table 15-5 that: Datapower and Vmoney
experienced full adoption, but Mimate did not; and, the relative implementation cost
and effort was lowest for Datapower, moderate for Vmoney, and highest for Mimate.
Table 15-5 The Wentworth Business Platforms
Business Platform
Size of Consortium
Adopting AHSs
Effort & Cost
Description
Datapower 8 AHSs 8 Low Enable online, real-time access to query data from a DOH human resources business platform.
Vmoney 4 AHSs 4 Moderate
Design and automate operational & managerial processes for paying medical specialists for services provided. These payments were negotiated centrally by DOH. While the same digitalized processes were used across the AHS sites, these processes worked through digital technologies available at each site.
Mimate 3 AHSs 1 High
Enable online, real-time access to query data from existing DOH financial & budgeting business platforms. Implementing Mimate required renegotiating a number of accounting practices affecting cost-allocations between DOH & the AHSs.
By providing answers for the questions posed in Table 15-4, Table 15-6
provides a summary explanation of why these particular implementation efforts and
costs were observed. The only organization design elements changed in
implementing Datapower involved a digitalized solution (enabling an online, real-time
query capability) and the competencies (being able to apply this query capability) of
a few HR staff employees at each adopting AHS. While these changes were
312
interdependent (i.e., the installed query capability led to the training), they were not
reciprocal (i.e., the training did not affect the query capability). Further, these
changes were consistent across the adopting AHSs.
Table 15-6
Assessing Organizational Change for the Wentworth Projects
Questions Applications
Datapower Vmoney Mimate
Organization Design Elements?
Digitalized Solutions
Routines & Practices
Employee Competencies
Structures
Strategies
Elements’ Interdependence?
Elements’ Change-Reciprocity?
Number of Sites 8 4 1
Site Change Consistency? High Moderate Low
Three organization design elements were changed in implementing Vmoney:
the digitalized solution (enabling the business platform), routines and practices (the
digitalized medical specialist payment processes), and the competencies (being able
to carry out the new payment routines via the installed business platform) of AHS
administrative staff involved with paying medical specialists. As with Datapower,
these changes were interdependent, but not reciprocal: adopting AHSs conformed to
a uniform digitalized payment process. However, as existing digital technologies
varied across the installation sites, some installation and training customization was
required for each site.
All five of the organization design elements were likely to be affected for any
AHS desiring to gain Mimate’s online, real-time capability to access data available on
313
DOH’s financial and budgeting business platforms. Changes would be required
regarding the digitalized solution (an online, real-time query capability), routines and
practices (a variety of accounting, budgeting and financial processes would be
affected), the competencies (learning how to carry out the new processes via new
business platforms) of numerous employees at an adopting AHS site, structures (a
new global chart of accounts; some loss of local budgetary autonomy), and strategies
(modifications in the relative power balances between DOH and each AHS). Not only
are these change elements interdependent, but they are highly reciprocal given the
very open-ended ways in which DOH and AHS administrators could choose to apply
the new digitalized capabilities. It should not be surprising that only three AHSs
opted to join the Mimate consortium with only a single AHS deciding to adopt the
Mimate business platform (experiencing high implementation efforts and costs).
Change Management Principles and Tactics
Changing people’s attitudes and behaviors occurs much more slowly than
changing the digital technologies that people use. Many implementation efforts fall
into the trap of carefully considering all the activities involved in designing and
building new digital platforms and business platforms, but then are careless (or,
worse, choose to ignore) all the activities involved in, first, understanding and, then,
changing the mindsets and behaviors of the people who will be using the new
platforms. Finely-targeted and finely-tuned digital solutions will not produce
anticipated outcomes if they are not used and used well. By applying two key
principles, individuals directing change-intensive implementation efforts are more
likely to anticipate, plan for, prepare for, and accommodate the ensuing
organizational change.
314
Principle 1: Organizations are Messy Living Systems, not Machines.
Absolute control is possible with a machine, but not with a person. While a
manager might be able to force an employee to engage in some work activity, the
manager cannot force the employee to persistently apply her talents to the work
activity to the best of her ability or to be creative or to work collaboratively with
others. And, while a manager can motivate and otherwise prepare an employee for
a change-event, it ultimately remains the employee’s choice whether or not to resist,
accept or embrace change. Unless the individuals whose behaviors are to change
willingly accept ownership of and responsibility for these behaviors, it is unlikely that
meaningful change will occur. Managers tend to be much more effective when they
act like gardeners rather than mechanics -- that is, when they see themselves as
growing things rather than changing things.
Principle 2 The Limiting Factor in Organizational Change is the Individual’s Desire and Ability to Accept and Adapt to a Planned Change-Event.
Passion is the key energizer of organizational change. People generally strive
to work toward what they see as the best possible outcome for themselves when
placed in uncertain situations. If the individual (or individuals) orchestrating an
organizational change episode and the individuals being targeted perceive the
change-situation differently or apply very different decision criteria, it is unlikely that
those orchestrating the organizational change episode will be able to piece together
a set of change-management tactics that results in the targeted individuals behaving
as desired. However, if those initiating change and those having to adapt to change
315
come to view the change-situation through compatible lenses, then it becomes much
more likely that effective change-management tactics will be devised and applied.
Inducing individuals to move away from their current comfort zones to a new
set of behaviors will likely prove more successful if the following change-management
tactics are emphasized:
Develop within the targeted individuals an understanding of why the new behaviors are being introduced and how these behaviors will benefit the
individuals and the social organization as a whole.
Provide more-than-adequate training about the new behaviors before and
after any new digital platforms and business platforms are installed.
Provide more-than-adequate support as the targeted individuals begin to apply and experiment the new functionality provided through newly-installed
digital platforms and business platforms. Especially important is just-in-time support – that is, providing individuals with help at the precise time that
help is needed.
Ensure that the situational context reinforces the value of the new
behaviors: visible, active direction and encouragement; visible, active platform engagement by peers; and, positive feedback and incentives.
Provide opportunities for the targeted individuals to contribute to the design,
installation, and evolution of the installed digital platforms and business platforms.
A Recap and Look Ahead
Implementing a funded digital investment, especially one that introduces
significant organizational change, is not a job for the faint-hearted. But, while the
challenges are many, so are the rewards. If a proposal’s implementation plan is
comprehensive and is realistically reflected in the investment’s strategic and financial
business cases, then the likelihood that benefits articulated in these business cases
will be realized is substantially increased.
316
But, having a solid implementation plan and effectively executing this plan are
two very different things. The next chapter covers tactics for transitioning a funded
digital investment into one or more projects, and then fashioning an effective plan
for managing the project(s).
317
Chapter 16. Project Management Planning
Funded digital investments are typically implemented by organizing the
activities identified in an implementation plan as a project and by typically assigning
responsibility for this project to a single individual. This individual is referred to as a
project manager. With a project, a group of talented individuals is temporarily
brought together to carry out an assignment because, collectively, the individuals are
believed to possess the perspectives, knowledge and skills necessary to successfully
complete the assignment.
Projects associated with digital investments differ from many other types of
projects in two primary ways. First, more often than not, digital investment projects
require project participants to undertake some task assignments that neither they
nor their colleagues have previously encountered. Second, again more often than
not, digital investment projects require project participants to closely interact with
some, or possibly many, individuals with whom limited (if any) prior collaborative
experience exists. It is these two attributes – the novelty of assigned tasks and
limited prior participant relationships – that can cause the management of a digital
investment project to be both challenging and risky.
Project management planning involves translating a funded investment’s
implementation plan into a set of work activities that, when completed, will produce
the investment’s anticipated benefits flows. An ineffective project manager can
seriously erode a digital investment’s promised benefits, even when a comprehensive
and realistic implementation plan exists, for a variety of reasons:
The tasks comprising a project can be incompletely or ambiguously defined
or can be intentionally left open-ended.
318
The wrong people are assigned to project teams.
The wrong people can be assigned to work on specific project tasks.
Project tasks can be under-resourced or over-resourced.
Project tasks can be incorrectly sequenced.
Project tasks might start too early or too late.
Project tasks may never be fully completed or may be completed but still produce faulty outcomes.
Such a list could go on and on. This chapter’s four sections address how effective
project management planning can reduce the frequency by which such problems
occur as well as the extent of a problem when it does occur:
The Nature of Projects
Project Success and Failure
The Nature of Digital Investment Projects
Proven Project Management Practices
The Nature of Projects
While the term project is one that we all use, most of us have not thought
about the term very deeply. A project involves a set of interrelated work activities
that is undertaken to achieve a specific outcome and that terminates once this
outcome is achieved. Because projects are temporary in nature, resources (e.g.,
budgets, people, equipment, facilities, etc.) are not permanently attached to them.
This creates five serious management challenges:
Acquiring the resources to successfully complete a project.
Working around the practical reality that many of these needed resources may be available only at certain times and then only for short bursts of time.
Breaking up the project into subprojects that fit the knowledge, skills and time-availability of the individuals assigned to the project.
319
Motivating the individuals participating in project activities to perform at high levels when engaged in project-related tasks even when these
individuals might have other, usually more permanent, work assignments.
Getting a project team’s members to work together effectively and
efficiently, especially when some (or many) of these individuals may not have previously worked together.
In grasping why these challenges exist, it is critical to understand what each
project team member does individually and what the project team does as a whole
(see Figure 16-1). Specific individuals are assigned to project-related activities
based, among other factors, on an individual’s knowledge, skills and availability.
After considering the nature of the assignment given a project team and the
knowledge/skills held by team members, a project plan is put into place that assigns
each member – or, more commonly, subgroups of members – a subproject to
accomplish. If subgroups are assigned appropriate subprojects and if these
subprojects are appropriately defined, resourced, sequenced and coordinated, then
the project team’s assignment should be successfully completed. Project
management is all about engaging in practices aimed at defining subprojects,
sequencing subtasks, assigning subprojects to project subgroups (and possibly to
individuals), and coordinating and tracking the execution of these subprojects as a
project unfolds.
320
Figure 16-1 How Project Teams Work
Subproject Execution
Subproject Accomplishment
Project Accomplishment
Project & Subproject Definitions
Project Team Members’ Knowledge, Skills &
Availabilities
Project Plan • Subproject Sequencing • Subproject-Subgroup
Assignments
Subgroups (& Individuals)
Subproject Coordination
Projects typically involve participants (i.e., the individuals involved with project
activities) and stakeholders (i.e., individuals or entities either having significant
influences on project outcomes or likely to be significantly affected by project
outcomes) holding very different, often conflicting, interests and perspectives. Figure
16-2 portrays a general project environment, and Table 16-1 describes the
participants and stakeholders typically associated with a project. It is not uncommon
for a project team (say, of ten or so members) to contend with hundreds of
participants and stakeholders – some powerful and others inconsequential; some
actively involved with the project and others passively involved; and, some acting as
project proponents, others as project opponents, and yet others indifferent as to
whether the project succeeds or fails.
321
Figure 16-2 Project Environment
Senior Executives & Senior Managers
Internal Users
Project Manager(s)
Project Proponents
Co-Workers
Team Members
Regulatory Bodies
External Users
Subcontractors
Strategic Partners
Vendors & Technology
Service Providers
Project Sponsors
External to the Investing Organization(s)
Internal to the Investing Organization(s)
Internal to the Project
Project Opponents
Peers of Project Participants & Stakeholders
Table 16-1
Project Participants and Stakeholders
Participants & Stakeholders Project-Related Roles
Regulatory Bodies Influence project outcomes.
Strategic Partners Influence project outcomes & engage in activities that complement project outcomes.
External Users Value stream & market ecosystem participants who will use project- targeted digital platforms & business platforms.
Peers Provide project-related expertise & perspectives.
Vendors, Service Providers & Subcontractors
Supply project resources and/or carry out project activities.
Senior Executives & Senior Managers
Allocate project resources & influence project outcomes.
Project Sponsors Provide funding & political support, and approve project objectives & outcome.
Project Proponents/Opponents Influence project activities & outcomes.
Internal Users Members of the investing organization(s) who will use project-targeted digital platforms & business platforms.
Co-Workers Provide project-related expertise & perspectives.
Project Manager(s) Responsible for achieving project outcomes, and for planning, organizing & controlling project activities.
Team Members Responsible for achieving subproject outcomes.
Project Success and Failure
The success or failure of a project is judged on the basis of three criteria:
322
Project Outcome Success: Whether project objectives agreed on by project sponsors have been achieved.
Project Budget Success: Whether project spending is below or above the project’s agreed-on level of funding.
Project Schedule Success: Whether project deliverables are completed before or after agreed-on delivery dates. A project deliverable refers to significant and perceptible project output that is fundamental to achieving
agreed-on project objectives.
These criteria may sound pretty straightforward. But, like most things about project
management, they usually are not. A project that met all three of these criteria
would certainly be considered a success. But, what if a project was on time and
within budget, but its primary sponsor was dissatisfied with project outcomes? Or,
what if a project far exceeded its primary sponsor’s expectations, but was 25% over
budget and missed its promised delivery date by three months? Or, what if a
project’s primary sponsor had (in reaction to a major competitor’s actions) made
radical changes to the project’s primary deliverable four months into the project (with
an original nine-month delivery date), requiring substantial design rework that
ultimately doubled the budget and induced a five-month delay in project completion
time, but eventually produced outcomes that the sponsor valued highly?
It is difficult to attach labels like success and failure to projects without
understanding their contexts, histories and trajectories. But, one project success
metric is universally applied. If a project is understood by its key stakeholders to
have created substantial competitive value, then the project is a success. However,
if a project is viewed as having created little competitive value (e.g., project
objectives went largely unmet, higher-than-expected costs eroded most of the
benefits flows, project outcomes were delivered too late to have a meaningful
competitive impact, etc.), then the project is most likely to be seen as a failure.
323
Achieving successful project outcomes is all about negotiating outcomes and
resources, communicating the nature of each subproject and relating this nature back
to the project-as-a-whole, planning (and re-planning) subprojects, making sure that
subtasks are carried out as planned, and, most important, being smart and politically
adept enough to keep a project moving forward when the project’s plans begin to fall
apart. The project manager’s mantra must be ‘No surprises’! If a plan component
needs to change, it should change – but only after letting stakeholders know what is
to be changed and why. If a planned deliverable date will be missed because of an
unforeseeable event, so be it - but, immediately inform stakeholders of the new
delivery date and explain why the delay will occur. If key project resources have just
been pulled from the project by a powerful executive, revise the project plan
accordingly – but make sure that stakeholders are aware of the revised plan and why
the revision took place.
The Nature of Digital Investment Projects
Digital investment projects often involve high levels of risk relative to many
other types of projects.78 Investment risk is not necessarily bad, as higher risk
typically offers the promise of higher, but more variable, financial returns. The key
to managing a digital investment project well involves: understanding the risks
involved in a project as well as the root cause of these risks; and, demonstrating
sound project management practices that, if executed well, enable a project’s
managers to surface and address risks as these risks arise. The remainder of this
78 S. Dewan, C. Shi and V. Gurbaxani, “Investigating the Risk-Return Relationship of
Information Technology Investment: Firm-Level Empirical Analysis,” Management Science,
December 2007, pp. 1,829-1,842.
324
section focuses on three risk areas often found to derail the success of digital
investment projects:
Heightened Project Deliverables Specifications Uncertainty
Depressed Benefits Flows
Heightened Costs Flows
Heightened Project Deliverables Specifications Uncertainty
A distinguishing aspect of many digital investment projects is the high level of
uncertainty that can exist regarding project deliverables specifications: the
descriptions that accompany each of a project’s digitized/digitalized functions or
components (e.g., a digitalized operational or managerial process, a technology
service, the content and format of a management report, the data to be hosted on a
platform, a platform’s user interface, etc.). Remember, many, if not most, of a
project’s deliverables are tied to novel or significantly-enhanced actions that have
not before been taken or experienced by targeted humans or by targeted digital
solutions. But, these deliverables need to be specified if a project’s stakeholders are
to reach consensus on expected outcomes, if project managers are to develop a
sound project plan, and if project participants are to fashion tactics for carrying out
assignments.
If a project’s deliverables are clearly and comprehensively specified early in
the project’s life, many project-related difficulties can be either eliminated or
substantially reduced. By making clear to all project participants what is to be
accomplished, a number of good things happen, including:
Associated benefits and costs flows are easier to envision, determine and communicate.
325
The extent of organizational change is more accurately estimated.
The to-be-delivered digital platforms and business platforms are more
readily designed, procured and engineered.
Subprojects are more readily defined, sequenced and assigned to project
team members.
The training needed by project team members and by platform users is more readily designed and delivered.
On the other hand, if a project’s deliverables are left uncertain (i.e., as to-be-defined-
later), a project’s management challenges intensify.
The specification of a digital investment project’s deliverables tends to be
characterized by greater uncertainty under two conditions. The first is rather obvious
– the lack of clear, comprehensive initial descriptions of a project’s deliverables. The
second, and not as obvious, condition involves the number, diversity and power of a
project’s stakeholders. The greater the number or diversity of stakeholders, the more
difficult it will be for these stakeholders to reach and maintain a consensus regarding
deliverables. The more powerful the stakeholders are, the more obstinate they are
likely to be about maintaining their individual positions regarding deliverables. Figure
16-3 depicts these determinants of a project’s deliverables specifications uncertainty.
326
Figure 16-3 Determinants of Project Deliverables Specifications Uncertainty
Number/Diversity/Power of Stakeholders
Many/Much/HighFew/Little/Low
P ro
je c t
D e
li v e
ra b
le s
S p
e c if
ic a
ti o
n s U
n c e
rt a
in ty
Clear
Ambiguous
Low Moderate
High Very High
Consider a project to modify a payroll/benefits business platform in response
to a newly-renegotiated union contract. This is an example of a digital investment
project likely characterized by a low level of specifications uncertainty. The new
payroll and benefits functionality is clearly described in the new union contract, and
while there may be many stakeholders, their diversity is low given that their views
are likely to be consistently represented by a few management and union
representatives.
On the other hand, a project targeted at dramatically overhauling an
organization’s sales force automation business platform is likely to have a high level
of specifications uncertainty. While some of the desired functionality can probably
be clearly stated (e.g., the documents and business processes associated with
acquiring and fulfilling sales orders), much of the desired functionality (e.g., how
should a sales team plan for and coordinate customer engagements, how should a
sales team interact with customers and with other sales teams, how should a sales
327
team engage in continual learning to improve their sales capabilities, etc.) is likely to
be quite vague at the beginning of the project. In addition, there is a large, diverse
group of stakeholders (e.g., sales executives, sales managers, account managers,
sales representatives, sales support personnel, administrative staff, clerical staff,
etc.), each of whom is likely to hold unique and distinctive views of how the new sales
force automation business platform should function.
Depressed Benefit Flows
In order for a digital investment project’s anticipated benefits flows to be
fully realized, many things have to go right. Table 16-2 identifies many of the risk
factors that possess the potential to depress the benefits flows actually realized
from a funded digital investment.
Table 16-2 Risk Factors Leading to Depressed Benefits Flows
Risk Factor Vulnerabilities
Project Objectives • Unspecified or ambiguous deliverables. • Lack of stakeholder consensus regarding deliverables.
Project Manager • Lack of competencies (knowledge, skill, experience); turnover.
Project Team Members • Lack of competencies or motivation; turnover.
Executive & Senior Management
• Lack of commitment, involvement or support; turnover.
Market Ecosystem • Competitors’, suppliers’, customers’ or strategic partners’ actions. • Economic events/trends.
Social Organization & Internal Environment
• Changes in strategic intent or in executing business models. • Changes in number & importance of competing investment projects.
Complementary Capabilities • Necessary complementary capabilities not recognized. • Necessary complementary capabilities inadequately provisioned.
Platform Users • Lack of competencies or motivation; turnover.
Digital Technology
• Use of unproven technologies. • Inadequate architectural design. • Insufficient flexibility or adaptability built into technology. • Necessity to integrate multiple technologies.
Vendors, Service Providers & Subcontractors
• Poor quality of delivered products or services.
These risk factors are best illustrated through an example. Consider an
organization that produces and sells complex manufacturing machinery. As a
328
means of differentiating themselves from their competitors, the organization has
decided to engineer into its products a digitalized, networked, self-monitoring and
self-diagnosing capability that can inform its technical service representatives that a
particular machine at a customer site may be about to experience problems and
then support these service representatives as they maintain, troubleshoot and
repair (ideally virtually, but physically if needed) an identified machine. This
enhanced after-sales product support capability is expected to lower the cost of
providing technical service and, more importantly, to reduce equipment downtime
and increase equipment cost-efficiency and reliability for the customer. Expected
benefits could include cost savings, greater sales and higher margins.
What could go wrong with this investment? Here is just a short list:
The rationales behind the investment’s strategic business case and/or financial business case may be flawed.
The project manager may have never before dealt with a similar project and, as a result, fails to recognize – let alone address – critical project issues.
The Vice President of Sales, who served as one of the project’s two executive sponsors, takes a position at another firm.
A major competitor introduces its own line of self-diagnosing, self-repairing
machinery and quickly enlarges its market share.
The new Vice President of Sales radically reshapes how customer
relationships are built and maintained.
The complementary effort to redesign product support business processes is underfunded and, as a consequence, is never fully completed.
The technical service representatives’ incentive system is not revised, for example, to replace bonuses for customer-site visitations with bonuses for
increasing the uptime of customer-installed machinery.
The digitalized solution being designed to diagnose machinery malfunctions produces a high rate of faulty diagnoses.
A third-party satellite-based communications network leased to capture real-
329
time diagnostic data from customer-installed machinery inserts random errors into these data streams.
Consequently, the manager(s) of a digital investment project must understand their
project’s anticipated benefits flows, be aware of likely risk factors, be vigilant to the
surfacing of these risks, take steps to reduce the negative consequences of a risk if
and when it arises, and communicate this risk and the steps taken to project
stakeholders.
Heightened Cost Flows
If the costs of a digital investment project begin to spiral upward, the
investment’s promise of positive financial outcomes can turn into a reality of
meager, perhaps negative, financial outcomes. A listing of the risk factors that
commonly threaten to increase a project’s costs flows is provided in Table 16-3.
Large, complex projects can be very difficult to plan, coordinate and control –
leading to escalating costs flows. Such project management challenges are only
exacerbated with inexperienced project managers or the loss of executive support.
If some project participants (team members or platform users) are unwilling or
unable to competently carry out assigned tasks, then rework or additional work is
necessitated – again increasing project costs. Likewise, uncertain deliverables
specifications, unexpected technical problems and unexpected social organizational
changes inevitably result in both rework and additional work. Again, effective
project management is all about being aware of potential risks, being vigilant with
regard to the surfacing of risks, taking steps to reduce the negative consequences
of a risk if and when it arises, and communicating this risk and the taken-steps to
project stakeholders.
330
Table 16-3 Risk Factors Leading to Heightened Costs Flows
Risk Factor Vulnerabilities
Project • Size, complexity.
Project Objectives • Ambiguous or unrealistic specification of deliverables. • Lack of stakeholder consensus regarding deliverables. • Changes to or additions of deliverables.
Project Manager • Lack of competencies (knowledge, skill, experience).
Project Team • Lack of competencies, motivation or cohesion; turnover.
Executive & Senior Management
• Lack of commitment, involvement or support; turnover.
Social Organization & Internal Environment
• Change in strategic intent or executing business models. • Changes in & number of competing investment projects.
Platform Users • Lack of competencies, motivation or involvement; turnover.
Digital Technology
• Use of unproven technology. • Inadequate architectural design. • Insufficient flexibility or adaptability built into technology. • Necessity to integrate multiple technologies.
Vendors, Service Providers & Subcontractors
• Lack of capabilities. • Inadequate contract or inadequate contract management.
Proven Project Management Practices
Project management has been practiced, informally, for as long as mankind
has been engaged with accomplishing large, complex tasks. How could the Egyptian
pyramids or Roman roadways have been built without someone applying basic project
management concepts? It would have been impossible. That said, the era of modern
project management is generally believed to have begun in the 1950s. Since then,
a large number of formal project management practices (i.e., concepts, techniques,
methods and tools) have been developed and refined.
Here, we focus on just six of these project management practices. These six
practices were selected for three reasons. First, these practices can be applied to
any project with which you might be involved. You will learn how to apply each
practice and, perhaps more important, be motivated to question the management of
projects where these practices are not applied. Second, these practices are
331
generally-effective management practices and learning about them is likely to prove
useful to you beyond the project management context. Third, successfully carrying
out each of these practices should increase the likelihood that a digital investment
project’s expected outcomes will be achieved and, consequently, the likelihood that
promised benefits flows will be realized. These six practices, as well as the objectives
sought through each, are summarized in Table 16-4.
Table 16-4 Six Proven Project Management Practices
Practice Objectives
Project Scoping
• Break up a large, complex project into a set of smaller, more easily- managed subprojects.
• Specify the deliverables associated with each subproject. • Realize some project benefits earlier than would otherwise be the case.
Project Planning
• Define subprojects and each subproject’s tasks & needed resources. • Sequence the subprojects and assign subprojects to project participants. • Produce a project schedule and a project budget.
Project Organization
• Establish accountabilities & oversight responsibilities for the overall project & subprojects.
Project Stage-Gating
• Detect errors of commission (incorrect or unsatisfactory actions) and errors of omission (actions that should occur but do not).
• Reduce rework & delays. • Identify & terminate a failing project as soon as possible.
Project Control • Increase visibility into executing subprojects. • Increase visibility of project/subproject progress.
Post-Project Review
• Determine a project’s realized (i.e., actual) benefits/costs flows. • Determine what went particularly well & particularly poorly, and ensure
that these learnings are applied to future projects.
Project Scoping
A disproportionate number of failed projects tend to be large and complex
endeavors. Invariably, these large, complex failures tend to have considerable
similarity:
A large number of tasks which were, to a large extent, proved to be
relatively independent of other tasks and, hence, could have been managed as a series of subprojects.
A large number of tasks whose deliverables were characterized by
considerable specification uncertainty for considerable periods of time.
332
A lengthy delivery schedule, leaving the project susceptible to a variety of unforeseen events for a considerable period of time.
Effective project managers do not take on large, complex projects. Instead, they
engage in project scoping, or breaking large projects into sets of smaller, more-
manageable subprojects – where later-scheduled subprojects build onto the
deliverables of earlier-scheduled subprojects. Three beneficial byproducts of project
scoping are:
Some project deliverables are delivered sooner, thereby pushing up benefits flows.
Some subprojects are started later, thereby pushing back costs flows.
Stakeholders and platform users are able to experience and learn from the deliverables of completed subprojects and, as a consequence, clarify the
deliverables specifications of future subprojects.
Particularly effective project managers evolve the practice of project scoping
further by treating their subprojects as not being set in stone but instead as involving
constantly changing options, such as those described in Table 16-5. This taking-
options approach to project management recognizes that risk-reducing
information always accumulates as a project progresses and that fully considering
this accumulating information before aggressively moving ahead with an established
project plan is the only way to ensure the best possible project outcome.
333
Table 16-5 Taking-Options Approach to Project Management
Option Description
Defer Subprojects
Indefinitely pause a subproject (i.e., put it on hold until new information is acquired).
Explore a Deliverable
Prior to going forward with a full-scale deliverable, undertake a pilot project aimed at acquiring new information about the deliverable’s specifications.
Expand a Deliverable
Increase the functionality of a deliverable by looking for opportunities to share risk across a greater number of stakeholders or to generate higher financial returns without increasing risk.
Scale Back a Deliverable
Reduce the complexity of a deliverable by looking for opportunities to reduce project risk without compromising benefits flows.
Externalize a Deliverable
Look for opportunities to externalize all or some of a deliverable’s functionality, thereby exploiting opportunities to increase financial returns by reducing costs flows and/or risks.
Abandon a Subproject or an
Entire Project
Recognize the wisdom of terminating a subproject or the entire project when risk escalates to a point where realizing positive financial returns has become unlikely.
Once a project’s scope has initially been established, it is good practice to
negotiate a formal project charter with the project’s sponsors. A project charter
describes the objectives sought through a project, the project’s deliverables, the
timing of these deliverables, and significant project constraints. Essentially, the
project charter serves as a contract between the project team and the project’s
sponsors. That said, effective project managers know that, as with any aspects of a
project, the project charter is always open to renegotiation.
Project Planning
Effective project managers do a thorough job of project planning. Once a
project’s scope is established, it should be possible to identify:
Subprojects and the tasks to be accomplished within these subprojects.
The relationships between subprojects and between tasks within subprojects
(e.g., identifying which activities cannot be started until others have been completed and which activities can be done in parallel).
The resources (facility, equipment, expertise and staffing requirements) and
334
time required to accomplish these subprojects and tasks.
Some project planning most surely occurred when building the financial business case
used to secure a digital investment project’s funding. However, the project planning
undertaken in putting together a financial business case typically involves very rough
approximations that lack the detail needed in an effective project plan. Once a
project manager has taken charge of a funded digital investment, the implementation
plan used in preparing the proposal’s financial business case is revisited, but now in
much greater depth and detail. If the project’s finalized budget and schedule differ
substantially from the estimates used in building the earlier financial business case,
this financial business case should be redone and provided to the project’s sponsors
prior to the start of the project – remember, no surprises.
Staffing a project can produce additional complications when preparing a
project plan. Can the very best people be brought onto the project? Are these people
available now or will some subprojects need to be delayed in order for these specific
individuals to be brought onto the project? Or, should the project keep to the agreed-
on schedule by using other, perhaps less experienced, personnel? Can the project
be fully staffed with internal employees or will contracted employees be used? If
contracted employees are needed, how might this affect the project’s budget,
schedule and risks?
Another staffing issue that has derailed more than a few projects involves
deciding on the number of project team members. It seems intuitive that adding
more staff to a project should shorten the time it takes to complete the project. If it
takes four weeks for two people to complete a subproject, then it would seem that it
would only take two weeks for four people to complete the subproject. Right?
335
Actually, it rarely works out this way. Adding more people to a subproject or to a
task always adds more management complexity (breaking up the work to be done
into smaller pieces, assigning responsibility for these pieces, and coordinating these
work assignments). So, it might take three weeks rather than two weeks, or perhaps
four or five weeks! Experienced project managers understand this and develop an
intuitive feel for when and how to adjust staffing levels in order to meet or beat
project deadlines while maintaining project budgets.
Finally, it is particularly important in project planning to estimate the extent of
organizational change likely to accompany the installation of a project’s deliverables.
It may seem non-intuitive, but experience has shown that projects involving
extensive organizational change often benefit from faster implementation cycles. An
employee’s (spoken or unspoken) hesitance to accept an imposed organizational
change is less likely to take root when the employee is given little time to organize
resistance or to figure out how to retain current work practices (rather than adopt
the new work practices) yet still acceptably complete all work assignments. Such
reasoning is important in determining how a project might be broken up into
subprojects (some of which involve extensive organizational change and some which
involve only minor, if any, organizational change) and how these subprojects are to
be sequenced.
Project Organization
Figure 16-4 depicts a very typical project organization, i.e., a project’s
authority and accountability assignments. One or more project managers comprise
a project management team that has direct responsibility for the project’s success
and that manages the project on a day-to-day basis. Many projects only have a
336
single project manager. However, large projects or projects involving extensive
organizational change often have co-project managers. With co-managed digital
investment projects, one manager (typically a technology professional) focuses on
the project’s technology aspects and the other manager (typically a business
professional) focuses on the project’s business aspects.
Figure 16-4 Typical Project Organization Structure
Steering Committee
Project Management
Subproject D Subproject E Subproject F Subproject G… …
Most major projects have a formal project steering committee, comprised
of two to five executives/managers having project oversight responsibility. The size
of a project steering committee and the organizational rank of steering committee
members generally reflect a project’s importance, budget, and the number of affected
work units. A strategically critical digital investment project whose deliverables are
to be used in numerous work units and that requires a substantial financial
investment would likely have a steering committee comprised of senior executives.
On the other hand, the steering committee for a project upgrading an existing
337
business platform hosting critical operational processes used by a single work unit
would likely be comprised of mid-level managers from this work unit. A senior
executive’s time is much too valuable to be spent overseeing a project that could just
as effectively be handled by a lower-level manager. Digital investment project
steering committees typically include representation from: the business-side (the
sponsoring unit or units, as well as other units significantly affected by a project’s
deliverables); the technology-side (assuring compliance with global technology
standards); and, especially for projects representing a substantial monetary
investment, the finance-side.
The project steering committee meets regularly for project status reviews and
is convened when critical issues surface that need to be resolved by someone with
more authority than that held by the project manager. Examples of such issues
might involve: requests to significantly expand or contract a project’s scope, budget
or delivery schedule; significant delays in critical project deliverables; significant
problems with vendors, providers, and subcontractors; and, unexpected technology
problems.
Project Stage-Gating
A variety of errors (traced, among other things, to inexperience, poor
assumptions, misunderstandings, errors in judgment, poor technology choices, etc.)
can arise in designing, acquiring, developing and configuring project deliverables.
The earlier such errors are detected and resolved, the less rework must be done and
the more likely it will be that a project will stay on-budget and on-schedule. For
example, one of the deliverables likely included within a sales automation business
platform would be a set of performance metrics to be used by regional sales
338
managers in assessing sales teams’ effectiveness. If the specifications for these
performance metrics are not examined and approved (signed off) by the regional
sales managers, then these regional sales managers may end up complaining about
having to work with metrics once the sales automation platform is installed.
Redefining these metrics, possibly capturing new data and then recoding and
retesting the software that produces the metrics is sure to add to the project’s overall
cost and to delay the delivery of a satisfactory set of metrics. By setting up an early
stage-gate requiring that the regional sales managers examine and approve the to-
be-delivered metrics, such rework would likely be avoided.
Effective project managers make use of project stage-gating at points in a
project where it makes sense to assess what has been accomplished so far and to
decide whether or not to (see Figure 16-5): proceed to the project’s next stage;
continue working on the current stage; or, if a detected problem seems unresolvable,
to reassess the project’s overall viability, rethink through the project’s deliverables
and, possibly, terminate the project. For example, it would be very reasonable for a
project manager to establish stage-gates that address the following issues:
Has the project charter been signed by the project’s sponsors?
Have the specifications regarding all key deliverables been examined and
approved by the responsible stakeholders?
Have the designs of the business processes to be hosted on to-be-installed
business platforms been examined and approved by the owners of these business processes?
Has all the testing associated with a to-be-installed platform been
satisfactorily completed?
Has all pre-installation user training been satisfactorily completed?
339
Figure 16-5 A Project Stage-Gate
Subproject F Gate Subproject HSubproject G
Reassess Project Viability
Repeat Prior Stage
… …
Designing a stage-gate involves defining the decision to be made, specifying
the criteria to apply in making this decision, and identifying the individuals to
participate in this decision. Depending on the nature of a stage-gate decision, the
individuals involved with the decision might represent the project’s steering
committee, other project stakeholders, the project manager, or project team
members. In selecting stage-gate participants, it is important to involve both the
individual or individuals accountable for the stage-gate decision and other individuals
holding the data, information and knowledge required in assessing the stage-gate
situation.
Project Control
Effective project managers apply project control tools and methods that
provide visibility (e.g., amount of work completed, the quality of this work, actual
costs compared to budgeted costs, how much time has elapsed and how much time
340
it will now take to complete the work that remains, etc.) into subprojects and into
the tasks that comprise these subprojects. By combining data about active and
already-completed subprojects and by reassessing projections regarding yet-to-be-
started subprojects, it should be possible to determine (on an almost continuous
basis) whether or not the overall project is on track. If not, adjustments should be
made and brought forward to the project steering committee for approval (remember
… no surprises).
Very effective project management tools and methods are available today to
provide visibility of a subproject’s progress. These tools and methods, however, are
dependent on the ability to capture, store and analyze data about the work done and
this can be quite challenging. How convenient is it for project team members to
regularly and accurately report on their work efforts and accomplishments (or, lack
of accomplishments)? For example, it is often very difficult to determine if software
design, coding or testing is, say, 50%, 75% or 90% complete. To complicate matters
further, computer programmers seem to stay at a 95% completion point for days or
weeks at a time (optimistically believing that the next set of test runs will prove
successful). Why should the person in charge of a task that is getting further and
further behind report this fact (and, hence, bear the brunt of a project manager’s
attention) when this individual is truly confident that a needed breakthrough will
occur tomorrow or, most surely, by next week? Why should any subordinate pass
on bad news to their supervisor when it is difficult for the supervisor to accurately
assess the substance of the subordinate’s reported work progress?
Effective project control requires not only effective tools and methods, but also
a project culture where team members are honest about and timely in reporting their
341
work progress. Visibility into a subproject’s status is unlikely to occur if team
members believe they will be penalized or harangued for reporting delays, mistakes
or unforeseen difficulties. Projects that are falling behind schedule or behind budget
only get back on schedule or back on budget when problems are recognized and
resolved as early as possible. Effective project managers realize the futility of
berating team members for reporting bad news. It is much more beneficial to figure
out why things have gone wrong and resolve the problems. Assigning blame, if it
occurs at all, should wait until a project has been successfully completed and
celebrated.
Post-Project Review
Once a project’s deliverables have been implemented and their operation and
use has stabilized, effective project managers conduct post-project reviews. The
purpose of a post-project review is two-fold. First, a project’s realized benefits flows
and actual costs flows are determined and compared to those stated in the project’s
financial business case. Such an analysis provides two important benefits:
The project’s sponsors and other major stakeholders learn the extent to
which promised benefits were, in fact, realized.
The individuals who put together the financial business case can see how realistic their projections were, and thus identify and learn from any
mistakes that might have been made.
Second, the project manager and team members can assess what went right with
the project (and why) and what when wrong with the project (and why). The learning
potential of such project debriefings is invaluable in improving both individual and
organizational project management capabilities.
342
Project Scoping with Coors’ Point-of-Sales (POS) Application Suite79
Coors does not sell its products to targeted consumers directly, but instead
does so through distributors and retailers. An important element of Coors’ marketing
strategy involves having retailers place eye-catching point-of-sales (POS) displays in
their stores. Coors works with third-party marketing partners and third-party
producers to obtain POS display materials (e.g., banners, placards, pictures, etc.),
with Coors owning the business processes by which wholesalers and retailers order
these materials. To motivate orders, Coors provides distributors and retailers with
funds that can only be used to purchase POS display materials. Coors anticipates
that at least some of these distributors and retailers will find the materials so valuable
in increasing sales that the Coors-provided funding is exceeded.
There are three types of POS display materials: general promotional materials,
licensed promotional materials (e.g., sports franchise-related), and customized
materials (tailored to the retailer or the retailer’s locale). General promotion
materials are the least expensive and have a fairly straightforward ordering process;
licensed promotional materials are more expensive and have a more complex
ordering process due to licensee contractual issues; and, customized materials are
the most expensive and have an even more complex ordering process.
The pre-existing manual operational processes for, first, designing, producing
and distributing a paper-based materials catalog and, second, fulfilling distributors’
and retailers’ orders had a number of problems. These problems resulted in the
79 The material in this section is based, in part, on: J. Buffington and D. McCubbery,
“Coors Brewing Company Point of Sales Application Suite: Winning Mindshare with Customers,
Retailers, and Distributors”, Communications of the AIS, Volume 13, 2004, pp. 81-96.
343
ordering processes being slow, error-prone and anything but convenient,
discouraging many distributors and retailers from taking advantage of their
promotional funds – let alone exceeding the established funding levels.
Coors’ marketing management approved a proposal to move to a digitalized
catalog and digitalized ordering processes. In addition to improving operational
processes, new technologies were introduced to make it easier and less expensive to
customize POS display materials and to provide retailers with a digitalized design
capability for optimizing the placement of Coors’ POS display materials and Coors’
products in a retail store.
Considered as a whole, implementing the funded digital investment would be
a very complex project that would take a long time to complete (delaying the receipt
of benefits). Especially troublesome was the fact that certain deliverables (e.g., the
content and functionality of an Internet portal serving as a communication interface
with the distributors and retailers, the POS display material customization process,
and the digitalized design capability) were not yet fleshed out and, hence, were
ambiguously specified.
A nice job of project scoping resolved these concerns. Instead of implementing
the POS Applications Suite as a single project, it was implemented as the five
subprojects described in Table 16-6. Note that this scoping strategy enabled the
Internet communication portal and the digitized operational processes for ordering
general POS display materials to be delivered quite early. And, by delaying the start
of the subprojects aimed at customizing POS display materials and at the digitalized
design capability, more time was made available for clarifying the specifications of
these subprojects’ deliverables.
344
Table 16-6 Project Scoping for Coors’ POS Application Suite
Subproject Description Subproject Sequencing Rationale
1 Internet
Portal • Build communication interface. • Build foundation for full POS Suite.
• Quickly implement the communication interface.
2
General Materials Ordering
• Build & populate digitalized catalog.
• Build digitalized ordering & fulfillment processes.
• Simplest operational processes to implement.
• Software bugs & operational problems can be found & resolved prior to implementing more complex operational processes.
3
Licensed Materials Ordering
• Add content to digitalized catalog. • Enhance the digitalized ordering &
fulfillment processes.
• More complex operational processes than those for general materials.
4
Customized Materials Ordering
• Add content to digitalized catalog. • Enhance the digitalized ordering &
fulfillment processes.
• New operational processes. • New digital technologies. • Distributors and retailers possess a
wide range in uptake capabilities.
5
Digitalized Design
Capability
• Build digitalized tools for retailers to use in optimizing the placement of Coors’ displays & products within a retail store.
• New managerial tools and processes. • New, sophisticated digital technologies. • Distributors and retailers possess a
broad range in uptake capabilities.
A Recap and Look Ahead
Three things, minimally, need to be in place for the promised benefits from a
funded digital investment project to be fully realized: a compelling and realistic
(strategic and financial) business case that sets the stage for implementation
planning; a comprehensive and realistic implementation plan that sets the stage for
project management planning; and, a manager – or better yet, managers – skilled
in the art and science of project management. As has been described in this chapter,
many things can go wrong even when both a strong business case and a strong
implementation plan exist. By following a well-conceived project plan, good project
managers are able to direct and coordinate a project’s various activities such that the
project’s specified outcomes are delivered on time and within budget. Exceptional
project managers are able to achieve these same outcomes even when the project
plan falls apart.
345
Building a strong project management capability is increasingly important for
all organizations today. That said, almost every organization recognizes that it does
not have a sufficient number of exceptional project managers. As a consequence,
executives of most organizations today are actively investing in this critical
management capability.
Investing in a strong project management capability is not the only thing that
executives are doing to ensure that formulated digital strategies are effectively
implemented and that the benefits attached to these formulated digital strategies are
fully realized. In the next, and final, chapter to Part 2, we suggest further actions
that executives can take to ensure that formulated digital strategies are successfully
implemented.
346
Chapter 17. Executive Mandates: Digital Investment
Part 2 of our book has focused on a practical set of concepts and tools aimed
at enhancing individuals’ capabilities to:
Build compelling and realistic financial and strategic business cases in support of digital investment proposals.
Insightfully critique others’ business cases.
Build more comprehensive and realistic implementation and project
management plans for funded digital investments.
Insightfully critique others’ implementation plans and project management plans.
The crafting of effective business cases, implementation plans and project plans is
significantly enhanced if everyone in an organization approaches these tasks in a
consistent manner. Establishing high-level principles related to digital investments
and then ensuring that an organization’s members comply with these principles is a
key executive responsibility.
In this final chapter, we offer as executive mandates five high-level principles
for crafting effective business cases, implementation plans and project management
plans:
Accentuate Bottom-Line Impacts
Argue Comprehensively, but Conservatively
Pepper Arguments with Soft Facts
Invest Early and Late
Assign Accountability for Bottom-Line Impacts.
347
Accentuate Bottom-Line Impacts
The proponents of a digital investment proposal are often hesitant to describe
the variety of ways by which the investment will produce bottom-line impacts, i.e.,
financial performance outcomes. A number of explanations as to why this occurs can
be given, including:
The individuals may lack the knowledge and skill to do so.
The individuals may not appreciate the overriding importance of bottom-line
impacts.
The individuals may feel that any offered bottom-line impacts would be seen
as too intangible – hence, too imprecise and seemingly just pulled out of the air – and would quickly be picked apart. Thus, only easily-defended projections, if any, are provided.
Individuals may feel that most bottom-line impacts would soon change, often dramatically, as the investment context naturally evolves.
It’s easy to come up with what seem to be very good excuses for not providing a rich
depiction of a digital investment’s bottom-line impacts.
However, the executives and senior managers charged with providing the
funding for proposed investments do look for – and often emphasize – an investment
proposal’s bottom-line impacts. Just as significant, if not more so, other investments
(e.g., expanding the sales force, building new manufacturing capacity, introducing
an innovative product or service, growing a new community, etc.) competing for
available investment funds are invariably framed through their bottom-line
implications. As a consequence, it is critically important for the proponents of a digital
investment to trace through, estimate and formally present a rich financial business
case. If done well, the process of projecting a rich financial business case will produce
a more compelling strategic business case.
348
Argue Comprehensively, but Conservatively
Proponents of digital investment proposals tend to focus on a single impact
path in developing their strategic and financial business cases. Further, all too often,
the elements comprising this impact path tend to emphasize technical functionalities
and tangible outcomes. It actually makes sense to simplify the arguments being
presented, as too much complexity can easily overwhelm a listener. But, placing
most of your bets on a single line of argument, especially one that stresses technical
details, is highly risky.
How should a proposal’s core arguments be expanded without introducing too
much complexity? We suggest the following:
Use touch point analysis to identify multiple impact paths, ensuring that
each of these paths both resonates with stakeholders and produces bottom- line impacts.
In tracing through each impact path, emphasize how the to-be-implemented
digital platforms and business platforms enhance business models, competitive positions and financial performance outcomes.
Be conservative in describing financial performance outcomes. Being conservative does not imply that intangible impacts are not used. Instead, both tangible and intangible impacts are used, along with strong-but-
realistic arguments. What being conservative does imply is using mid-range values, rather than extreme values, when producing estimates.
Present impact paths in layered-form. Here, a top layer (comprised of only a few, easily-understood elements) is initially depicted and described. However, more detailed views of each impact path are kept in reserve to be
used, if needed, in answering specific questions about a business case.
Pepper Arguments with Soft Facts
Most decision makers like facts - things that are verifiable. Fact-based
decision making introduces a sense of objectivity into decision processes,
facilitating both consensus and confidence in stakeholders’ perceptions of decision
349
outcomes. Tangible benefits and costs, by their natures, are arrived at through the
use of facts. All too often, this is not the case with intangible benefits and costs.
How can a similar sense of objectivity be fashioned when monetizing intangible
benefits and costs? We suggest that arguments be peppered densely with soft facts.
A soft fact is not something that is definitively verifiable, but rather is something
that is supported through commentaries and data provided by sources familiar to and
trusted by stakeholders. Say, for example, that a key benefits flow associated with
a digital investment proposal involves the percentage by which outbound logistics
costs are likely to be reduced. Good sources to use in arriving at an estimate of this
projected reduction in outbound logistics costs would include: key players from the
investing organization’s logistics management unit and internal audit unit; logistics
specialists from consultancies known for their logistics expertise; and, logistics
specialists from other organizations that have successfully implemented similar
digitalized solutions. By using the commentaries and data obtained from these
sources (the soft facts), a highly-believable estimate should be obtained.
Invest Early and Late
While it might seem non-intuitive, the largest marginal returns from
implemented digital investments are likely to be linked to implementation activities
that occur early and late. The challenge for most observers, however, is that the
accounting practices used with implementation projects do not portray benefits flows
and costs flows in ways that make it easy to detect such patterns.
What kind of implementation activities are we talking about? The early
investments are those incurred in developing a proposal’s financial and strategic
business cases, implementation plan, and project management plan. As addressed
350
throughout this book, the most surefire way to guarantee that a digital investment’s
promised benefits will fail to be realized is to develop and apply poor business cases,
implementation plans and project plans. The late investments are those incurred in
re-energizing an implementation project after the installation and shake-down stage.
A surge of new investment at this time reengages platform users in learning about
and thinking about installed digital platforms, business platforms, and how the new
capabilities provisioned through these platforms can enhance work practices,
business models and competitiveness.
Assign Accountability for Realizing Bottom-Line Impacts
Few of the performance gains anticipated from implementing a funded digital
investment occur automatically. This is especially true of the intangible benefits flows
associated with dramatic improvements to operational processes, collaboration
processes, decision-making processes, coordination and control processes, and
planning processes. Four related sets of accountabilities need to be established if an
investment’s anticipated benefits are to be realized.
First, all affected parties must understand the nature of the organizational
changes that need to occur and why these changes need to occur. Such
understandings serve as maps of the many, varied journeys that need to be taken if
a proposal’s promised benefits are to be realized. Absent such roadmaps, individuals
engaging with newly-installed digital platforms and business platforms have little to
fall back on as they attempt to integrate these solutions into their day-to-day
experiences. Explicit accountabilities must be established for ensuring that all
affected parties are provided with such understandings.
351
Second, one thing you can be assured about is that some, if not many,
operational and managerial processes will change. Some of these changes will be
minor, others of these changes are likely to be dramatic, and some completely new
processes may be designed and implemented. Explicit accountabilities need to be
established for each of the process changes that are linked directly or indirectly to a
digital investment’s promised benefits. If these accountabilities are absent, the
likelihood of the required process changes being put in place is significantly reduced.
Third, most digital investment projects involve multiple benefits, and often
these benefits are felt across multiple work units. Metrics must be devised that allow
for consistent benefits measurement across affected work units, and data reflecting
the progress achieved (or not achieved) in realizing promised benefits must be
gathered from each affected work unit in order to produce these metrics. Explicit
accountabilities must be established to ensure that these benefits and costs flows are
accurately and validly measured and reported.
Finally, and perhaps most important, explicit accountabilities must be
established for ensuring the realization of each promised benefits flow and for
minimizing (to the extent possible given the nature of the promised benefits) each
expected costs flow.
A Recap
It takes a lot of effort, and often a good deal of pain, to fully extract (or better
yet, to exceed) a funded digital investment’s promised benefits. All too often, the
individuals involved with proposing and implementing a digital investment lack the
skills required in this effort or are simply unwilling to invest the effort (and to live
through the pain), resulting in promised benefits not being realized. But, what needs
352
to be done is known and can be learned; and, thankfully, doing what needs to be
done becomes easier with experience.
353
PART 3. PLATFORM MANAGEMENT
Chapter 18 A Perpetual Balancing Act
Chapter 19 Business Processes
Chapter 20 Business Platforms
Chapter 21 Enterprise Resource Planning Systems
Chapter 22 Digital Platforms
Chapter 23 Platform Management Challenges
Chapter 24 Enterprise Architecture Design
Chapter 25 Digitalization Governance Design
Chapter 26 Digitalization Organization Design
Chapter 27 Executive Mandates: Platform Management
354
Chapter 18. A Perpetual Balancing Act
Increasingly, organizations’ digital strategies involve digital innovations. A
digital innovation refers to conceiving a new form of digitization, of digitalization,
or of both. Digitization refers to the purely technical processes associated with
converting sensed and captured data into binary form; storing and transmitting these
binary data; manipulating these data; and, storing/transmitting the outcomes of
these data manipulations. Digitalization, on the other hand, refers to more complex
processes where digitization is applied within organizations and within the social and
economic contexts within which organizations are embedded. Typically, innovative
digitalized solutions directly affect competitiveness by enabling the execution of new
or radically-changed business models, while innovative digitized solutions indirectly
affect competitiveness by enabling new or radically-changed digitalization
capabilities.
As an illustration of a digital innovation, consider GUESS?, INC.’s
implementation of GMobile, a game-changing business analytics iPad initiative.80
GUESS?, INC. stays ahead of its competition by identifying and stocking the products
most likely to be purchased by consumers at each of its retail locations. By combining
visual product images with real-time sales trends in a flexible and intuitive manner,
GMobile has significantly enhanced the ability and willingness of employees to exploit
the rich information being made available through GUESS?, INC.’s business analytics
capability, consequently better ensuring the availability of products to consumers.
80 B.H. Wixom, B. Yen, and M. Relich, “Maximizing Value from Business Analytics,” MIS
Quarterly Executive, Volume 12, Issue 2, June 2013, pp. 111-123.
355
Innovative digitalization solutions entail two critical elements. The first is the
capability to establish, use and evolve global business platforms. Global business
platforms refer to standardized configurations of digitized data and digitalized
business processes, both of which are enabled through global digital platforms. A
global digital platform provides a collection of standardized technology services.
As used here, the term global refers to a platform being used by many (perhaps all)
of an organization’s work units (another term frequently used is enterprise-wide).
Global (business and digital) platforms provide many, if not most, of the assets and
capabilities applied in launching digital innovations.
The second critical element is the capability to exploit emergent opportunities
best met through local business platforms – customized configurations of digitized
business data and digitalized business processes unique to a specific work unit (or to
a few, closely-aligned work units) and enabled though technology services executed
from both global and local digital platforms. A local digital platform provides a
collection of customized technology services. As used here, the term local refers to
a platform being used by a single work unit (or a few work units).
Global business platforms, once established, are available to each of an
organization’s work units. Relative to corresponding local platforms, global platforms
are secure, stable, and cost-effective to build, maintain and support. However, there
are times when it is simply impossible to effectively meet an emergent need (i.e., an
opportunity or a problem) through the functionalities provided by installed global
platforms. In such situations, fashioning and implementing a local platform targeted
at the emergent need can be both timely and effective. That said, an organization’s
over-dependence on local platforms leads inevitably to delayed and costly
356
digitalization projects as well as to excessive overall digitalization costs. A central
challenge in guiding and sustaining organizations’ digitalization efforts thus involves
managing the tensions that regularly arise between an organization’s global and local
platforms (Figure 18-1) so as to maintain an appropriate global/local balance.
Table 18-1
Global vs. Local Platforms
G lo
b a
l P
la tf
o rm
L o
c a
l P la
tfo rm
• Tailored Solutions • Innovative Solutions • More-Easily Implemented
Solutions
• Lower-Cost Solutions • Leveraged Solutions • More-Easily Maintained &
Supported Solutions
This third part of our book focuses on the challenges involved in maintaining
an appropriate balance in organizations’ global and local platforms. This chapter
introduces these challenges by covering the following topics:
Navigating the Balancing Act
Background
The Increasing Difficulty of Maintaining an Appropriate Balance
Navigating the Balancing Act
A critical driver of GUESS?, INC.’s ongoing business success has been the
clothing retailer’s achievement in building a global business analytics capability. In
configuring this global digitalization capability, GUESS?, INC. has placed constraints
357
on the types of business data readily available for analysis, as well as the types of
analytic techniques that can readily be undertaken. Such constraints undoubtedly
delay, and possibly discourage, some innovative ideas for exploiting business
analytics for competitive purposes. Nonetheless – precisely because of these
constraints - a robust and well-supported global business analytics platform is
available for use throughout the company.
What happens at GUESS?, INC. when a work unit wishes to undertake a
business analytic initiative that requires data or analytic techniques distinct from
those provided through the global business analytics platform? One of three
alternatives is most likely:
The business analytic initiative is abandoned.
The business analytic initiative is implemented outside of sanctioned channels, usually by contracting with a third-party business analytics consultancy.
A local business analytics platform is established by both fashioning customized functionalities and by leveraging functionalities available from
the global business analytics platform – using internal expertise and, very possibly, the expertise of a third-party business analytics consultancy.
Neither of the first two alternatives is desirable, as the first results in a lost
opportunity, and the second results in an investment in business analytics capabilities
that are unlikely to be leveraged by others. The third alternative, while carrying a
good deal of managerial complexity, is preferred as it holds the promise of both
meeting a local work unit’s immediate need and expanding the global business
analytics platform in the future to include the novel functionalities provisioned by this
local analytics platform. This third pathway also deftly illustrates the balancing act
constantly being navigated as organizations commission, build, modify and
decommission their global and local platforms.
358
Background
This desire to achieve an optimal balance in global and local platforms is not
new. During the 1960s, 1970s and 1980s, most organizations had established global
digital platforms (e.g., data centers) to house, operate and manage most
(mainframe-based) computational and communications processes. Yet, these global
data centers were primarily used to provision and operate local business platforms in
meeting the needs of individual work units. While work unit performance was
improved, this use of global digital platforms and local business platforms proved
very inefficient.
Two major developments during the early 1980s allowed organizations to
move away from the prevailing bias toward global digital platforms and local business
platforms: software vendors began offering global business platforms (e.g.,
manufacturing planning and control applications packages; supply chain
management applications packages; customer relationship management applications
packages; finance and accounting applications packages; human resources
applications packages; etc.), and hardware vendors began offering local digital
platforms (personal computers and mini-computers). The availability of packaged
global business platforms that could be tweaked to meet the distinctive needs of
individual work units began to wean organizations’ digital strategists away from a
dependence on local business platforms. The availability of affordable local digital
platforms likewise weaned these digital strategists away from a dependence on global
digital platforms.
Since the 1990s, a seemingly never-ending series of digital innovations have
appeared: the Internet, the World Wide Web, ERP systems, applications-as-a-service,
359
service-oriented architectures, cloud computing, smart appliances, social
technologies, etc. Not surprisingly, certain of these digital innovations favor global
platforms, certain others favor local platforms, but most can be configured to operate
as either global or local platforms.
The Increasing Difficulty of Maintaining an Appropriate Balance
Today, an abundance of digital technologies is available for provisioning robust
global platforms and pliant local platforms – this wealth in enabling technologies can
only be expected to increase with time. This holds positive and negative aspects
regarding the nature of the tensions that arise as organizations’ digital strategists
negotiate an effective balance in global and local platforms. On the positive side, the
costs and time incurred while fashioning well-designed global platforms and well-
designed local platforms can be expected to decrease. On the negative side, the
pressures work units are likely to place on moving away from the current global/local
platform balance can be expected to increase. There are four primary reasons for
these intensifying pressures.
First, organizations are facing increasingly competitive environments. As a
consequence, organizations’ digital strategies are evolving, sometimes dramatically,
at an accelerated pace. And, this pace is likely to vary across organizations’ work
units. As a result, work units’ evolving digital strategies may not fit well, if at all,
with their organizations’ installed global platforms - intensifying pressures to move
toward local platforms. On the other hand, robust, easily-adapted global platforms
can reduce the time and cost of implementing a new digital strategy, intensifying
pressures to move toward global platforms.
360
Second, today’s digital strategies are increasingly being formulated and
implemented by a network of collaborating organizations rather than by a single
organization. Through such collaboration networks, each participant is able to
contribute uniquely-held capabilities in providing exceptional value propositions to
targeted consumers/communities. But, in doing so, each participant also agrees to
deploy a common set of global platforms. Increasingly, however, organizations are
simultaneously participating in multiple networks and competing outside of any
established network – significantly increasing the number and variety of global/local
platforms to be built, used, evolved and managed.
Third, few convincing technology constraints exist to deter pressures
directed at the in-place global/local balance. In the past, a convincing argument for
maintaining the current global/local balance has been that it would be too costly or
take too long to do otherwise. Today, such simplistic arguments are unlikely to carry
much weight.
Fourth, organizations’ business professionals are becoming increasingly
technologically-savvy and organizations’ technology professionals are becoming
increasingly business-savvy. In fact, some business professionals, given their
distance from day-to-day digital platform management challenges, are often ahead
of their technology-colleagues in identifying and applying digital innovations; and,
some technology professionals, given their distance from day-to-day business
platform management challenges, are often better positioned than their business-
colleagues in anticipating their organization’s next generation of digital strategies.
However, ever-accumulating stocks of knowledge and insight can also produce
chaotic patterns of digital investment. In such a context, not maintaining an
361
appropriate balance between global and local platforms is sure to produce a never-
ending stream of ever-changing, hotly-contested clashes that find organizations
simultaneously spiking a growth of investments in both global platforms and local
platforms - a very inefficient approach toward digitalization.
A Recap and Look Ahead
An ever-increasing portion of all organizations’ work activities is either enabled
or supported by digital platforms and business platforms. As a consequence, issues
related to the design, building, evolving and management of these platforms have
become important concerns of all employees, not just technology professionals. Of
these platform-related concerns, the most critical is related to decisions regarding
the nature of the capabilities to be provided through a specific platform and regarding
whether this platform should be deployed globally or locally.
This third part of our book begins with more-detailed discussions of business
platforms and digital platforms. Then, we describe the tactics being taken by leading
organizations in addressing the management challenges that arise as organizations’
leadership teams grapple with the complexities of maintaining an appropriate
global/local platform balance. Finally, we conclude Part 3 by offering executives a
set of high-level principles aimed at establishing a management culture more likely
to produce an optimal global/local platform balance.
362
Chapter 19. Business Processes
Managers in successful organizations expect their employees to be effective
and efficient as they carry out work assignments. An employee is effective when
she does the right thing. Ideally, an employee would always take the best action
available given the situation being faced. An employee is efficient when she does
the thing right. Ideally, an employee’s taken-actions would always be carried out
with minimal, if any, waste or error. Successful organizations increase the likelihood
that employees (at all levels) perform effectively and efficiently by prescribing well-
designed business processes (i.e., operational and managerial task sequences) to be
followed as these employees carry out their work roles and assignments.
As a means of illustrating how this occurs, consider TaskRabbit
(www.taskrabbit.com). TaskRabbit’s business model, which is a good example of
crowd-based capitalism, is quite simple: to make it easy and (relatively) risk-free for
a member of the consumer community to hire someone from the producer community
to carry out a task. For example, a person may want to hire someone to load a
rented moving van, to walk your dog or to paint your kitchen. In other words,
TaskRabbit is a network organization that has created a market ecosystem that brings
together consumers with tasks to be done and producers able to perform these tasks.
In executing this business model, TaskRabbit’s employees engage in a variety
of work activities, including but not limited to: deciding on the breadth of tasks to be
handled, recruiting and vetting producers willing and able to handle these tasks,
marketing the task-handling service so that potential consumers are aware of the
service, matching producers with consumers, responding to consumer or producer
363
concerns, handling payment processes, etc. By fabricating business processes that
specify how such work activities are to be handled, TaskRabbit is able to automate
many of these activities, to empower employees engaged with activities that are not
fully-automated, and to train new hires so that they quickly come up to speed in
carrying out work roles and assignments.
Professor Michael Porter uses the term value chain to describe an
organization’s business processes because these business processes are comprised
of the work activities through which the organization creates ecosystem value by
transforming inputs (supplies, materials, components, etc.) into outputs
(intermediate products and services, delivered products and services, etc.).81 Figure
19-1 depicts a typical value chain for a manufacturing firm, and Figure 19-2 modifies
this value chain to represent some of TaskRabbit’s business processes. Note that
there are two categories of work activities: primary processes refer to work
activities directly involved in providing products/services to customers/clients, and
support processes refer to work activities that either provide direction/oversight
for the primary processes or that provide resources (financial, information, human,
equipment, etc.) needed to configure, execute and evolve the primary processes.
81 M. E. Porter, Competitive Advantage: Creating and Sustaining Superior
Performance, Free Press, New York, 1998.
364
Figure 19-1 Typical Value Chain for a Manufacturing Firm
Indirect Materials & Supplies Procurement
Human Resource Recruitment & Development; Benefits Management
Financial Services; Accounting Services
Business/Digital Strategizing; Administrative Services
Manufacturing
Work-in- Process
Inventory
Quality Control
Direct Materials
and Supplies Procurement
Inbound Logistics
Order Fulfillment
Finished- Goods
Inventory
Outbound Logistics
Sales
Marketing
Merchandising
Customer Support
Reverse Logistics
S u
p p
o rt
P ro
c e
s s e
s P
ri m
a ry
P ro
c e
s s e
s
R&D; New Product Development; New Product Rollout
Digital Technology Services & Management
Figure 19-2
TaskRabbit’s Value Chain
Indirect Materials & Supplies Procurement
Human Resource Recruitment & Development; Benefits Management
Financial Services; Accounting Services; Payment Services
Strategic Planning; Administrative Services
Taking Task
Requests from
Consumers
Matching Producers
with Consumers
Producer Recruitment
Producer Vetting
Arranging Producer
Assignments for Handling
Consumer Requests
Marketing
Consumer Support
Producer Support
Producer Quality Control
S u
p p
o rt
P ro
c e
s s e
s P
ri m
a ry
P ro
c e
s s e
s
New Services Development; New Services Rollout
Regardless of the conceptual superiority of an organization’s business model,
the success of these strategies ultimately depends on the effectiveness and efficiency
365
of the business processes applied in executing the business model. This chapter
examines the nature of business processes by covering the following topics:
Specifying End-to-End Business Processes
Rationalizing Business Processes
Business Process Modeling and Business Process Digitalization
Specifying End-to-End Business Processes
Historically, most organizations designed their work activities around the
assumption that the handling of most business processes takes place within a single
functional unit (see Figure 19-3). With this functional approach for organizing
work, each functional unit is assigned the responsibility for performing a set of
business processes. If all of an organization’s units successfully accomplish their
work activities and if the work activities handled within each unit mesh well with the
work activities handled within other units, then the organization’s objectives should
be achieved. The logic behind this functional approach for organizing work is:
By having employees within a work unit specialize in a limited set of work
activities, the employees will focus their collective attention on figuring out the best way to carry out these work activities.
A unit manager can be held accountable for a work unit’s effectiveness and
efficiency.
The senior manager holding authority over a set of unit managers can be
held accountable for coordinating work activities across the work units.
366
Figure 19-3 Functional Approach to Organizing Work
Functional Units
R&D Marketing
& Sales Operations Customer
Support Finance &
Accounting
Human Resources
This functional approach to organizing work performs well as long as
employees within each functional unit are able to accomplish their work assignments
without needing to interact inordinately with employees in other functional units.
Consider a firm that: manufactures products, stores finished products in a
warehouse, sells the stored products to retailers through a direct sales force, ships
ordered products from the warehouse to retailers as orders are taken, and then bills
retailers on a monthly basis. If each of these activities is handled by a separate
functional unit, and if the organization’s managers are able to resolve any minor
coordination problems that arise, then this functional approach to organizing work
would operate smoothly.
However, this functional approach to organizing work does not fit well at all
with today’s highly competitive market ecosystems. Let’s look at what might happen
if TaskRabbit organized its work in a functional manner - with, say, the nine business
367
processes identified in the bottom row of Figure 19-2 each fully handled by separate
work units. Let’s further assume that on Friday a producer named Tom has been
assigned to load up a rental truck for a consumer named Sue and that Tom agreed
to be at Sue’s apartment at 3pm the following Wednesday. But, Tom comes down
with the flu on Monday and calls up the producer recruitment unit to cancel his
assignment. Now, the operational work processes involved in assigning a producer
to handle Sue’s task assignment needs to be executed again, requiring a good deal
of interaction between TaskRabbit work units for Sue to have a van-loader show up
at the arranged time. If messages get lost or operational processes get delayed, the
likelihood increases that Sue will end up loading the truck by herself – and will think
twice before using TaskRabbit again.
The likelihood of work-related disturbances occurring increases significantly
when data/information must move from one functional unit to another in a rapid,
error-free manner. For another example, consider the problems that might arise
when a consumer of a make-to-order laptop computer from a manufacturer (e.g.,
Dell) uses the manufacturer’s website to configure and purchase the laptop. What
follows next is a very sophisticated, digitalized dance that coordinates the activities
of a network of collaborating organizations (material and component suppliers,
product assemblers, logistics providers, etc.) so that the ordered laptop is delivered
to the consumer in just a few days. A functional approach to organizing work would
surely prove disastrous in such a highly-collaborative, messaging-intensive context.
In order for data and information to flow rapidly and error-free across work
unit and organization boundaries, interrelated work activities must be interconnected.
Ideally, this interconnection should be seamless - that is, the work activities being
368
connected are largely automated, flows of data/information occur essentially
instantaneously, and any data/information sent from a work activity is perfectly
understood by a receiving work activity. Automating and interconnecting work
activities can prove very daunting when functional units each fully controls the work
activities being performed. Control, here, means things like deciding what data is to
be used, defining the meaning of these data, and deciding on the nature of the
business processes being executed.
Consider, for example, the types of data-related difficulties that can arise when
a large, national retail organization (which has organized work functionally) must
decide where to locate a new distribution center. More specifically, think about the
first time the organization makes such a decision. Alternative locations for the new
distribution center must be identified and then compared across a number of criteria,
such as: expected shipping costs to current and future retail locations, expected
shipping costs from current and future suppliers, land acquisition costs, state taxes,
state incentives, facility construction costs, facility operating costs, and so on. While
some new data would most likely need to be acquired, most of the needed data has
already been captured and is available for use. These existing data, however, have
been defined, captured and stored by different work units – invariably to suit the
unique needs of each unit. Considerable effort will surely be involved in locating
these existing data, in understanding the form and meaning of these data, in digitally
accessing these data, and in modifying these data for use in making this distribution
center location decision.
Because of the problems inherent with the functional approach for organizing
work, most organizations today have moved to (or are in the process of moving
369
toward) organizing their work activities as end-to-end business processes that cut
across functional – and, increasingly, organization – boundaries. With the end-to-
end business process approach for organizing work, all the work activities
associated with accomplishing a critical work outcome are designed as a seamlessly-
connected work flow, regardless of the physical location of where specific work tasks
are performed.
Figure 19-4 illustrates a set of end-to-end business processes for a
hypothetical organization. Note in particular:
Order handling requires the involvement of human resources (tracking the
employees involved with each order), sales (taking an order), production/operations (pulling ordered products from finished goods
inventory and handling the outbound logistics associated with an order), and accounting (tracking revenue inflows and cost outflows).
Customer service requires the involvement of marketing (capturing customer
feedback/experiences), sales (order taking), customer support (dealing with
customers requesting information about their orders or complaining about received shipments), and accounting (tracking cost outflows).
By organizing work as end-to-end business processes, responsibility for all of the
work activities can be assigned to a single individual, referred to as the owner of the
business process, rather than being dispersed across multiple individuals, housed in
multiple work units (each of whom, quite naturally, is likely to point a finger at one
or more of the other individuals if and when things go wrong).
370
Figure 19-4 Organizing Work as End-to-End Business Processes
Order Handling
Product Development
Customer Service
Financial Reporting
R&D Marketing
& Sales Operations Customer Support
Finance & Accounting
Business Processes
Human Resources
Functional Units
Rationalizing End-to-End Business Processes
Once responsibility for managing an end-to-end business process has been
assigned to a business process owner (typically, a mid-level or higher manager),
the business process is rationalized through an iterative cycle of process
specification, process measurement and process improvement (see Figure 19-5).
371
Figure 19-5 Business Process Rationalization
Define Operating
Procedures
Define Business
Rules
Track Process
Performance
Set Goals for Performance Improvement
Analyze Process
Performance
Design/Implement Process
Improvements
Process Specification
Process Improvement
Define Data
Elements
Define Performance
Metrics
Process Measurement
Process Specification
A business process is a sequence of work tasks that converts inputs into
outputs. Process specification defines the purposes of the work tasks comprising
a business process, describes what is involved in executing each work task, and
indicates the existence and natures of relationships amongst the work tasks (e.g.,
which tasks must be complete prior to the start of a given task, which of a task’s
outputs serve as inputs to other tasks, etc.). Business process inputs can be digital
in nature (e.g., a digitized order form, digitized data, etc.), non-digital in nature (e.g.,
a paper order form, data taken from some document, etc.), or some combination of
both. Business process outputs, likewise, can be digital in nature (e.g., a digitized
log of all sales transactions at a retail store), non-digital in nature (e.g., a paper
invoice packaged with an ordered product), or some combination of both. Figure 19-
6 portrays the main work tasks involved with a generic purchasing process. Each of
372
the work tasks in this purchasing process can be further specified as subprocesses,
providing a finer description of the procurement process.
Figure 19-6 A Generic Purchasing Process
Determine Requirements
Select Vendor
Create Purchase Requisition
Complete Order Form
Send Order Form to Vendor
Order Follow-Up
Goods Received
Invoice Verification
Vendor Payment
Business processes consist of operating procedures, business rules and data.
Operating procedures describe what must be done (e.g., accessing inputs,
producing outputs, the actions and decisions taken in producing outputs, the actors
expected to engage in these actions and decisions, etc.) in order for a work task to
accomplish its purpose.
Business rules describe the conditions that must be met when taking actions
or making decisions within a work task. For example, the creation of a purchase
requisition might involve the following business rules:
If the purchase amount is less than $500, then the requisition does not need to be approved by a department head.
If the purchase amount is greater than $500 but less than $5,000, then the requisition needs the approval of a department head.
373
If the purchase amount is greater than $5,000, then the requisition must be approved by both a department head and a divisional finance director.
Operating procedures and business rules both operate on data (serving as
process inputs, process outputs or intermediate outputs within a process). Data
reflect attributes of the objects and events associated with a business process. The
data elements used with a business process must be defined, with a data definition
including, but certainly not limited to: the name of the data element, the type of data
(e.g., numeric, text, etc.), the range of viable data values, the meaning of the data,
and the location where the data is stored (prior to and after processing). Data are
assigned to data owners responsible for data definitions and for ensuring the
integrity (data accuracy, correctness, timeliness, security, etc.) of these data.
Process Measurement
Once a business process has been specified and is being executed, it is the
responsibility of the business process owner to ensure that the business process
operates effectively and efficiently. With process measurement, performance
goals and performance metrics are defined for a business process, and then
performance metrics are computed and compared against process performance
goals. A good performance metric indicates the extent to which one or more
performance goals are being achieved. Often, multiple metrics are used for a
performance goal, with each of these metrics providing evidence regarding a distinct
aspect of the goal.
One of TaskRabbit’s key business processes is that of matching producers to
consumer task requests. For this process, an effectiveness goal might be to satisfy
all customer requests and an efficiency goal might be to minimize the time TaskRabbit
374
staff spend in making a match. Table 19-1 illustrates possible metrics for these two
performance goals. An effective way of presenting performance metrics to business
process owners (and to the managers of work units executing business processes)
involves using dashboards that present process metrics in an easy-to-understand
manner. Generally, the set of dashboards associated with a business process present
a multi-dimensional view of the business process’s performance. Figure 19-7
illustrates some of the ways performance metrics might be displayed via dashboards.
Don’t forget that once a performance metric for a business process has been devised,
the data to be used in producing this metric must be defined, captured, stored and
processed. Computing and reporting business process performance metrics, thus,
must be included within a business process’s specification.
Table 19-1 Performance Goals & Metrics for TaskRabbit’s Matching Business Process
Performance Goal
Performance Metric #1
Performance Metric #2
Satisfy Customer Task Requests
Percentage of customer requests that have been matched within specified time windows.
Percentage of matches that were rated ‘highly satisfied’ or ‘very highly satisfied’ by the customer.
Minimize Staff Time
Average number of match attempts to obtain a successful match.
Total average staff time (minutes) for successful matches.
Total average staff time (minutes) for unsuccessful matches.
375
Figure 19-7 Dashboard Examples
Process Improvement
A primary responsibility of a business process owner is process
improvement: ensuring that the business process is executed as specified, that
process-specific performance goals are achieved, and that these performance goals
increase over time.
Inconsistencies in process execution tend to occur for one of two reasons:
employees do not understand their process-related roles, or employees believe
certain aspects (perhaps most or all of the aspects) of the process specification to be
faulty and choose not to follow these thought-to-be–faulty aspects. With the latter
reason, employees carry out their work tasks by working around the business process
specification. The first reason is addressed through training, support and hand-
holding. Resolving the second reason is more complicated, as the process owner
needs to first grasp the employees’ logic as to why the process specification is
believed faulty and then either revise the process specification (i.e., the employees’
376
logic makes sense) or change the employees’ critical view of the business process.
Understanding an employee’s view of a business process specification can be very
challenging as a broad array of explanations (including, among many others, work-
related stress, job dissatisfaction, personal animosity toward co-workers or toward
the process owner, unwillingness to change work-related behaviors, and insufficient
or inappropriate incentives) might serve as the basis for the employee’s rejection of
a business process specification.
Even with consistency in process execution, an executing business process
may not achieve its targeted goals. When targeted goals are not being achieved, the
business process owner needs to, first, understand why the goals are not being met
(e.g., existence of recurrent problems, presence of hard obstacles, too-stringent
goals, etc.) and, second, introduce appropriate changes. Table 19-2 provides a list
of common problems that arise with business processes along with examples of the
corrective actions that could be taken.
Table 19-2
Common Business Process Problems
Problems Corrective Actions • Unsatisfied consumers or
community members. • Frustrated employees. • Excessive finger-pointing. • Subprocesses take too much time. • Too many reviews & sign-offs. • Expensive or in-demand assets sit
idle. • Too many errors and/or too much
scrap/rework. • Process specifications work-
arounds regularly occur. • Exceptions & special cases are
common and require an excessive amount of resources.
• Simplify and/or refine subprocesses (work tasks, actions and decisions to be taken, data, business rules, employee roles & responsibilities, etc.).
• Remove and/or combine one or more work tasks or subprocesses.
• Re-sequence some subprocesses. • Execute some subprocesses in
parallel. • Improve employee access to data &
information as well as to expertise for handling exceptions.
• Add missing process controls and eliminate unneeded or redundant process controls.
377
When an executing business process consistently achieves its targeted goals,
the possibility of raising these performance targets should always be considered.
When performance goals are increased, it is advisable to anticipate what might
constrain the planned performance improvement and simultaneously introduce
business process or organizational changes aimed at overcoming these constraints.
Finally, whenever significant changes are implemented in order to improve a business
process, it becomes the business process owner’s responsibility to:
Ensure that employees affected by the changes understand what changes were made, why these changes were made, and how their work roles are affected.
Assess the extent to which the anticipated performance improvements have been achieved (and, if not, why not).
Business Process Modeling and Business Process Digitalization
Business process modeling is an important skill to be acquired by a business
process owner or any other individual likely to be involved with business process
rationalization activities. With business process modeling, the work tasks and
flows involved with a business process are visually depicted, making it easier for the
involved-individuals to understand and recognize ways to improve the business
process.
A business process common to most organizations, including TaskRabbit, is
reimbursing employees for out-of-the-pocket expenses associated with approved
travel. Consider a travel claim reimbursement process that unfolds as follows:
An employee with out-of-the-pocket expenses for approved travel expenses completes a travel claim form and sends this form, along with supporting
receipts, to the clerk assigned to process reimbursement claims.
The clerk examines the completed travel claims form to make sure that the employee followed appropriate business rules in completing the form. By
378
using these same business rules, the clerk can identify errors. If errors are found, the form is returned back to the employee for correction and
resubmission. If no errors are found, the data on the travel claims form is entered into a business platform hosting the digitalized reimbursement
business process.
Once the data for the travel claim has been entered into this business platform, the amount of money to be reimbursed to the employee is
determined through another set of business rules. Then, a message is sent to the manager of the travel reimbursement office letting the manager know
that the travel claim is ready for her approval.
Once this manager receives the message, she accesses the business platform to retrieve claims data and the calculated reimbursement amount.
After examining these, she either approves the reimbursement claim or sends the travel clerk a message indicating any issues that need to be
resolved.
Once the manager approves the reimbursement claim, the digitalized business process concludes by doing one of the following: print and mail the
employee a reimbursement check, initiate an automatic deposit into the employee’s designated checking account, or direct the travel clerk to
reimburse the employee with cash.
Then, at the end of the month, a report is generated for the manager that
summarizes travel expenses on a year-to-date basis.
Figure 19-8 depicts this business process.
379
Figure 19-8 Travel Reimbursement Business Process
E m
p lo
y e
e
T ra
v e
le r
T ra
v e
l C
le rk
D ig
it a
li z e
d
B u
s in
e s s
P ro
c e
s s
T ra
v e
l M
a n
a g
e r
Complete Travel Form
Audit Travel Form
Errors ?
Yes
Enter Data into System
Calculate Reimbursement
Approve ?
No
No
Funds Disbursement
Funds Disbursement
Reimbursement
Yes
Cash Electronic
Monthly Report
Diagrams such as Figure 19-8 are referred to as swim-lane diagrams. With a
swim lane diagram, the roles served and work activities carried out by each actor
involved with a business process is separately depicted (in a swim lane). For the
travel reimbursement business process depicted in Figure 19-8, the actors include
three humans (the employee traveler, the travel clerk and the travel manager) and
one digitalized solution (the digitalized elements of the business process). Such
visual depictions of business processes have benefits that extend beyond easing the
effort involved in rationalizing a business process, such as:
Educating a department’s new employees (transfers or new hires) about their
work roles.
Explaining to employees in other departments or in other organizations how a department handles its assigned work, such that all involved will be better able to coordinate any work activities that flow across departmental or
organizational boundaries.
380
Most organizational leaders today recognize that digitalization can be a very
effective means for improving a business process’s performance. Digitalization can
be applied to enhance a business process via four engines of digitalization:
Automation: automating work tasks (replacing humans with digitalized solutions).
Control: controlling work tasks (monitoring work-related events and then identifying and correcting surfaced issues).
Empowerment: empowering the humans involved with work tasks
(providing information and suggesting actions).
Interaction: facilitating interactions among the actors (humans and
digitalized solutions) involved with work tasks so as to optimally leverage the collective capabilities held by these actors.
How might digitalization improve the travel reimbursement business process
shown in Figure 19-8? Here are four such enhancements. First, the human
intermediary (i.e., the travel clerk) might be removed from the process by enabling
employees to directly enter (via a smart phone, tablet, or laptop/desktop computer)
travel-related data and receipts into the business platform. Second, if effective
controls are used with data/document entry processes, errors can be brought to the
attention of the employee traveler and immediately corrected. Third, knowledge
regarding data definitions and business rules associated with the travel
reimbursement business process can be provided to the employee traveler on an as-
needed basis via a digitalized help function or via digitalized communications with a
human expert (via email, interactive chatting, telephone, etc.). Finally, the role of
the travel manager in the process can be substantially reduced by crafting new
business rules for automatically approving most travel reimbursements (while
maintaining a digitized audit trail). Now, the travel manager role involves two
381
primary responsibilities: to approve exceptional travel claims (i.e., those not covered
by business rules), and to periodically examine the business rules to ensure their
continued validity and comprehensiveness.
The four business process enhancements described in the prior paragraph
involved instances of automation, control, empowerment and interaction. Can you
identify the digitalization mechanisms applied in accomplishing each enhancement?
A Recap and Look Ahead
Organizations gain numerous benefits from rationalizing and digitalizing work
activities as end-to-end business processes. The most obvious of these benefits is
that work activities are handled more effectively and more efficiently – resulting in
more satisfied market ecosystem participants and enhanced competitive positions.
Still, it must be remembered that these benefits will only be observed if the business
model enabled through these business processes remains viable given its ever-
evolving market ecosystem context.
Two less obvious, but no less important, benefits can be traced to business
process digitalization. First, digitalized business processes represent a rich archive
of knowledge regarding how work is organized and accomplished. Employees come
and go, but secured digitalized solutions remain. As long as business process owners
ensure the continued validity of these digitalized solutions and technology specialists
are available to extract their contents, this mass of knowledge of what we are doing
and how we are doing it remains available to future generations of employees.
Second, digitalized business processes represent a valuable, highly-
leverageable organization resource. As more and more of an organization’s business
382
processes are digitalized, this accumulating investment is available to serve as a
powerful enabler of future competitive actions, since:
The time required to modify currently-executing business processes or to fabricate new business processes can be significantly reduced.
Discrete business processes can be seamlessly interconnected, enabling more-timely, more-comprehensive and more-sophisticated competitive
actions.
Executives, managers and digital strategists are better able to sense the
need for and then direct competitive responses to portending events within their organization, within the market ecosystems within which their
organization participates, and within national and world economies.
But, should these digitalized business processes be hosted on global or local business
platforms? We examine this and associated issues in the next chapter.
383
Chapter 20. Business Platforms
A business platform hosts a collection of digitized data and digitalized
business processes, and is enabled through digital platforms. Ideally, these
digitalized business processes are seamlessly interconnected and operate with a
common collection of shared, digitized data. Importantly, the shared data is the
primary mechanism enabling the set of digitalized business processes to be
seamlessly interconnected. Consider, for example, a digitalized order process
maintained in a business platform that captures the details of customers’ sales orders
and stores the digitized data characterizing these sale events (e.g., date and time of
sale, customer ID, products purchased, purchase quantities, deliver date, discounts
to apply, etc.) within the platform’s collection of shared data. The platform’s other
digitalized business processes (e.g., a packing process, a shipping process, an
invoicing process, etc.) are now able to quickly and reliably access these sales-event
data, as needed, in fulfilling customers’ orders.
Today, business platforms are present in all types and all sizes of organizations
– from large, global firms (e.g., Wal-Mart, Proctor & Gamble, etc.) to small
entrepreneurial startups. Take Warby Parker (www.warbyparker.com) as an
example of an entrepreneurial startup. Founded in 2010, the pipeline organization’s
founders sought to disrupt the designer eyewear market while advancing a social
mission of bringing designer eyewear to people who otherwise couldn’t afford
designer eyewear. Warby Parker sells its eyewear for a single price, $95, and
donates, for every pair that is sold, a pair to someone in need. How do they do this?
By bypassing the middleman! The firm designs their own products, works directly
384
with suppliers, and sells their eyewear through their website. And, important for our
purposes, Warby Parker’s business platforms serve as the primary vehicles through
which most work activities are executed.
Warby Parker quickly realized that, given the nature of their product, a pure
digital presence was not enough. Right from the company’s launch, consumers
wanted to physically try on the eyewear. It was not uncommon for a consumer, after
having looked at a pair of glasses on the company’s website, to show up at one of
the founders’ apartments and ask if they could try on pairs of glasses. As a
consequence, Warby Parker – similar to other boutique-like e-commerce firms – has
opened retail locations. Not traditional retail stores, but experience spaces where
consumers can view and try on frames (and, among other things, take photos of
themselves with different frames to be immediately uploaded to their social
networking presences). While at the retail location, the consumer can also use kiosks
to access the firm’s business platform to order eyewear or to check the status of an
existing order. Some of the work activities carried out at retail locations (e.g.,
displaying eyewear, promoting eyewear, socially engaging with consumers, digitally
tracking a consumer’s movement through and actions at a location, creating and
orchestrating in-store events, etc.) are distinct from those handled by Warby Parker’s
e-commerce business platform; and, as will be explained later in this chapter, there
are advantages to be gained from executing these retail-location business processes
similarly at all retail locations. Conceptually, then, Warby Parker can be thought of
as operating two global business platforms: an e-commerce platform (e.g., a digital
storefront, product content, consumer content, eyeglass ordering and fulfillment
processes, etc.), and a retail-location platform.
385
The aim of this chapter is to provide a more detailed understanding of
organizations’ business platforms. In accomplishing this objective, three topics are
covered:
The Benefits of Hosting Business Processes on a Business Platform
Applying Standardized and Integrated Business Processes
Managing Global Business Platforms
The Benefits of Hosting Business Processes on a Business Platform
As described earlier, a business platform consists of a set of seamlessly-
interconnected, digitalized business processes and a common collection of shared,
digitized data. This common collection of shared data is commonly referred to as a
database. Viewed simply, a business platform’s digitalized business processes:
Capture data describing value-chain events, possibly manipulate these data, and then store these data (in original and/or manipulated form) in the
platform’s database.
Access data stored within the databases of other business platforms, possibly manipulate these data to create new data, and then store these
data (in original and/or manipulated form) in the platform’s database.
Carry out work tasks by accessing data stored within the platform’s
database, possibly manipulating these data, and then storing any newly- created data in the platform’s database.
Essentially, then, the seamless-interconnection of two business processes hosted on
a business platform occurs through the platform’s database: data output by one of
these business processes are placed in the platform’s database, from where the data
can be accessed by the second business process.
Business platform design involves three main issues:
Determining the data elements with which to populate a platform’s
database.
386
Deciding whether or not to standardize the business processes being hosted on a platform.
Deciding whether or not to integrate two or more of the business processes being hosted on a platform.
We now describe the benefits to be derived from shared databases, standardized
business processes, and integrated business processes.
Benefits of Shared Databases
Database design involves defining the data elements to be stored and
organizing these data such that the data elements can be easily and quickly accessed.
Typically, the most difficult task in establishing a business platform’s database
involves reaching consensus amongst the platform’s stakeholders on which data
elements to include, on how each data item is to be defined, and on the relationships
amongst these data.
All business platforms contain an operational database holding the digitized
data used in carrying out the day-to-day work activities handled through a business
platform. Increasingly, however, a second database is also present. This second
database, referred to as a data mart or a data warehouse, holds less current, more
aggregate, but cleaner data used for in-depth information reporting and for business
analytics. Cleaning data refers to the extra steps taken to identify and correct data
errors. A data mart typically contains data limited to a single functional domain
(e.g., marketing, logistics, manufacturing, etc.) while a data warehouse contains a
much broader collection of data and is used by multiple functional domains. Figure
20-1 points out that much of the data populating a data mart/warehouse are
originally captured by transaction-handling business processes and stored within a
business platform’s operational database.
387
Figure 20-1 Operational Database and Data Mart/Warehouse
Operational Database
Data Mart/Warehouse
Data Extraction, Transformation, Cleansing and Loading
Transaction- Handling Business Processes
Transaction Summary Reports
Operating Reports
In-Depth Reporting
Business Analytics
Data from Other Internal and External
Sources
Why have both an operational database and a data mart/warehouse within a
business platform? Operational databases are designed to efficiently handle huge
volumes of transactions (e.g., sales transactions, purchasing transactions, inventory
movements, fulfillment movements, HR transactions, etc.). If the database-access
operations required in transaction-handling were slowed down by time-consuming,
database-access operations associated with sophisticated information reporting
and/or business analytics, an organization’s day-to-day operations could be
disrupted. Disrupted transactional processing, in turn, poses a direct (or indirect)
threat to the functioning of an organization’s revenue-producing activities.
A well-designed business platform database provides four significant benefits.
First, agreed-on data definitions make available to all employees a common business
language to be used in communicating with one another. For example, when one
manager refers to a 3% increase in sales, others know exactly what is meant by a
388
sale. Second, the availability of current, shared data about a set of work activities
greatly facilitates work task coordination/synchronization. Third, the availability of a
consistent, comprehensive collection of data about a set of work activities greatly
facilitates operational, tactical and strategic decision making. Finally, the existence
of an already implemented database reduces the time and expense associated with
future digitalization projects. Column 1 of Table 20-1 summarizes these benefits.
Table 20-1 Benefits of a Business Platform
Shared Database Business Process Standardization
Business Process Integration
• Common business language
• Enhanced work task coordination & synchronization
• Enhanced operational, tactical & strategic decision making
• Quicker, less expensive digitalization projects
• Reduced digitalization costs
• Fewer serious operating problems
• Leveraging of business process improvements
• Reduced employee training & support costs
• Reduced time & cost to start up a new work location
• Increased work flow efficiency
• Increased work flow effectiveness
• Leveraging of work units’ capabilities via enhanced coordination
• Leveraging of employees’ capabilities via enhanced collaboration
Benefits from Standardized Business Processes
With business process standardization, multiple work units execute a
single instance of the digitalized business process. When two or more installations
of a business process are configured exactly the same, these installations represent
an instance of the business process. In other words, when a single instance exists
across all work units executing a business process, these work units are applying the
same business process specification. When two instances of a business process exist,
two distinct versions of the business process are executed – one version by one group
of work units, the other version by another group of work units. Business process
389
specification differences across these two instances could be minor, moderate or
substantial.
For a standardized business process to prove effective, it has to satisfy the
work-related needs of each affected work unit. Here, the term satisfy should be
interpreted as follows: while the switch to a standardized business process may find
employees’ having to change how they carry out certain of their work-related tasks,
these works tasks should now be carried out more effectively and more efficiently
than previously was the case. If this is not the case, then either aspects of the
business process rationalization effort were faulty or some of the affected work units
should not be required to apply the standardized business process.
Well-designed, standardized business processes provide five important
benefits. First, digitalization costs are reduced as only one digitalized version of each
business process needs to be designed, built, maintained and supported. Second,
the likelihood of work units experiencing serious operating problems is reduced as
such problems, when they arise, tend to be promptly designed out of standardized
business processes. Third, business process improvements made at one work unit
can be incorporated into the standardized business process such that these
improvements are replicated across all work units deploying the standardized
business process. Fourth, employee training and support costs are reduced as only
a single business process configuration needs to be accounted for in training and
support activities. This has the added benefit of easing the transition costs for
employees transferring from one work unit to another. Finally, new work locations
can be established more quickly and less expensively, given the availability of well-
390
honed standardized business processes. Column 2 of Table 20-1 summarizes these
benefits.
Benefits of Business Process Integration
With business process integration, configured interconnections allow
digitized data to flow seamlessly across executing digitalized business processes
hosted on the same business platform or on different business platforms. For
example, employees at one work location involved with a task associated with a
client’s project may need to access task-related data produced by employees at a
different work location involved with the same project. If both groups of employees
are working through the same business platform and the digitalized business
processes hosted on this platform are integrated, then data designated as shareable
within the platform’s database specification would be instantaneously available to
employees at both locations.
Well-designed, integrated business processes provide four primary benefits.
First, work flow efficiency (e.g., lower cost, greater speed, etc.) is increased by
eliminating the need for human involvement in moving data and documents from one
task to another task or from one business process to another business process.
Humans are not only a costly resource for handling routine and repetitive tasks, but
they can introduce delays and errors into these tasks. Second, work flow
effectiveness (e.g., fewer errors being made, errors that are made are quickly
detected and corrected, fewer missed deadlines due to processing delays, etc.) is
also likely to increase. Third and fourth, work unit capabilities (via coordination and
synchronization) and employee capabilities (via collaboration), respectively, can be
391
more readily leveraged through a heightened ability to access and share data.
Column 3 of Table 20-1 summarizes these benefits.
Applying Standardized and Integrated Business Processes
It would be natural, after hearing about the benefits of standardization and
integration, for you to think: “If we are building a business platform, why not go
ahead and standardize/integrate all of the business processes maintained on a
platform and then require all work units to make use of this single instance of
business processes?” In reality, not all organizations – or better said, not all of an
organization’s work units – stand to benefit from being required to use standardized,
integrated business processes. A standardized business process may not meet the
needs of one or more of the work units, and (as will be explained in later chapters)
standardization typically requires substantial political and monitoring costs. Business
process integration may not be needed (e.g., when two business processes never
exchange data or documents), and (as will be explained later) integration typically
requires substantial technology costs.
Decisions to apply standardization and integration within a business platform
hinge on two key questions. The first of these questions is: “Should a business
process be executed similarly across all work units, or should a work unit be allowed
to execute its own version of the business process?” Consider the three scenarios
depicted in Figure 20-2. With the left-most scenario, all six work units use a business
platform (Platform A) hosting a single instance of a set of standardized business
processes. With the middle scenario, four work units use Platform A because these
units perform very similar work activities, and two other work units use Platform B
(these two work units perform similar work that is quite different from the work
392
performed by the four units using Platform A). Now, there are two instances of the
standardized business processes. With the right-most scenario, four work units use
Platform A (the units perform very similar work), but the other two units use locally-
tailored business platforms (Platform C and Platform D) because each of these work
units engages in a unique set of work activities.
Figure 19-2 Business Process Standardization Scenarios
Platform A
Platform B
Platform C
Platform D
Platform A
Platform A
The second question is: “Do any of the business processes being hosted on the
business platform need to share data or documents with other of the business
processes being hosted on the platform?” If the answer is Yes, then business process
integration is desirable, with the extent of integration (e.g., minimal, moderate,
extensive) reflecting the extent to which data/document flows are to be
interconnected across the hosted business processes. If the answer is No, then there
is no need to undergo the effort and cost required to implement an integrated set of
business processes.
393
Thus, the desirability of standardizing and integrating the business processes
being hosted on a business platform is directly linked to the nature of the work
activities being performed by the work units that will be using these business
processes. In other words, how similar are the work units’ work activities and to
what extent would the work units benefit collectively from executing business
processes that are able to easily share data and documents? Thinking along these
lines, certain conditions favor four different business platform designs (see Figure
20-3).82 Each of these business platform variants is now discussed.
Figure 20-3
Business Platform Variants
Globally- Integrated
Work Units Execute Distinct, Tightly
Synchronized Business Processes
Work Units Execute Standardized, Tightly Synchronized Business
Processes
Locally- Isolated
Work Units Execute Distinct, Mostly
Unconnected Business Processes
Work Units Execute Standardized, Mostly Unconnected Business
Processes
Locally-Unique Globally-Standardized
Business Process Standardization
B u
s in
e s s P
ro c e
s s
I n
te g
ra ti
o n
A Globally-Integrated, Locally-Unique Business Platform
With a globally-integrated, locally-unique business platform, an
organization’s work units engage in different work activities (forestalling
standardization), but would benefit from certain of the hosted business processes
82 Figure 19-3 has been adapted from Figure 2-2 in: J.W. Ross, P. Weill and D.C.
Robertson, Enterprise Architecture as Strategy: Creating a Foundation for Business Execution,
Harvard Business School Press, Boston, MA, 2006, p. 32.
394
being able to share data and documents (advancing integration). As an example,
consider the high-level work units (i.e., the business units) of a comprehensive
financial services firm like USAA. USAA’s business units (auto insurance, life
insurance, home insurance, personal banking, personal investing, etc.) operate
within different competitive markets requiring, for the most part, distinctive business
processes. While it might be advantageous to use standardized, integrated global
business platforms for most support value chain activities (i.e., accounting, finance,
human resources, procurement of office supplies, etc.), most primary value chain
activities would benefit from local business platforms unique to each business unit.
However, because the business units tend to serve a common customer base,
business opportunities (e.g., the cross-selling of financial products and services
within customer segments) would arise from interconnecting (i.e., integrating)
business process data/document flows both within and across these local business
platforms.
A Globally-Integrated, Globally-Standardized Business Platform
With a globally-integrated, globally-standardized business platform,
the organization operates in a single competitive market with most of its work
activities having considerable direct influence on one another. While the work units
may each carry out some distinct work activities, all of the work units involved with
the same work activities would benefit from carrying out these work activities
similarly (advancing standardization); and, given the dependence of most work
activities on other work activities, work unit coordination and collaboration would
benefit from sharing data and documents (advancing integration).
395
Consider an airline, such as Delta. In order for flights to operate efficiently
(minimal waste regarding fuel, customer refreshments, aircraft crew hours, aircraft
service crew hours, aircraft maintenance crew hours, boarding gate crew hours, etc.)
and effectively (profitably, on schedule, safely, etc.), business processes need to be
tightly choreographed. This can best occur through global business platforms
characterized by high levels of standardization and integration.
A Locally-Isolated, Globally-Standardized Business Platform
With a locally-isolated, globally-standardized business platform, the
organization operates in a single competitive market with most of its work activities
having little direct influence on one another. While work units may carry out some
unique work activities, all of the work units involved with the same work activity
would benefit from carrying out these work activities similarly (advancing
standardization); but, as little coordination or collaboration is required across work
units, little need exists for these work units to share data or documents (forestalling
integration).
Consider, as an example, certain of the property-specific business processes
(catering, special events, guest room cleaning, facility maintenance, etc.) executed
at a hotel chain such as Marriot’s Courtyard. In order to achieve high levels of
business process efficiency and effectiveness and to maintain a consistent image
(customer service, amenities, etc.) across these properties in the eyes of the
consumer, it would make sense to standardize many of the business processes
executed at the chain’s properties, executing these business processes from a global
business platform where within-property business process integration was enabled
across the platform’s business processes. But, as there is little need to share data
396
and documents across properties, integration of business processes across properties
would not be a high priority. That said, as certain hotel chain business processes
(reservations, customer relationship management and accounting) do benefit from
standardization and integration across properties, these business processes are
typically executed from globally-integrated, globally-standardized business
platforms.
A Locally-Isolated, Locally-Unique Business Platform
With a locally-isolated, locally-unique business platform, an
organization’s work units engage in very different work activities (forestalling
standardization) and stand to benefit little from sharing data and documents
(forestalling integration). Business conglomerates, such as GE, provide good
examples. At a high-level of organization structuring, a conglomerate is comprised
of independent business units that tend to compete in different industries
characterized by very different competitive markets. As a result, little is to be gained
from standardizing or integrating business processes across the business units. Each
business unit, thus, typically applies localized business platforms. Even here,
however, there are advantages that arise from standardizing and integrating a few
business processes (e.g., financial reporting) important for managing the
conglomerate as a whole; these select business processes would be hosted on
globally-integrated, globally-standardized business platforms.
Business Process Standardization and Integration at Warby Parker
Earlier, two of Warby Parker’s business platforms were described: an e-
commerce business platform and a retail-location business platform. With the e-
commerce platform, business process standardization exists by default (a single
397
platform exists) and business process integration would be extensive (to coordinate
and synchronize consumer ordering and fulfillment). With the retail-location
platform, business process standardization would be extensive (to maintain a single
instance of retail-site business processes across all retail locations), but business
process integration would likely be less extensive (only applied where it would be
beneficial for certain of the hosted business processes).
Managing Global Business Platforms
With a global business platform, the hosted business processes are
standardized, each business process works with data maintained in the platform’s
database, and each work unit subscribing to the global platform executes the same
set of business processes. For example, a global office supply procurement platform
finds the same set of procurement-related business processes (many of which would
benefit from being integrated) being executed at each of an organization’s
administrative offices - those at headquarters, sales offices, client service or support
sites, manufacturing sites, distribution centers, retail sites, etc.). If each site instead
applied its own local business platform (hosting a unique set of procurement
processes), considerable variance would exist in how each office carried out
procurement tasks - presenting considerable challenges regarding coordinating or
synchronizing tasks across offices, assessing procurement effectiveness and
efficiency, and ensuring accounting and financial consistency. Figure 20-4 portrays,
at a high level of organization structuring, three global business platforms commonly
observed with manufacturing firms.
398
Figure 20-4 Global Manufacturing Business Platforms
Market Research
New Product Creation
New Product Development
New Product Launch
R&D Platforms
Develop Product Demand
Obtain Product Orders
Maintain Consumer Relations
Sales & Marketing Platforms
Process Product Orders
Fill Product Orders
Ship Product Orders
Support Products/Consumers
Product Fulfillment Platforms
Global business platforms require a number of managerial roles (see Table 20-
2) aimed at ensuring that these platforms are effectively designed, operated and
evolved. As global business platforms are implemented, a number of new managerial
roles are typically established (e.g., a VP for global business processes, a platform
manager role, a business processor owner role, and a data owner role). In addition,
the responsibilities of some existing roles (e.g., work unit managers) are extended.
The VP, global business processes is typically a senior management position; and,
business platform managers, business process owners and data owners tend to hold
mid-level management positions. In addition to putting these managerial roles in
place, organizations’ leadership teams also implement appropriate changes to their
planning systems, control systems and incentive systems.
399
Table 20-2 Business Platform Managerial Roles
Managerial Role Business Process Responsibilities
Data Responsibilities
VP, Global Business Processes
• Overall planning and control • Manage business platform managers • Coordinate with business process owners • Coordinate with business data owners
Business Platform Owner
• Platform design • Platform availability • Platform integrity • Platform security
Business Process Owner
• Process specification • Process measurement • Process improvement
Data Owner
• Data definition • Data capture integrity • Data storage integrity • Data security
Work Unit Manager • Process execution integrity • Data usage integrity
A Recap and Look Ahead
Most organizations today do not have the greenfield luxury of being a startup
(e.g., Warby Parker) and thus tend to find themselves dealing with collections of local
business platforms, single-instance global business platforms, and multiple-instance
global business platforms – with the nature of an organization’s unique collection of
installed business platforms determined by its history of digital investment and the
digital savviness of its executives and managers.
Of course, the ideal situation would be to only use single-instance global
business platforms, as single-instance global business platforms create the potential
for maximally exploiting the benefits of shared databases, standardized business
processes and integrated business processes. As a consequence, most organizations
today are in the process of, where appropriate, moving their digitalized business
processes onto single-instance, global business platforms.
400
Designing and implementing a global business platform, even under ideal
conditions, can be a difficult, lengthy and expensive endeavor. The next chapter
explains how many of today’s organizations have successfully overcome these
challenges by acquiring and implementing enterprise resource planning (ERP)
systems.
401
Chapter 21. Enterprise Resource Planning Systems
Given the benefits of global business platforms, you may ponder:
“Why did most organizations wait until the mid- to late-1990s to move
toward implementing global business platforms?”
“Why are projects aimed at implementing global business platforms so costly and why do they take so long?”
“Why do some of these implementation projects seem to go on forever?”
The answers to such questions hinge on two observations. First, implementing global
business platforms can be very challenging – technically and politically. Second,
organizations constantly change, usually incrementally but occasionally radically, in
response to internal events (e.g., a new chief executive officer (CEO) is hired, a new
chief financial officer (CFO) is hired, a product line is dropped, three product lines are
introduced to international markets, etc.) and to external events (e.g., a new
competitor appears, a new generation of manufacturing technology appears, a key
supplier goes out of business, etc.). As organizations change, so do their business
models and the business processes that enable these business models. As a
consequence, it often seems very rational to put off starting a project (or to continue
a project that is underway) until an organization’s business processes have stabilized.
The problem? This anticipated stability never materializes!
Quite understandably, projects undertaken to implement digitalized business
processes have historically been driven by an overriding goal of meeting the business
needs of the work unit(s) initiating and/or funding the projects. Generally, little, if
any, thought is given by project leaders as to how a to-be-digitalized business process
402
might benefit or constrain other work units or whether another work unit has recently
digitalized the same (or a similar) business process.
By the early 1990s, this situation had reached a breaking point as many
organizations were operating a mélange of redundant digitalized business processes,
each of which worked with somewhat unique sets of data and was regularly being
modified (e.g., process enhancements, responses to internal/external changes, etc.).
Two all-too-common outcomes were increasingly observed. First, organizations’
leadership teams perceived that digitization costs were out-of-control. Second, the
complexities that arose when working with or around installed digitalized business
processes significantly increased the costs and time required to either enhance
existing business processes or build new business processes. Digitalization projects
associated with competitive moves proved especially troublesome as, all too often, a
taken-move cost more than was planned, lacked key features and/or was delayed.
As a consequence, the competitive impacts of these projects tended to be far less
than anticipated.
Organizations’ leadership teams realized that things needed to change. But,
a proven, cost-effective approach for implementing well-designed global business
platforms was lacking.
This chapter addresses two related issues. First, we begin by providing deeper
explanations of the challenges associated with efforts to implement global business
platforms. Second, we then describe the technology that emerged in the 1990s for
implementing global business platforms: enterprise resource planning (ERP)
systems. The topics covered are:
The Challenge of Implementing Global Business Platforms
403
The Arrival of Enterprise Resource Planning (ERP) Systems
The Nature of ERP Systems
Celenese’s OneSAP Project
Alternatives to ERP Systems
The Challenge of Implementing Global Business Platforms
Two sets of challenges arose as project teams engaged in efforts to implement
global business platforms: one set associated with standardizing the business
processes to be hosted on the platform, and the other associated with integrating
these business processes. Each of these sets of challenges are now described.
Challenge: Standardizing Global Business Processes
Because of the political maneuvering that typically occurs, standardizing a
business process generally proves to be anything but a straightforward task. Each
of the work units expected to execute a common business process is likely to desire
that its version of the business process becomes the standardized business process.
A work unit required to change one of its executing business processes will have to
redo many, if not most, of its data definitions, business rules, operating procedures,
work roles, performance metrics, etc. All of this takes time, costs money, disrupts
operations and unsettles employees – when the unit’s currently executing business
process, for the most part, seems to be working fine. Why fix something that is not
broken? Most of the work units involved in the decision to standardize a business
process are thus motivated to argue either that their business process should serve
as the standardized business process or that they should be exempt from having to
use the standardized business process.
404
Different, but still significant, challenges can then surface once these political
challenges are resolved. Business platforms typically host not one but many business
processes. Moving from a large number of locally-tailored business processes to a
suite of standardized business processes is a huge undertaking involving numerous,
interrelated work/technology redesigns. Putting together a convincing business case
and obtaining the needed funding are anything but straightforward.83 And, while this
huge business process redesign effort is underway, what happens to current
operations and to work unit desires to enhance or modify executing business models?
Challenge: Integrating Global Business Processes
Three tactics for integrating a set of digitalized business processes were
followed, over time, by most organizations prior to the availability of ERP systems.
The earliest of these integration tactics (see Figure 21-1) used system-to-system
interfaces to link together digitalized business processes (each of which makes use
of uniquely-defined data). With this system-to-system interface tactic, each pair
of digitalized business processes to be integrated are modified so that each business
process can accept, interpret and work with data coming from the other business
process. This can be an effective and efficient integration tactic – but only when a
limited number of digitalized business processes are involved. As the number of
digitalized business processes being integrated increases, the building of system-to-
system interfaces to interconnect pairs of business processes results in a complex
web of interconnections that, over time, becomes error-prone, operationally
inefficient, and costly to maintain and support.
83 For coverage of these issues, refer to Part 2 of this book.
405
Figure 21-1 The System-to-System Interface Tactic
Business Process 1
System-to-System Interface
Data Data Data
Business Process 2
Business Process 3
A second integration tactic, the global database tactic, interconnects
digitalized business processes through a global database interface (see Figure 21-2),
and required two distinct activities:
Designing and implementing a global database.
Modifying all the installed digitalized business processes to be interconnected such that data captured by, used by and produced by a business process would be placed in and accessed from this global database.
While such a tactic seems quite intuitive, achieving each of these activities proved
extremely challenging. For example, many organizations literally spent millions of
dollars, with limited success, in efforts to implement global databases.
Two principal challenges arose. First, getting all of the work units that would
be using the business platform to agree on a single set of global data definitions
proved to be a daunting political task. Consider, for example, the differing definitions
that might be used across work units regarding a sale: the sales unit may consider a
sale to occur when an order is taken; the manufacturing unit may consider a sale to
406
occur when the order leaves the finished goods inventory; the accounting unit may
consider a sale to occur when the order is received by the customer; and, the finance
unit may consider a sale to occur when the customer’s payment is received. More
troublesome, as with standardized business processes, each work unit desires that
its local data definitions will ultimately serve as the global data definitions, thus
eliminating the need for work unit members to change mindsets and operating
procedures. Second, even when the political challenges were overcome, the technical
work involved in modifying each work unit’s digitalized business processes (so that
these business processes could work with the global database) was complex, time-
consuming and costly – providing ample opportunities for political dissonance to re-
surface and intensify.
Figure 21-2 The Global Database Tactic
Business Process 1
Business Process 2
Business Process 3
Global Database
Global Database Interface
A third tactic (see Figure 21-3), that gained momentum in the late 1980s and
throughout the 1990s was the middleware tactic, that applied a set of technologies
collectively referred to as middleware. While many different types of middleware
407
exist, the basic idea is fairly simple. Middleware makes the data or programming
logic contained in one digital solution (e.g., a digitalized business process, a
database, etc.) transparent to other digital solutions. Thus, instead of having to
modify a digital solution each time it is to be interconnected to another digital
solution, the digital solution only needs to be modified once to connect with the
middleware technology being used - significantly reducing, for example, the cost of
interconnecting a large set of digitalized business processes. Table 21-1, which
describes three frequently-used middleware technologies, should provide a better
understanding of middleware technology and how it works.
Figure 21-3
The Middleware Tactic
Business Process 1
Business Process 2
Business Process 3
Global Data
Warehouse
Global Operational
Database Middleware
Middleware Interface
408
Table 21-1 Three Common Middleware Technologies
Middleware Description
Remote Procedure
Calls
An Application Program Interface (API) is built into software program A that exposes certain of program A’s data and/or computational features. A function call is defined, enabling other software programs executing on or remote from the platform executing program A to gain access to the API (gaining access to program A’s data or computational results).
Message Broker
(or Adapter)
An intelligent (software and hardware) digital artifact that holds: a list of subscribers (i.e., programs B, C & D) for specific messages (data and documents) transmitted by program A, & message translation rules for each message-subscriber pair. All the translation involved to enable programs B, C & D to interpret program A’s data/documents is done by the message broker. No changes need to be made to programs A, B, C & D. However, considerable work is necessary to specify and code the message broker’s translation rules.
Distributed Objects
A distributed object infrastructure is used to build: a distributed object (data and/or computational procedures) hosted on platform A, a corresponding procedure call for use by other programs running on platform A or on other platforms (B, C & D) networked to platform A, & a network directory listing & describing the distributed object and its procedure call. Now, any program running on platforms A, B, C or D can use this procedure call to access the distributed object.
In practice, the middleware tactic can be quite challenging technically, as the
various middleware technologies are fairly different from one another and, typically,
a mix of middleware solutions is used in achieving business process integration
objectives. Additionally, few organizations in the 1990s possessed the in-house
technical expertise to build and maintain global business platforms applying the
middleware tactic.
The Arrival of Enterprise Resource Planning (ERP) Systems
Two significant events occurred in the mid-1990s to create both the funding
opportunity and the solution for resolving the challenges of implementing global
business platforms. First, the Year 2000 (Y2K) problem found organizations
needing to overhaul their huge base of installed digitalized business processes prior
to the year 2000. Why? Because most programmers - first to save (at the time,
scarce) computer memory and then from habit - only used the last two digits of a
409
year to signify dates in logical programming rules and in data formats. For example,
‘1983’ was represented as ‘83’. This tactic worked fine during the 1950s, 1960s,
1970s, 1980s and 1990s. But, depending on how each program was actually coded,
no one knew exactly what might happen in the year 2000 and beyond. Would these
digitized business processes work as expected? Would they crash? Or, worse, would
they continue operating, but produce erroneous but undetected outputs (data,
documents, decisions, etc.)?
As the risk of doing nothing was extremely high, most organizations realized
an impending necessity to fund a redesign of all installed digitalized business
processes. While each of these software redesigns might only require that a few lines
of code be changed, the correct lines of code needed to be located across hundreds
(if not thousands or tens of thousands) of installed software programs. For large
organizations, the overall cost of locating the changes to be made, making these
changes and testing the changed programs (to make sure that the software programs
worked correctly alone and in interaction with other programs) was expected to easily
run into the millions of dollars.
But, if such massive change needed to be done, why return to the status quo
of local business platforms? Why not use this as an opportunity to implement global
business platforms?
Second, software vendors (e.g., SAP, Baan, PeopleSoft, Oracle, etc.) began
marketing in the early 1990s a new type of technology referred to as an enterprise
resource planning (ERP) system – in essence, a pre-defined global business
platform (a global database along with a set of standardized, integrated digitalized
business processes). The concept was revolutionary. Instead of building a set of
410
business platforms to accommodate an organization’s unique needs, the organization
acquired a pre-packaged global business platform reflecting industry best practices
and then changed its work practices to conform (as much as possible) to the data
definitions and business processes hosted on the acquired global business platform.
Today, a variety of vendors offer ERP systems for all types and sizes of organizations;
and, most of these ERP systems have versions reflecting best practices for a variety
of industries. Table 21-2 lists some of today’s more popular ERP systems, applying
a common categorization scheme (Tier 1, Tier 2 and Tier 3).
Table 21-2
Examples of ERP Systems and Vendors
Tier 1 Tier 2 Tier 3
Description
• Used by large, global organizations
• Extensive variety & depth in functionality
• Extensive configuration options
• Highly-scalable • Highest cost
• Used by mid-size organizations
• Handles international locations
• Less-extensive functionality
• Less-extensive configuration options
• Medium cost
• Used by small organizations
• Limited functionality
• Limited configuration options
• Lowest cost
Vendors • SAP • Oracle • Microsoft Dynamics
• Epicor • Infor • QAD • Microsoft Navisan
• Netsuite • Exact • Syspro • Microsoft Great
Books • SAP Business
One
Acquiring and implementing an ERP system can still be a lengthy, expensive
and disruptive undertaking. Technical and political challenges abound. What sets an
ERP system apart from the earlier approaches for implementing global business
platforms is that the end-goal is clear, change happens relatively quickly, and once
you begin the process of change it is difficult, if not impossible, to revert back to prior
ways of working. So, what exactly is an ERP system and what are an ERP system’s
advantages and disadvantages?
411
The Nature of ERP Systems
Figure 21-4 provides a very simplified depiction of an ERP system. ERP
systems have three primary components: a global database; a set of global
(standardized, integrated and functionally modularized) digitalized business
processes; and, ERP system interfaces used to interconnect the ERP system to
digitalized business processes not handled through the ERP system and to bolt-ons
(i.e., tailored extensions to the ERP system’s functional modules built using tools
provided as part of the ERP system) in order to align the ERP system with unique,
competitively-important aspects of a work unit’s business practices. The global
database provides the data (delineated through definitions and relationships) used
by the software modules as well as reporting/analytic tools that can be applied to
these data. It is commonplace today for an ERP system to provide both an
operational database and a data warehouse. Each functional module is designed by
the ERP vendor to represent industry best practices, covering a broad spectrum of
work activities including (but certainly not limited to):
Planning activities: Supply chain planning, manufacturing/operations
planning, sales planning, budget planning, overall business strategic planning, etc.
Operational activities: Production/operations, logistics, procurement, order
processing, general ledger, human resources, cash management, etc.
Analytical activities: Product costing, manufacturing costing, investment
analyses, sales forecasting, logistics analysis, inventory optimization, etc.
412
Figure 21-4 ERP System Schematic
Global Database
Reporting & Analytic Tools
Human Resources Modules
Inventory & Manufacturing
Modules
Sales & Distribution
Modules
Financial & Accounting
Modules
Bolt-ons
Other Digitalized Business ProcessesS
y s te
m
I n
te rf
a c e
s
S y s te
m
I n
te rf
a c e
s
ERP System
While ERP system functional modules are pre-specified, they are configurable
- with the extent of configurability depending on whether the ERP system is a Tier 1,
Tier 2 or Tier 3 product. In other words, an accounting module does not necessarily
provide set-in-stone cost-accounting business processes. Instead, some (perhaps
considerable) flexibility is provided (though hard constraints inevitably exist) in how
the module can be configured to an installing organization’s existing cost-accounting
policies, procedures and practices.
If an organization’s pre-ERP work policies, procedures and practices do not
reflect industry/functional best practices and if there is nothing exceptional about the
organization’s strategies or operations, it generally is advantageous for the
organization’s leadership team to require that most of its work units adopt the
digitalized business processes made available through the ERP system. But, if
specific work units make strong business cases for maintaining some, or most, of
413
their currently-executing business processes, then ERP system interfaces can be used
to interconnect the ERP system to both bolt-ons and external (to the ERP system)
digitalized business processes. It is important to recognize, however, that the
extensive use of ERP system interfaces has a disadvantage in addition to the cost
and time spent building bolt-ons, modifying the to-be-connected digitalized business
processes, and configuring the system interfaces: future migrations to new versions
of an installed ERP system almost always require that modifications be made to
system interfaces, bolt-ons and connected digitalized business processes.
Table 21-3 summarizes the key properties of an ERP system. First, ERP
systems are multi-functional in scope. An organization installing all of an ERP
system’s functional modules can have most of its business processes handled through
the ERP system.
Table 21-3 Key Properties of an ERP System
Property Explanation
Multi-functional ERP systems provide a range of functional capabilities, with an adopting organization deciding which of an ERP system’s functional modules are to be installed.
Modular
Modularity means that it is easy to add or delete functional modules when installing or reconfiguring an ERP system. Additionally, the number & configuration of installed functional modules can vary across an organization’s work units.
Industry Verticals
ERP vendors offer different versions of their systems, with each version applying what are considered to be best practice business processes for a specific industry.
Extensible Tools are available to build system interfaces & bolt-ons, thereby enabling an adopted ERP system to handle work policies, procedures & practices not reflected within provided modules.
Integrated All functional modules operate out of a global database. Data captured or updated in one module is stored in this global database & is immediately available for use by other modules.
Second, ERP systems are modular in design. When installing an ERP system,
organizations have considerable leeway in selecting which modules to install,
414
selecting when a selected module will be installed (i.e., a limited set of modules can
be initially installed, with other modules being installed later), and in configuring the
modules being installed. Importantly, this flexibility extends to decisions about if and
how selected modules will be installed across various work units. In fact, many
organizations choose to operate multiple ERP configurations, referred to as ERP
system instances, as a means of reducing initial implementation and political
challenges. Differences can exist across instances regarding data definitions,
database scope, which functional modules are installed, and how a functional module
is configured for differing work units. Much is gained, however, by operating an ERP
system as a single instance. These advantages will be covered in more depth later
in this chapter in describing a project undertaken by Celanese to reduce its number
of ERP system instances.
Third, the digitized business processes embedded within an ERP system’s
software modules are designed and built to reflect industry best practices. Generally,
ERP systems are designed as industry verticals. That is, vendors make different
versions of their ERP system to reflect the distinctive natures of the business
processes used within targeted industries. In designing an industry-specific ERP
system, the ERP vendors partner with industry leaders (typically, organizations that
already use the vendor’s ERP system). Note, here, that best practices are not the
same as industry-leading practices. Organizations that consider their business
processes to be world-class are understandably reluctant to share these world-class
business processes with others. This does not mean, however, that organizations
building world-class digitized business processes do not use ERP systems - they are
just very selective in deciding which modules to install. Walmart, for example, is
415
well-recognized as having a number of world-class digitized business processes
targeted at logistics, inventory-handling, merchandizing and retail store operations.
While Walmart does not use an ERP system for these primary value chain activities,
Walmart does use an ERP system for many of its support value chain activities (e.g.,
accounting, finance and human resources).
Fourth, ERP systems are extensible. As described earlier, needed business
process functionality not designed into an ERP system can be connected to the ERP
system through system interfaces and bolt-ons. While such extensions are
accompanied by complexities and additional costs, they significantly increase the
attractiveness and feasibility of the ERP approach.
Finally, implementing an ERP system as a single instance does produce a global
business platform whose digitized business processes are, to a large extent,
standardized and integrated. Here, integration is achieved by storing data captured
by one functional module in the global database, where these data are immediately
available for use by other functional modules, by bolt-ons and by connected (via a
system interface) digitalized business processes. However, when multiple instances
of an ERP system have been implemented, business process standardization and
integration can be significantly impaired - with the extent of impairment largely
determined by differences in how data are defined, processed and stored across these
instances.
It is precisely the properties of an ERP system (listed in Table 21-3) that
produce its advantages (listed in the first column of Table 21-4). Most of these
advantages have been covered earlier in this part of our book when describing the
benefits of global business platforms. However, the last advantage listed in the first
416
column of Table 21-4 is new: over time, an organization’s overall digitalization costs
are likely to be lowered. We will explain why this is the case later in this chapter
when discussing Celanese’s project to reduce its number of ERP system instances.
Table 21-4
Advantages and Disadvantages of an ERP System
Advantages Disadvantages
Global Database High Acquisition & High Installation Costs
Standardized & Integrated Business Processes
Lengthy Implementation Period & the Potential for Work-Related Disruptions
More Timely & More Comprehensive Data Challenges in Fully Realizing the Expected
Benefits from Implementing an ERP System
More Effective & More Efficient Business Processes
Potential Negative Effects from Using Industry-Best-Practice Business
Processes
Quicker & Less Expensive Implementations of New Digitalized
Business Processes Dependence on the ERP System Vendor
Lower Overall
Digitalization Costs
Frequent, Costly & Disruptive Releases of New Versions of an Installed ERP System
Adopting an ERP system also has a number of potential disadvantages (see
the second column of Table 21-4). A first and rather obvious disadvantage of an ERP
system is the high cost of implementation – costs associated with acquiring the
software, with engaging consultants holding expertise in managing ERP system
implementations, with digital platform upgrades needed to operate the ERP system,
with the time spent by employees engaged in ERP system acquisition and
implementation activities (listed in Table 21-5), and with the organizational
disruptions that inevitably occur.
417
Table 21-5 Examples of ERP System Implementation Activities
Decide on the business processes to be handled via the installed ERP system.
Select an ERP system vendor & an ERP implementation consultant.
Analyze work unit business process requirements & determine the ERP system modules to adopt & the extent each work unit will be expected to use the implemented modules.
Specify the ERP configuration or configurations (modules & instances).
Put together the implementation project team, lay out the project plan, & finalize the project schedule & budget.
Upgrade all affected digital platforms.
Design & populate the global database.
Configure the ERP instances.
Build system interfaces & bolt-ons.
Modify managers’ authorities & responsibilities & employees’ work roles, as well as affected planning, control & reward systems, to align with new configuration of business processes.
Train affected employees to ensure that each is able to able to effectively carry out their work activities through the new configuration of business processes.
Install the ERP instances.
A second disadvantage reflects the reality that the implementation activities
shown in Table 21-5 can each take a good deal of time. Importantly, the political
maneuvering involved with ERP implementations (i.e., reaching consensus on data
definitions and business process standards; resolving managers’ desires that their
work units be allowed to opt-out of the entire ERP implementation or to opt-out of
selected ERP system modules; reaching consensus on the number of instances to run
and the configuration of each instance; reaching acceptance regarding new authority
and responsibility structures and regarding changes to planning, control, and reward
systems; etc.) is likely to monopolize the work lives of many of an organization’s
most-valued employees.
Third, the benefits expected to be derived from implementing an ERP system
are based on many assumptions. Fundamental questions that regularly arise are:84
84 For coverage of these and related questions, refer to Part 2 of this book.
418
How realistic and how reasonable are the implementation’s benefits and costs projections?
How realistic and reasonable is the implementation schedule?
Will the ERP system’s functionalities work as promised by the vendor?
Will affected employees understand their new work roles and how to carry out their work activities with the new configuration of business processes?
Will affected employees use the ERP system as planned or will they instead
fall back on their pre-implementation work procedures by devising work- arounds?
How long will the current configurations of implemented ERP system interfaces be compatible with each work unit’s internal and external environments?
The above questions need to be regularly and persistently raised and resolved
throughout an ERP implementation project – resulting in as-needed adjustments to
project activities, schedules, benefits projections and costs projections, as well as to
the instance and module specifications.
Fourth, if most of the organizations in an industry adopt the same ERP system
and, consequently, execute a similar configuration of digitalized business processes,
then an organization’s ERP-provisioned business processes are unlikely to serve as
the basis for gaining a competitive advantage. The rationale should be clear - if all
competitors execute the same business processes, then competitive parity is likely
to result. What is the take-away here? A seemingly straightforward rule to follow
would be to identify those business processes likely to serve as the basis of future
competitive advantages and fully/partially exclude these business processes from the
ERP system implementation. Then, use system interfaces to connect these
strategically-critical business processes with the implemented ERP system. But, like
419
many things, this rule is not as straightforward as it might seem – raising questions
such as:85
“How do we identify our strategic business processes?”
“Will today’s strategic business processes be tomorrow’s strategic business
processes?”
“Don’t most strategic business processes involve subprocesses which are not strategic? Which, if any, of these subprocesses should be included within the implemented ERP system?”
Fifth, installing an ERP system invariably results in an organization becoming
dependent on the ERP system vendor. What happens if the vendor goes out of
business or is acquired by another firm? Will the ERP vendor continue to evolve
future versions of the ERP system? If not, how long will it be before a move must be
made to a different ERP system? How long will the ERP vendor continue to support
the currently-installed version of the ERP system? Once vendor support ceases, the
installed global business platform – and, hence, the organization itself – is at risk.
Finally, the promise of new ERP system version releases has positive and
negative aspects. On the positive side, each new release promises functionality
enhancements that can be applied to improve executing business models and in
formulating new digital strategies. On the negative side, each new release involves
another ERP system implementation project (usually incremental but sometimes
substantial) that requires managerial attention and new funding and that will disrupt
(to varying extents) work activities. Whenever a new ERP system version is released,
a number of decisions must be addressed, such as:
“Should we adopt the new release now?”
85 For coverage of these and related questions, refer to Part 1 of this book.
420
“If so, all of it or just part of it?”
“If so, do we adopt for all installed instances or for just some of these instances?”
“If so, when should we schedule the implementations to minimize the impact
of work disruptions?”
“If not, how long can we wait until we have to adopt it?”
Celanese’s OneSAP Project86,87
Most large organizations adopted their first ERP systems during the mid-1990s
through mid-2000s time period. Very few of these initial implementations involved
organization-wide, single-instance implementations. While progress was made in
standardizing and integrating these organizations’ digitalized business processes, the
business platforms fashioned were not global. Instead, these business platforms
might best be thought of as loosely-connected islands, where each island served as
a business platform for one or more work units. While a mélange of island-like
business platforms can improve business process effectiveness and efficiency for the
affected work units, the organization as a whole receives little benefit and
experiences higher digitalization costs (among other things: licensing, implementing,
operating and evolving multiple ERP system instances).
Celanese’s ERP journey, begun in the 1990s, followed just such a path.
Celanese is a large, complex multinational organization operating five business units
in different segments of the chemical industry. Headquartered in Dallas, Texas,
86 S. Berinato, “A Day in the Life of Celanese’s Big ERP Rollup,” CIO Magazine, January
15, 2003 (http://www.cio.com/article/2440272/enterprise-resource-planning/a-day-in-the-
life-of-celanese-s-big-erp-rollup.html#social). 87 U. Schultze, “Finding the Process Edge: ITIL at Celanese,” Journal of Information
Technology Teaching Cases, Vol. 1, 2011, pp. 22-39.
421
Celanese operates across the globe (primarily North America, Europe and Asia) with
a majority of sales generated outside of North America. Celanese’s management
culture favors decentralized decision making, with its business units essentially
operating as independent businesses.
It should not come as a surprise, given a culture favoring decentralized
decision making, that Celanese’s business units would implement their own ERP
systems. The situation was complicated further in that the business units had used
acquisitions as a major growth strategy, and many of the acquired firms had retained
their own ERP systems. By 2000, Celanese was operating thirteen distinct ERP
systems. The good news was that the thirteen ERP systems were all from a single
vendor, SAP. Most chemical firms had selected SAP as their ERP system vendor,
easing the technical work involved in interconnecting suppliers’, producers’, and
consumers’ digitalized business processes. The bad news was that the thirteen ERP
systems were configured differently and represented differing ERP system releases
(from version 3.1 to version 4.6).
In mid-summer of 2001, Celanese started an initiative, named OneSAP, aimed
at operating their ERP system as a single instance, i.e., a stretch goal of having all
work units operate out of a single global business platform. If achieved, how would
this benefit Celanese? One objective was to significantly reduce Celanese’s overall
digitalization costs. Each installed ERP system had its own licensing fees and its own
technical support staff. Operating a single instance ERP system would result in a
single set of licensing fees and a much smaller technical support staff. Other key
objectives were focused on strategic, rather than cost-related, benefits. For example,
with all work units using a truly global database, many operational activities (e.g.,
422
financial consolidations, procurement transactions, cross-selling, etc.) and most
managerial activities could be handled more effectively and more efficiently.
Importantly, it was believed that all of the costs associated with the OneSAP project
would be recovered within the two years following installation of the single-instance
ERP system through the savings in digitalization costs.
The OneSAP project did make substantial progress in moving Celanese toward
a single-instance ERP system. While Celanese’s leadership team eventually
exempted three instances from the OneSAP project, the single-instance ERP system
implementation accounted for roughly 90% of Celanese’s digitalized business
processes. And, by 2005, follow-up projects had produced the sought single-instance
ERP system implementation. Among other realized business benefits, Celanese was
achieving a three-day global close in its transaction systems, a two-day global
financial consolidation, and had reduced its overall digitalization costs by 30 to 40
percent.
Alternatives to ERP Systems
Implementing an ERP system is not the only way organizations today assemble
global business platforms. For example, Walmart (business platforms for business
logistics, retail store and distribution center operations, and inventory replenishment)
and Dell (a direct-to-customer, build-to-order digitized sales platform extending to
supplier-partners and to logistics-partners) are industry leaders who have been very
selective (in terms of installed modules) adopters of ERP systems precisely because
of their use of innovative, industry-leading business practices.
Two tactics for implementing global business platforms without going the full-
blown ERP system route exist: (1) building much of the global business platforms
423
from scratch, and (2) assembling their global business platforms by interconnecting
best-of-breed business platforms built and sold (or licensed) by software vendors.
Both of these tactics require that an organization’s technology professionals are
highly-skilled and its managers are digitally-savvy. These two tactics are not for the
faint of heart!
The build-your-own tactic is applied by organizations basing their
competitive strategies on industry-leading, digitally-enabled business practices (e.g.,
Walmart, Dell, FedEx, UPS, etc.). Here, global business platforms are fashioned by
devising never-before-implemented digitalized business processes and then
interconnecting these business processes to one another and to a global database
through middleware solutions.
The best-of-breed tactic is applied by organization leadership teams not
satisfied with the industry best practices built into ERP systems. Organizations
following this tactic acquire business platforms (e.g., manufacturing, order
processing and fulfillment, supply chain management, energy accounting, human
resources, etc.) whose advanced or specialized functionality is crucial to the
organizations’ competitive strategies, and then use middleware to interconnect the
acquired platforms to one another and to an organizations’ other digital solutions.
These two tactics are not necessarily substitutes for implementing an ERP
system. Increasingly, organizations are finding it advantageous to fashion a global
business platform by interconnecting (via middleware) select modules from an ERP
system, home-grown business platforms and/or acquired best-of-breed business
platforms. Both ERP system vendors and business platform software vendors have
made it increasingly straightforward to interconnect such collections of global
424
business platforms by improving the functionality and ease-of-use of pre-built system
interfaces as well as the tools used to configure these system interfaces.
A Recap and Look Ahead
Today’s sophisticated ERP systems, along with the availability of more
specialized global business platforms, provide very pliable pathways for just about
any organization striving to implement global business platforms. But, all business
platforms are enabled and supported through the technologies and services provided
by digital platforms. We discuss digital platforms in the next chapter.
425
Chapter 22. Digital Platforms
Standalone digitalized business processes, local business platforms and global
business platforms are enabled and supported by the digital technologies and
technology services provided through digital platforms – some of which operate as
local platforms and others as global platforms; and, some of which are built in-house,
and others are externally sourced (either as internally-operated platforms or digitally-
accessed platforms). Figure 22-1 depicts such a mélange of business and digital
platforms for a hypothetical organization.
Figure 22-1 A Collection of Business Platforms and Digital Platforms
Standalone Digitalized Business Process
Local Business Platform
Local Digital Platform
Global Business Platform
Global Digital Platform
Externally-Sourced Business Platforms and Digital Platforms
Organization
The relative sizes of the ovals depicted in Figure 22-1 are reflective of a typical
organization’s investment in digital assets. As can be seen, a majority of these
investments involve digital platforms – even though the benefits that organizations
gain through digitalization are largely derived from business platforms.
426
In order to get a sense of why organizations invest more in digital platforms
than in business platforms, consider a proposed project by a retail chain to provide
each retail store manager with a daily report comparing her store’s sales (products,
volumes, margins) against those of comparable stores across the chain. Proponents
of this digitalization project would most likely take for granted the availability of
numerous digital technologies and technology services (e.g., point-of-sales data
capture devices, data storage devices, database services, networking devices and
services, communications devices and services, technology training services, help-
desk services, etc.). If these enabling technologies and services were not already
installed, then these digital assets would need to be included as part of the project
proposal. As a consequence, the proposal’s projected costs would increase
dramatically, possibly making the digitalization project cost-prohibitive.
Today, the implications of absent, enabling digital assets can often be
affordably addressed. When a valuable idea surfaces for which enabling digital assets
are absent, contractual relationships can be established with service providers able
to provide these digital assets at very appealing price points. Figure 22-2 depicts
just such a situation. Here, a digitalized market research capability has been
configured, relatively quickly and relatively inexpensively, by acquiring needed
digitalized business services (providing access to market research data and to
modeling/analytic tools) and needed technology services (providing access to servers
and to a virtual collaboration space) from external service providers. Later in this
chapter, we will discuss how, today, cloud-based services make available a huge
variety of digital assets, technology services and business services.
427
Figure 22-2 Accessing Cloud-Based Services
Global Market Research Platform
• Acquire New Customers
• Accelerate Sales Growth
• Increase Market Share
Local Sales Forecasting
Business Platform
Local Sales Prospect Analysis System
Global Digital Platforms
Data
Modeling and
Analytic Tools
Servers Cloud- Based
Services
Collaboration Space
Technology Services
B u
s in
e s s S
e rv
ic e
s
This chapter examines digital platforms, addressing what digital platforms are
and how they are evolving. To accomplish this, the following topics are covered:
The Nature of Digital Platforms
The Benefits of Standardized Digital Platforms
Standardizing the Desktop Environment at ABN Amro
Cloud-Based Services
The Nature of Digital Platforms
Digital platforms apply configurations of digital assets to deliver technology
services that, in turn, are applied in building, operating, maintaining and evolving
digital platforms, business platforms and standalone digitalized business processes.
The technology services delivered through digital platforms vary markedly in their
scope and complexity, and can be largely comprised of digitized solutions (e.g.,
messaging services), humans (e.g., strategic digital consulting services), or, most
428
commonly, digitalized solutions (mixes of digitized solutions and humans, such as
help desk services).
Organizations use two broad categories of digital platforms: internal digital
platforms acquired/built, operated, managed and owned by the organization; and,
external digital platforms built, operated, managed and owned by other organizations
(most commonly, a technology service provider). The most familiar of these external
digital platforms is the Internet. A vast number of organizations, both for-profit and
not-for-profit, cooperate in providing the vast resources and capabilities of the
Internet. All organizations, by interconnecting their own digital platforms and
business platforms to the Internet, are able to greatly expand the reach (across
organization and geographic boundaries) and range (across types of digitized
content) of their digitization/digitalization capabilities.
Five core types of digital assets are applied in configuring digital platforms (see
Table 22-1 for definitions): hardware assets, design assets, data assets, human
assets and social assets. These digital assets serve as the constitutive elements
of the technology services provisioned through digital platforms.
429
Table 22-1 Core Types of Digital Assets
Asset Definition Examples
Hardware Electronic and electro- mechanical devices & associated equipment
Laptops, servers, mobile devices, cabling, routers, devices, printers, etc.
Design Software, architectures, policies, standards procedures, etc.
Computer programs, system interfaces, database management system, operating system, data architecture, server architecture, Internet usage policies, etc.
Data Attributes of objects and events
Device serial number, network login password, service request time stamp, Internet Protocol (IP) address, etc.
Human Managerial, staff & operations employees (skills, knowledge & experience)
Programmer, systems analyst, database designer, technology strategist, project manager, network administrator, etc.
Social
Relationships (familiarity, interaction, trust, shared understanding, etc.) between humans
Relationships between: digital strategists & the members of an organization’s leadership team, systems analysts & work unit managers, work unit managers & an external service provider’s managers, etc.
Returning to the global market research platform example shown earlier as
Figure 22-2, the digitalized capabilities being provisioned include:
A global market research capability applied by market research analysts and
sales strategists across the organization’s work units to better understand sales trends, sales potential and sales performance.
A local sales forecasting capability applied by sales managers to predict product/market supply and demand.
A local sales prospect solution applied by sales teams to prioritize their
targeting of sales leads.
These digitalized capabilities are enabled through numerous digital assets, including:
Storage devices (hardware): Cost-efficient, responsive data storage repositories.
Database management systems (design): Systems software enabling the secure and timely organizing, archiving, and accessing of stored data.
IP addresses (data): Every device connected to the Internet is assigned a unique number known as an Internet Protocol (IP) address; IP addresses
consist of four numbers separated by periods and look something like: 153.0.0.1. IP addresses are then used in transmitting messages to and
430
from market researchers by indicating the specific devices to which messages are sent.
Database analyst (human): An expert in organizing data within a database such that digitized data can be electronically stored and accessed efficiently
and flexibly. Here, a database designer organizes the collection of digitized data to be used in market research analyses.
Relationships between the database analyst and market researchers (social):
Close working relationships between the database analyst (whom understands the structure of the data being maintained in the market
research database) and market researchers (whom will be accessing these data) enables the timely and effective completion of market research projects.
The Benefits of Standardized Digital Platforms
As indicated in Figure 22-1, digital platforms can be implemented as global
platforms and as local platforms. A global digital platform is a standardized digital
platform used across many, if not most, of an organization’s work units. A local
digital platform is a tailored digital platform used by a few work units (often, a single
work unit).
Because of the benefits to be derived from standardization (see Table 22-2),
digital platforms are increasingly being configured as global platforms. The first
column of Table 22-2 lists four drivers of these benefits. The first two drivers accrue
from the role that standardization plays in reducing the number of and variety of
digital assets deployed across an organization’s digital platforms. The latter two
drivers accrue from assuring high levels of compatibility and consistency across these
digital assets.
431
Table 22-2 Digital Platform Standardization Benefits
Benefit Driver Benefit
Preferred Vendor/Provider
Relationships
• Quantity discounts • Preferential ordering and fulfillment processes • Tailored configuration services • Tailored installation and customer support services
Fewer Digital Assets
Technology trainers & technology support staffs have fewer digital assets for which training/support processes/materials need to be developed.
Ease of Implementing Global/Local
Business Platforms
Global & local business platform functionalities enabled by global digital platforms will interconnect & execute more smoothly & more efficiently.
Ease of Employee Movements
Employees experience a consistent digitalized work environment when moving (temporary assignments, transfers, promotions, etc.) across work units making use of global digital platforms.
By reducing the number and variety of deployed digital assets, the number of
vendors from whom these assets are acquired is reduced. Typically, this results in
preferred vendor relationships being established and nurtured. Early in the
development of such relationships, benefits such as quantity discounts and
preferential ordering and fulfillment processes can be realized. As these relationships
deepen, vendor-partners become increasingly willing to work with customers in
developing future versions of commodity products/services and in investing in
customer-specific products/services, as well as in customer-specific installation and
support processes.
By reducing the variety of technology assets being acquired and deployed, the
resources spent on delivering training and support services can be significantly
reduced. Why? Because there are fewer technology products/services for training
and support staffs to learn about and to be accounted for in training and support
services.
432
By assuring component compatibility and consistency across an organization’s
global digital platforms, the complexities associated with implementing global
business platforms are significantly reduced. As a result, the interconnection of and
execution of the business processes being hosted on business platforms should occur
more smoothly and more efficiently.
Finally, establishing compatibility and consistency across a global digital
platform results in employees experiencing a consistent digitalized work environment
when moving from one work unit to another (e.g., as a result of temporary work
assignments, of work unit transfers, of promotions, etc.). As a consequence,
transferred employees are likely to experience little, if any, drops in productivity while
adjusting to their new work contexts.
Standardizing the Desktop Environment at ABN Amro88
ABN Amro serves retail, private and commercial banking customers (in its
home country of the Netherlands and across the globe) with a comprehensive range
of financial products and services. In 2002, the company’s desktop environment (a
collection of digital platforms) was comprised of a broad variety of digital assets.
Managing this complex desktop environment proved costly and difficult, and these
complexities added considerable time and expense when the company enhanced
installed business platforms or implemented new business platforms.
In order to resolve this situation, a two-year desktop environment
standardization project was carried out, affecting 10,000 employees at one of the
88 This section is adapted from materials in Chapter 5 of: R. van Wessel, Realizing
Business Benefits from Company IT Standardization, Doctoral Dissertation, Tilburg University,
2008.
433
company’s largest business units. The project’s two main objectives were to reduce
the total cost of ownership (acquisition, installation costs, maintenance and
support costs) of the desktop environment and to increase the company’s flexibility
by enabling changes in business models and/or business platforms to occur more
quickly, less expensively and less painfully.
Desktop environment standards have a broad reach and range. Here, the
reach of these standards was the entire business unit, as well as a few small work
groups in other parts of the company that worked with or through the business unit’s
installed business platforms; and, the range of these standards included all of the
digital technologies, technology services and business services (from desktop
productivity tools to the enablement of business platforms handling complex financial
transactions) accessed by employees through desktop devices.
The technology products specified in the new set of technology standards were
determined jointly by executives representing the business unit and the
organization’s corporate technology group. Most important, it was the business unit
leadership team that set cost-saving targets and defined the functional requirements
to be met by the new desktop environment.
The standardized desktop environment that was installed involved server-
based computing with thin-clients. The technology platform consisted of three tiers
of components:
Thin-clients hosting a minimal set of local applications (the tier actually
touched by employees).
Web servers and terminal servers hosting global applications.
Data servers hosting the global database (individual and work group data
were stored on terminal servers and replicated daily to data servers).
434
Thin-clients are terminal devices able to handle graphical interfaces and basic data
processing tasks. Web servers, terminal servers and data servers are small,
powerful, specialized computer systems that are easily configured into sophisticated,
but adaptable, networks. A primary benefit of this architecture is that it minimizes
dependencies across the three tiers. That is, changing a device located on one tier
introduces few, if any, changes to devices on the other two tiers.
The new desktop environment consisted of 10,000 thin-client workstations,
1,000 laptops, 1,000 terminal servers, a couple of web servers and 300 back-end
data servers. It was expected that laptop use would decline fairly quickly as
employees grew comfortable with the new desktop environment and with a new
work-at-home networking capability implemented in parallel with the new desktop
environment.
Prior to the standardization project, business unit employees were executing
over 6,000 different applications from their desktop devices. After a rationalization
process that eliminated redundant applications and stressed the use of commercially-
available, off-the-shelf software products, the number of different applications being
executed on the new desktop environment dropped to 265. In theory, this final list
of 265 standard applications could have been even smaller. However, internal
company politics resulted in some allegedly vital applications being added to the list
of available applications. These exceptions, however, were only executed locally on
a few desktop devices and were not supported by a newly-created technology support
work group.
In principle, once the new desktop environment had been installed, work units
were restricted to the list of approved hardware and software products. In practice,
435
an exception process existed that provided a sanctioned pathway for violating the
desktop standards. Anyone requesting nonstandard hardware or software products
was first required to try out an approved product. Then, after demonstrating
limitations with approved products and developing a sound business rationale (e.g.,
explaining the added value to be derived from the exception, the number of affected
employees, total extra costs, willingness to cover all or part of these costs, etc.), an
exception allowed. When an exception request was granted, the requested product
was either added, after a vetting process, to the list of standard products (the
preferred option) or was maintained as a temporary exception (to be reversed at any
time if and when it became advantageous or necessary to do so).
Table 22-3 summarizes the outcomes from ABN Amro’s desktop environment
standardization project. The payback period for the €32 million project was 1.45
years, and the project yielded a positive cash flow of €56 million in the fourth year
after the investment had been made. Just as important, if not more so, were the
reactions of business unit employees. Initially, their collective attitude was not
positive as they feared the standardized desktop environment would result in a loss
of personal flexibility. However, after having adjusted to the new work environment,
more than half considered the change to be an improvement, 30 percent were
indifferent, and only about 10 percent were less satisfied than before – with a
majority of these dissatisfied employees being housed in the corporate technology
group!
436
Table 22-3 Results from ABN Amro’s Desktop Environment Standardization Project
Cost-Related Outcomes Flexibility-Related Outcomes
• The per desktop yearly costs dropped from €4,600 to €2,392 (48% of pre- project cost).
• As all desktops had the same configuration, there was no need to reconfigure desktop configurations with staff movements.
• The number of corporate technology group employees dropped from 383 FTE to 130 FTE (34% of pre-project level).
• Costs to enhance/develop new business platforms dropped as these new platforms could be designed for the standardized desktop environment, requiring less technical expertise.
• Employees could move across the business unit without productivity loss. As a result, employees could work anywhere, enabling business expertise to be spread across the business unit.
• The desktop platform – because of its adaptability, scalability & robustness – became far less a constraint on initiatives to develop new business platforms.
• New projects demonstrated completion times up to 75% less than pre-project completion times.
Cloud-Based Services
As mentioned earlier in this chapter, organizations are increasingly acquiring
the functionalities hosted on business platforms and digital platforms as cloud-
based services or, more precisely, as proprietary services delivered to consumers
either via the Internet or via Internet-like technologies. Today’s cloud-based services
can trace their roots to two earlier technologies:
1960s-era mainframe-based utility computing, also referred to as time- sharing services, that offered customers access, via telecommunications, to
digitalized services executed on high-powered computer systems.
1990s-era application service providers (ASPs) that offered consumers
access, via the Internet, to a variety of digitalized services.
The advances that have occurred with digital technologies differentiate today’s cloud-
based services from these earlier technologies: heightened ease-of-use, ease-of-
deployment, transmission speed, transmission bandwidth, service availability,
437
service reliability, service interoperability, service security, etc. Just as important,
these cloud-bases services are very affordable.
Just about any type of digitized/digitalized service is available from the cloud
today. As illustrated in Figure 22-3, one can access (moving upwards from the
bottom of the figure) hardware assets, technology services and business services
(including business platforms). Note, in particular, two things regarding Figure 22-
3. First, cloud-based business services are available for, essentially, any of an
organization’s work units. Second, it is not uncommon for organizations to contract
with multiple technology service providers to create a comprehensive cloud-based
solution. For example, a financial services company like ABN Amro could use cloud-
based services to assemble much, if not all, of their standardized desktop
environment (indicated in Figure 22-3 by the services in green boxes).
Figure 22-3 Examples of Cloud-Based Services
Hardware Assets
Servers Network Devices Data Storage
Devices
Technology Services
Connectivity Services
Messaging
Storage Management
Virtual Desktop
Disaster Recovery
Content Management
Business Services & Business Platforms
Software Development
Platform
Project Management
Platform
Accounting Services
Self-Service Human Resources
Platform
CRM Platform ERP Platform Logistics
ServicesPayroll Services
Desktop Productivity
Tools
Market Research Data
Credit Score Checking
Shipment Tracking
Currency Trading Platform
Collaboration Platform
438
Three deployment options exist by which organizations gain access to cloud-
based services: private clouds, community clouds and public clouds. Private clouds
are designed, developed and operated by (on-premises) or for (off-premises via a
third-party) an organization, with access to the cloud-based services confined (via
authentication processes) to authenticated members of the organization and
authenticated members of select-other organizations (strategic partners, consumers,
suppliers, etc.). Private clouds offer the greatest control over a cloud-based service,
including the abilities to customize the service and to apply especially-stringent
security protocols. Community clouds, essentially, are private clouds managed and
accessed by a consortium of organizations. Public clouds, not surprisingly, are
made available to anyone. A public-cloud provider takes on the responsibilities of
building, operating, maintaining, evolving, and managing the services being offered,
with consumers of these services only charged for the services actually used.
However, this convenience does come at a cost. Public cloud-based services tend to
be offered as commodities that only accommodate the most common sets of
consumer requirements (i.e., configuration options tend to be limited), and
consumers are reliant on the public-cloud provider operating, securing and enhancing
the cloud-based services.
Table 22-4 lists the advantages to be gained from using cloud-based services,
and Table 22-5 lists the disadvantages. All of these advantages and disadvantages
are applicable to consumers of a public cloud-based service, and most apply to
consumers of a community cloud-based service. For organizations using a private
cloud-based service, some subset of these advantages and disadvantages will apply,
439
depending on the situation. Any organization contemplating deploying a private cloud
should possess strong digitization capabilities and strong digitalization capabilities.
Table 22-4 Advantages of Cloud-Based Services
Advantage Description
Minimal Up-Front
Investment
• Acquire a service rather than an asset (few capital/operating costs). • Cost to initialize a service ranges from zero (no customization) to
moderate (extensive customization).
Consumption- Based Pricing
• Pay for services actually used. • Pay to gain guaranteed access to higher service levels.
Ubiquitous Access
• Access services from any physical location at any time.
Guaranteed Quality of
Service
• Established via negotiated service level agreement (SLA). • Tiered service-level pricing.
Minimal Technology
Management
• Cloud management (strategy, planning, control, operations, maintenance, enhancement, etc.) transparent to the consumer.
Strategic & Operational Flexibility
• Adaptable to the needs of a broad range of consumers. • Scalable across service volumes & locations. • Relatively low costs borne by consumers when switching cloud
vendors.
Table 22-5 Disadvantages of Cloud-Based Services
Disadvantage Description
Validity of Services Delivered
• Dependent on providers’ capabilities & oversight. • Providers’ use of other third-party providers.
Security & Privacy • Dependent on providers’ capabilities & oversight. • Providers’ use of other third-party providers. • Applicable laws depend on vendors’ geographic locations.
Availability, Fault- Tolerance &
Disaster Recovery
• Dependent on providers’ capabilities & oversight. • Providers’ use of third-party providers. • Providers’ escalated commitments to other consumers.
Data Transfer & Data Lock-In
• Bottlenecks (speed, volume) in transmitting data. • Lack of system interfaces for accessing data from sophisticated
consumer platforms. • Lack of portability in moving a consumer’s data from one provider
to another provider.
Transaction Auditability
• Inability to audit transactions. • Difficulties in auditing transactions.
Provider Instability • Financial insolvency. • Inability to maintain competitiveness. • Inability to hire & retain highly-capable employees.
440
The pervasive availability of cloud-based services today has significantly
reduced the complexities and costs of deploying both global and local platforms.
However, this ease of deploying business platforms and digital platforms that are
heavily dependent on cloud-based services does have a downside – a susceptibility
of becoming locked into a platform, for technical and/or contractual reasons. Then,
when competitive realities demand the partial dismantling of a global platform or the
folding of a local platform into a global platform, significant challenges can surface
that increase the time and cost, sometimes prohibitively so, of moving forward with
the desired platform change.
A Recap and Look Ahead
Digital platforms form the foundation on which business platforms are built,
operated, managed and evolved. As is the case with business platforms, digital
platforms can be implemented as global platforms and as local platforms. Although
most organizations today are moving toward provisioning an increasing portion of
their technology services through global digital platforms, these same organizations
are likely to have installed elaborate collections of global and local digital platforms
– attributed to organizations’ unique digitalization histories and the reality that
organizations’ work units confront differentiated, ever-evolving environments. In the
next chapter, we discuss the managerial challenges that arise as organizations’
leadership teams strive to maintain an optimal global/local balance with their digital
platforms and their business platforms.
441
Chapter 23. Platform Management Challenges
In today’s highly competitive market ecosystems, one of the few digitally-
related realities that can be stated with confidence is that organizations’ abilities to
enhance or sustain their competitive positions are largely dependent on the extent
to which installed platforms:
Operate efficiently and effectively.
Adapt – timely and cost-effectively – as an organization’s digital strategies evolve.
Facilitate, rather than obstruct, the taking of innovative competitive moves and timely, well-targeted competitive responses.
As a consequence, leadership teams and digital strategists within organizations
recognized as digitalization exemplars focus increasing amounts of attention on:
overseeing regular assessments of the continued viability of their organizations’
installed platforms; identifying if, when and where platform enhancements and/or
renewals are needed; and, viewing the ongoing funding of platform
enhancement/renewal initiatives as a necessary tactic in ensuring their organizations’
competitive success.
As illustrated in Figure 23-1, the ideas and the funding for enhancing and/or
renewing organizations’ business platforms and digital platforms can reflect business
and/or technology objectives, each of which might be global or local in nature. In
the absence of careful and sustained planning, investments directed toward sought
business (technology) objectives might undermine sought technology (business)
strategies, and investments directed toward sought global (local) objectives may
undermine local (global) objectives. As a consequence, an organization’s installed
442
and to-be-installed platforms need to be built, operated, managed and evolved in a
synergistic, rather than a one-off, manner.
Figure 23-1 Sources of Platform Enhancement/Renewal Initiatives
Business Platforms
Digital Platforms
Corporate Leadership Teams & Digital Strategists
Work Unit Leadership Teams & Digital Strategists
Corporate Technology Leadership Teams &
Strategists
Work Unit Technology Leadership Teams &
Strategists
GlobalGlobal
Local Local
These varied sources of platform enhancement/renewal initiatives are the root
causes of many, if not most, of the serious challenges that arise in leadership teams’
efforts to maintain an optimal global/local platform balance. We cover these
challenges in this chapter through the following two topics:
Platform Challenges at Charles Schwab Corporation
Effective Platform Management
Platform Challenges at Charles Schwab Corporation89
Charles Schwab Corporation, the discount brokerage firm, is widely recognized
as an organization that has repeatedly introduced digital innovations as a primary
89 This section is based on material adapted from: D. Shpilberg, S. Berez, R. Puryear
and S. Shah, "Avoiding the Alignment Trap in Information Technology," Sloan Management
Review, Fall 2007, pp. 51-58.
443
means for driving a business model based largely on offering customers superior
services and low prices. As an example, consider Schwab’s digital innovations
targeted at customer-facing business processes:
1989 - Customer trading via a fully-automated telephone system.
1993 - Customer trading via the customer’s personal computer.
1996 - Customer trading via Schwab’s website.
By 1998, Schwab had become a full-service, online broker; and, in 2003, the
company launched Charles Schwab Bank. Clearly, Schwab has figured out, over time,
how to formulate and implement a consistent stream of digital strategies in support
of this business model.
By the early 2000s, a number of competitors had introduced business models
similar to Schwab’s. Schwab’s installed platforms were (in too many instances)
preventing the company from responding to these competitors in a timely and
effective manner: business process enhancement projects had become lengthy and
expensive, and roll-outs of the customer-facing innovations being hosted on the
company’s platforms were delayed and buggy.
What had happened? Poor performing competitive actions can often be traced
to overly-complex business platforms and/or overly complex digital platforms, and
Schwab’s massive collection of interconnected platforms had grown much too messy.
Where did this messiness come from? The company’s work units were each
aggressively devising and implementing sophisticated local business platforms,
enabled largely through local digital platforms, and then interconnecting these
444
platforms to other platforms both within and across work units. While creative
middleware solutions enabled this interconnectivity, these same middleware
solutions only added to the geometrically-increasing complexity of Schwab’s
assemblage of platforms. With the passage of time, it became increasingly difficult
to enhance or extend installed platforms and to introduce new platforms. Worse,
Schwab’s mélange of platforms was becoming increasingly brittle, triggering an ever-
increasing number of faults and errors.
The problem that Schwab faced in the early 2000s was not tied to inappropriate
digital strategies but instead could be traced back to not effectively managing, from
a global perspective, its collection of business platforms and digital platforms.
Effective Platform Management
Effective platform management begins with establishing meaningful, sound
policies and standards regarding business platforms and digital platforms. Table 23-
1 lists areas for which policies and standards should be developed.
Table 23-1
Common Platform Policies and Standards
Policies Standards
• Approval procedures for establishing & modifying platform policies & standards.
• Business/digital platform distinctions and global/local platform distinctions.
• Criteria to be met for implementing new local standalone digitalized business processes, new local business platforms, and new local digital platforms.
• Criteria to be met for implementing new global business/digital platforms.
• Approval procedure for enhancing or extending a local business/digital platform.
• Approval procedure for enhancing or extending a global business/digital platform.
• Hardware/software specifications for standalone digitalized business processes, local business/digital platforms, and global business/digital platforms.
• Data specifications for standalone digitalized business processes, local business/digital platforms, and global business/digital platforms.
• Middleware specification for interconnectivity solutions.
• Local/global business process specifications (operating procedures & business rules).
445
Like most things in life, politics and money invariably intrude on platform
management activities. This is certainly the case with decisions taken in establishing
and then conforming to platform policies and standards such as those listed in Table
23-1. To avoid dysfunctional squabbles (ultimately leading to policy/standard
avoidance or rejection), it is advantageous to anticipate the drivers of platform-
related dissonance and to account for these drivers within the processes used in
establishing platform policies and standards.
A sample of some of the questions likely serving as dissonance drivers is
provided in Table 23-2. The overall intent of an organization’s leadership team
addressing such questions should be clear – putting in place sound and accepted
platform-related policies and standards aimed at achieving and maintaining an
optimal global/local platform balance. Establishing a sound and accepted set of
platform policies and standards is the only way of ensuring that an organization’s
stream of digital investments complement, rather than hinder (or worse, obstruct),
one another.
Table 23-2
A Sample of Platform-Related Political/Financial Questions
Political Questions Financial Questions
Who should participate in the activities aimed at establishing or modifying platform policies & standards?
When & to what extent should work unit leadership teams contribute to the funding of a global platform?
Who should be responsible for monitoring conformance to platform policies & standards?
When & to what extent should the corporate leadership team contribute to the funding of a local platform?
How should conformance to platform policies & standards be enforced?
Often, a local digitalized business process requires that enhancements be made to local/global platforms. How should such platform investments be funded?
How should requests for exceptions to platform policies & standards be handled?
Should the costs associated with building, operating, managing and evolving global platforms be reflected in work unit operating budgets? If so, when & to what extent?
446
The potential for platform-related conflicts to surface increases significantly
when an organization’s work units largely operate within differing market ecosystems
(differing consumers, producers, suppliers, etc.), as these work units are unlikely to
obtain uniform benefits from installed global platforms. In order to better grasp this
issue, consider the hypothetical organization shown in Figure 23-2, where:
Work units 1, 2 and 3 are similar regarding their use of global digital platforms.
Work units 2 and 3 are fairly similar regarding their use of global business platforms.
Work units 1 and 4 have invested heavily in local business platforms and local digital platforms.
Work unit 3 has invested very little in local digital platforms.
Work unit 4 makes little use of global platforms (business or digital).
Figure 23-2 A Not-Uncommon Platform Situation
Work Units
Global Digital Platforms
Global Business Platforms
Local Digital Platforms
Local Business Platforms
1 2 3 4
Would the management teams of these four work units feel they should
contribute equally to funding the organization’s global platforms? Would the work
unit management teams react similarly to an executive leadership edict requiring
447
that all future digitalized business processes must operate from a global business
platform? The answer to both questions is most surely No. Should all the work unit
leadership teams be involved in establishing, reviewing and approving new platform
policies and standards? Of course!
A few more-nuanced examples may help to illustrate the challenges that can
arise in platform management. First, consider the decision to install a global business
platform, such as an ERP system. Because of the huge expense involved and the
disruption likely to be felt by affected work units, the capital investment required for
ERP implementation is likely to be directed and funded by the corporate leadership
team (with active involvement of the leadership teams of affected work units). Even
with full corporate-level funding, however, all work unit leadership teams will be
financially impacted as the amount of corporate-level investment funding available
for other capital investment initiatives will be significantly reduced.
Or, consider the decision by a work unit to implement an organization’s first
customer relationship management (CRM) business platform. Should this be built as
a local business platform or a prototype of a global business platform? This is a very
critical decision, as it affects who would be involved in the design of the business
platform and how the investment would be funded. But, even if the decision was to
implement the CRM platform as a local platform, some corporate-level involvement
would occur to ensure conformance to global digital platform standards. How might
the dynamics of this digitalization project change if this local CRM platform required
that enhancements be made to an installed global business analytic platform? With
this latter situation, the corporate leadership team might very well agree to provide
448
some of the funding to enhance the global business analytic platform in order to
ensure the integrity of this global platform.
Finally, consider the question of who should pay for the costs of operating and
maintaining an organization’s global platforms, such as a global business analytic
platform or a global communications services (email, messaging, videoconferencing,
etc.) platform. If all global platform costs are fully covered through corporate-level
funding, then some work units might view the hosted functionalities as free goods
and misuse them. But, if work units are expected to contribute to the funding of
global platforms, how much funding should these work units contribute individually
and collectively? Should the contributions of each local work unit be based on an
arbitrary measure (i.e., number of employees, number of desktops/laptops, etc.) or
on each work unit’s expected (a fixed cost) or actual (a variable cost) use of a global
platform? Finally, would your answer vary for specialized platforms (e.g., a global
business analytics platform) versus general-purpose platforms (e.g., a global
communications services platform)?
A Recap and Look Ahead
Having recognized and resolved its platform management problems, Schwab
has resumed its very successful digitalization journey. Effective platform
management is inextricably tied to the ability of an organization’s leadership team to
ensure that:
The right platform-related policies and standards are established.
The right people are brought together to establish, evolve and monitor conformance to these policies and standards.
The installed platforms simultaneously influence and are influenced by the
organization’s evolving digital strategies and digitalization capabilities.
449
The next three chapters, respectively, introduce three complementary tactics for
effective platform management (see Figure 23-3): a platform design tactic focused
on implementing modular enterprise architectures, a digitalization governance
design tactic focused on establishing managerial accountabilities for platform-related
decisions, and a digitalization organization design tactic focused on positioning
the work units most influential in formulating digital strategies and in provisioning
digitalization capabilities.
Figure 23-3 Tactics for Effective Platform Management
Effective Platform Management
Modular Enterprise
Architectures
Digital Strategizing
Digitalization Capability
Hosting
Digitalization Managerial
Accountabilities
Platform Architecture
Design
450
Chapter 24. Enterprise Architecture Design
Enterprise architectures, at their core, are idealized blueprints of the
global/local balance across an organization’s business platforms and digital platforms.
Do not skip over the word idealized here. Generally, whenever a new enterprise
architecture is devised and signed-off by an organization’s leadership team, installed
business platforms and installed digital platforms already exist - many of which are
inconsistent (to varying extents) with the newly-specified enterprise architecture.
Further, once a newly-devised enterprise architecture has been approved, internal
and external environmental forces immediately begin to induce perturbations that
accumulate over time – chipping away (usually slowly, but sometimes rapidly) at the
integrity of the newly-specified enterprise architecture. Enterprise architectures are
perhaps best thought of as works-in-progress never intended to be set-in-stone.
Despite their impermanence, enterprise architectures serve two critical roles
in maintaining a global/local balance in organizations’ platforms. First, and perhaps
most important, enterprise architectures influence how an organization’s digital
strategies and technology strategies evolve. (Stated simply, a technology strategy
is a mapping of how an organization’s investment in technology services is expected
to evolve over time.) It is often difficult for leadership teams to grasp the strategic
and tactical implications of an installed platform. However, participating actively in
discussions related to the appropriateness of alternative enterprise architectures will
profoundly affect most individuals’ understandings of the strengths and weaknesses
of installed and planned platforms. Second, from a more pragmatic perspective, an
organization’s current enterprise architecture will undoubtedly influence the natures
451
of new digital investment proposals as well as the outcomes of associated digital
investment funding decisions.
In describing the nature and design of enterprise architectures, the following
topics are covered:
The Nature of Enterprise Architectures
Enterprise Architecture Implementation
Modular Services Architectures
The Nature of Enterprise Architectures
Jeanne Ross and her colleagues90 describe an enterprise architecture as “…the
organizing logic for … an organization’s integration and standardization
requirements.” We refine this definition of an enterprise architecture as the
organizing logic for core business processes (those provisioned through global
business platforms), core business data (that provisioned through global databases),
and core digital technologies and technology services (those provisioned through
global digital platforms). Here, the term core refers to the digital resources seen as
being fundamental to the success of an organization’s executing and planned
business models.
Figure 24-1 depicts the determinants of an enterprise architecture. As can be
seen from the relative sizes of the two arrows leading toward the enterprise
architecture in this figure, the primary driver of an organization’s enterprise
90 J.W. Ross, P. Weill and D.C. Robertson, Enterprise Architecture as Strategy: Creating
a Foundation for Business Execution, Harvard Business School Press, Boston, MA, 2006, p.
47.
452
architecture is what Ross and her colleagues term the operating model91: “… the
necessary level of business process integration and standardization for delivering
goods and services to customers.” In other words, the operating model specifies
the business processes and business data that should be provisioned through global
business platforms in order to effectively and efficiently implement formulated digital
strategies. These global business platforms, in turn, are enabled through technology
services hosted, largely, on global digital platforms. These global digital platforms
are designed, built and evolved as a consequence of organizations’ technology
strategies. To complete this picture, Figure 24-1 reinforces the primal notion that
organizations’ digital strategies and technology strategies are devised to enable them
to survive and prosper within their competitive environments.
91 J.W. Ross, P. Weill and D.C. Robertson, Enterprise Architecture as Strategy: Creating
a Foundation for Business Execution, Harvard Business School Press, Boston, MA, 2006, p.
25.
453
Figure 24-1 Enterprise Architecture Components and Determinants
Digital Strategies Planned Business Models
Executing Business Models
OPERATING MODEL
Business Process Standardization
Business Process Integration
ENTERPRISE ARCHITECTURE
Business Platforms Core Business Processes
Core Business Data
Digital Platforms Core Technology Services Core Technology Assets
Technology Strategies Planned Technology Services Installed Technology Services
C o
m p
e ti
ti v e
E
n v ir
o n
m e
n t
Organizations’ unique histories of digital strategies and technology strategies
combine to produce somewhat distinctive operating models (though organizations
competing within similar market ecosystems often exhibit a considerable similarity in
their operating models). Accordingly, organizations’ enterprise architectures tend to
be idiosyncratic. Still, it is useful to describe commonly-observed enterprise
architecture patterns. Earlier in this part of our book, we described four prototypical
business platform patterns. These same prototypical patterns also apply to
enterprise architectures.
Globally-Integrated, Locally-Unique Enterprise Architectures
Organizations likely to employ globally-integrated, locally-unique enterprise
architectures are those whose business strategies focus on a single consumer base,
but a range of differentiated products/services. Since the full product/service
portfolio is likely to be attractive to many, if not most, consumers, ripe opportunities
454
for cross-selling and up-selling exist. Examples of industries possessing such
attributes include financial services and health services.
As seen in Figure 24-2, the differentiated products/services benefit are offered
to consumers through distinct work units applying local platforms customized to each
set of products/services. However, a large number of global digital platforms are
likely to be utilized across the work units and a few global business platforms are also
likely to be applied – specifically, business platforms hosting a few primary processes,
e.g., those targeted at attracting and managing the consumer community,
product/service cross-selling and up-selling, and a number of support processes.
Figure 24-2
Globally-Integrated, Locally-Unique Enterprise Architecture
Global Business Platforms
Local Business
Platforms 1
Local Digital Platforms 1
Local Business
Platforms 2
Local Digital Platforms 2
Local Business
Platforms 3
Local Digital Platforms 3
Local Business
Platforms 4
Local Digital Platforms 4
Local Business
Platforms 5
Local Digital Platforms 5
Local Business
Platforms 6
Local Digital Platforms 6
Global Digital Platform
Globally-Integrated, Globally-Standardized Enterprise Architectures
Organizations likely to employ globally-integrated, globally-standardized
enterprise architectures are those whose business models are aimed at offering
consumers a cohesive set of products and services via a cohesive set of operational
455
work activities. Examples of such organizations include those offering transportation-
related services (airlines, package delivery firms, etc.) and consulting-related
services, and those manufacturing and/or selling a homogenous product-line. Such
organizations operate most effectively and most efficiently by deploying a single set
of highly-rationalized, seamlessly-interconnected business processes, enabled by
standardized technology services. As can be seen in Figure 24-3, this implies a
relatively simple enterprise architecture consisting of a set of global business
platforms, enabled through a set of global digital platforms.
Figure 24-3
Globally-Integrated, Globally-Standardized Enterprise Architecture
Global Business Platforms
Global Digital Platforms
Locally-Isolated, Globally-Standardized Enterprise Architectures
Organizations likely to employ locally-isolated, globally-standardized
enterprise architectures are those whose business models focus on offering
consumers a similar set of products/services from many, possibly hundreds or
thousands, of work locations. Examples of such organizations can be found in
numerous industries such as: hospitality (e.g., restaurant or lodging chains),
groceries and pharmacies (with replicated distribution centers and retail stores),
456
manufacturing (with replicated manufacturing and distribution centers), etc. Such
organizations generally strive to apply a common set of rationalized business
processes at each of the work locations in order to operate as effectively and as
efficiently as possible and to provide consumers with similar product/service
experiences regardless of the location where a product was produced or a service
was provided.
We illustrate this enterprise architecture pattern in Figure 24-4 via a
hypothetical situation involving two replicated business platforms (each of which is
supported by a global digital platform and a global business platform). With this
example, the first set of replicated platforms might be for distribution centers and
the second set of replicated platforms might be for retail stores. The primary role
served by the global business platform would be to host support processes (e.g.,
accounting processes, financial processes, HR processes, etc).
Figure 24-4 Locally-Isolated, Globally-Standardized Enterprise Architecture
Global Business Platforms
Global Digital Platforms
Replications of Local Business
Platform 1
Replications of Local Digital Platform 1
Replications of Local Business
Platform 2
Replications of Local Digital Platform 2
457
Locally-Isolated, Locally-Unique Enterprise Architectures
Organizations likely to employ locally-isolated, locally-unique enterprise
architectures are diversified organizations, e.g., a holding company, whose work
units operate fully independent of one another. While such organizations might have
two or more work units offering similar products/services to similar customers, it may
be advantageous to maintain the independence of the work units (detracting to some
extent from these units’ efficiency and effectiveness) in order to make it as easy as
possible to divest a work unit.
Each work unit’s primary processes and many of its support processes are
hosted on local platforms (see Figure 24-5). Still, in order to manage the entire
enterprise, a very small set of financial processes (tracking enterprise profitability,
handling enterprise taxes, managing enterprise-held funds, etc.) are likely hosted on
a global business platform.
Figure 24-5 Locally-Isolated, Locally-Unique Enterprise Architecture
Global Business Platform
Local Business
Platforms 1
Local Digital Platforms 1
Local Business
Platforms 2
Local Digital Platforms 2
Local Business
Platforms 3
Local Digital Platforms 3
Global Digital Platforms
458
Enterprise Architecture: Levels of Analysis
The preceding discussions of prototypical enterprise architectures applied an
enterprise-wide level of analysis. Such analyses are likely to suffice for globally-
integrated, globally-standardized organizations. For most other organizations, it is
desirable for enterprise architectures to be established for second-tier work units,
such as business units, operating units and functional units. If these second-tier
enterprise architectures exist, architecture exception-handling generally becomes
more straightforward than otherwise would be the case.
Enterprise Architecture Implementation92
Specifying an enterprise architecture is only a first step of what often proves
to be a lengthy series of projects aimed at modifying existing platforms, fashioning
new platforms and, as needed, interconnecting platforms. In order to lessen
implementation complications, enterprise architectures tend to be built in two stages,
as shown in Figure 24-6.
92 Many of the ideas (visual and textual) in this section are based on material in: J.W.
Ross, P. Weill and D.C. Robertson, Enterprise Architecture as Strategy: Creating a Foundation
for Business Execution, Harvard Business School Press, Boston, MA, 2006.
459
Figure 24-6 Enterprise Architecture Implementation Stages
Global Digital Platforms
Global Digital Platforms
Global Business Platforms
Standalone Digitalized Business Processes
Local Business Platforms
Local Digital Platforms
Stage 2 Business Process
Optimization
Standalone Digitalized Business Processes
Local Business Platforms
Local Digital Platforms
Stage 1 Technology
Standardization
Because it is usually less difficult to convince an organization’s leadership team
to standardize technologies rather than to standardize business processes, and
because many of the benefits from standardizing digital platforms are quickly
realized, a first stage typically involves projects aimed at technology standardization
– that is, the implementation of global digital platforms. It is only after benefits from
technology standardization have borne fruit that more challenging projects aimed at
business process optimization are undertaken. With business process
optimization, global business platforms are identified, negotiated, rationalized and
implemented.
Figure 24-6 also makes it clear that organizations’ investments in global
platforms sit aside these organizations’ investments in standalone digitalized
processes and local platforms. The objective is not to eliminate localized digital
investment, but instead to maintain an optimal global/local platform balance.
460
The benefits derived from technology standardization and business process
optimization are summarized in the first four columns of Table 24-1 (the fifth column
addressing the benefits derived from a third implementation stage, i.e., services
modularization, will be discussed later in the chapter). While these benefits can be
significant, a potential negative consequence can arise whenever an organization
installs global platforms: an erosion in work unit (i.e., local) flexibility and, hence, in
a work unit’s ability to respond in a timely and effective manner to competitors’
moves (see Figure 24-7).
Table 24-1
Benefits from Implementing an Enterprise Architecture
Stage 1 Technology
Standardization
Stage 2 Business Process Optimization
Stage 3 Services
ModularizationGlobal Database Standardization Integration
• Lower procurement, configuration, installation, support & training costs
• Ease of employee movement
• Common business language
• Enhanced work task coordination & synchronization
• Enhanced operational, tactical & strategic decision making
• Develop new digitalized solutions quickly & less expensively
• Fewer operational problems
• Lower support & training costs
• Fewer digitalized business processes to develop & maintain
• Digital investment leveragability
• Establish new work locations quickly & less expensively
• More efficient work flows
• More effective work flows
• Increased work-related coordination
• Increased work-related collaboration
• Replace, modify and implement digitized solutions & digitalized solutions quickly & inexpensively
• Lower support costs
• Digital investment leveragability
461
Figure 24-7 Potential Impacts of Global Business Platforms on Flexibility
Stage 1 Technology
Standardization
Stage 2 Business Process
Optimization
Local Flexibility
Global Flexibility
Why does this potential erosion in work unit flexibility arise? Because
digitalization projects inconsistent with installed global platforms:
Are less likely to be proposed - as business and technology strategists’ thinking regarding new digital investments is likely to gravitate toward initiatives consistent with these installed global platforms.
Are more difficult to justify - as the mindsets of executives holding project-
approving authority are likely to be biased toward these installed global platforms.
Are more difficult and costly to implement – as to-be-built digital solutions must be designed and engineered, in part, to operate with these installed
global platforms.
To some extent, then, there is likely to be a loss in digital strategists’ flexibility to
implement (or, perhaps even envision) a digitalized solution that best meets an
emerging competitive situation. If not resolved, this erosion in flexibility can, over
time, result in an organization losing much, if not most, of its competitiveness.
As is often the case, new technologies have emerged to not only dampen this
potential for local inflexibility but, when effectively applied, to reverse it (see Figure
24-8). These new technologies (described in the next section) enable modularized
462
enterprise architectures to be implemented. With the services modularization
stage, business processes (business platforms) and technology services (digital
platforms) are conceptualized, decomposed and constructed as self-contained
modules (as a module that fully performs by itself a well-defined task or service),
and each modularized service is loosely-coupled (through the passing of data) to
other modularized services. Modular enterprise architectures (see Figure 24-9) apply
modularized business services and data objects within global business platforms,
apply modularized technology services within global digital platforms, and, to as great
an extent as possible, build their standalone digitalized business processes, local
business platforms and local digital platforms from modularized services components.
When an enterprise architecture is implemented with modularized services, it
becomes relatively easy and relatively inexpensive to modify an existing module (as
no other modules are affected) and to add/remove modules (as only the data being
passed to and from modules are affected).
Figure 24-8
Impact of Services Modularity on Flexibility
Standardized
Technical
Platforms
Standardized
Technical
Platforms
Data Marts
Enterprise
Database
Process
Standardization
Process
Integration
Stage 1 Technology
Standardization
Stage 2 Business Process
Optimization
Local Flexibility
Global Flexibility
Stage 3 Services
Modularization
Standardized
Technical
Platforms
463
Figure 24-9 Adding the Services Modularization Implementation Stage
Modularized Technology ServicesGlobal Digital
Platforms
Global Digital Platforms
Global Business Platforms
Standalone Digitalized Business Processes
Local Business Platforms
Local Digital Platforms
Stage 2 Business Process
Optimization
Standalone Digitalized Business Processes
Local Business Platforms
Local Digital Platforms
Stage 1 Technology
Standardization
Modularized Business Services
Data Objects
(Modularized)
Standalone Digitalized Business Processes
Local Business Platforms
Local Digital Platforms
Stage 3 Services
Modularization
The benefits to be obtained from modularization are provided in the right-most
column of Table 24-1 (shown earlier in this chapter). First, as already-installed
modules can be repaired or modified without having to touch other modules, it
becomes relatively easy and inexpensive to change, as necessary, installed digital
solutions. Second, once a new digital solution has been built or otherwise acquired,
interconnecting the new module to existing modules only requires modifications to
the data flowing between these modules. As long as implemented data objects
conform to global data standards, these interconnections can be established relatively
quickly and relatively inexpensively. Together, then, these first two benefits provide
the capacity to incorporate, relatively quickly and inexpensively, digital innovations,
digitalized competitive moves and digitalized competitive responses into
organizations’ portfolios of installed business platforms and digital platforms. The
third and fourth benefits from services modularity are a reduction in platform support
464
costs and an inherent leveragability of the prior digital investments targeted at
producing digital solutions comprised of modularized services.
Modular Services Architectures93,94
Modular services architectures are built via configuring together many different
technologies, dominated by server technologies (that host modularized services) and
middleware technologies (that interconnect modularized services). However, even
more important are services architectural standards, or rules, that define how
modularized services are to be designed and that direct how modularized components
operate and interconnect. By configuring business platforms and digital platforms as
modularized services that conform to established standards, the configured services
are able to seamlessly interconnect and interact. A large number of public and private
organizations are working to develop and extend the standards (see Table 24-2 for
examples) used in implementing modular services architectures.
93 O.A. El Saway and P.A. Pavlou, “IT-Enabled Business Capabilities for Turbulent
Environments,” MIS Quarterly Executive, September 2008, pp. 139-150. 94 R. Hirschheim, R. Welke, R. and A. Schwarz, “Service-Oriented Architecture: Myths,
Realities, and a Maturity Model,” MIS Quarterly Executive, March 2010, pp. 37-48.
465
Table 24-2 Services Architectural Standards
Standards Domain Example Standards
Application/Industry Business Process Standards
UBL, XCBL, HRSML, RossetaNet
Business Process Execution ebXML, WSCL, WSFL, Biztalk
Services Publishing & Discovery
UDDI
Services Description WSDL, BPML, BPEL
Messaging SOAP
Universal Data Language XML, XSLT
Network Transport Protocols TCP/IP, HTTP, FTP
Three architectural concepts are critical to the implementation of modular
services architectures: service-oriented architectures, self-learning architectures and
event-based architectures. Table 24-3 lists the major principles associated with each
of these architectural concepts.
Table 24-3
Three Key Modular Services Architectural Concepts
Concept Key Principles
Service- Oriented
Architectures
• Standalone digitalized business processes, business platforms & digital platforms are built from modularized services.
• Each service by itself fully performs a specified task (or tasks). • Services are loosely-coupled (interconnected through data flows). • Services are hardware independent.
Self-Learning Architectures
• Information is provided within the architecture enabling services to locate, establish connections with, and interact with other services.
• Services remember how to locate, establish connections with, and interact with other services.
• Services learn, over time, how to best interact with other services.
Event-Based Architectures
• Services can subscribe to other services’ communications regarding the detection of & reaction to specific events; a service detecting and/or reacting to an event publishes messages (describing the event & event-processing outcomes) that are transmitted to subscribing services.
466
With service-oriented architectures, processing logic and data are
implemented as self-contained services, with only a service’s input and output data
exposed to other services. What differentiates service-oriented architectures from
their predecessors are the ever-growing sets of standards (refer back to Table 24-2)
describing what a service is, what a service does, how a service is to be accessed,
how to communicate with a service, etc. Figure 24-10 provides a depiction of the
execution dynamics associated with locating, connecting with and executing a
service.
Figure 24-10
Locating, Connecting With and Executing a Service
Service Discovery
Service A
Services Directory
Service B location and access information.
I need a service.
Service Connection
Service connection protocols.
I need to establish a connection.
Connection established.
Service request fulfilled; deliverables.
Service request; needed data.Service A
Service A
Service B
Service B
Service Execution
Self-learning architectures exhibit three primary characteristics. First,
these architectures contain (either within a global information repository or within
the individual services) all the information that is needed for services to locate,
connect with and execute other services. Second, each service possesses the
functionality needed to interpret and apply this information. Third, each service
467
possesses the functionality to learn (from provided information and from repetitive
interaction episodes) how to best interact with other services. As a consequence,
self-learning architectures can, over time, perform more efficiently and more
effectively.
Event-based architectures utilize the attributes of service-oriented
architectures and self-learning architectures to automatically detect and react to
specified events. After detecting and interpreting an event, services within an event-
based architecture can distribute data describing the event as well as reactions taken
by the service in responding to the event to all other services that have subscribed
to receive notifications regarding the event. For example, assume an inventory
management service is built to detect the event of any item in a finished goods
inventory dropping below its replenishment point. Two services, among others, that
would benefit from immediately being informed of this event are a product availability
service and a product reordering service.
Table 24-4 describes the three most common ways that modular services
architectures are applied: within an organization, between organizations, and within
an industry. The first row of Table 24-4 describes how an organization can make use
of a modular services architecture for internal use. Here, most of the organization’s
standalone digitalized business processes, business platforms and digital platforms
are configured as modular services conforming to agreed-on standards.
468
Table 24-4 Applying Modular Services Architectures
Context Description
Within an Organization
• An organization implements a modular services architecture using specific standards defining how to locate a service, connect with a service, and interact with a service.
• Most of the organization’s standalone digitalized business processes, business platforms & digital platforms are provisioned as services, each of which conforms to the agreed-on standards.
Between Organizations
• An organization implements one or more services that are made available (along with information about how to locate, connect with, and interact with the services) to anyone.
• An organization implements one or more services that are made available (along with information about how to locate, connect with, and interact with the services) to favored customers and suppliers.
Within an Industry
• An industry association develops industry-specific standards that define a set of services and how to locate, connect with. and interact with the services.
• Industry members can implement these services, as well as gain access to association-approved services implemented by industry members or by third-parties.
Figure 24-11 illustrates the layers of a prototypical modular services
architecture. The bottom (Layer 1) consists of technology assets. In Layer 2, these
technology assets are virtualized for increased flexibility and efficiency. When
technology assets are virtualized, the real-time commitment of specific technology
assets in executing services depends on the point-in-time demands on these assets.
Layer 3 consists of the modular technology services that make use of the virtualized
technology assets, Layer 4 consists of data objects used in constructing business
services, and Layer 5 consists of the modular business services. Layer 6 represents
the global information repositories holding information about configured technology
services, data objects and business services. Finally, Layer 7 consists of configured
digital platforms (built largely from modular technology services), and Layer 8
consists of configured standalone digitalized business processes and business
platforms (built largely from data objects and modular business services).
469
Figure 24-11 Layers of a Prototypical Modular Services Architecture
Standalone Digitalized Business Processes & Business Platforms
Modular Business Services
Data Objects
Modular Technology Services
Technology Assets [Clients, Servers, Networks, Storage, …]
Technology Virtualization
Services Directories
L a
y e
rs 8
Digital Platforms7
6
5
4
3
2
1
The second row of Table 24-4 describes two ways of using modular services
architectures to facilitate organization-to-organization interaction. The first of these
refers to organizations that develop a service conforming to a specific set of standards
and then make this service available to anyone who might wish to use the service.
Popular examples of such services include, among others: weather-related services
(e.g., forecasts, alerts, etc.), transportation-related services (e.g., schedules, ticket
prices, departure/arrival status, etc.), calendar-related services, mapping-related
services, etc. The second type of organization-to-organization situation refers to an
organization offering a service conforming to a specific set of standards to be used
by favored value stream participants (e.g., consumers, suppliers, strategic partners,
etc.). Popular examples of these services include, among others: logistical tracking,
funds availability, product availability, etc.
470
The third row of Table 24-4 refers to how modular services architectures can
be used to facilitate industry-wide interactions. Here, an industry group or
association has developed sets of standards for data, documents, events, and
business transactions (as well as enabling technology services) specific to the
industry, and these standards are made available to industry participants, technology
vendors, external service providers, cloud services providers, etc. Applying these
standards, the industry association itself, industry participants, and third-parties
implement specific services (that are vetted by the industry association) for use by
industry participants.
Delivery Corp’s Transition to a Modular Enterprise Architecture95
Delivery Corp is a large subsidiary of a global leader in logistics and
transportation. While its revenues (derived from its offerings in supply chain
services) in 2006 were about $10 billion, its market was becoming increasingly
competitive - driven largely by an influx of low-cost competitors.
Delivery Corp’s history of digitalization followed a not uncommon pattern. The
firm had grown rapidly by aggressively acquiring smaller, specialized logistics firms.
Typically, these acquired units continued to operate through their already-installed
business platforms and digital platforms. In the 1990s, initiatives were undertaken
to standardize technology (hardware, software, architecture, security, etc.) and to
interconnect the local business platforms by building system interfaces (on an as-
needed basis) to share data and otherwise link together the business processes
95 Much of the material in this section is adapted from: A. Rai, V. Venkatesh, H. Bala,
and M. Lewis, “Transitioning to a Modular Enterprise Architecture: Drivers, Constraints, and
Actions,” MIS Quarterly Executive, June 2010, pp. 83-94.
471
housed on these local business platforms. In the early 2000s, further initiatives were
pursued that moved Delivery Corp to established global business platforms (i.e., end-
to-end business processes to be executed by all operating units). A key element in
this movement toward global business platforms involved the creation of a global
data warehouse containing data extracted from the local databases operated by the
operating units.
Although data standardization and business process rationalization improved
operational efficiencies, Delivery Corp became concerned with its ability to meet its
growth and profitability objectives. In particular, Delivery Corp recognized that its
fastest-growing, most-lucrative customer segment involved customers requiring
complex, but unique, digitalized logistics solutions. Servicing these customers was
currently unprofitable for Delivery Corp, as building these largely unleverageable
digitalized logistic solutions required long lead times and high costs - both of which
were understandably a significant concern for potential customers. What Delivery
Corp needed was a capability to efficiently and profitably combine a broad portfolio
of standardized logistic services and technology services when creating complex,
customized and innovative logistic solutions.
To provide this capability, Delivery Corp implemented a modular enterprise
architecture using modular services architecture technologies. This decision was
justified on three primary grounds. First, standardizing business services, technology
services and the interfaces needed to interconnect these services would enable
Delivery Corp to better leverage its existing arsenal of digitalized logistic services
(e.g., brokerage services, freight-forwarding services, warehousing services, etc.).
Second, the availability of standardized interfaces and robust collections of
472
modularized business services and modularized technology services would enable
Delivery Corp to enrich its collaborative relationships with customers as Delivery Corp
logistics specialists would be working closely with clients in configuring customized
solutions. Third, the modular enterprise architecture would enable Delivery Corp to
survive, and thrive, in a turbulent business environment distinguished by an
increasing number of low-cost competitors.
A Recap and Look Ahead
Specifying and implementing enterprise architectures – and then regularly
assessing the appropriateness of these architectures – provides an effective means
by which an organization can manage the balance among its global and local digital
platforms. For organizations facing especially demanding business environments
(that is, environments requiring innovation and frequent, rapid responses to
competitors’ actions), moving toward implementing modularized enterprise
architectures is highly advised.
Organizations’ enterprise architectures, however, are not of equal quality!
Designing, implementing and evolving an enterprise architecture (thereby giving rise
to evolving collections of business platforms and digital platforms) that remain in
alignment with an organizations’ digital strategies and technology strategies does not
occur by happenstance. For any organization, an innumerable number of decisions
are deliberated and taken as its digitalization-related activities unfold – with the
outcomes produced by these decisions ultimately determined by the appropriateness
of involved-individuals and the quality of the decision processes these individuals
follow. In order that these decision processes are suitably populated, directed and
constrained, complex webs of policies, guidelines, rules and procedures need to be
473
established. The next chapter explains how this is accomplished through
digitalization governance systems.
474
Chapter 25. Digitalization Governance Design
With the intent of improving work unit performance, managers of all
organizations are finding themselves contributing to, critiquing, making, and
approving countless decisions about acquiring, configuring, and deploying standalone
digitalized business processes, business platforms and digital platforms. For
example, a supply chain manager might wish to enhance a demand forecasting
system; a marketing manager might be exploring the acquisition of a business
analytics platform to be used to increase sales force productivity; a mayor’s chief of
staff might be examining social networking platforms to be used to increase citizen
participation; and, a technology manager might be considering installing a more
advanced firewall in order to better protect databases from outside intrusion.
Increasingly, the issues being considered with digitalization decisions involve
global/local platform considerations, e.g., “Do the incremental benefits my work unit
would realize from a customized solution outweigh the losses to be suffered by my
organization from not being able to leverage this digital investment?”. The supply
chain manager, the marketing manager, the chief of staff, and the technology
manager noted above might be advised, respectively, to raise questions such as:
Is there a forecasting system already installed on a business platform that
would meet our needs? If not, would other work units be able to make use of the forecasting system we are thinking of acquiring?
What other business analytics tools are already being used across our organization? Can we acquire tools that integrate seamlessly with these already-installed tools and with our global databases?
Does our city government already have a presence on popular social networks? If so, how can we establish a presence and engage our city
residents to participate? If not, should we establish such a presence and make its existence known to all city departments?
475
What security solutions are already installed? How would the new security solutions we are most excited about accommodate our enterprise
architecture? Would these new security systems meet the requirements of all our global and local databases?
Ideally, a digitalization-related decision would be taken only after a manager has
looked at the decision from a variety of perspectives: local, global and points in
between. In practice, however, a manager’s local perspective often takes
precedence, with other perspectives slipping through the cracks. Two explanations
suggest why this occurs.
First, when making decisions, humans tend to give emphasis to their personal
interests, personal experience and personal knowledge. It is simply unreasonable to
expect a person … on her own … to be equally comfortable with and capable of fully
incorporating other people’s perspectives into her decision-making processes. Thus,
supply chain managers focus primarily on supply chain issues, marketing managers
on marketing issues, city chiefs-of-staff focus on mayoral or city council issues, and
technology managers on technology issues.
Second, once underway, digitalization projects take on a life of their own.
Well-conceived projects often start with a balanced set of local and global objectives.
With the passage of time, however, project team members immersed within day-to-
day project activities spend much of their time interacting with one another and with
the members of the work unit (or units) where the digitalized solution is to be
installed. In turn, these interactions introduce pressures on project team members
to make adjustments to the solution being implemented. Most often, a majority of
these adjustments tend to favor either local or global objectives – given that
successive adjustments tend to directly build on one another. If there were only a
few of these pressure points, a solution’s objectives would largely remain consistent
476
with the local-global balance conceived and approved at the project’s start. With
most projects, however, there are literally hundreds or thousands of such pressure
points that, if not countered, can result in an installed solution whose local-global
balance differs significantly from that initially conceived and approved.
How are day-to-day decisions made by managers across an organization
influenced such that the collective outcome of these decisions maintains the
organization leadership team’s agreed-on global/local platform balance? To a large
extent, the answer lies in the design and implementation of an effective digitalization
governance system. Digitalization governance systems introduce, into the fabric
of an organization’s life, decision structures and decision processes aimed at
increasing the likelihood that the right people apply the right criteria at the right time
in making digitalization decisions. We examine digitalization governance systems
through the following topics:
Three Domains of Digitalization Decisions
Digitalization Governance System Objectives
Digitalization Governance System Postures
Digitalization Governance System Mechanisms
Project-Level Digitalization Governance
Information Governance at Intel
Three Domains of Digitalization Decisions
Digitalization governance systems are directed at three domains of
digitalization decisions: a global domain, a demand-side domain and a supply-side
domain. Table 25-1 provides definitions of these three decision domains, along with
illustrative examples.
477
Table 25-1 Domains of Digitalization Decisions
Definition Examples Global Decisions
Positioning, directing & overseeing global digital strategies & policies.
• What should be the organization’s overarching digitalization strategic intent?
• What should be the spending on digitalization? • Should corporate pay a portion of the cost of local digital innovations? • Under what conditions can local business platforms be deployed? • Which global business platforms should not be externally hosted?
Demand-Side Decisions
Stimulating, prioritizing & constraining work unit digitalization requirements.
• What should be a work unit’s overarching digitalization strategic intent? • How should digitalization projects be prioritized within a work unit? • What criteria should be used in approving digital investment proposals
within a work unit? • Which of a work unit’s business platforms should not be externally hosted?
Supply-Side Decisions
• Delivering, operating & maintaining digitalized business processes & business platforms.
• Designing, delivering, operating, maintaining & evolving digital platforms.
• How should a business platform be enabled through digital platforms? • Which digital platforms should be global? • Which digital platforms should not be externally hosted? • How should technology professionals be hired & developed? • How should the risks of digitalization be monitored and mitigated?
Global digitalization decisions focus on global digital strategies and policies.
These decisions are characterized by three overarching objectives: leveraging digital
investments, spurring digital innovation, and minimizing digitalization risks that, if
not curtailed, can significantly impair an organization’s competitiveness. The
outcomes arising from global digitalization decisions are most effective when the
individuals involved with associated decision processes represent an organization’s
most powerful and most influential leaders. When such individuals fail to actively
involve themselves in these decision processes, tensions traced to inter-unit
disagreements regarding digitalization are likely to arise; such tensions can become
crippling if not resolved.
Demand-side digitalization decisions focus on stimulating, prioritizing and
constraining work units’ digitalization requirements. These requirements reference
478
already-made, in-progress, and to-be-made digital investments. While demand-side
decisions generally originate within a specific work unit, it is not uncommon for
multiple work units to put together a digital investment proposal that meets their
collective needs. The outcomes arising from demand-side digitalization decisions are
most effective when the individuals involved with associated decision processes
include the work units’ most powerful and influential leaders. When such individuals
fail to actively involve themselves in these decision processes, intra-unit tensions that
arise in establishing a work unit’s digital strategies and policies are unlikely to be
resolved, especially in the face of limited resources.
Supply-side digitalization decisions focus on (1) delivering, operating and
maintaining an organization’s digitalized business processes and business platforms,
and (2) designing, delivering, operating, maintaining and evolving an organization’s
digital platforms. While these responsibilities can be carried out internally (via a
global or local technical group) or externally (via service providers and
consultancies), concerns regarding platform robustness (operating performance,
interconnectivity, interoperability, security, etc.) and platform cost (implementation
costs, operating costs, lifetime costs of ownership, etc.) are moving most
organizations toward global platforms. The outcomes arising from supply-side
digitalization decisions are most effective when the individuals involved with
associated decision processes include the organization’s most powerful and most
important technology leaders (including key vendors, service providers and
consultancies).
479
Digitalization Governance System Objectives
Digitalization decisions spill into all aspects of business platforms and digital
platforms. As a consequence, effectively-designed digitalization governance systems
influence, on any specific day, the outcomes of literally hundreds, if not thousands,
of decisions: some associated with digital strategies and others primarily with
technology strategies; some broad in their scopes and others narrow in their scopes;
some affecting ongoing work activities and others affecting future work activities, etc.
At their core, however, organizations’ digitalization governance systems aim to
achieve the six objectives summarized in Table 25-2.
Table 25-2
Digitalization Governance System Objectives
Objective Focus
Alignment of Digital Strategies & Technology
Strategies
• Ensure that digital strategies enhance or maintain competitiveness. • Ensure that installed platforms facilitate, rather than obstruct,
competitiveness.
Leverage Digital Investments
• Eliminate redundant digital assets & digital investment proposals.
Organization & Work Unit Leadership Teams’
Awareness of Digitalization
Opportunities & Risks
• Ensure organization & work unit leadership teams are aware of digitalization opportunities & risks.
• Ensure organization & work unit leadership teams are aware of the extent to which competitiveness is dependent on digitalization.
Technology Leadership Teams’ Awareness of
Competitive Opportunities & Risks
• Ensure technology leadership teams are aware of competitive opportunities & risks.
• Ensure technology leadership teams aggressively manage digitalization risks.
Leverage Other Organizations’
Digital Capabilities
• Ensure external sources of digital capabilities are appropriately & fully exploited.
• Ensure internal digital capabilities are targeted at high-value activities.
Evaluate Performance of the Technology Group
• Ensure installed platforms operate as intended and are available, reliable, secure & cost-effective.
• Ensure funded digital investments are successfully implemented.
The first two objectives strive to optimize and achieve synergies among global,
demand-side and supply-side digitalization decisions. Global, demand-side, and
supply-side digitalization decisions often impact one another. Consequently, it is
necessary to ensure: that supply-side leaders and demand-side leaders are involved,
480
as appropriate, within global decision processes; that global leaders and supply-side
leaders are involved, as appropriate, within demand-side decision processes; and,
that global leaders and demand-side leaders are involved, as appropriate, within
supply-side decision processes. Effective digitalization governance systems account
for these interdependencies.
The third and fourth objectives recognize that involving individuals within
digitalization structures and decision processes not only enriches these individuals’
understanding of the specific decisions being addressed, but also exposes them to
the expertise, experiences and insights of others with whom they interact. Given
real constraints on people’s time and attention, it is unrealistic to expect most
individuals, on their own, to gain meaningful understandings of issues and concerns
outside of their immediate work responsibilities.
The fifth objective focuses on today’s dynamic technology products and
services industries as well as organizations’ increasingly digitally-savvy strategic
partners. Such external sources of digitized business services and technology
services offer both opportunities and risks, and effective digitalization governance
systems can ensure that these opportunities and risks are appropriately considered,
thereby allowing organizations to target their (typically limited) internal digital
capabilities at high-value activities.
The sixth objective recognizes that effective digitalization governance systems
provide means for formally (i.e., establishing goals and measuring goal achievement)
and informally (i.e., prompting and interpreting explanations about successes and
failures) evaluating the performance of an organization’s corporate technology group.
Organizations recognized as digitalization industry leaders seem to have one thing in
481
common – a highly capable corporate technology group. How would you recognize
a highly-capable technology group if you saw one? Highly-capable technology groups
are populated by technologists whom:
Are able to get digital technologies, digital platforms and business platforms
to work and to work well.
Understand their organization’s competitive environment, operational and
managerial processes, digitalization opportunities, and digitalization risks.
Trust and are trusted by their organizational peers.
Effective digitalization governance systems direct and, when necessary, redirect the
perspectives and priorities of leadership teams toward building just such a profile
within their corporate technology groups.
Digitalization Governance System Postures
Given an organization’s specified enterprise architecture, digitalization decision
processes are likely to reflect systematic biases in favor of global objectives, local
objectives, or some mix of both. Accordingly, digitalization governance systems are
designed to reflect an intentional bias, or posture, toward accommodating:
Global objectives – the centralized posture.
Local objectives – the decentralized posture.
To varying degrees, both global and local objectives – the federal posture.
Figure 25-1 visually depicts how an organization’s enterprise architecture influences
the digitalization governance system’s posture, and Table 25-3 characterizes the
natures of centralized, decentralized and federal postures.
482
Figure 25-1 Governance System Posture and Prototypical Enterprise Architectures
Decentralized Posture
Federal Posture
Federal Posture
Centralized Posture
Locally- Isolated
Globally- Integrated
Locally-Unique Globally-Standardized
Table 25-3 Digitalization Governance System Posture
Centralized Federal Decentralized
Systematic Bias
Global Objectives Global & Local Objectives Local Objectives
Digital Investment Leverage Digital Investment Leverage &
Digital Innovation Digital Innovation
Primary Responsibility for Global Digitalization Decisions
Corporate Leadership Team Corporate Leadership Team & Work
Unit Leadership Teams Work Unit Leadership Teams
Primary Responsibility for Demand-Side Digitalization Decisions
Corporate Functional Leadership Teams
Corporate & Work Unit Functional Leadership Teams
Work Unit Functional Leadership Teams
Primary Responsibility for Supply-Side Digitalization Decisions
Corporate Technology Leadership Team
Corporate Technology Leadership Team & Work Unit Technology
Leadership Teams
Work Unit Technology Leadership Teams
Most Appropriate For …
Homogeneous Work Unit Competitive Environments
Moderately Heterogeneous Work Unit Competitive Environments
Highly Heterogeneous Work Unit Competitive Environments
Organizations applying globally-integrated, globally-standardized enterprise
architectures are apt to exhibit centralized digitalization governance systems in order
to achieve global objectives and to maximally leverage digital investments (by
implementing global platforms). The corporate leadership team serves prominent
483
and influential roles in these governance systems. A weakness of centralized
governance is that pressing local digitalization needs either may be unmet or met
unsatisfactorily.
Organizations applying locally-isolated, locally-unique enterprise architectures
are apt to exhibit decentralized digitalization governance systems in order to achieve
local objectives and to increase the ease by which work units are able to implement
digital innovations. Work unit leadership teams serve prominent and influential roles
in these governance systems. Two weaknesses of decentralized governance include:
a tendency to over-spend on digitalization, as work units accumulate redundant
digital assets; and, an inability to leverage other work units’ digital investments,
because of a lack of awareness or because of platform incompatibilities.
Organizations applying more nuanced enterprise architectures are apt to
exhibit variants of federal digitalization governance systems. In fact, most
organizations today deploy federal governance systems for two reasons. First,
although they can be difficult to design and implement, federal digitalization
governance systems can overcome the inherent weaknesses of purely centralized or
purely decentralized digitalization governance systems. Second, because
organizations’ internal and external environments are seemingly in constant flux,
centralized governance systems feel pressures to be less centralized, and
decentralized governance systems feel pressures to be less decentralized. Federal
governance systems, by definition, are designed to cope with just such pressures.
Given the forces moving all organizations today toward global platforms,
federal digitalization governance systems in practice tend to reflect an increasingly
common pattern of bias regarding the three domains of digitalization decisions:
484
A centralized bias, where appropriate, with global digitalization decisions so as to leverage digital investments through global platforms.
A decentralized bias, where appropriate, with demand-side digitalization decisions so as to facilitate work unit digital innovation and timely
competitive responses.
A centralized bias with supply-side decisions so as to achieve technology standardization and to facilitate innovation with regard to technology
services.
Digitalization Governance System Mechanisms
Governance systems do not make decisions. Instead, governance
mechanisms are designed and implemented to create arenas within which decisions
are negotiated and taken by participants. Three types of governance mechanisms
are brought together within digitalization governance systems: managerial roles,
governance structures and governance processes.
A well-designed collection of governance mechanisms should increase the
likelihoods of the right people being brought together to apply the right criteria at the
right time to produce the right outcomes. Governance mechanisms that are effective
today, however, might not be effective tomorrow. Like all other courses of action
designed to enhance an organization’s competitiveness and performance,
governance mechanisms need to evolve over time to sustain their effectiveness.
As intimated earlier in this chapter, the individuals actively involved with an
organization’s digitalization governance system can include just about any of the
organization’s executives, managers, staff specialists and functional specialists.
Generally, these individuals’ digitalization governance responsibilities are appended
to their primary organization responsibilities. It is especially important to note the
485
necessity for the corporate leadership team and for work unit leadership teams to
actively involve themselves in digitalization governance.96
In addition, most organizations have established governance managerial
roles – characterized by specific zones of authority and accountability – that focus
solely on digitalization activities (see Table 25-4). The majority of these managerial
roles are associated with supply-side digitalization decisions, with most emerging
early in organizations’ digitalization histories (and, hence, are not described further).
Two of the roles described in Table 25-4, however, do require further description.
Table 25-4
Digitalization Governance Managerial Roles
Roles Typical Responsibilities
Global, Demand-Side & Supply-Side Digitalization Decisions
Chief Digital Officer (CDO) • Digital investments
Chief Information Officer (CIO) • Global & supply-side digitalization decisions
Divisional Information Officer (DIO) • Local demand-side/supply-side digitalization decisions
Supply-Side Digitalization Decisions
Chief Technology Officer (CTO) • Technology strategy, architecture & standards
Director of Program Management • Implementation of Digital Solutions
Director of Finance • Technology investment/budgeting
Director of Software Development • Building & maintaining standalone digitalized solutions,
business platforms & digital platforms. • Implementation of software development methods & tools.
Director of Vendor Management • Establishing, managing & evolving relationships with
technology vendors and external service providers. • Procurement of digital technologies & technology services.
Director of Risk & Audit • Digitalization risk management & quality assurance Director of Security • Digital security & disaster recovery
Director of Human Resources • Acquire & develop digital human assets.
96 A. Masli, V. Richardson, M.W. Watson and R.W. Zmud, “Senior Executives’ IT
Management Responsibilities: Serious IT-Related Deficiencies and CEO/CFO Turnover,
Management Information Systems Quarterly, September 2016, pp. 687-708.
486
The emergence of the chief digital officer (CDO) is a quite recent
phenomenon.97,98 The CDO role, which can be established at the corporate-level and
within work units, is aimed at nurturing, envisioning, orchestrating and overseeing
digitalization and digital innovation. As a consequence, CDOs are becoming key
members of organizational and work unit leadership teams.
Most organizations have long established a lead executive holding overall
responsibility for an organization’s digitalization activities. Most often, the title given
to this executive is that of chief information officer (CIO). Historically, the CIO
role has been implemented quite differently across organizations, with the CIO most
often observed to report to either the CEO or the CFO and assigned responsibility for
an organization’s global and supply-side digitalization decisions, with responsibilities
for the local demand-side and local supply-side digitalization decisions assigned to
work unit divisional information officers (DIO). DIOs generally report to work
units’ most senior executive.
With the emergence of the CDO role, most organizations’ digitalization
leadership structures are somewhat unsettled. For example, a random sample of
organizations within the same industry might very well produce the following within
different organizations:
A corporate CDO orchestrating the global digitalization domain, work unit CDOs orchestrating the demand-side digitalization domain, and a corporate
97 T. Catlin, L. Harrison, C.L. Plotkin and J. Stanley, “How B2B Digital Leaders Drive
Five Times More Revenue Growth than Their Peers,” McKinsey Quarterly, October 2016,
http://www.mckinsey.com/business-functions/marketing-and-sales/our-insights/how-b2b-
digital-leaders-drive-five-times-more-revenue-growth-than-their-peers 98 O.A. El Sawy, P. Kraemmergaard, H. Amsinck and A.L. Vinther., “How LEGO Built
the Foundations and Enterprise Capabilities for Digital Leadership,” MIS Quarterly Executive,
June 2016, pp. 53-64.
487
CIO orchestrating the supply-side digitalization domain.
A corporate CDO orchestrating the global digitalization domain, work unit
CDOs orchestrating the demand-side digitalization domain, a corporate CIO orchestrating the global supply-side digitalization domain, and DIOs
orchestrating the local supply-side digitalization domain.
A corporate CIO orchestrating all three digitalization domains, with the CIO serving as the corporate CDO and DIOs serving as work unit CDOs.
What might explain these differences? Most likely, key explanatory factors would
include: an organization’s digitalization history, executing business models, and the
relative power of the corporate leadership team and the work unit leadership teams;
and, the experience, mindset, personality and held-relationships of the involved-
executives.
Governance structures convene participants to interact in addressing
circumscribed sets of digitization-related decisions, often applying prescribed
governance processes. A governance process moves participants through a
sequence of tasks to ensure that pertinent policies, guidelines and rules are followed
and that pertinent objectives, constraints and criteria are considered. Tables 25-5
and 25-6, respectively, describe commonly-observed digitalization governance
system structures and processes. While Tables 25-5 and 25-6 illustrate global
governance structures and processes, large work units (e.g., a strategic business
unit, a global function, etc.) often implement corresponding structures and processes.
488
Table 25-5 Global Digitalization Governance Structures
Structure Issues Addressed Typical Participants
Digitalization Council
• Digital strategy • Technology strategy • Enterprise architecture • Global platforms • Digital investment
prioritization
• Corporate leadership team & CDO • Work unit leadership teams &
CDOs • CIO, CTO, DIOs
Digital Investment
Board
• Digital investment policies • Corporate technology and
work unit technology group budgetary policies
• Corporate leadership team & CDO • Powerful work unit leadership
teams & CDOs • CIO, CTO, Director of Finance
Global Architecture
Board
• Platform policies and standards
• Architecture exception policies & procedures
• Corporate CDO • Powerful work unit CDOs and
DIOs • CIO, CTO, Directors: Software
Development, Digital Risk & Audit, Digital Security
Table 25-6 Global Digitalization Governance Processes
Process Typical Participants Global
Strategic Planning
• Corporate leadership team & CDO • Work unit leadership teams & CDOs • CIO, CTO
Global Technology
Planning
• Corporate CDO & powerful work unit CDOs • CIO, CTO • Directors: Program Management, Finance, Software
Development, Vendor Management, Risk & Audit, Digital Security, Human Resources
Global Digital Investment
Approval
• Corporate CFO & CDO • Affected work unit CDOs • CIO, CTO • Directors: Finance, Program Management
Global Architecture
Exception Approval
• CTO • Affected work unit CDOs and DIOs • Directors: Vendor Management, Program Management,
Digital Risk & Audit, Digital Security
Designing a collection of digitalization governance mechanisms that fits well
with an organization’s competitive situation and with the organization’s culture is
likely to require a good bit of experimentation and trial-and-error experience. What
works for one organization may not work for other organizations; what had worked
489
for one organization may not continue to work as the organization’s competitive
environment changes; and, what has worked well for a group of participants may not
continue to work well as the group changes membership.
Project-Level Digitalization Governance99
It was pointed out earlier in this chapter that digitalization projects often take
on lives of their own as project participants are caught up in resolving day-to-day,
project popups. Project popups are unanticipated problems or stakeholder
demands that arise as projects unfold. As the outcomes from the actions taken to
resolve popups accumulate, project deliverables often move away from what was
initially agreed. While such redirections can increase a project’s success,
unquestioned redirections can produce serious negative impacts. To counteract
potentially harmful redirections, project-level governance mechanisms need to be
implemented to account for three types of alignment:
Objectives Alignment: Assures that a project stays on track to achieve sought global objectives and sought local objectives.
Deliverables Alignment: Assures that a project stays on track to deliver
sought digitalization capabilities and sought technology capabilities.
Architectural Alignment: Assures that a project’s installed platforms
conform, unless a formal exception is granted, to global architectural standards.
99 Material in this section is adapted from: N. Fondstat and D. Robinson, “Transforming
a Company, Project by Project: The IT Engagement Model,” MIS Quarterly Executive, March
2006, pp. 1-14.
490
Fonstad and Robinson100 illustrate how BT (formerly British Telecom) and Toyota
Motor Marketing Europe apply project-focused governance mechanisms. A sample
of these mechanisms are described in Table 25-7.
Table 25-7
Project-Level Governance System Mechanisms
Mechanism Description Alignment Focus
Managerial Roles
DIO Senior technology managers housed in local work units. • Objectives
Project Sponsor All projects required to have a senior business sponsor. • Deliverables
Project Architect System architects assigned to project teams. • Architectural
Governance Processes
Project Portfolio Management
Project features compared against installed platforms to eliminate redundancies & incompatibilities.
• Objectives
Project Appraisal All stakeholders examine & sign off, early in a project’s life, on the project’s objectives & deliverables.
• Objectives • Deliverables • Architectural
Architectural Exceptions
Consider requests for global policies/standards exemptions. • Architectural
Post-Project Review
Assessing a project’s realized outcomes & learning what went especially right and wrong with the project.
• Objectives • Deliverables • Architectural
Governance Structures
Project Approval and Continuance
Committee
Ongoing project funding & participant evaluations linked to achieving global objectives, delivering digitalization capabilities & conforming to global policies/standards.
• Objectives • Deliverables • Architectural
The governance mechanisms described in Table 25-7 reveal two insights
regarding the design of digitalization governance systems. First, effective systems
of digitalization governance make use of overlapping mechanisms to direct and
constrain participants’ behaviors. Note, for example, how the project architect role,
an architectural exception-handling process, and a project approval/continuance
committee complement one another in ensuring that projects conform to global
architectural standards. Second, individual governance mechanisms often address
100 N. Fonstad and D. Robinson, “Transforming a Company, Project by Project: The IT
Engagement Model,” MIS Quarterly Executive, March 2006, pp. 1- 14.
491
multiple governance aims. For example, the project appraisal process and the post-
project review process target all three types of alignment.
Information Governance at Intel101
Most organizations today are experiencing exponential growth in both the
volume of data being captured (via transaction processing, email and chat traffic,
social technologies, etc.) and associated information management costs (for storing,
protecting, accessing and analyzing these data). Three primary information
management challenges typically arise in the face of such growth:
How do we protect this expanding mass of data against digitalization risks?
How do we enable our employees to use these data, especially for new
purposes?
How do we contain our information management costs?
Here, we describe how Intel is addressing these rather conflicting challenges through
information governance. More specifically, you will see how Intel has evolved its
information governance strategy from a protect approach that tightly locked down
data to a protect-and-enable approach that permits potentially risky, but value-
creating, uses of these data.
Intel’s massive collections of data have been growing at a rate of 30 to 40
percent per year over the last decade. During this same timeframe, Intel’s overall
spending on digitalization had been in a planned decline (from 3.5% of sales in 2004
to 2.4% of sales in 2011), largely as a result of a technology consolidation begun in
2004 that brought all digitalization activities under a single corporate technology
101 The material in this section has been adapted from: P.P. Tallon, J.E. Short and M.W.
Harkens, “The Evolution of Information Governance at Intel,” MISQ Executive, December
2013, pp. 189-198.
492
function. Given the absence of a strong information governance program, Intel’s
trending decrease in overall digitalization spending would soon reverse.
Three events spurred Intel to systematically address its information
management challenges. First, as mentioned in the previous paragraph, Intel
consolidated all digitalization activities (across all business units and all geographic
locations) under a corporate-level CIO in 2004. As part of this consolidation effort,
Intel’s Information Management (IIM) group initiated a Master Data Management
(MDM) program to create a set of global data management policies to be applied
across the organization. A key governance mechanism associated with this MDM
program was establishing information governance boards for each of six core data
domains: customer, supplier, location, item, worker, and finance. Second, the
Sarbanes-Oxley Act of 2002 had compelled Intel to better protect its transaction-
level financial data. Third, in early 2003, Intel had been seriously impacted by the
SQL Slammer virus, resulting in a corporate officer leading a security task force drawn
from every major business unit and every significant corporate support function (e.g.,
finance, technology, legal, corporate security, etc.). This task force was charged with
establishing new global continuity, risk and security policies.
Taken together, these three events triggered Intel’s protect era of information
governance, characterized by the primary objective of locking down access to Intel’s
digitized data. The information governance policies that were established tightly
restricted unnecessary access to critical data assets. Over time, however, two
significant drawbacks of this very restrictive governance system became apparent.
First, this heavy-handed approach led to an epidemic of engineers and other business
professionals devising workarounds (within the letter, but certainly not the spirit, of
493
the global governance policies) to complete work assignments. Not surprising, these
workarounds served to increase Intel’s technical, organizational, reputational and
financial risks. Second, these very restrictive governance policies found most data
being kept within highly-expensive data management environments. As data volume
continued to grow, data-related costs escalated.
By 2009, Intel’s senior technology leadership recognized the protect era
governance policies to be excessive, expensive, risk-inducing and detrimental to
Intel’s long-term commitment to digital innovation. This led to a reworking of the
firm’s information governance systems, resulting in a protect-to-enable approach
aimed at increasing business value through a greater use of digitized data but within
defined, quantifiable and tolerable risk limits. Because innovation had been and
continued to be a central element of Intel’s competitive success, a key governance
effectiveness criterion for this protect-to-enable era involved assessing the effect of
governance policies on innovation and time-to-market.
A central governance mechanism introduced in this protect-to-enable era was
a review process within which all data owners were required to classify their data
according to its value-potential. Based on its classification, data was then stored
within an appropriate data management environment. By provisioning a variety of
data management environments (each providing a distinct level of security, cost and
ease-of-access), this governance process simultaneously addressed all three of
Intel’s information management challenges.
The protect-to-enable era involved three layers of information governance: a
policy-setting layer, a tactical-planning layer and an operational layer.
494
Information governance policy setting is vested in an Ethics and Compliance
Oversight Committee within Intel’s Risk and Compliance function. Given this
committee’s strategic role, its membership is drawn from support functions
(technology, HR, legal, business development, internal audit, etc.) and line functions
(sales and marketing, manufacturing, product design, etc.) across the company. This
committee meets on a quarterly basis to review and, where necessary, propose and
establish information governance policies for business units and for country locations.
Responsibility for information governance tactical planning is assigned to
Intel’s Corporate Risk and Security Group (CRSG), whose purview covers digital and
paper records across all (domestic and international) work units. The CRSG took
over many of the activities of the information governance boards (established in 2004
with the MDM program), with these information governance boards now focused on
technical concerns (such as establishing data standards for business process
integration). Because of its expanded information governance responsibilities, the
CRSG introduced new work roles, such as data architects (knowledgeable of the
complexities of capturing and retaining massive amounts of data) and business leads
(knowledgeable of how data might be applied in new ways).
Day-to-day operational activities, e.g., data backups, maintaining data
dictionaries, etc., are handled by Intel’s corporate technology function.102 In addition,
the corporate technology function also regularly conducts audits to check compliance
with Intel’s information governance rules and with external (domestic and
international) regulations, and regularly conducts security-related scenario planning
102 Intel’s internal audit function and its Security and Privacy Office monitor the firm’s internal and
external landscapes for threats and other signals indicative of increased information risk.
495
exercises. Analyses of outcomes from these audits and scenario planning exercises
then become the basis of information management policy recommendations.
In 2010, Intel created a business intelligence (BI) data management group for
the purpose of coordinating the data being used for business analytics. The desire
by business analytics professionals for self-service BI capabilities, such as easily
gaining access to broad collections of data owned by work units from across the
company, found Intel again reassessing its information governance policies. The BI
data management group, serving largely as a broker between business analytics
professionals and data owners, championed the further loosening of data access
restrictions and the involvement within the data classification review process of not
only data owners, but also business leads able to envision how to generate value
from data by using it in new ways.
A Recap and Look Ahead
The managerial roles, structures and processes established in implementing a
digitalization governance system create formalized arenas within which organizations
are able to direct and constrain the actions of individuals involved with digitalization
decisions. Of course, the interactions occurring within these formalized arenas do
spill over into other aspects of the involved-individuals’ work lives: conversations
continue outside these arenas; personal relationships are formed, strengthened and
damaged; mindsets are changed, etc. Still, the key in designing an effective system
of digitalization governance is to ensure that most, if not all, critical decisions are
addressed and resolved in these formalized arenas.
In all likelihood, nonetheless, a far greater number of digitalization decisions
are acted on outside of, rather than within, these formalized arenas. For example,
496
digitalization issues are often raised as powerful leaders convene for other purposes;
and, as mentioned earlier in this chapter, project team members make countless
decisions as they interact among themselves and with project stakeholders. Usually,
each of the decisions made outside of formalized governance arenas would seem to
have little impact beyond their immediate scope. However, when considered
collectively, the outcomes from a series of minor decisions can produce significant,
unintended consequences.
The next chapter describes the third tactic for platform management – how
organizations organize their digital capabilities. What actually transpires, day-to-
day, in organizations is largely determined by individuals’ personal relationships, and
these personal relationships are inordinately influenced by where individuals are
physically located and with whom they usually work. By appropriately positioning
digital capabilities such that these capabilities are optimally aligned with work
activities associated with formulating and implementing digital strategies, the
likelihood is increased that the right people apply the right criteria at the right time
in making digitalization decisions.
497
Chapter 26. Digitalization Organization Design
Above all else, the quality of digitalization-related work activities depends on
the quality of the informal working relationships that exist amongst the individuals
engaged in these activities. Successful digitalization invariably requires that a broad
range of information and knowledge be combined. It is a rare occurrence that an
individual assigned a task possesses all the information/knowledge needed to
complete the task. Needed information must be sought from others, tough problems
are often best resolved with the help of others, and seemingly chance conversations
often turn out to be the sources of the insights leading to a task’s accomplishment.
Now, think about your own sources of work-related information and
knowledge. Who are your most valued sources of help and support? Invariably, they
are people with whom you regularly interact and have developed a personal
relationship – in other words, people with whom you feel comfortable discussing
important, challenging and sensitive issues.
This chapter describes differing designs for locating the human assets engaged
in an organization’s digitalization-related work activities. The primary aim in devising
a particular digitalization organization design is to establish mutually-benefitting
working relationships among the individuals involved with digitalization-related work
activities, such that robust webs of knowledge, information, insight and authority are
established to direct and facilitate these activities.
A digitalization organization design specifies where digital strategies are
formulated, where digital capabilities are located, where digitalization activities are
performed, and whom has authority over these activities. An effective organization
498
design directs employees’ work behavior through formal influences and informal
influences. Formal influences follow from superiors’ explication of the policies,
goals, priorities, plans, procedures, rules, guidelines, etc., to be followed as
employees carry out work assignments. These formal influences are reinforced
through governance systems. Informal influences follow from the personal
relationships employees build with co-workers. In many situations, these informal
influences prove just as important to task performance, if not more so, than do the
formal influences. We cover digitalization organization design through the following
topics:
Three Key Interaction Networks
Prototypical Digitalization Organization Designs
Promoting Digital Innovation at the YCH Group
Three Key Interaction Networks
A central concern in digitalization organization design involves ensuring that
the right people are being brought together to form three key interaction networks.
An interaction network refers to a web of interpersonal relationships within which
individuals exchange facts, information, knowledge, experiences, perspectives and
beliefs.
Table 26-1 summarizes the individuals typically involved with and the primary
focus of a visioning network, a value discovery network, and a sourcing network.
Visioning networks involve the individuals and groups charged with shaping and
directing the global digitalization decision domain. Value discovery networks
involve the individuals and groups charged with shaping and directing the demand-
side digitalization decision domain. Sourcing networks involve the individuals and
499
groups charged with shaping and directing the supply-side digitalization decision
domain.
Table 26-1 Three Key Interaction Networks
Network Participants Strategy/Policy Focus
Visioning • Corporate leadership team • Work unit leadership teams
• Market-ecosystem participation • Business model evolution • Digital strategies & policies • Technology strategies & policies • Global/local platform balance
Value Discovery
• Corporate CDO & work unit CDOs • Work unit leadership teams • Corporate technology leadership
team & work unit technology leadership teams
• Vendor, provider & partner digital strategists
• Competitive positioning • Executing business models • Digital innovation • Digitally-enabled competitive actions • Global/local platform balance
Sourcing
• Corporate technology leadership team
• Work unit technology leadership teams
• Vendor, provider & partner account teams
• Technology strategies, policies, architectures & standards
• Internal/external provisioning/hosting of technology assets, technology services & digitalization solutions
• Global/local platform balance
Two objectives are paramount in establishing robust visioning, value discovery
and sourcing networks. First, at any given point-in-time, an interaction network’s
active, influential members must include participants representing the work units
whose value-adding contributions most significantly affect an organization’s current
and near-future competitive success. Intentionally or unintentionally excluding a
critical work unit or having a critical work unit represented by a passive participant
can have disastrous, long-term consequences. Second, at any given point-in-time,
an interaction network’s active, influential members must include those holding the
authority to release the resources required in undertaking networked-sanctioned
actions. In the absence of such individuals, network-sanctioned actions might never
be initiated or, if initiated, are likely to be either underresourced or poorly resourced.
500
Prototypical Digitalization Organization Designs
In practice, the active, influential participants within visioning, value discovery
and sourcing networks are largely determined by how an organization has structurally
positioned its digitalization-related capabilities and digitalization-related work
activities. While the structural positioning of an organization’s digitalization-related
capabilities/activities is always somewhat unique, two prototypical organization
designs exist: the partner model and the platform model. Table 26-2 provides an
overview of each of these designs.
Table 26-2
Contrasting the Partner Model and the Platform Model
Partner Model Platform Model
Location of Technology
Professionals
• Most housed within work unit technology groups.
• Most housed within the corporate technology group.
Work Unit Digitalization
Activities
• Formulate digital strategy & seed ideas for digital innovations.
• Implement, operate & evolve local digital solutions.
• Formulate digital strategy. • Envision and evolve digital solutions.
Corporate Technology
Group’s Digitalization
Activities
• Seed ideas for global digital strategy & policies.
• Envision and implement global technology strategy.
• Implement innovative digitalized solutions.
• Envision & implement innovative digitized solutions.
• Support the corporate office. • Implement, operate and evolve
global digital solutions.
• Seed ideas for the global digital strategy • Formulate & implement the global
technology strategy. • Seed ideas for and implement innovative
digitalized solutions. • Envision and implement innovative
digitized solutions. • Implement, operate & maintain digitalized
solutions. • Envision, implement, operate, maintain &
evolve digitized solutions.
Best For • Organization engaged with a variety
of market ecosystems or highly- segmented consumer communities.
• Organizations engaged with a single market ecosystem and a (relatively) homogeneous consumer community.
Partner Model
With the partner model (see Figure 26-1), the corporate technology group is
largely overshadowed by an organization’s work unit technology groups. Work units
are supported by their own technology groups, with these work unit technology
501
groups working closely with their work unit peers to design, implement and evolve
local digital solutions. In fact, many of these work unit technology groups are likely
to be larger (budget, staffing, etc.) than the corporate technology group. Typically,
the leader of a work unit technology group (often a DIO) reports directly to the leader
of the work unit, but maintains a dotted line relationship to the CIO. As a
consequence, the primary allegiance of a work unit technology group is to the work
unit, not to the corporate technology group.
Figure 26-1 The Partner Model
CEO
CIO
Corporate Leadership
Visioning Network
Work Unit Leadership
DIO
Solution Delivery
Digital Strategies
Technology Strategy
Platform Operations
Solutions Delivery
Digital Strategies
Corporate Offices
Work Unit
Corporate Technology Group
External to the Organization
Platform Operations
Corporate Office
Support
Solution Delivery
Platform Operations
T e
c h
n o
lo g
y S
e rv
ic e
P
ro v id
e rs
CDO
CDO
Four aspects of the partner model warrant special mention. First, as the
technologists assigned to a work unit’s technology group are physically located with
their work unit peers, opportunities abound for establishing strong personal
relationships. Second, work unit CDOs and DIOs typically participate regularly in a
502
technology management council along with the corporate technology group’s
leadership team. This council provides a forum where:
Work unit CDOs and DIOs can communicate their units’ needs, priorities and concerns.
The corporate technology group leadership team can take a lead in
articulating global digital strategies, policies and priorities.
Council participants can be kept aware of, contribute to and debate planned
digital innovations, significant digital investments and major digitalization initiatives.
Third, to facilitate digitalization across the organization, a digital strategy consulting
group is commonly directed by a corporate-level CDO. Fourth, under the direction
of the CIO, the corporate technology group seeds ideas for, implements, operates
and evolves a limited number of global platforms.
For the partner model to function effectively, the funding of digitalization is
usually carried out differently for business platforms, for global platforms, and for the
corporate technology group. Business platform funding largely occurs within work
units and generally includes costs associated with: a work unit technology group’s
administrative and personnel costs; envisioning, implementing, enhancing and
radically overhauling the work unit’s local digital solutions; and, carrying out local
strategic experiments. With a strategic experiment, a trial-version of a digital
innovation is implemented within a real, but tightly-bounded, work context. The
objective of strategic experimentation is to limit investment and risk, but still gain
insights (via analysis of collected data) on the viability of the digital innovation. While
most work unit digitalization spending is vested within work unit operating budgets,
some funding is provided by the corporate leadership team – most often with an aim
503
of encouraging work units to engage in digital innovation and as an incentive to
collaborate with other work units in developing and using global platforms.
Global platform funding covers spending and investment associated with
enhancing or radically overhauling installed global (business and digital) platforms,
implementing new global platforms, and experimenting with innovative digitized
solutions. The funding for global business platforms comes from some combination
of the work units’ operating budgets and the corporate leadership team.
Increasingly, today, it is not unusual for organizations following the partner model to
apply global digital platforms. Typically, the costs of these global platforms are
apportioned back to the work units’ operating budgets via negotiated chargeback
(internal transfer prices) budgeting processes.
Corporate technology group funding covers: the administrative and personnel
costs attributed to the corporate IT group; the costs of meeting the digitalization
needs of the corporate leadership team; the costs of implementing, operating, and
evolving global platforms; and, the costs of seeding ideas for digital strategy and
digital solutions across an organization. Generally, some portion of these costs
(often, a very large portion) is treated as corporate overhead, with the remainder
charged back to the work units.
Platform Model
With the platform model (see Figure 26-2), the principal responsibility of the
corporate technology function is to seed demand for, implement, operate and evolve
global digital solutions (i.e., global business platforms and global digital platforms).
Typically, the corporate technology function also implements and operates most of
the work units’ local digital solutions. By locating most technologists under the CIO
504
and physically close to one another, strong personal relationships can be built within
and across the corporate technology group’s platform-focused work units. As a
consequence, it is anticipated that installed platforms and available digital capabilities
will follow best-practices and, where competitively desirable, exhibit leading-
practices. Because of the corporate technology group’s expertise and global-
perspective, the corporate technology group – with sanctioned exceptions – handles
the vast majority of the work units’ digitalization-related work activities. Essentially,
the corporate technology group operates as a business within a business to provision
and operate most of an organization’s digitalization solutions.
Figure 26-2
The Platform Model
Technology Strategies
CEO
CIO Work Unit Leadership
Account Managers
G lo
b a
l B
u s in
e s s P
la tf
o rm
2
G lo
b a
l B
u s in
e s s P
la tf
o rm
… .
G lo
b a
l D
ig it
a l
P la
tf o
rm 1
G lo
b a
l D
ig it
a l
P la
tf o
rm 2
G lo
b a
l D
ig it
a l
P la
tf o
rm …
. Corporate Leadership
Corporate Offices
Work Unit
Corporate Technology Group
G lo
b a
l B
u s in
e s s P
la tf
o rm
1
External to the Organization
Platform Operations
Solutions Delivery
T e
c h
n o
lo g
y S
e rv
ic e
P
ro v id
e rs
CDO Digital Strategies
Platform Managers
CDO
Digital Strategies
A key managerial role associated with the platform model is that of the account
manager. Account managers serve as the corporate technology group’s primary
line of contact with the work units. Typically, account managers have solid-line
505
reporting relationships up to the CIO and dotted-line reporting relationships with the
heads of the business work units for which they coordinate digitization-related work
activities. Account managers - and their staffs - are expected to develop personal
relationships with the work unit’s leadership team, especially the work unit’s CDO.
Ideally, these personal relationships also enable the work unit leadership teams to
influence the natures of installed global platforms, such that most of the work units’
digitalization needs are met by these global platforms. Account managers work with
work unit CDOs in resolving the work units’ digitalization problems.
A second critical managerial role is that of the platform manager. Platform
managers, who report up to the CIO, are responsible for designing, implementing,
operating and evolving global platforms. Ideas for enhancing a global platform can
come from internal sources (e.g., account managers, work unit CDOs, internal
digitalization consultants, etc.) and external sources (e.g., technology service
providers, consultancies, peers in other organizations, etc.). If platform managers
perform their responsibilities well, the corporate technology group should be able to
confidently project itself as the organization’s predominant digitalization provider.
Implicit here is the option for work units to have a choice in determining how and by
whom their digitalization needs are met. Most often, the option to go outside the
corporate technology group requires a strong business case, given that going outside
the corporate technology group can seriously hamper an organization’s ability to
leverage its digital investments.
Generally, account managers (and their staffs) are physically located with the
platform managers (and their staffs) so that strong working relationships are
developed and maintained. It is through these strong relationships that:
506
Account managers (and their staffs) are able to develop deep understandings of global platform capabilities and the planned trajectories of
these platforms.
Platform managers (and their staffs) can develop deep understandings of
the work units’ digitalization needs and how these needs are expected to evolve.
For the platform model to function effectively, digitalization funding differs
from that described earlier regarding the partner model. The vast majority of
digitalization spending and investment occurs within the corporate technology group.
Typically, the direct digitalization spending by a work unit involves the administrative
and personnel costs associated with a work unit CDO, customized services
provisioned by the corporate technology group, and any digitalization activities done
independent of the corporate technology group (i.e., a work unit contracts directly
with a technology service provider). However, work units’ operating budgets usually
account (via chargeback processes) for much of the expenses associated with
staffing, administering and operating the corporate technology group.
Variations on the Partner and Platform Models
Very few organizations make use of a pure partner model or a pure platform
model. Three reasons explain why this tends to be the case. First, few organizations
are good candidates for the pure forms of either of these positioning models (refer
back to the last row of Table 26-2). Second, it takes considerable time and political
effort to fully implement any organization design. Even if an organization was seen
as a good candidate for a pure partner or pure platform model, at the conclusion of
a lengthy implementation period it is highly likely that the just-implemented design
would no longer be optimal. Third, organizations’ (and their work units’) internal and
external environments are always in flux, most often incrementally but occasionally
507
radically, and organizations’ (and their work units’) responses to such changes will
influence what is seen as an optimal digitalization organization design.
Common variations to the partner and platform models are observed and these
are described in Table 26-3. In this table, primary business processes are directly
involved in making available products/services to consumers/clients and in fulfilling
customers’/clients’ requests, and support business processes are involved with the
administrative and staff work activities necessary for carrying out primary business
processes.
Table 26-3
Alternatives to the Partner Model and Platform Model
Digitalization Organization Design Model
Business Platforms Digital Platforms
Primary Business Processes
Support Business Processes
Enabling Primary Business Processes
Enabling Support Business Platforms
Pure Organization Design Models
Partner Partner Partner Partner Partner
Platform Platform Platform Platform Platform
Organization Design Model Variations
Global Digital Platform
Partner Partner Platform Platform
Global Support Platform
Partner Platform Partner Platform
Local Primary Platform
Partner Platform Platform Platform
Table 26-3 begins by characterizing the pure forms of the partner and platform
models. With the global digital platform model, an effort is made to exploit
technology standardization wherever possible and appropriate, while recognizing that
most work units vary considerably regarding their digitalization needs (and, hence,
stand to benefit from local business platforms). Here, a platform model is applied
for most digital platforms, but a partner model is applied for most business platforms.
With the global support platform model, an effort is made to exploit technology
508
standardization and business process optimization for support business processes,
while recognizing that work units vary considerably regarding the natures of their
primary business processes. Here, a platform model would be applied for most
support business processes, but a partner model would be applied for primary
business processes. With the local primary platform model, an effort is made to
exploit technology standardization to as great an extent as is possible and to exploit
business process optimization for support business processes, while recognizing that
most work units vary considerably regarding their primary business processes. Here,
a platform model would be applied for most digital platforms and for most support
business processes, but a partner model would be applied for most primary business
processes.
It should be noted that the global digital platform, global support platform and
local primary platform models again represent pure forms of digitalization
organization design. In practice, any pure design model should be seen as a starting
point to be tweaked as necessary to account for an organization’s unique contextual
situation.
Energizing Digital Innovation at the YCH Group103
Founded in 1955, the YCH Group is a logistics and supply chain management
company serving clients in the Asia-Pacific region. By 1988, YCH was providing
manufacturing clients across the world with integrated logistics solutions and services
through a variety of global business and technical platforms. A core element of YCH’s
103 The material in this section is adapted from: T.S.H. Teo, C. Ranganathan, S.C.
Srirastava, and J.W.K. Loo, “Fostering IT-Enabled Business Innovation at YCH Group,” MIS
Quarterly Executive, December 2007, 211-223.
509
business strategy has involved and continues to involve aggressive digitalization of
the logistics solutions/services offered to and delivered to clients.
As a relatively small player in the world-wide logistics services industry, YCH
must compete with much larger competitors, some of which have very deep pockets.
As a consequence, the company decided to focus its supply chain and logistics
solutions and services to meet the demands of a limited set of world-class
manufacturing clients. Why this particular niche? The companies populating the
niche have extremely complex operational flows requiring customized, sophisticated
logistics solutions. Having developed unique capabilities to design, build and apply
the innovative logistics solutions demanded by such clients, YCH has become a
dominant player within the market niche. YCH designs and builds all of its digitalized
logistics solutions from scratch; three of the company’s global business platforms
delivering logistics services are described in Table 26-4. The company’s executive
leadership works hard to cultivate a corporate mindset and culture that places
digitalization at the forefront of the organization’s operational and managerial
practices.
510
Table 26-4 Examples of the YCH Group’s Global Business Platforms
Global Business Platform
Functionality
Inbound Logistics
• Comprehensive, just-in-time hub for a manufacturing client’s global suppliers.
• Tracks multiple suppliers, multiple orders & multiple items (raw materials & components).
• Material, information & financial transactions. • Vendor-managed inventory.
Outbound Logistics
• Comprehensive hub for finished goods fulfillment. • Manufacturer’s finished goods are dispatched to YCH, where
they are sent on to specific client end-points (distribution centers, retail stores, end-customers, etc.).
• Auto-replenishment, route optimization, load optimization, etc.
Reverse Logistics
• After-sales logistics services: goods that need to be repaired, serviced, returned, exchanged, etc.
• Warranty-related services.
In the early 2000s, YCH spun off its corporate technology function as a
separate subsidiary charged with:
Developing, operating and enhancing the digitalized business solutions (and enabling technology services) offered to clients.
Marketing and selling YCH digitalized business solutions as software products (standalone digitalized business processes and business platforms) offered
to other firms (including YCH competitors).
Leading the company’s R&D and strategic experimentation efforts driving the development of innovative, digitalized logistics solutions.
There were two primary goals in spinning off YCH’s corporate technology function: to
generate an additional stream of revenue (i.e., the sale of software products); and,
to create a more entrepreneurial corporate technology function that was focused on
developing innovative logistics solutions/services, especially those having appeal
beyond YCH’s existing clients). YCH strategists believed strongly that
selling/licensing these software products to competitors would not cannibalize the
company’s primary revenue streams for two reasons. First, any competitor
511
purchasing a YCH software product would always be at least one-step behind YCH’s
current logistics services offerings. Second, YCH would not be sharing with other
logistics service providers the company’s rich expertise on how to best apply a given
software product to meet a client’s needs.
In addition to creating a more entrepreneurial corporate technology function,
YCH senior executives introduced a number of other management practices aimed at
energizing digital innovation. Table 26-5 describes five of these practices.
Importantly, these five practices, if applied well, can be effective in promoting digital
innovation for any type of organization, regardless of the organization’s digitalization
organization design.
Table 26-5
YCH Group Management Practices Aimed at Facilitating Digital Innovation
An Innovation Culture
• Visible, aggressive encouragement & rewarding of innovative outcomes. • Free flow of ideas across sales, operations & technology groups. • Open office concept for the corporate technology group (e.g., glass cubicles) where everyone
can see what everyone else is doing and everyone else’s availability.
Cross-Functional Project Teams
• Projects staffed by teams of sales, operations & technology professionals. • Project teams meet monthly with senior managers to discuss project status & direction.
Project Justifications Based on Strategic Value
• Project proposals assessed by potential strategic value for YCH & for YCH’s clients. • Funding made available for high-risk projects with high potential strategic value.
Client-Centric Alliances
• Strategic partnerships to generate, nurture & develop innovative logistic solutions. • Deepen & leverage relationships with strategic partners to grow new revenue streams.
Continuing Development of Professional Staffs
• Sales and operations professionals are regularly exposed to new digital technologies and to new digitalized logistics solutions.
• Technology professionals are regularly exposed to logistics best practices across industry segments to spur & direct innovative digitalized solutions.
A Recap and Look Ahead
It is useful to reflect on how enterprise architectures, digitalization governance
systems and digitalization organization designs complement one another. Once
512
specified, enterprise architectures serve as a template for both establishing
digitalization governance system postures and for organizing digital capabilities and
digitalization-related work activities. Once implemented, governance system
mechanisms bring the right people together to consider the right issues when
specifying and evolving enterprise architectures and when deciding on the location of
digital capabilities and digitalization-related work activities. Finally, it is the personal
relationships that develop as a result of a digitalization organization design that
engender the collaborative and committed interactions amongst the members of an
organization’s various leadership teams that is necessary for specifying and evolving
meaningful enterprise architectures and for designing effective systems of
digitalization governance.
Mindfully attending to the design of enterprise architectures, digitalization
governance systems and digitalization organization designs should enable
organizations’ leadership teams to maintain appropriate balances among their global
and local platforms. As a consequence, these organizations are more likely to host
their executing business models on robust platforms, to optimally leverage their
digital investments, and to sustain levels of digital innovation necessary for their
continued competitive success. Our concluding chapter to this final part of the book
describes five mandates for action aimed at focusing organizations’ leadership teams
as they engage in such design activities.
513
Chapter 27. Executive Mandates: Platform Management
Business platforms and digital platforms increasingly serve as the primary
means through which today’s organizations carry out their most critical operations
and launch their competitive moves. Global platforms enable coordinated actions
involving multiple work units, whereas local platforms enable individual work units to
move nimbly while taking finely-honed competitive actions. However, if an
organization’s global and local platforms are not designed and managed well, they
can present dark sides:
Institutionalized global platforms can become iron cages that constrain forward-looking thought and action.
Proliferating local platforms can preclude the interconnectivity increasingly
necessary for implementing multi-unit and multi-organization digital strategies.
Strong biases favoring global platforms over local platforms can discourage, if
not suppress, digital innovation.
In this final chapter, we provide five mandates for executives striving to better
design, manage and evolve their organizations’ collections of business platforms and
digital platforms:
Combat Complacency
Crystallize the Competitive Value of Global Platforms
Expose Digital Innovation Sweet Spots
Instill a Forward-Looking Bias into Platform Design
Configure Systems of Participant Interlocks
514
Combat Complacency
The individuals engaged within digitalization interaction networks and affected
by digitalization governance mechanisms must include an organization’s most
powerful, influential and talented leaders. With few exceptions, such individuals have
very little slack in their work schedules and, for many of these individuals,
digitalization-related concerns are seen as a subset (sometimes a small subset) of
their responsibilities. Given real constraints on such individuals’ attentions, many
are likely to perceive their involvement with digitalization interaction networks and
governance mechanisms, at best, as a distraction or, at worse, as something to be
avoided. Such perceptions are especially likely to exist when few, if any, serious
operational problems or imminent competitive threats exist. When a sense of
digitalization ennui develops, affected leaders are likely to disengage (that is, become
passive or absent participants) from digitalization interaction networks and override
digitalization governance mechanisms.
What are the symptoms of complacency across an organization’s leaders?
There are many signals, with the most striking being:
Executives and senior managers are directly engaged with very few, if any, digitalization decisions.
Executives and senior managers seldom interact with members of their organization’s corporate technology groups or work unit technology group
leadership teams.
The preponderance of changes being made to an organization’s digital strategies and technology strategies are incremental in nature.
Few digital innovations are launched.
The spending on global platforms steadily increases and the spending on
local platforms steadily increases.
The corporate technology group’s budget steadily increases.
515
How can such complacency be prevented or, once identified, overcome? The key lies
in enriching executives’ and senior managers’ understandings of:
The significant influence of digitalization and of global/local platforms on an organization’s competitiveness.
The roles served by digitalization interaction networks as the wellsprings from which most competitive moves flow.
The roles served by digitalization governance mechanisms in keeping digital strategies on track, in ensuring digitization policies are mindfully followed, and in questioning the appropriateness of in-place digital strategies/policies
and technology strategies/policies.
The remaining four mandates are directed at instilling these understandings.
Crystallize the Competitive Value of Global Platforms
The digital capabilities provisioned through installed global platforms
represent, when mapped against organizations’ competitive environments, the
means for maintaining and, ideally, for enhancing competitive positions. Too often,
however, these embedded digital capabilities are either not recognized or not
understood by those participating in digitalization interaction networks and
digitalization governance mechanisms.
When applied well, the economies of scale and scope provisioned by global
platforms enable organizations to marshal their digital capabilities to:
Drive down cost structures.
Increase the volume and speed of transaction-handling.
Expand the breadth and depth of products offerings and services offerings.
Implement and operate complex, sometimes novel, internal operating environments from which to plan, conduct and control the sale and delivery of products and services.
Implement and orchestrate, increasingly in conjunction with strategic
516
partners (suppliers, service providers, distributors, retailers, etc.), complex, sometimes novel, business platforms and market platforms from which to
plan, conduct and control the sale and delivery of products and services.
It is essential for an organization’s (overall and work unit) leadership teams to fashion
and disseminate, on a regular basis, communication programs describing the
competitive significance of digital capabilities and of global platforms.
Expose Digital Innovation Sweet Spots
While digital innovation tends to be a costly endeavor (e.g., business
assumptions can prove faulty, technologies might not work as expected, software
development can prove challenging, associated work practices need to be designed
and implemented, etc.), the benefits to be realized from gaining and then sustaining
a novel competitive advantage can be huge. Organizations that thrive through digital
innovation do not engage in a shotgun approach, but instead are systematic in
choosing where and when to innovate.
Successful innovation is anything but a trial-and-error process (though it often
may appear so). Instead, successful innovation occurs in well-understood market
ecosystem spaces and applies thoughtfully-configured, thoughtfully-targeted assets
and capabilities that result in novel products and/or novel services unlikely to be
quickly imitated by competitors, because the assets, capabilities and associated
configuration processes and implementation processes are either rare or would
require competitors considerable time, effort and expense to acquire.
Where are an organization’s digital innovation sweet spots? It varies
depending on whether an innovation predominately involves market-focused
innovation or technology-focused innovation. Market-focused innovation, which
emphasizes innovative digitalized solutions, directly targets competitive spaces
517
characterized by significant revenue growth and/or by high-profitability market-niche
potentials and for which the organization holds proprietary access to requisite digital
assets, digital capabilities and/or configuration processes. Technology-focused
innovation, which emphasizes innovative digitized solutions, indirectly targets
competitive spaces by delivering proprietarily-held technology capabilities promising
magnitude increases in technology efficiency/effectiveness and high potentials of
being competitively applied. Compiling, on an ongoing basis, an embellished listing
of the most-promising digital innovation sweet spots and then distributing this listing
to digitalization interaction network participants and to digitalization governance
mechanism participants should increase the likelihoods that these participants will be
motivated to collaborate with other participants and that ideas for digital innovation
will appear more frequently within participant deliberations.
Instill a Forward-Looking Bias into Platform Design
Organizations’ business platforms and digital platforms serve as the engines
driving current work activities and as the superstructures enabling planned and yet-
to-be-planned competitive moves. However, given the immediacy of day-to-day
operating pressures, a natural tendency exists to emphasize today’s realities within
enterprise architectures, within digitalization governance systems and within
digitalization organization designs. Such a bias only serves to reinforce the dark
sides of digital platforms and, as a consequence, can result in digitalization ennui
settling in across organizations’ most powerful, influential and talented leaders.
Instead of basing enterprise architectures, digitalization governance systems
and digitalization organization designs on where an organization is today, these
designs should reflect – to an equal, if not greater, extent - where an organization is
518
heading. To do this well is itself a delicate balancing act. But, if these designs are
not meaningfully directed toward the future, the deliberations unfolding within
digitalization interaction networks and orchestrated through digitalization governance
mechanisms are likely to deteriorate toward the mundane, providing little motivation
to sustain the involvement of powerful, influential and talented leaders.
Configure Systems of Participant Interlocks
Digitalization interaction networks and digitalization governance mechanisms
engage participants in defining, negotiating and resolving digitalization decisions.
However, the decisions being addressed by a specific group at a particular point-in-
time do not occur as isolated events. The decisions being negotiated by a group
today have been framed (e.g., assumptions, objectives, constraints, criteria, etc.) by
the group’s past negotiations and are influenced - sometimes directly but more often
indirectly - by the concurrent deliberations of other groups addressing related issues.
The absence of a robust decision framing (that is, decision framing missing salient
assumptions, objectives, constraints, criteria, etc.) is likely to result in a group’s
deliberations being dominated by a few participants, to be unsatisfying for most
participants, and to lead to ill-formed actions. Over time, such decision dynamics
only lead to both inferior outcomes and participant disengagement.
In order to enrich the context-space within which decisions are negotiated and
taken, participant interlocks should be designed into digitalization interaction
networks and digitalization governance mechanisms. With a participant interlock,
the same individual serves as a participant within two or more associated decision-
making groups. Two types of participant interlocks exist: temporal interlocks and
topical interlocks. With a temporal interlock, one or more individuals mindful of a
519
group’s history are included as group participants. With a topical interlock,
individuals mindful of the deliberations of tightly-related groups are included as group
participants.
Given the highly-situational processes used in selecting participants of
digitalization interaction networks and governance mechanisms, it is impossible to
state specific guidelines regarding the extent to which participant interlocks should
be used. Stating the obvious might be best:
For temporal interlocks, some is better than none – but not too many, as groupthink or ennui can arise.
For topical interlocks, more is better than none or some. However, group
size needs to be limited or else associated dysfunctional group dynamics arise (e.g., a few members dominate, cliques form, etc.).
A Recap
It takes a great deal of effort by an organization’s leadership teams to design,
manage and evolve the organization’s collection of business platforms and digital
platforms. If done well, these efforts should maintain an appropriate balance in
global and local platforms, thereby enabling the organization to optimally leverage
its digital investments, sustain a strong digital innovation capability, and, thus,
maintain its competitiveness. All too often, however, an organization’s powerful,
influential and talented leaders are reluctant to invest the effort to actively engage
with digitalization interaction networks and digitalization governance mechanisms.
And, again all too often, when such leaders do choose to become active participants,
they offer insufficient or, worse, distracting guidance for ensuing deliberations.
In this third part of our book, we have described three tactics – enterprise
architecture design, digitalization governance design and digitalization organization
520
design – that collectively promise to provide apt direction and guidance for the
individuals engaged with digitalization decisions. In this chapter, we have offered
five executive mandates for sustaining the attention and motivation of these same
individuals. But, be advised – none of these strategies and tactics represent quick-
fixes. Instead, they collectively represent the means by which organizations’
leadership teams orchestrate a never-ending digitalization journey. Bon voyage!
521
APPENDIX: Basic Concepts
This appendix provides definitions and descriptions of many of the basic
concepts used in this text and in other materials covering digital strategy,
digitalization and digitalization management. The specific topics covered are:
What is an Information System?
Distinctions between Data, Information and Knowledge
Basic Types of Information Systems
Data, Information and Knowledge Use within Information Systems
Information Systems in Practice
What is an Information System?
An information system is a computer-based system designed to accomplish
a set of sought objectives. An information system is comprised of seven elements:
sought objectives, business processes, data, people, computer hardware, systems
software and applications software (see Figure A-1).
522
Figure A-1 Elements of an Information System
Computer Hardware
Applications Software
Sought Objectives
Business Processes
People
Data
Inputs
Outputs
Digital Technologies
Information System
Systems Software
Sought objectives refer to the purpose or purposes to be accomplished
through the information system. Organizations use information systems for a variety
of purposes: to automate routine operational activities such as payroll or fulfilling a
customer order; to provide employees with comprehensive, timely and accurate data
to be used in carrying out work assignments; to enable a customer to search through
an online product catalog; to aid product managers in developing ideas for the new
generation of products; etc.
Business processes refer to sequences of actions undertaken by one or more
employees in carrying out a recurring work activity. The actions that comprise
business processes can vary in the extent to which they are predefined through
policies, rules and procedures, and the extent employees are allowed to deviate from
these predefined policies, rules and procedures.
523
Data are attributes of objects and events. Table A-1 provides examples of
common objects and events, along with their attributes. Typically, data are captured
and digitally stored for future processing by an information system because the
objects and events being described are either necessary or useful in carrying out
work activities. For example, a captured sales event is likely to be used immediately
(to remove the sold product from available inventory), to be accessed for future use
(in compiling weekly, monthly, quarterly and annual sales reports), and to be
accessed for yet-to-be-thought uses (e.g., a daily-sales forecast). Attributes of
events not captured at the time the event occurs are lost forever.
Table A-1
Data: Attributes of Objects and Events
Attributes
Objects
Employee Employee ID, name, job position, salary, home address, spouse, education, etc.
Product Product ID, product description, substitute products, stock-on-hand, etc.
Product Defect Defect ID, defect type, defect description, likely defect causes, etc.
Events
An Employee is Terminated
Employee ID, date, supervisor ID, reason for termination, etc.
A Customer Order is Placed
Order ID, date, customer ID, salesperson ID, product IDs, number of products, discount rate, etc.
A Product Defect is Found
Defect ID, date, employee ID, product ID, cause, etc.
People refer to an organization’s employees, employees of other organizations
(suppliers, vendors, service providers, strategic partners, etc.) and to the consumers
of an organization’s products and services. People directly use information systems
when they actively interact with a digitalized business process. People indirectly use
information systems when they do not actually interact with an information system,
but instead make use of an information systems’ outputs (e.g., reports, lists, memos,
524
etc.) or supervise or interact with others directly or indirectly using an information
system.
Information systems are built from digital technologies. Digital technologies
deliver commodity-like digital capabilities. Two general types of digital technologies
exist: computer hardware and computer software.
Computer hardware refers to the devices that provide basic data processing
capabilities, data communication capabilities, data capture capabilities, data display
capabilities, and data storage capabilities. Typical hardware components include
processing units (servers, PCs, iPads, etc.), communication devices (routers,
modems, etc.), input devices (keypads, mice, touchpads, touchscreens, etc.), display
devices (LCD screens, printers, smart phones, etc.), and storage devices (hard
drives, optical drives, flash drives, etc.).
Computer software manipulates and transmits data and/or directs the
functioning of computer hardware. Two general categories of software exist:
systems software operates computer systems and coordinates across interacting
computer systems, and applications software executes digitalized business
processes that enable and support the accomplishment of sought objectives.
Distinctions between Data, Information and Knowledge
At their most basic level, information systems provide capabilities for cost-
effectively capturing, processing, storing and distributing data. It is important to
realize that what is being captured, processed, stored and distributed is just that –
data. And, data is very different from information, which in turn is very different
from knowledge, although these three terms are often used interchangeably.
525
Data was defined earlier as the attributes of objects and events. Information
refers to sets of data that are interpreted for a specific purpose by a person facing a
specific decision situation. As is depicted in Figure A-2, data are manipulated (using
predefined rules) to produce a set of information to the person (or persons) facing a
decision situation.
Figure A-2 Data, Information and Knowledge
Data Filter
Summarize Manipulate
Data Act On
L e
a rn
in g
P
ro c e
s s e
s
Knowledge
Interpret Information Outcomes
R u
le s
R u
le s
R u
le s
Information arises when a person applies her understanding of the decision
situation (and of similar decision situations), along with an organization’s existing
norms and expectations, to interpret available data and to produce fresh insight
(trends, patterns, forecasts, etc.) regarding the decision situation. If this information
is meaningful, the person is normally able to reduce the uncertainty associated with
the decision situation, thus increasing the likelihood that a better decision outcome
will occur. The same set of data is likely to produce different information when
applied by a person coping with different decision situations or when applied by
526
different people facing a similar decision situation. Information use eventually
culminates in a taken action and the outcomes experienced from this action. These
outcomes are then used (implicitly or explicitly) to confirm, reject or refine this
interpretation of the data.
Knowledge refers to the current state of understanding that exists about
some work-related activity (e.g., selecting a substitute product for an out-of-stock
product, resolving a recurring problem with a manufacturing process, deciding on an
optimal amount to spend on advertising for a certain class of products, etc.).
Knowledge exists within the minds of people, across groups of people (where
knowledge is referred to as shared understanding) and within organization
structures (e.g., policies, rules and procedures). As is depicted in Figure A-2,
knowledge accumulates and evolves over time as individuals learn from their
experiences and share knowledge with one another. As knowledge about a specific
work activity improves, existing rules associated with the work activity (i.e., the data
to be collected and reported, how to transform the data so that it can be more
meaningfully interpreted as information, how to apply sets of data and information
in making decisions, etc.) are modified and new rules are created.
Table A-2 summarizes distinctions in how data, information and knowledge are
created, stored and exchanged. First, consider how each is created. Data items are
formally defined so that these data are used consistently by all the individuals aware
of the definitions. However, the information created as individuals interpret these
data will vary depending on who is doing the interpretation and the situation in which
the interpretation is done. Knowledge is created through individual and group
learning processes. In order for knowledge to become an organization (rather than
527
individual) resource, it must be codified (clearly expressed in written form) and
validated (shown to hold across time and situations) by knowledge experts.
Table A-2 Distinctions Among Data, Information and Knowledge
Issue Data Information Knowledge
How Created
Formally defined Individuals’ interpretations
• Individuals’ & groups’ learning processes
• Codification • Validation
Where Stored
• Digitized files & databases (primarily)
• Individuals’ personal files (lesser extent)
• Individuals’ minds (primarily)
• Reports & documents (lesser extent)
• Digitized files & databases (even lesser extent)
• Individual’s minds (primarily)
• Business rules (lesser extent)
• Digitized files & databases (even lesser extent)
How Exchanged
• Explicitly (primarily)
• Tacitly (lesser extent)
• Tacitly (primarily) • Explicitly (lesser
extent)
• Tacitly (primarily) • Explicitly (lesser extent)
Second, consider how each is stored. Data is primarily stored in formal
archives (files and databases), increasingly in digitized form. Some data, however,
will always be kept private by people (and, for the most part, unavailable to others).
Most of the information created as employees engage in work activities is either lost
once these activities are completed or maintained only in these employees’ minds.
Using interpreted information within reports or documents does preserve the
information, as long as the reports or documents are preserved. But, information
contained in reports and documents can be difficult to locate. If these reports and
documents are digitized and organized as digitized files or databases, then finding
specific information contained in a report or document becomes much easier. Most
of the knowledge that exists across an organization is stored in employees’ minds
and remains an individual rather than an organization resource. However, steadily
528
increasing portions of this knowledge is stored both within the business rules
(digitalized and non-digitalized) used in directing business processes, and within
digitalized knowledge archives, such as a ‘best practices’ repository or a knowledge
management system.
Third, consider how each is exchanged. As it is formally defined, most data
are exchanged in an explicit (clearly expressed, usually written) manner. On the
other hand, most information is exchanged in a tacit (ambiguously expressed, usually
verbal) manner. Exchange ambiguity arises because interpretations of exchanged
information depend largely on senders’ and receivers’ experiences and current work
situations. Most knowledge is exchanged tacitly. However, once knowledge is made
available as an organization resource (i.e., it has been codified and validated),
exchange can occur in a largely explicit manner.
Basic Types of Information Systems
Organizations install large numbers of information systems that enable or
support operational and managerial processes. For the most part, these installed
information systems represent the features of one or more of five basic information
system types: transaction processing systems, information reporting systems,
decision support systems, automated decision systems, and messaging and
collaboration systems (see Table A-3). Figure A-3 illustrates the relationships among
these types of information systems. Below, we discuss how these types of basic
information systems could be used in a hypothetical manufacturing company.
529
Table A-3 Types of Information Systems
Type Definition
Transaction Processing
Systems
Capture data regarding important objects & events, store these data and use the data in the execution of business processes and in the production of associated messages & documents.
Information Reporting Systems
Retrieve stored data to produce pre-specified reports regarding operational processes & managerial processes.
Decision Support Systems
Retrieve stored data and enable the manipulation of these data by individuals in creating ad hoc queries, analyses & reports regarding operational processes & managerial processes.
Automated Decision Systems
Embed decision rules into transaction processing systems, information reporting systems & decision support systems so that decisions are made directly by an information system rather than by a human.
Messaging & Collaboration
Systems
Digital communication channels that support, enable & augment person-to-person, person-to-group, and group-to-group message flows.
Figure A-3 Relationships Among the Types of Information Systems
Managerial Processes
Automated Decision Systems Transaction Processing Systems
Databases
Operational Processes
Information Reporting Systems Decision Support Systems
M e
s s a
g in
g &
C o
ll a
b o
ra ti
o n
S
y s te
m s
M e
s s a
g in
g &
C o
lla b
o ra
tio n
S
y s te
m s
530
Operational Processes
Transaction processing systems capture data regarding important objects
and events, store these data, and use these data in the execution of operational work
processes and in the production of messages and business documents. This stored
data can then be used by the other types of information systems. Transaction
processing systems dominate a manufacturing firm’s operational work activities by
enabling or supporting much of what occurs within purchasing, receiving, inventory,
manufacturing, selling, order processing, order fulfillment and customer/product
support operational processes. Transaction processing systems are heavily involved
in carrying out day-to-day work and in populating databases (e.g., customer
database, product database, parts database, supplier database, employee database,
order database, etc.).
As knowledge is accumulated over time about operational activities, about the
products and services offered to customers, and about customers and suppliers,
many of the transaction processing tasks that previously were carried out by
employees are fully automated via automated decision systems. Automated
decision systems make use of business rules (i.e., policies and procedures for
executing actions and decisions) embedded within computer software such that when
specific conditions are detected (from analyzing captured and stored data), specific
actions and decisions are taken without human intervention. Below are some
examples of a few manufacturing operational work activities that are typically fully
automated:
Purchase orders for parts are automatically sent to suppliers when inventory levels dip below pre-specified levels.
531
Sales orders from established customers with excellent credit ratings and for which all ordered products are in-stock are automatically accepted and
fulfilled.
The next week’s work assignments and staffing schedules are automatically
developed and distributed to supervisors and employees on Friday afternoon.
Table A-4 provides a more general listing of the automated decision systems installed
by organizations today.
Table A-4 Examples of Automated Decision Systems
Work Activity Example
Product/Service Configuration
Identify the components required in providing a customer with a complex product/service that is tailored to the customer’s needs.
Route Determination Identify the appropriate path for servicing a client, an order, a complaint, a request, etc.
Policy Compliance Ensure that specified policies & procedures (rules, regulations, etc.) are followed in handling a customer, a client, an order, a complaint, a request, etc.
Fraud Detection Apply specified policies & procedures (rules, regulations, etc.) to identify a fraud event.
Yield Optimization Adjust prices in real-time in order to reflect current supply/demand conditions.
Dynamic Forecasting Adjust forecast targets (production, sales, purchasing, inventory, etc.) in real-time in order to reflect current supply- demand conditions.
Operational Control Adjust schedules, production levels, inventory levels, order amounts, staffing, etc., in order to reflect current work flow conditions.
It is important to recognize that the business rules embedded in automated
decision systems must regularly be examined to assess their continuing relevance.
Change is a constant for all organizations and a rule that was effective yesterday may
prove ineffective today.
Messaging and collaboration systems (email, instant messaging, virtual
conferencing, virtual work spaces, etc.) are used to provide directions, raise and
answer questions, brainstorm ideas, and resolve the problems that regularly arise as
532
employees deal with suppliers, customers, unexpected events (e.g., a delayed
delivery) and anything else that happens to fall through the cracks.
Managerial Processes
Information reporting systems support the work activities of managers
responsible for the manufacturing firm’s operational, tactical and strategic activities.
Information reporting systems make use of the databases populated by transaction
processing systems; these databases are also supplemented by data obtained from
external sources (e.g., marketing research companies) or produced by staff
specialists (e.g., a data set describing the physical assets owned by the firm).
Information reporting systems use these data to generate information used by
managers when they are facing a decision situation. Typically, the reports being
produced are found useful for many different decision situations. The distinguishing
feature of information reporting systems is that these reports are pre-specified. It
would not be unusual for hundreds, if not thousands, of pre-specified reports (hard
copy or digital) to be produced in a typical manufacturing firm. Examples of such
reports include: weekly, monthly and quarterly sales reports; weekly, monthly and
quarterly budget reports; weekly, monthly and quarterly financial performance
reports; weekly, monthly and quarterly production problem (defects, delays, returns)
reports; and so on. Ideally, information reporting systems provide managers (as well
as other employees) with an overall view of what is going right, as well as what is
going wrong, within their areas of work responsibility.
As knowledge accumulates about business processes, business rules can be
embedded (i.e., another form of automated decision systems) into information
reporting systems to produce another type of pre-specified report – the exception
533
report. An exception report is provided only when an exceptional condition (defined
through an embedded business rule) is detected. For example, the only time a
manufacturing manager overseeing a particular manufacturing operation might
receive a defect report is when the trend line tracing the proportion of defective
components approaches a pre-established level, say 0.001.
Decision support systems exist to meet a very different need: that of
providing managers, staff professionals and executives with the capability to address
ad hoc decision situations. Ad hoc decision situations refer to decision situations
that have not previously arisen or for which generally accepted ways of dealing with
the situation are lacking. Decision support systems allow decision makers to vary
the data being analyzed, as well as the criteria, conditions or objectives associated
with a decision process. Decision support systems provide much more flexibility than
do information reporting systems. But, this flexibility comes at a cost: a need to
invest in more sophisticated digital technologies and a greater effort on the part of
decision makers to learn how to use the various features of the decision support
system. Examples of decisions often supported through decision support systems in
a manufacturing firm include:
Determining the need for and location of a new distribution facility.
Determining whether or not to expand sales operations into new
international markets.
Revising an organization’s preferred suppliers, given past experiences and growth opportunities.
Determining the profitability and growth prospects of different customer segments.
Reexamining employee cost-sharing levels regarding the firm’s benefit packages.
534
Messaging & collaboration systems have fundamentally changed how
managers interact with others in carrying out their responsibilities. Communicating
and collaborating with peers, superiors, subordinates, suppliers, customers,
consultants and business partners (among others) represents a substantial portion –
seemingly an ever-increasing portion – of the typical manager’s day-to-day life.
Data, Information and Knowledge Use within Information Systems
Table A-5 examines data, information and knowledge within the context of the
basic types of information systems. Even a quick glance at Table A-5 should
underscore the importance of capturing and storing data about important objects and
events, as well as the necessity for these data to be comprehensive, accurate and
current. Subtler, but of no lesser importance, is the significant role served by
knowledge in creating the many business rules (digitized and non-digitized) that
dictate how data and information is filtered and processed.
Table A-5 Data, Information and Knowledge Use: Types of Information Systems
Information System Type
Data Information Knowledge
(Business Rules)
Transaction Processing Systems
• Captured by • Input into • Created by • Stored by • Output by
• Business rules direct transaction processing
Automated Decision Systems
• Input into • Created by • Stored by • Output by
• Business rules direct decision making
Information Reporting Systems
• Input into • Output by
• Business rules direct report production
• Users’ held-knowledge guides data interpretation
Decision Support Systems
• Input into • Created by • Stored by • Output by
• Input into • Stored by • Output by
• Business rules direct data analysis
• Users’ held-knowledge guides decision making
Messaging & Collaboration
Systems • Message content • Message content
• Message content • Business rules direct message
filtering
535
Information Systems in Practice
While the five types of information systems have been separately described,
the information systems being implemented within organizations invariably have
aspects of two, three, four or all five of these basic types. Consider, for example, an
order fulfillment system installed within a manufacturing organization. The objective
of such an application is to determine how best to fill a customer order from the
finished goods inventories held at the manufacturing firm’s distribution centers. To
accomplish this objective, the order fulfillment system generates a listing of current
finished goods availabilities (across all distribution centers; accounting for already-
committed items, near-term production outputs and forecast orders), determines
shipping priorities (given sales commitments and customer importance) and costs,
and initiates the shipment once the decision is made as to which distribution center
(or centers) will physically fill the order.
Such an application could have parts that resemble a transaction processing
system (e.g., initiate a shipment), an information reporting system (e.g., listing
available inventories at each of the distribution centers), an automated decision
system or a decision support system (selecting the distribution center to use for an
order), and a messaging and collaboration system (alerting distribution center
employees of the need to pack the order for shipment). This work activity is
comprised of many different types of tasks and decisions (some large and some
small, some simple and some complex, some well understood and some less
understood). Some of these tasks and decisions might be fully automated, others
might involve substantial interplay between humans and digitalized solutions, and
still others might be handled solely by humans. Deciding just how an order fulfillment
536
system should be designed, implemented and operated involves a complex set of
issues associated with aligning available technological resources and available human
talent, while accounting for both profitability expectations and customer
expectations. In a nut shell, this is exactly what digitalization is all about!
537
GLOSSARY
CHAPTER 1: Digital Innovation and Disruption
Analytical domain – one of the three domains of digitalization; organizational
activities involved in improving understandings of what things should be done, what things need to be done, what things can be done, how things are done, and how what has been done is assessed.
Architecture – an overarching design framework specified to maintain established policies and to enable component interoperability.
Automation – one of the four engines of digitalization; simplifying and digitizing complex tasks and task-sequences, eliminating unneeded tasks and, as appropriate, performing tasks via digital technologies rather than via humans.
Blended organization – an organization that operates, to varying extents, as both a pipeline organization and a network organization.
Business-to-business (B2B) – when market exchanges occur between two organizations.
Business-to-consumer (B2C) – when market exchanges occur between an
organization and a person.
Business disruptions – when an industry’s incumbents face one or more
challengers whose business models offer far greater value to customers than the incumbents’ business models and these incumbents are unable to effectively respond
to the ensuing competitive threat.
Business model – a simplified and aggregated conceptualization of the value- creating, profitability-sustaining activities of an organization.
Collaborative domain – one of the three domains of digitalization; organizational activities involved in enabling digital technologies, humans and organizational entities
to share data, information and/or knowledge in making decisions and in getting things done.
Consumer-to-consumer (C2C) – when market exchanges occur between two
people.
Control – one of the four engines of digitalization; embedding rules within digital
solutions to identify out-of-control events/situations, such that out-of-control events/situations do not occur or, if they do occur, are quickly corrected.
Data – attributes of objects or events represented in digital (discrete sets of ones
and zeroes) form.
538
Digital disruption – when the innovative uses of digital technologies and globalization are the primary factors leading to incumbents within existing industries
facing overwhelming competitive challenges and to entirely new industries being created.
Digital giants – firms that have mastered digitalization and are able to harness their business models and digitalization expertise to disrupt a wide range of industries.
Digital technologies – the technologies (involving hardware, software and, most
often, sophisticated combinations of hardware and software) involved in specifying, capturing, processing, storing and transmitting data.
Digitalization – applying digitization within organizations and within the social and economic contexts within which organizations are embedded.
Digitization – the purely technical processes associated with converting sensed and
captured data into binary form, storing and transmitting these binary data, manipulating these data, and storing/transmitting the outcomes of these data
manipulations.
Domains of digitalization – the three fundamental spheres of organization activity within which digitalization occurs: operational, analytical and collaborative.
Early-adopters – organizations whose leadership teams are regularly among the first to apply new forms of digitalization.
Efficient market – a market that provides maximal opportunities to producers and consumers to effect transactions with minimal transaction costs.
Empowerment – one of the four engines of digitalization; providing humans facing decisions with timely, accurate and comprehensive information and with easy-to-use, relevant decision aids and business intelligence tools.
Engines of digitalization – the four fundamental mechanisms through which digital technologies effect changes within organizations and their broader social/economic
contexts: automation, control, empowerment and interaction.
Firm – one of the two primary mechanisms (along with the market) for organizing economic activities; economic exchanges in a firm mainly occur through hierarchical
structures and control structures. Also referred to as an organization.
Globalization – the ongoing process of interaction and integration among the
people, companies and governments of different nations.
Incumbents – firms having operated in an industry for a long time and holding well- established business models, organization structures and resource control structures.
539
Interaction – one of the four engines of digitalization; enabling entities (human or digital) to engage in timely, meaningful dialogues with one another (overcoming
barriers of space and time).
Interoperability – when two or more digital solutions are able to seamlessly
exchange data and able to apply these exchanged data.
Linear value stream – sequence of value-adding steps within a pipeline ecosystem in which raw materials are assembled into components and then into finished value-
units that are delivered to consumers, either through a complex downstream process facilitated by intermediaries or through a simpler, direct-to-consumer downstream
process.
Market – one of the two primary mechanisms (along with the firm) for organizing economic activities; economic exchanges in a market mainly occur through pricing
mechanisms and contractual mechanisms.
Moore’s law – a characteristic of digital technologies, whereby their capability per
dollar essentially doubles each year.
Network ecosystem – a market-focused ecosystem in which a network of value- unit producers and a network of value-unit consumers are brought together by a
network orchestrator.
Network orchestrator – creates and manages the market environment and the
transaction environment within which value-unit exchanges occur within a network ecosystem.
Organization – one of the two primary mechanisms (along with the market) for organizing economic activities; economic exchanges in an organization mainly occur through hierarchical structures and control structures. Also referred to as a firm.
Open – a technology that is available for use (and modification) by anyone, though some form of payment may be required to gain access to the technology.
Operational domain – one of the three domains of digitalization; organizational activities involved in getting things done.
Pipeline ecosystem – a market-focused ecosystem in which a producer
organization targets a collection of value-units at one or more consumer segments and fashions a linear value stream involving numerous upstream, midstream and
downstream organizations to deliver the value-units to consumers.
Proprietary – a technology that is tightly controlled by its developer.
Technology entrepreneurs – firms (often young and small) that bring specialized
digitalization expertise to innovate, transform or disrupt certain aspects of an industry’s value stream or value-units.
540
Value-unit – the entities (information, a good or a service) being exchanged within a market-focused ecosystem.
Vertically-integrated – when a producer in a pipeline ecosystem performs many, if not most, of the activities involved with upstream and downstream linear value
stream processes.
CHAPTER 2: Digital Strategy Fundamentals
Adaptive agility – the ability of a firm to aggressively introduce incremental
enhancements into currently-executing business models.
Agility – the ability of a firm, first, to detect potentially disruptive threats and opportunities and, then, to marshal the resources and managerial insights required
to subdue threats and/or exploit opportunities.
Business model – a simplified and aggregated conceptualization of the value-
creating, profitability-sustaining activities of an organization.
Collision at the core – directing managerial attention and resources toward building relationships with digitalization leaders in order to understand and recognize business
model innovations aimed at reinventing currently-executing business models.
Core capabilities – an element of a business model that describes the tangible and
intangible resources needed to successfully implement a business model’s value proposition and profit model.
Cost model – describes the nature of the costs borne in producing revenue streams from an executing business model and how these costs will be controlled to provide requisite levels of profitability.
Customer intimacy – a value discipline by which organizations tailor and shape products and services to fit increasingly segmented consumer needs and wants.
Dynamic capabilities – an element of a business model that describes the intangible resources needed to (1) sense and assess opportunities for business model enhancement, replication and innovation, and (2) successfully implement these
enhancements, replications and innovations.
Dynamism – the ability of a firm to innovate, transform and disrupt by
demonstrating strategic adaptability, speed and entrepreneurism.
Entrepreneurial agility – the ability of a firm to aggressively introduce radical enhancements into currently-executing business models or to introduce new business
models.
541
Experimentation at the edge – directing managerial attention and resources toward understanding and recognizing business model innovations within adjacent
industries and within emerging industries.
Operational excellence – the value discipline by which organizations provide
consumers with very reliable products and/or services at very competitive prices delivered with minimum difficulty or inconvenience for consumers.
Product leadership – a value discipline by which organizations produce a
continuous stream of new, innovative and stylish products/services.
Profit model – an element of a business model that defines how an organization
expects to be profitable; consists of revenue models and cost models.
Reinvention at the root – directing managerial attention and resources toward understanding and recognizing the necessity to cannibalize existing core capabilities
and dynamic capabilities by investing significantly in digitization and digitalization capabilities.
Revenue model – an element of a profit model that describes where, when and how sustainable revenue streams will materialize when executing a business model.
Stability – the ability of a firm to withstand disruptions by maintaining operational
reliability and efficiency.
Strategic experiment – a small-scale, tightly-contained competitive move taken to
learn about a potential digital innovation or potential digital disruption.
Strategic intent – a statement of competitive direction and purpose that directs
digital strategists’ thought processes.
Value disciplines – three sets of activities that are crucial in differentiating an organization from its competitors; an organization’s dominant value discipline
strongly influences its executing business models.
Value proposition – an element of a business model that defines how an
organization will distinguish itself within the market(s) that it has chosen to participate. Pipeline organizations distinguish themselves by creating value for consumers. Network organizations distinguish themselves by creating value for
participating communities.
CHAPTER 3: Digitalized Business Models for Pipeline Ecosystems
Big Data – high-volume streams of digitized data that are captured and organized
for use.
542
Big Data analytics – applying statistical and mathematical models to organized collections of Big Data.
Data/document standards – policies and rules that allow data and documents to be accessed and used by value stream participants.
Disintermediation – an intermediary is bypassed, thus shortening and narrowing a value stream.
Economies of scale – the advantages that arise with increased volume of output.
Economies of scope – the advantages that arise when a family of related goods are produced rather than a single good.
Electronic Data Interchange (EDI) – an Era 1 form of industry-based sets of data/document standards.
Intermediary – an organization whose capabilities are used to reach suppliers or
end consumers.
Intermediary transformation – an existing intermediary vertically integrates, thus
becoming a producer.
Intermediation – choosing to reach suppliers or end consumers through another organization.
Long-tail phenomenon – the ability of digital markets to offer a far broader variety of value-units than could be offered in comparable physical markets.
Make-versus-buy decision – a firm (or individual) decides between making an item or performing an activity itself (themselves) or having another firm (or individual)
make the item or perform the activity.
Pervasive connectivity – when smart devices across an ecosystem are interconnected, thus creating opportunities for anywhere, anytime interaction.
Platform – assemblage of digital technologies that hosts digital and digitally-enabled resources.
Primary processes – work activities directly involved in delivering value-units to customers.
Production costs – direct costs to produce an activity or perform an activity.
Reintermediation – a new intermediary is added to a value steam, thus lengthening and broadening the value stream.
Self-regulation – an organization captures data associated with critical market- related transactions, monitors this data for problems, reacts responsively and
543
responsibly if and when problems arise, and keeps regulators and value-stream participants aware of these activities.
Smart device – an assembled piece of digital technology containing the digital capability to sense, analyze and act on environmental signals.
Social media complements – the opportunities made available to value-unit consumers to engage with the value-unit’s producer and/or retailer and with other consumers via social media.
Stock holding – building up various kinds of inventories, thus providing buffers that soften the effects of poor demand forecasts.
Support processes – work activities that provide direction, resources and oversight for primary processes.
Transaction costs – additional costs involved (beyond production costs) when an
item or activity is acquired from someone else.
Value stream platform – a platform, hosting digitized data and documents as well
as digitalized managerial and operational processes, that can be accessed and used by a value stream’s participants.
Vertical integration – when a producer in a pipeline ecosystem performs many, if
not most, of the activities involved with upstream and downstream linear value stream processes.
World Wide Web (WWW) – an Era 2 one-to-many connectivity mechanism enabling organizations (and individuals) to access and use content stored across the
Internet.
CHAPTER 4. Digital Strategy Formulation for Pipeline Organizations
Barriers to competitive retaliation – tactics taken to prevent competitors from
eroding an organization’s gained competitive advantages.
Business model enhancement – incremental changes are made to one or more of the four elements of business models.
Business model innovation – radical changes are made to one or more of the four elements of business models or a novel configuration of these elements is fashioned.
Business model replication – a business model proven successful in one market is applied within an adjacent market.
Business platform – a platform hosting digitalized operational and managerial
processes.
544
Channel multiplicity – ensuring that a sufficient mix of interconnection channels are available to handle the data, messages and documents flowing to and from
individuals and digital solutions so that a preferred channel is available for use.
Complementary resources barrier – based on requirements for unique or rare
non-digital resources in establishing a digitalized competitive advantage.
Customer switching costs – the costs borne by a consumer choosing to move to a competing product/service.
Data mart – an archive of organized data focused on a specific sphere of work.
Data warehouse – a single, comprehensive archive of organized data.
Digital platform – a platform hosting technology services.
Digital resources barrier – based on an organization’s investment in unique or rare digital/digitalized assets and capabilities.
Event visibility - making key events (as well as key non-events) known to the individuals and the digital solutions taking action so that actions can be taken.
Global – a digital solution designed and built to be used by most of an organization’s work units.
Local – a digital solution designed and built to be used by one or only a few of an
organization’s work units.
Loose-coupling – neither of the interconnected platforms needs to be modified in
order that the data, messages and/or documents being exchanged are consistently interpreted across both platforms.
Mission statement – answers the question: “What must we do to achieve our strategic vision?”.
Modularity – each of a platform’s major functionalities, or modules, operates
independent of other functionalities and obtains needed information or resources from a common coordinating module.
Preemption barrier – based on an organization’s investments that limit competitors’ opportunities and incentives to undertake retaliatory action.
Pricing mechanism – the means by which a value-stream participant captures its
share of the value being created by the value stream.
Project management capabilities barrier – based on an organization’s
investment in needed project management capabilities.
545
Strategic vision – answers the question: “What kind of organization do we wish to become?”.
Tight-coupling – one or both of the interconnected platforms need to be modified so that the data, messages and/or documents being exchanged are consistently
interpreted across both platforms.
Well-architected platform – exhibits an appropriate balance in (1) the stability and agility of the hosted functionality, and (2) the costs of building, enhancing and
extending platforms across functional, unit and organization boundaries.
CHAPTER 5. Digital Strategy and the External Sourcing of Capabilities
Cloud computing – provisioning a pool of digital assets and digitally-enabled
services such that these services can, on demand, be accessed and applied by clients via the Internet.
Collaboration-based crowdsourcing – the crowdsourcing community collectively generates ideas, selects the most promising of these ideas, and refines these selected ideas into the single task outcome.
Commodity capabilities – the capabilities that are required or are otherwise beneficial for an organization to operate, that do not contribute to competitive
positions (aside from their absence), and that are readily available from external sources.
Crowdsourcing – externalizing a capability to a community of individual agents.
Externalization of a capability – transferring ownership and decision rights regarding a capability, the assets used in executing the capability, and/or the
management of the capability from inside an organization’s boundary to outside this boundary.
Loose-governance – increased discretion is given to the provider with the increased risk exposure managed through the client-provider relationship and by regularly assessing whether or not an engagement continues to prove beneficial for both the
client and the provider.
Multisourcing – contracting with multiple providers rather than a single provider.
Offshore – the external provider of a capability is located in a different country than is the client.
Onshore – the external provider of a capability is located in the same country as is
the client.
546
Outsourcing a capability – transferring ownership and decision rights regarding a capability, the assets used in executing the capability, and/or the management of the
capability from inside an organization’s boundary to outside this boundary.
Peripheral core capabilities – the capabilities that are necessary for an
organization to gain and maintain its competitive positions, but that are not a source of competitive advantage.
Prediction market – targets broad, diverse communities to predict events or
outcomes.
Social information – information formed through exposure to the contributions of
other community members and these members’ expressed confidence in their contributions.
Strategic core capabilities – capabilities that lie at the heart of an organization’s
competitive advantage.
Tight-governance – characterized by a constant, detailed and deep visibility into
how a work activity is being carried out and the extent to which a comprehensive set of negotiated obligations is being met.
Tournament-based crowdsourcing – the crowdsourcing community (working
individually or in teams) submits finalized, independent task solutions; the crowdsourcer/client then selects one of these contributed solutions, or perhaps a few
solutions, in exchange for financial or non-financial compensation.
CHAPTER 6. Digitalized Business Models for Network Ecosystems
Blended organization – an organization that operates, to varying extents, as both
a pipeline organization and a network organization.
Complement – an entity that increases the perceived worth of a value-unit.
Core transaction – the primary market exchange activity driving both producers and consumers to an ecosystem’s market platform.
Critical mass – the point at which the number of product/service-adopters results
in the product/service becoming dominant within its market space.
Cross-side effect – existence of positive (or negative) effects felt by a community
associated with a network ecosystem as the number of members increases with another of the ecosystem’s communities.
Crowd-based capitalism – a two-sided market that brings together two crowds, or
communities, of individuals: one community possessing an under-used asset or skill
547
(the value-unit) and the other possessing a short-term need for such an asset or skill.
Market platform – the organized collection of digital and business platforms that hosts the content and functionalities that establish, operate and govern the
ecosystem’s market.
Money-side – a revenue-generating community associated with a network ecosystem.
Multi-sided market – a network ecosystem with more than two actively participating communities.
Network effects – where the worth of or demand for a value-unit grows as an exponential function of the number of current consumers of a value-unit and/or the number of complements available to these consumers.
Network externality – where the worth of or demand for a value-unit grows as an exponential function of the number of current consumers of a value-unit and/or the
number of complements available to these consumers.
Same-side effect – existence of positive (or negative) effects within a community associated with a network ecosystem.
Subsidy-side – an incentivized community associated with a network ecosystem.
The sharing economy – an economy driven by crowd-based capitalism.
Two-sided market – a network ecosystem in which a producer community and a consumer community are brought together to engage in value-unit exchanges.
Winner-take-all-market – a market where the potential exists that a critical mass of consumers will adopt one producer’s products/services.
CHAPTER 7. Digital Strategy Formulation for Network Organizations
Ancillary transactions – transactions associated with a network organization’s value propositions that bring communities other than producers and consumers to the platform.
Market congestion – ensuring the ease by which producers and consumers are able to consider a sufficient number of alternatives in arriving at a satisfactory match.
Market design – a network organization’s competitive moves aimed at enhancing the efficiency of its constituted market.
548
Market platform design – a network organization’s competitive moves aimed at building market platform content/functionality in order to enhance community
participants’ satisfaction with offered value propositions.
Market safety – ensuring that market transactions are sufficiently safe such that
producers and consumers are willing to reveal or act on confidential information and are willing to keep the transactions inside the market.
Market thickness – ensuring sufficiently large numbers of producers and consumers
such that a strong likelihood exists that satisfactory producer-consumer matching will occur.
Side-switching – existing producers become consumers and/or existing consumers become producers.
Spillover – when a taken action targeted at one purpose affects other purposes.
CHAPTER 8. Grappling with the Risks of Digitalization
Authentication – techniques aimed at proving a person’s or a digital entity’s identity.
Business platform operations – the execution of an organization’s digitalized operational and managerial processes that are hosted on business platforms (and on
market platforms).
Cybercriminal – uses hacking techniques and tools in order to take illegal actions
for financial gain or to take over digital assets in order to launch a series of illegal actions.
Data privacy – concerns that arise wherever personally-identifiable or other
sensitive information is captured, collected, stored and used.
Detection – putting in place software and manual scanning processes that identify
problematic behaviors transpiring within digital platforms and business platforms.
Digital assets – digital technologies (hardware and software), digitized data, and digitization/digitalization capabilities applied in configuring digital platforms and
business platforms.
Digitalization risk – the likely occurrence of digitalization-related incidents that
have the potential to negatively impact an organization’s operational performance and/or competitive position.
Financial loss – theft; fraud; extortion; destruction of uninsured facilities,
equipment and materials; drops in stock valuations; regulatory fines; legal fees, court awards and out-of-court settlements; etc.
549
Graceful degradation – operations affected by a natural disaster do not immediately shut down, but instead gradually slow down, allowing time for affected
operations to be shifted to other physical locations prior to a complete shutdown.
Hactavist – uses hacking techniques and tools for the purpose of bringing attention
to a social or political issue.
Hardening a platform – installation of hardware, software and physical impediments that increase the effort required by a perpetrator such that all but the
most determined perpetrators either bypass the platform (moving on to easier targets) or are so hindered that they quickly give up.
Intellectual property loss – theft of digitized ideas, innovations and other forms of creative expression (e.g., trade secrets; blueprints; digitalized processes; proprietary digital content; the underpinnings of strategies and business models;
etc.).
Internal controls – the processing logic and rules embedded within digitalized
financial reporting systems to ensure the correct handling of financial transactions and the accuracy of produced financial reports.
Legal and regulatory requirements – digitalization-related statutory policies and
rules requiring protective actions, most often aimed at preventing harm to others.
Malicious intrusion – a perpetrator’s success in getting through an organization’s
security-related defenses.
Natural disaster – tornadoes, hurricanes, earthquakes, tsunamis, nuclear
emergencies, collapsed dams, broken gas or water pipes, etc.
Ongoing risk control – monitoring a risk area such that the incident occurrences are detected and resolved before excessive losses occur.
Reputation loss – depreciation of an organization’s image or of its brands that undermines the trust and goodwill held by participants in the various market-focused
ecosystems with which the organization participates.
Revenue loss – short-falls in revenue streams or lost revenue streams traced to operational disruptions, reputation loss, the inability to respond effectively to
competitors’ actions, etc.
Risk assessment – estimating the risk exposure associated with a risk area.
Risk assumption – accepting that losses are likely to arise if and when an incident occurs in a risk area, covering these losses through internal funds and third-party insurance.
Risk deterrence – taking action to reduce the likelihood that an incident will occur in a risk area.
550
Risk exposure – the probability of a risk occurring multiplied by the expected loss to be borne if the risk occurs.
Risk management – creating awareness and a common understanding across an organization’s members about the existence and nature of a risk domain; and, putting
in place risk management policies, procedures and programs to ensure that critical risks in the domain are appropriately addressed by the appropriate individuals.
Risk mitigation – tempering (as much as possible) the consequences of a risk
incident by taking corrective actions.
Risk planning – establishes the contexts within which risk management activities
are carried out.
Terrorist – uses hacking techniques and tools for the purpose of causing harm and havoc within an established geo-political order.
CHAPTER 9. Executive Mandates: Digital Strategy
Chief digital officer (CDO) – senior executive/manager having approval authority for digitalization-related investments.
Data monetization – bundling together well-defined sets of data and analytic models such that the intangible value of data is transformed into something of
tangible value.
Digitalization culture – an organization culture where competitive success largely
relies on the capabilities and judgements of employees – working alone and in small groups – holding local knowledge and unencumbered by bureaucratic or overly- burdensome hierarchical constraints.
Digitalized ecosystem mindset – a view of competitive spaces as markets characterized by high rates of business model evolution/innovation, high levels of
information sharing and value co-creation by market participants, and high rates of participant entry/exit.
Intangible digital assets – market, product, services and platform designs that
attract, engage and retain large numbers of ecosystem participants; operational and analytical processes that capture, organize and exploit data regarding market events,
about operational and managerial activities, and about participant beliefs, expectations, behaviors and perspectives; knowledge and skills held by an organization’s employees as well as its partners’ employees; digitalization reputation
acquired by an organization; etc.
Organization culture – the assumptions, values and norms of behavior collectively
held by an organization’s members.
551
Social proof – a social influence mechanism aimed at producing coordinated behavior among individuals.
Tangible digital assets – the commodity technologies (e.g., servers, routers, messaging services, Internet standards and software, etc.) that serve as the building
blocks of digital platforms and of business platforms.
CHAPTER 10. The Digital Investment Enigma
None.
CHAPTER 11. Strategic Focus
Business model – a simplified and aggregated conceptualization of the value- creating, profitability-sustaining activities of an organization.
Business platform effectiveness – improving the quality of the platform or the quality of one or more of the business processes being hosted on the platform.
Business platform efficiency – improving the cycle times and costs associated with
one or more of the business processes being hosted on a business platform.
Business process – a sequence of work tasks that converts inputs into outputs, and
these work-task sequences can involve operational activities, managerial activities, or both.
Business rules - the conditions that must be met when taking actions or making decisions.
Capability – the ability to achieve a desired outcome by bringing together and
applying a particular set of resources.
Consumer welfare – the benefits received from consumers (rather than producers)
from productivity increases in an economy.
Core capabilities – an element of a business model that describes the tangible and intangible resources needed to successfully implement a business model’s value
proposition and profit model.
Digital platform operations – activities involved in planning, designing, running,
managing and evolving the technology services required to enable and support an organization’s business platforms.
Digitalization – applying digitization within organizations and within the social and
economic contexts within which organizations are embedded.
552
Digitalization capabilities – an organization’s readiness to attract, manage and retain individuals highly skilled in: identifying digitalization opportunities, building
and assessing business cases for digitalization investments, implementing funded digitalization investments, managing business platforms, and achieving the strategic
aims sought through digitization.
Digitization – the purely technical processes associated with converting sensed and captured data into binary form, storing and transmitting these binary data,
manipulating these data, and storing/transmitting the outcomes of these data manipulations.
Digitization capabilities – an organization’s readiness to: apply digital technologies, digitized content and technology services; manage digital platforms; and, attract, manage and retain highly-skilled technology professionals.
Dynamic capabilities – an element of a business model that describes the intangible resources needed to (1) sense and assess opportunities for business model
enhancement, replication and innovation, and (2) successfully implement these enhancements, replications and innovations.
First-order learning - engages participants in refining their understandings of a
business process, but does not substantially change the assumptions and foundational reasoning on which these understandings are based.
IT productivity paradox – the recognition (prior to the mid-1990s) that the ever- increasing investments in digital technologies produced mixed evidence regarding
productivity improvement across the US economy.
Network ecosystem – a market-focused ecosystem in which a network of value- unit producers and a network of value-unit consumers are brought together by a
network orchestrator.
Operating procedures – the sequenced tasks that comprise a business process as
well as the relationships among these tasks.
Performance-price ratio – the capabilities of a digital technology relative to the technology’s cost.
Pipeline ecosystem – a market-focused ecosystem in which a producer organization targets a collection of value-units at one or more consumer segments
and fashions a linear value stream involving numerous upstream, midstream and downstream organizations to deliver the value-units to consumers.
Profit model – an element of a business model that defines how an organization
expects to be profitable; consists of revenue models and cost models.
Risk – the likelihood that an anticipated financial gain will be realized.
553
Second-order learning – pre-existing ideas and assumptions are up-ended and looked at with a fresh and open mind.
Strategic focus – a conceptualization and articulation of a digitization/digitalization intention and the target(s) of this intention.
Technical services – the digitized functionalities and technical support provided to an organization’s employees and, increasingly, to its customers and suppliers.
Value – the size of an anticipated financial performance gain.
Value driver – a core factor underlying performance gains.
Value proposition – an element of a business model that defines how an
organization will distinguish itself within the market(s) that it has chosen to participate. Pipeline organizations distinguish themselves by creating value for consumers. Network organizations distinguish themselves by creating value for
participating communities.
CHAPTER 12. Value Pathways
Business platform enhancement value pathway – digital investments are
directed toward making significant improvements to the operational and managerial processes being hosted on existing business platforms.
Competitive advantage value pathway – digital investments are directed toward creating business models aimed at dramatically differentiating themselves from
rivals.
Competitive necessity value pathway – digital investments are directed toward either enabling an organization to respond to a competitor’s actions or enabling an
organization to meet or exceed what are considered to be best practices within a market ecosystem in which the organization participates.
Digital platform renewal value pathway – digital investments are directed toward refreshing the hardware and software technologies that comprise a digital platform as a means of broadening and deepening an organization’s digitization and
digitalization capabilities.
Mandate value pathway – digital investments are directed toward reducing an
organization’s risk exposure associated with not complying with a statutory requirement.
Options generator value pathway – digital investments are directed toward
providing the means for obtaining future benefits (which may or may not be clearly envisioned at the time of the investment), recognizing the anticipated near-term
benefits will not cover investment costs.
554
Value pathway – a common way by which value is created through digitization and through digitalization.
CHAPTER 13. Building a Persuasive Business Case
Business case – the rationale for the value to be created if an innovative idea is funded and successfully implemented.
Champions – individuals highly skilled at influencing others to grasp an innovative idea’s worth.
Cost-avoiding benefit – planned but yet-to-be-experienced costs are avoided.
Cost-reducing benefit – existing cost structures are lowered.
Executive sponsors – an influential group of senior executives able to effectively
interact with their peers in arguing for and politically defending an innovative idea.
Financial business case – a narrative that examines a proposed investment from
a quantitative, benefits-costs perspective.
Global costs – costs attributed to platform functionalities applicable to all affected work units.
Innovation cycle – the flow of activities involved in transforming an innovative idea into a funded project.
Innovative idea – an idea that involves doing new things.
Intangible costs – costs that are difficult to monetize.
Local costs – costs attributed to platform functionalities applicable to just one, or a few, of the affected work units.
One-time costs – costs that are felt prior to the operation of a proposal’s installed
digital platforms and business platforms.
Recurring costs – cost that are borne repeatedly once a proposal’s installed digital
platforms and business platforms have begun to be used.
Strategic business case – a narrative that places a proposed investment within its competitive context in order to accentuate the investment’s strategic importance.
Tangible costs – costs that are easily monetized.
Value-enhancing benefit – revenues and/or margins are increased.
555
CHAPTER 14. Monetizing Benefits Flows
Analytical domain – one of the three domains of digitalization; organizational activities involved in improving understandings of what things should be done, what
things need to be done, what things can be done, how things are done, and how what has been done is assessed.
Automation – one of the four engines of digitalization; simplifying and digitizing
complex tasks and task-sequences, eliminating unneeded tasks and, as appropriate, performing tasks via digital solutions rather than via humans.
Collaborative domain – one of the three domains of digitalization; organizational activities involved in enabling digital technologies, humans and organizational entities to share data, information and/or knowledge in making decisions and in getting
things done.
Control – one of the four engines of digitalization; embedding rules within digital
solutions to identify out-of-control events/situations, such that out-of-control events/situations do not occur or, if they do occur, are quickly corrected.
Domains of digitalization – the three fundamental spheres of organization activity
within which digitalization occurs: operational, analytical and collaborative.
Empowerment – one of the four engines of digitalization; providing humans facing
decisions with timely, accurate and comprehensive information and with easy-to-use, relevant decision aids and business intelligence tools.
Engines of digitalization – the four fundamental mechanisms through which digital technologies effect changes within organizations and their broader social/economic contexts: automation, control, empowerment and interaction.
Impact path diagram – a visual portrayal of the beneficial effects of a proposed digital investment.
Interaction – one of the four engines of digitalization; enabling entities (human or digital) to engage in timely, meaningful dialogues with one another (overcoming barriers of space and time).
Internal rate of return (IRR) – calculates the discount rate at which the present value of expected cash inflows balances with the present value of expected cash
outflows.
Net present value (NPV) – calculates the expected monetary gain or loss from an investment by discounting benefits and costs flows, using a required rate of return.
Operational domain – one of the three domains of digitalization; organizational activities involved in getting things done.
556
Payback period – calculates the length of time for an investment’s benefits flows to balance out its costs flows.
Sensitivity analysis – the numbers inserted into a financial analysis are systematically varied so as to account for differing assumptions and varying
competitive conditions.
Touch point analysis – a technique for monetizing a digital investment proposal’s benefits flows by specifying where and how to-be-implemented capabilities impact
an organization’s financial performance by tracing through the manner by which organization and/or market ecosystem activities are being touched by digitization, by
digitalization or by both.
CHAPTER 15. Implementation Planning
Approval and funding stage – an implementation process stage that involves:
putting together the business case to gain funding approval for a proposed digital investment.
Configuration stage – an implementation process stage in which digital platforms
and business platforms are designed, acquired and/or built, assembled and tested; and, pre-installation change management activities are carried out.
Digitalized solutions – one of the five social organization design elements: digitally-enabled functionalities (hosted on digital platforms and business platforms)
that are directly applied toward achieving sought objectives or that otherwise support/enable the members of the social organization.
Implementation planning – identifying all the activities likely to be required in
successfully deploying a digital investment.
Implementation process – the activities required in moving an idea for a digital
investment forward, obtaining the necessary funding for the design and installation of digital and business platforms, and for taking steps to ensure that the investment’s promised benefits are attained.
Inertia stage – an implementation process stage (that often occurs after the installation and shakedown stage) where implementation-related momentum wanes
and may be lost altogether.
Installation and shakedown stage – the implementation process stage that involves: installing digital platforms and business platforms; and, providing platform
users, operators and managers the support needed in carrying out platform-related work activities.
Interdependence – when a social organization design element influences and is influenced by one or more of the other social organization design elements.
557
Low-hanging fruit – benefits that materialize without much effort being exerted.
Members’ competencies – one of the five social organization design elements:
capabilities required of the members of a social organization in achieving sought objectives.
Net benefits flow – a point-in-time difference between accumulated benefits and accumulated costs.
Onward and upward stage – an implementation stage (that may follow either the
installation and shakedown stage or the inertia stage) when implementation-related momentum is reenergized.
Organizational change – the requirement for affected individuals (employees, value-stream participants and/or market ecosystem participants) to learn about and adapt to new digital platforms, new business platforms, new behavioral contexts
and/or new behaviors.
Prescribed routines and practices – one of the five social organization design
elements: sequences of operational and managerial activities that are executed by the members of a social organization or by digitalized solutions.
Reciprocal interdependence – two social organization design elements that
influence one another.
Strategies – one of the five social organization design elements: the objectives
sought by the members of a social organization.
Structures – one of the five social organization design elements: the authority,
accountability, planning, control, coordination, incentive and relationship systems established to guide and direct the behaviors of the members of a social organization such that sought objectives are achieved.
CHAPTER 16. Project Management Planning
Post-project reviews – an assessment at a project’s completion of whether or not promised benefits were realized, whether these anticipated benefits were realistic
and what can be learned to produce more realistic benefits forecasts, and, overall, what went right and wrong with the project.
Project – a set of interrelated work activities that is undertaken to achieve a specific outcome and that terminates when this outcome is achieved.
Project budget success – whether project spending is below or above the project’s
agreed-on level of funding.
558
Project charter – a formal agreement between a project’s sponsors and the project manager that describes the objectives sought through a project, the project’s
deliverables, the timing of these deliverables, and significant project constraints.
Project control – providing visibility into subprojects and into the tasks that
comprise these subprojects.
Project deliverables – significant and perceptible project outputs that are fundamental to achieving agreed-on project objectives.
Project deliverables specifications – descriptions that accompany each of a project’s digitized/digitalized functions or components.
Project management planning – the activities involved in translating a funded digital investment implementation plan into a set of work activities that, when completed, will produce the investment’s anticipated benefits flows.
Project manager – an individual assigned the responsibility for implementing a funded digital investment.
Project organization – a project’s authority and accountability assignments.
Project outcome success – whether project objectives agreed on by project sponsors have been achieved.
Project planning – defining a project’s subprojects and the tasks to be accomplished within these subprojects, the relationships between subprojects and between tasks
within subprojects, and the resources and time required to accomplish these subprojects and tasks.
Project schedule success – whether project deliverables are completed before or after agreed-on delivery dates.
Project scoping – breaking large projects into sets of smaller, more-manageable
subprojects.
Project stage-gating – inserting decision points into a project where it makes sense
to assess what has been accomplished so far and to decide whether or not to proceed as scheduled.
Project steering committee – the group of executives/managers having project
oversight responsibility.
Stakeholders – individuals or entities either having significant influences on project
outcomes or likely to be significantly affected by project outcomes.
Taking options approach to project management – treating subprojects as not being set in stone but instead as involving constantly changing options as risk-
reducing information about the subprojects accumulates.
559
CHAPTER 17. Executive Mandates: Digital Investment
Facts – things that are verifiable.
Fact-based decision making – when decision makers base their arguments and
rationales on facts, thus introducing a sense of objectivity into decision processes.
Soft fact – not definitively verifiable, but rather supported through commentaries and data provided by sources familiar to and trusted by stakeholders.
CHAPTER 18. A Perpetual Balancing Act
Digital innovation - a new form of digitization, of digitalization, or of both.
Digitalization – applying digitization within organizations and within the social and economic contexts within which organizations are embedded.
Digitization – the purely technical processes associated with converting sensed and captured data into binary form, storing and transmitting these binary data, manipulating these data, and storing/transmitting the outcomes of these data
manipulations.
Global – a digital solution designed and built to be used by most of an organization’s
work units.
Global business platform – standardized configurations of digitized data and
digitalized business processes, both of which are enabled through global digital platforms.
Global digital platform – a collection of standardized technology services.
Local – a digital solution designed and built to be used by one or only a few of an organization’s work units.
Local business platform – customized configurations of digitized data and digitalized business processes unique to a specific work unit (or to a few, closely- aligned work units) and enabled though technology services executed from both
global and local digital platforms.
Local digital platform – a collection of customized technology services.
560
CHAPTER 19. Business Processes
Automation – one of the four engines of digitalization; simplifying and digitizing complex tasks and task-sequences, eliminating unneeded tasks and, as appropriate,
performing tasks via digital technologies rather than via humans.
Business process – a sequence of work tasks that converts inputs into outputs, and these work-task sequences can involve operational activities, managerial activities,
or both.
Business process modeling – the work tasks and flows involved with a business
process are visually depicted, making it easier for the involved-individuals to understand and recognize ways to improve the business process.
Business process owner – an individual assigned responsibility for rationalizing a
business process.
Business rules – the conditions that must be met when taking actions or making
decisions.
Control – one of the four engines of digitalization; embedding rules within digital solutions to identify out-of-control events/situations, such that out-of-control
events/situations do not occur or, if they do occur, are quickly corrected.
Data – reflect attributes of the objects and events associated with a business process.
Data definition – specifying the name of a data element, the type of data (e.g., numeric, text, etc.), the range of viable data values, the meaning of the data, and
the location where the data is stored (prior to and after processing).
Data integrity – the accuracy, correctness, timeliness, security, etc., of data.
Data owner – an individual assigned responsibility for defining a set of data and for
ensuring the integrity of these data.
Dashboard – visual means for presenting process metrics in an easy-to-understand
manner.
Effective – doing the right thing.
Efficient – doing the thing right.
Empowerment – one of the four engines of digitalization; providing humans facing decisions with timely, accurate and comprehensive information and with easy-to-use,
relevant decision aids and business intelligence tools.
End-to-end business process approach for organizing work – all the work activities associated with accomplishing a critical work outcome are designed as a
561
seamlessly-connected work flow, regardless of the physical location of where specific work tasks are performed.
Engines of digitalization – the four fundamental mechanisms through which digital technologies effect changes within organizations and their broader social/economic
contexts: automation, control, empowerment and interaction.
Functional approach for organizing work – each of an organization’s functional work units is assigned the responsibility for performing a set of business processes.
Interaction – one of the four engines of digitalization; enabling entities (human or digital) to engage in timely, meaningful dialogues with one another (overcoming
barriers of space and time).
Primary processes – work activities directly involved in delivering value-units to customers.
Process improvement – ensuring that a business process is executed as specified, that process performance goals are achieved, and that these performance goals
increase over time.
Process measurement – defining performance goals and performance metrics for a business process, computing these metrics, and comparing these metrics against
performance goals.
Process specification – defines the purposes of the work tasks comprising a
business process, describes what is involved in executing each work task, and indicates the existence and natures of relationships amongst the work tasks.
Operating procedures – the sequenced tasks that comprise a business process as well as the relationships among these tasks.
Rationalize a business process – engage in an iterative cycle of process
specification, process measurement and process improvement.
Seamless – when data/information flows instantly from a sending work activity to a
receiving work activity, and this data/information is perfectly understood by the receiving work activity.
Support processes – work activities that provide direction, resources and oversight
for primary processes.
Swim lane diagram – a means of depicting the roles served and the work activities
carried out by each actor involved with a business process.
Value chain – the totality of an organization’s business processes; these processes, directly and indirectly, create ecosystem value by transforming inputs into outputs.
562
CHAPTER 20. Business Platforms
Business platform – configurations of digitized data and digitalized business processes, enabled through digital platforms.
Business platform/process instance – two or more work-unit installations of a business platform/process that are configured exactly the same.
Business process integration – when configured interconnections exist that allow
digitized data to flow seamlessly across executing business processes hosted on the same business platform or on different business platforms.
Business process standardization – when a single version of a business process is executed across multiple work units.
Cleaning data – identifying and correcting data errors.
Database – a common collection of shared, digitized data.
Database design – defining the data elements to be stored, and organizing these
data such that the data elements can be easily and quickly accessed.
Data mart – an archive of organized data focused on a specific sphere of work.
Data warehouse – a single, comprehensive archive of organized data.
Globally-integrated, globally-standardized business platform – while an organization’s work units may each carry out some distinct work activities, all of the
work units involved with the same work activities would benefit from carrying out these work activities similarly (advancing standardization); and, given the
dependence of most work activities on other work activities, work unit coordination and collaboration would benefit from sharing data and documents (advancing integration).
Globally-integrated, locally-unique business platform – an organization’s work units engage in different work activities (forestalling standardization), but would
benefit from certain of the hosted business processes being able to share data and documents (advancing integration).
Locally-isolated, globally standardized business platform – while an
organization’s work units may carry out some unique work activities, all of the work units involved with the same work activity would benefit from carrying out these work
activities similarly (advancing standardization); but, as little coordination or collaboration is required across work units, little need exists for these work units to share data or documents (forestalling integration).
Locally-isolated, locally-unique business platform – an organization’s work units engage in very different work activities (forestalling standardization) and stand
to benefit little from sharing data and documents (forestalling integration).
563
Operational database – an archive of the digitized data used in carrying out an organization’s day-to-day work activities.
CHAPTER 21. Enterprise Resource Planning Systems
Best-of-breed ERP system alternative – acquire business platforms (e.g., manufacturing, order processing and fulfillment, supply chain management, energy
accounting, human resources, etc.) whose advanced or specialized functionality is crucial to an organizations’ competitive strategies, and then use middleware to
interconnect the acquired platforms to one another and to an organizations’ other digital solutions.
Bolt-on – a tailored (built using tools provided as part of the ERP system) extension
to an ERP system’s functional module in order to better align the module to unique aspects of a work unit’s business practices.
Build-your-own ERP system alternative – global business platforms are fashioned by devising never-before-implemented digitalized business processes and then interconnecting these business processes to one another and to a global
database through middleware solutions.
Enterprise resource planning (ERP) system – a pre-defined global business
platform (a global database along with a set of standardized, integrated digitalized business processes).
ERP system extensibility – needed business process functionality not designed into an ERP system can be connected to the ERP system through system interfaces and bolt-ons.
ERP system instance – a single ERP system configuration.
ERP system integration – data captured by one functional module is stored in the
global database, where these data are immediately available for use by other functional modules, by bolt-ons and by connected (via a system interface) digitalized business processes.
ERP system interface – interconnects an ERP system to digitalized business processes not handled through the ERP system and to bolt-ons.
ERP system modularity – an organization installing an ERP system has considerable leeway in selecting which modules to install, deciding when a selected module will be installed (i.e., a limited set of modules can be initially installed, with
other modules being installed later), and in configuring the modules being installed.
ERP system multi-functionality – an organization installing all of an ERP system’s
functional modules can have most of its business processes handled through the ERP system.
564
Global database integration tactic – each pair of digitalized business processes to be integrated are connected to a global database interface.
Industry vertical – a version of a vendor’s ERP system that reflects the distinctive natures of the business processes used within a specific industry.
Middleware – makes the data or programming logic contained in one digital solution (e.g., a digitalized business process, a database, etc.) transparent to other digital solutions.
Middleware integration tactic – each pair of digitalized business processes to be integrated are connected to a middleware interface.
System-to-system interface tactic – each pair of digitalized business processes to be integrated are modified so that each business process can accept, interpret and work with data coming from the other business process.
Year 2000 (Y2K) problem – the necessity for an organization, prior to the year 2000, to overhaul its digitalized business processes in order to correct how dates
were handled in the software enabling these business processes.
CHAPTER 22. Digital Platforms
Cloud-based services – proprietary services delivered to consumers either via the
Internet or via Internet-like technologies.
Community cloud – cloud-based services managed and accessed by a consortium
of organizations.
Digital platform – a configuration of digital assets that delivers technology services.
Data digital assets – attributes of objects and events.
Design digital assets – software, architectures, policies, standards, procedures, etc.
Hardware digital assets – electronic and electro-mechanical devices and associated equipment.
Human digital assets – managerial, staff and operational employees (skills,
knowledge and experience).
Private cloud – cloud-based services designed, developed and operated by an
organization, with access to the cloud-based services confined to authenticated members of the organization and authenticated members of select-other organizations.
565
Public cloud – cloud-based services made available to anyone.
Social digital assets – relationships (familiarity, interactions, trust, shared
understanding, etc.) between humans.
Total cost of ownership – the totality of a digital asset’s costs, including the costs
of acquiring, installing, maintaining and supporting the asset.
CHAPTER 23. Platform Management Challenges
Digitalization governance design tactic – establishing managerial
accountabilities for platform-related decisions.
Digitalization organization design tactic – positioning the work units most influential in formulating digital strategies and in provisioning digitalization
capabilities.
Platform design tactic – implementing modular enterprise architectures.
CHAPTER 24. Enterprise Architecture Design
Business process optimization – global business platforms are identified, negotiated, rationalized and implemented.
Enterprise architecture – the organizing logic for core business processes (those provisioned through global business platforms), core business data (that provisioned
through global databases), and core digital technologies and technology services (those provisioned through global digital platforms).
Event-based architecture – utilizes the attributes of service-oriented architectures
and self-learning architectures to automatically detect and react to specified events.
Operating model – a specification of the business processes and business data that
should be provisioned through global business platforms in order to effectively and efficiently implement formulated digital strategies.
Self-contained module – a module that fully performs by itself a well-defined task
or service.
Self-learning architecture – contains (either within a global information repository
or within the individual services) all the information that is needed for services to locate, connect with and execute other services; each service possesses the functionality needed to interpret and apply this information; and, each service
possesses the functionality to learn (from provided information and from repetitive interaction episodes) how to best interact with other services.
566
Service-oriented architecture – processing logic and data are implemented as self-contained services, with only a service’s input and output data exposed to other
services.
Services architectural standards – rules that define how modularized services are
to be designed and that direct how modularized components operate and interconnect.
Services modularization – business services and their enabling technology services
are designed and built from modularized components.
Technology strategy – a mapping of how an organization’s investments in
technology services are expected to evolve over time.
Virtualization – the real-time commitment of specific technology assets in executing services depends on the point-in-time demands on these assets.
CHAPTER 25. Digitalization Governance Design
Architectural alignment – assures that a project’s installed platforms conform, unless a formal exception is granted, to global architectural standards.
Centralized governance posture – a bias toward global objectives.
Chief digital officer (CDO) – senior executive/manager having approval authority
for digitalization-related investments.
Chief information officer (CIO) – senior executive historically holding overall
responsibility for an organization’s digitalization activities; today, CIOs often are given responsibility for an organization’s global and supply-side digitalization decisions.
Decentralized governance posture – a bias toward local objectives.
Deliverables alignment – assures that a project stays on track to deliver sought
digitalization capabilities and sought technology capabilities.
Demand-side digitalization decisions – stimulating, prioritizing and constraining work unit digitalization requirements.
Digitalization governance systems – decision structures and decision processes aimed at increasing the likelihood that the right people apply the right criteria at the
right time in making digitalization decisions.
Divisional information officer (DIO) – senior executive/manager often assigned responsibility for a work unit’s local demand-side and local supply-side digitalization
decisions.
567
Federal governance posture – accommodates both global and local objectives.
Global digitalization decisions – positioning, directing and overseeing global
digital strategies and policies.
Governance managerial roles – managerial positions/assignments characterized
by specific zones of authority and accountability for digitalization-related decisions.
Governance mechanisms – managerial roles, governance structures and governance processes that create arenas within which decisions are negotiated and
taken by participants.
Governance processes – move participants through a sequence of tasks to ensure
that pertinent policies, guidelines and rules are followed and that pertinent objectives, constraints and criteria are considered.
Governance structures – convene participants to interact in addressing
circumscribed sets of digitization-related decisions, often applying prescribed governance processes.
Governance posture – an intentional bias toward global or local objectives.
Objectives alignment – assures that a project stays on track to achieve sought global objectives and sought local objectives.
Project popups – unanticipated problems or stakeholder demands that arise as a project unfolds.
Supply-side digitalization decisions – delivering, operating and maintaining digitalized business processes and platforms; and, designing, delivering, operating,
maintaining and evolving digital platforms.
CHAPTER 26. Digitalization Organization Design
Account managers – the corporate technology group’s primary line of contact with
the work units; account managers have solid-line reporting relationships up to the CIO and dotted-line reporting relationships with the heads of the business work units for which they coordinate digitization-related activities.
Digitalization organization design – specifies where digital strategies are formulated, where digital capabilities are located, where digitalization-related work
activities are performed, and whom has authority over these activities.
Formal influences – follow from superiors’ explication of the policies, goals, priorities, plans, procedures, rules, guidelines, etc., to be followed as employees carry
out work assignments.
568
Global digital platform model – an effort is made to exploit technology standardization wherever possible and appropriate, while recognizing that most work
units vary considerably regarding their digitalization needs (and, hence, stand to benefit from local business platforms).
Global support platform model – an effort is made to exploit technology standardization and business process optimization for support business processes, while recognizing that work units vary considerably regarding the natures of their
primary business processes.
Informal influences – follow from the personal relationships employees build with
co-workers.
Interaction network – a web of interpersonal relationships within which individuals exchange facts, information, knowledge, experiences, perspectives and beliefs.
Local primary platform model – an effort is made to exploit technology standardization to as great an extent as is possible and to exploit business process
optimization for support business processes, while recognizing that most work units vary considerably regarding their primary business processes.
Partner model – local digital strategies emphasized; most digitization capabilities
are housed in work units and most digitization activities are carried out in work units.
Platform model – global digital strategies emphasized; most digitization capabilities
are housed in the corporate technology group and most digitization activities are carried out in the corporate technology group.
Platform managers – responsible for designing, implementing, operating and evolving global platforms; platform managers have upward, solid-line reporting relationships to the CIO.
Sourcing networks – involve the individuals and groups charged with shaping and directing the supply-side digitalization decision domain.
Strategic experiment – a small-scale, tightly-contained competitive move taken to learn about a potential digital innovation or potential digital disruption.
Technology management council – a digitalization governance structure aimed at
ensuring that global and local digitalization leadership teams’ objectives, investments and activities complement one another.
Value discovery networks – involve the individuals and groups charged with shaping and directing the demand-side digitalization decision domain.
Visioning networks – involve the individuals and groups charged with shaping and
directing the global digitalization decision domain.
569
CHAPTER 27. Executive Mandates: Platform Management
Market-focused innovation – directly targets competitive spaces characterized by significant revenue growth and/or by high-profitability market-niche potentials and
for which the organization holds proprietary access to requisite digital assets, digital capabilities and/or configuration processes.
Participant interlock – having the same individual serve as a participant within two
or more associated decision-taking groups.
Temporal interlock – having one or more individuals mindful of a group’s history
included as group participants.
Topical interlock – having individuals mindful of the deliberations of tightly-related groups included as group participants.
Technology-focused innovation – indirectly targets competitive spaces by delivering proprietarily-held technology capabilities promising magnitude increases
in technology efficiency/effectiveness and high potentials of being competitively applied.
APPENDIX: Basic Concepts
Ad hoc decision situation – a decision situation that has not previously arisen or for which generally accepted ways of dealing with the situation are lacking.
Applications software – executes digitalized business processes that enable and support the accomplishment of sought objectives.
Automated decision system – a basic type of information system that makes use
of business rules embedded within computer software such that when specific conditions are detected (from analyzing captured and stored data), specific actions
and decisions are taken without human intervention.
Business process – a sequence of work tasks that converts inputs into outputs, and these work-task sequences can involve operational activities, managerial activities,
or both.
Business rules – the conditions that must be met when taking actions or making
decisions.
Computer hardware – electronic and electro-mechanical devices providing data processing capabilities, communication capabilities, data capture capabilities, data
display capabilities and data storage capabilities.
Computer software – manipulates and transmits data and/or directs the
functioning of computer hardware.
570
Data – attributes of objects and events.
Decision support system – a basic type of information system that provides
managers, staff professionals and executives with the capability to address ad hoc decision situations; decision makers can vary the data being analyzed as well as the
criteria, conditions or objectives associated with a decision process.
Digital technologies – the technologies (involving hardware, software and, most often, sophisticated combinations of hardware and software) involved in specifying,
capturing, processing, storing and transmitting data.
Exception report – a pre-specified report created by an information reporting
system that is generated only when an exceptional condition (defined through an embedded business rule) is detected.
Information – sets of data that are interpreted for a specific purpose by a person
facing a specific decision situation
Information reporting system – a basic type of information system that generates
pre-specified reports that support the work activities of managers responsible for an organization’s operational, tactical and strategic activities; makes use of the databases populated by transaction processing systems, often supplemented by data
obtained from external sources (e.g., marketing research companies) or produced by staff specialists (e.g., a data set describing the physical assets owned by the firm).
Information system – a computer-based system designed to accomplish a set of sought objectives.
Knowledge – the current state of understanding that exists about some work- related activity (e.g., selecting a substitute product for an out-of-stock product, resolving a recurring problem with a manufacturing process, deciding on an optimal
amount to spend on advertising for a certain class of products, etc.).
Knowledge management system – a digitized knowledge archive that
accumulates, archives and distributes knowledge.
Messaging and collaboration system – a basic type of information system that is used by pairs or groups of individuals to provide directions, raise and answer
questions, and resolve the problems that regularly arise as employees deal with suppliers, customers, unexpected events (e.g., a delayed delivery) and anything that
happens to fall through the cracks; examples include email, instant messaging, collaboration tools, etc.
People – an organization’s employees, employees of other organizations (suppliers,
vendors, partners, etc.), and the consumers of an organization’s products and services.
Shared understanding – knowledge that exists in a consistent fashion across a group of people.
571
Sought objectives – the purpose, or purposes, to be accomplished through an information system.
Systems software – operates computer systems and coordinates across interacting computer systems.
Transaction processing system – a basic type of information system that captures data regarding important objects and events, stores these data, and uses these data in the execution of business processes and in the production of messages and
business documents.
- PART 1. DIGITAL STRATEGY
- Chapter 1. Digital Innovation and Disruption
- The Evolving Nature of Markets and Firms
- Three Eras of Digital Disruption
- Revisiting Fortune’s Most Admired Companies
- The Evolving Landscapes of Industries
- A Recap and Look Ahead
- Chapter 2. Digital Strategy Fundamentals
- The Goal of Digital Strategy: Agility
- The Grammar of Digital Strategy: Business Models
- General Electric (GE): Operational Excellence in Action
- Kraft Foods: Customer Intimacy in Action
- Apple: Product Leadership in Action
- Final Thoughts about Business Models
- The Logic of Digital Strategy: Competitive Moves
- Experimentation at the Edge
- Collision at the Core
- Reinvention at the Root
- The Logic of Digital Strategy Formulation and Evolution
- A Recap and Look Ahead
- Chapter 3. Digitalized Business Models for Pipeline Ecosystems
- Why Pipeline Ecosystems Exist
- Economies of Scale and Scope
- Transaction Costs
- Intermediation
- Digitalizing Pipeline Ecosystems
- Era 1
- Era 2
- Purely-Digital Value-Units
- Platforms
- Omni-Channel Promotion, Ordering and Delivery
- Payment and Trust Systems
- Era 3
- The Promise of Car Data
- Disintermediation, Reintermediation and Intermediary Transformation
- A Recap and Look Ahead
- Chapter 4. Digital Strategy Formulation for Pipeline Organizations
- Digitalization and the Value Disciplines
- Platform Design
- Modularity
- Tight-Coupling and Loose-Coupling
- Global and Local
- Platforms: Best Practices
- Platforms and the Domains of Digitalization
- The Operational Domain
- The Analytical Domain
- The Collaborative Domain
- Digital Strategy Formulation
- Strategic Intent
- Business Model Enhancement, Replication and Innovation
- Digital Strategy Formulation in Practice
- Finnair
- UPS-SCS
- Sustaining Competitive Positions
- A Recap and Look Ahead
- Chapter 5. Digital Strategy and the External Sourcing of Capabilities
- Externalizing Organizations’ Capabilities
- Tactics for Lessening Clients’ Dependence on Sourcing Providers
- Multisourcing
- Crowdsourcing
- Governing the External Sourcing of Capabilities
- External Sourcing and Digital Strategy Formulation
- Digital Strategy Formulation
- Business Model Adaptations
- Achieving External-Sourcing Agility at Commonwealth Bank of Australia
- A Recap and Look Ahead
- Chapter 6. Digitalized Business Models for Network Ecosystems
- Why Network Ecosystems Exist
- Network Effects
- Two-Sided Markets
- Multi-Sided Markets
- Winner-Take-All Markets
- Crowd-Based Capitalism
- Digitalizing Network Ecosystems
- Era 1
- Era 2
- Era 3
- Blended Organizations
- A Recap and Look Ahead
- Chapter 7. Digital Strategy Formulation for Network Organizations
- Business Models for Network Organizations
- Strategic Intent for Network Organizations
- Market Design and Market Platform Design
- Market Design
- Market Platform Design: Digitalizing the Operational Domain
- Market Platform Design: Digitalizing the Analytical Domain
- Market Platform Design: Digitalizing the Collaborative Domain
- Digital Strategy Formulation
- How Fast Should each Community Grow?
- What Pricing Mechanisms Should Be Applied to each Community?
- Should a New Feature Be Added?
- Should Transactions and Participant Behaviors Be Regulated?
- How Many Communities Should Connect to the Market Platform?
- Evolving Network Organizations’ Business Models
- Sustaining a Network Organization’s Competitive Position
- A Recap and Look Ahead
- Chapter 8. Grappling with the Risks of Digitalization
- Nature of Digitalization Risks
- Malicious Intrusions
- Natural Disasters
- Legal and Regulatory Requirements
- New Digital Technologies
- Actions of Competitors
- External Sourcing
- Inability to Respond
- Risk Management: A General Overview
- Risk Planning
- Risk Assessment
- Ongoing Risk Control
- An Exercise in Digitalization Risk Assessment
- Digitalization Risk Management Practices
- Securing Digital and Business Platforms Against Malicious Intrusions
- Intra-Organizational Information Sharing Regarding Malicious Intrusions
- Extra-Organizational Information Sharing about Malicious Intrusions
- The Board of Directors and Digitalization Risk Management
- Accounting for Digitalization Risks in Digital Strategy Formulation
- A Recap and Look Ahead
- Chapter 9. Executive Mandates: Digital Strategy
- Embrace a Digitalized Ecosystem Mindset
- Innovate and Iterate
- Invest in Data and Analytics
- Evolve Processes and Platforms at Multiple Speeds
- Track and Evaluate Intangible Digital Assets
- Cultivate a Digitalization Culture
- A Recap
- PART 2. DIGITAL INVESTMENT
- Chapter 10. The Digital Investment Enigma
- The Benefits Were Never There
- The Benefits Were Overstated
- Inadequate Efforts Were Taken to Attain the Benefits
- A Recap and Look Ahead
- Chapter 11. Strategic Focus
- The IT Productivity Paradox
- Strategic Focus
- Digital Platform Operations and Technology Services
- Business Platform Efficiency
- Business Platform Effectiveness
- Business Model Innovation
- Impacting Overall Financial Performance
- A Recap and Look Ahead
- Chapter 12. Value Pathways
- Mandate Value Pathway
- Digital Platform Renewal Value Pathway
- Business Platform Enhancement Value Pathway
- Competitive Necessity Value Pathway
- Competitive Advantage Value Pathway
- Options Generator Value Pathway
- A Recap and Look Ahead
- Chapter 13. Building a Persuasive Business Case
- The Innovation Cycle
- Strategic Business Cases and Financial Business Cases
- Building Strategic Business Cases
- Building Financial Business Cases
- Costs Flows Associated with Digital Investment Proposals
- Benefits Flows Associated with Digital Investment Proposals
- Summary
- A Recap and Look Ahead
- Chapter 14. Monetizing Benefits Flows
- Touch Point Analysis
- Financial Analysis Techniques and Sensitivity Analysis
- Monetization in Practice: Business Platform Renewal at BioGen
- Just How Persuasive is this Business Case?
- Monetization in Practice: Intel’s Value Dials Methodology
- A Recap and Look Ahead
- Chapter 15. Implementation Planning
- The Implementation Process
- Organizational Change
- Assessing the Extent of Organizational Change: The Wentworth Projects
- Change Management Principles and Tactics
- A Recap and Look Ahead
- Chapter 16. Project Management Planning
- The Nature of Projects
- Project Success and Failure
- The Nature of Digital Investment Projects
- Heightened Project Deliverables Specifications Uncertainty
- Depressed Benefit Flows
- Heightened Cost Flows
- Proven Project Management Practices
- Project Scoping
- Project Planning
- Project Organization
- Project Stage-Gating
- Project Control
- Post-Project Review
- Project Scoping with Coors’ Point-of-Sales (POS) Application Suite
- A Recap and Look Ahead
- Chapter 17. Executive Mandates: Digital Investment
- Accentuate Bottom-Line Impacts
- Argue Comprehensively, but Conservatively
- Pepper Arguments with Soft Facts
- Invest Early and Late
- Assign Accountability for Realizing Bottom-Line Impacts
- A Recap
- PART 3. PLATFORM MANAGEMENT
- Chapter 18. A Perpetual Balancing Act
- Navigating the Balancing Act
- Background
- The Increasing Difficulty of Maintaining an Appropriate Balance
- A Recap and Look Ahead
- Chapter 19. Business Processes
- Specifying End-to-End Business Processes
- Rationalizing End-to-End Business Processes
- Process Specification
- Process Measurement
- Process Improvement
- Business Process Modeling and Business Process Digitalization
- A Recap and Look Ahead
- Chapter 20. Business Platforms
- The Benefits of Hosting Business Processes on a Business Platform
- Benefits of Shared Databases
- Benefits from Standardized Business Processes
- Benefits of Business Process Integration
- Applying Standardized and Integrated Business Processes
- A Globally-Integrated, Locally-Unique Business Platform
- A Globally-Integrated, Globally-Standardized Business Platform
- A Locally-Isolated, Globally-Standardized Business Platform
- A Locally-Isolated, Locally-Unique Business Platform
- Business Process Standardization and Integration at Warby Parker
- Managing Global Business Platforms
- A Recap and Look Ahead
- Chapter 21. Enterprise Resource Planning Systems
- The Challenge of Implementing Global Business Platforms
- Challenge: Standardizing Global Business Processes
- Challenge: Integrating Global Business Processes
- The Arrival of Enterprise Resource Planning (ERP) Systems
- The Nature of ERP Systems
- Celanese’s OneSAP Project ,
- Alternatives to ERP Systems
- A Recap and Look Ahead
- Chapter 22. Digital Platforms
- The Nature of Digital Platforms
- The Benefits of Standardized Digital Platforms
- Standardizing the Desktop Environment at ABN Amro
- Cloud-Based Services
- A Recap and Look Ahead
- Chapter 23. Platform Management Challenges
- Platform Challenges at Charles Schwab Corporation
- Effective Platform Management
- A Recap and Look Ahead
- Chapter 24. Enterprise Architecture Design
- The Nature of Enterprise Architectures
- Globally-Integrated, Locally-Unique Enterprise Architectures
- Globally-Integrated, Globally-Standardized Enterprise Architectures
- Locally-Isolated, Globally-Standardized Enterprise Architectures
- Locally-Isolated, Locally-Unique Enterprise Architectures
- Enterprise Architecture: Levels of Analysis
- Enterprise Architecture Implementation
- Modular Services Architectures ,
- Delivery Corp’s Transition to a Modular Enterprise Architecture
- A Recap and Look Ahead
- Chapter 25. Digitalization Governance Design
- Three Domains of Digitalization Decisions
- Digitalization Governance System Objectives
- Digitalization Governance System Postures
- Digitalization Governance System Mechanisms
- Project-Level Digitalization Governance
- Information Governance at Intel
- A Recap and Look Ahead
- Chapter 26. Digitalization Organization Design
- Three Key Interaction Networks
- Prototypical Digitalization Organization Designs
- Partner Model
- Platform Model
- Variations on the Partner and Platform Models
- Energizing Digital Innovation at the YCH Group
- A Recap and Look Ahead
- Chapter 27. Executive Mandates: Platform Management
- Combat Complacency
- Crystallize the Competitive Value of Global Platforms
- Expose Digital Innovation Sweet Spots
- Instill a Forward-Looking Bias into Platform Design
- Configure Systems of Participant Interlocks
- A Recap
- APPENDIX: Basic Concepts
- What is an Information System?
- Distinctions between Data, Information and Knowledge
- Basic Types of Information Systems
- Operational Processes
- Managerial Processes
- Data, Information and Knowledge Use within Information Systems
- Information Systems in Practice
- GLOSSARY
- CHAPTER 1: Digital Innovation and Disruption
- CHAPTER 2: Digital Strategy Fundamentals
- CHAPTER 3: Digitalized Business Models for Pipeline Ecosystems
- CHAPTER 4. Digital Strategy Formulation for Pipeline Organizations
- CHAPTER 5. Digital Strategy and the External Sourcing of Capabilities
- CHAPTER 6. Digitalized Business Models for Network Ecosystems
- CHAPTER 7. Digital Strategy Formulation for Network Organizations
- CHAPTER 8. Grappling with the Risks of Digitalization
- CHAPTER 9. Executive Mandates: Digital Strategy
- CHAPTER 10. The Digital Investment Enigma
- CHAPTER 11. Strategic Focus
- CHAPTER 12. Value Pathways
- CHAPTER 13. Building a Persuasive Business Case
- CHAPTER 14. Monetizing Benefits Flows
- CHAPTER 15. Implementation Planning
- CHAPTER 16. Project Management Planning
- CHAPTER 17. Executive Mandates: Digital Investment
- CHAPTER 18. A Perpetual Balancing Act
- CHAPTER 19. Business Processes
- CHAPTER 20. Business Platforms
- CHAPTER 21. Enterprise Resource Planning Systems
- CHAPTER 22. Digital Platforms
- CHAPTER 23. Platform Management Challenges
- CHAPTER 24. Enterprise Architecture Design
- CHAPTER 25. Digitalization Governance Design
- CHAPTER 26. Digitalization Organization Design
- CHAPTER 27. Executive Mandates: Platform Management
- APPENDIX: Basic Concepts
5
Coding Theory
Author: Kenneth H. Rosen, AT&T Laboratories.
Prerequisites: The prerequisites for this chapter are the basics of logic, set theory, number theory, matrices, and probability. See Sections 1.1, 2.1, 2.2, 3.4–3.7, and 6.1 of Discrete Mathematics and Its Applications.
Introduction The usual way to represent, manipulate, and transmit information is to use bit strings, that is, sequences of zeros and ones. It is extremely difficult, and often impossible, to prevent errors when data are stored, retrieved, operated on, or transmitted. Errors may occur from noisy communication channels, electrical interference, human error, or equipment error. Similarly, errors are introduced into data stored over a long period of time on magnetic tape as the tape deteriorates.
It is particularly important to ensure reliable transmission when large com- puter files are rapidly transmitted or when data are sent over long distances, such as data transmitted from space probes billions of miles away. Similarly, it is often important to recover data that have degraded while stored on a tape. To guarantee reliable transmission or to recover degraded data, techniques from coding theory are used. Messages, in the form of bit strings, are encoded by translating them into longer bit strings, called codewords. A set of codewords
73
74 Applications of Discrete Mathematics
is called a code. As we will see, we can detect errors when we use certain codes. That is, as long as not too many errors have been made, we can de- termine whether one or more errors have been introduced when a bit string was transmitted. Furthermore, when codes with more redundancy are used, we can correct errors. That is, as long as not too many errors were introduced in transmission, we can recover the codeword from the bit string received when this codeword was sent.
Coding theory, the study of codes, including error detecting and error correcting codes, has been studied extensively for the past forty years. It has become increasingly important with the development of new technologies for data communications and data storage. In this chapter we will study both error detecting and error correcting codes. We will introduce an important family of error correcting codes. To go beyond the coverage in this chapter and to learn about the latest applications of coding theory and the latest technical developments, the reader is referred to the references listed at the end of the chapter.
Error Detecting Codes A simple way to detect errors when a bit string is transmitted is to add a parity check bit at the end of the string. If the bit string contains an even number of 1s we put a 0 at the end of the string. If the bit string contains an odd number of 1s we put a 1 at the end of the string. In other words, we encode the message x1x2 . . . xn as x1x2 . . . xnxn+1, where the parity check bit xn+1 is given by
xn+1 = (x1 + x2 + . . . + xn) mod 2.
Adding the parity check bit guarantees that the number of 1s in the extended string must be even. It is easy to see that the codewords in this code are bit strings with an even number of 1s.
Note that when a parity check bit is added to a bit string, if a single error is made in the transmission of a codeword, the total number of 1s will be odd. Consequently, this error can be detected. However, if two errors are made, these errors cannot be detected, since the total number of 1s in the extended string with two errors will still be even. In general, any odd number of errors can be detected, while an even number of errors cannot be detected.
Example 1 Suppose that a parity check bit is added to a bit string before it is transmitted. What can you conclude if you receive the bit strings 1110011 and 10111101 as messages?
Solution: Since the string 1110011 contains an odd number of 1s, it cannot be a valid codeword (and must, therefore, contain an odd number of errors).
Chapter 5 Coding Theory 75
On the other hand, the string 10111101 contains an even number of 1s. Hence it is either a valid codeword or contains an even number of errors.
Another simple way to detect errors is to repeat each bit in a message twice, as is done in the following example.
Example 2 Encode the bit string 011001 by repeating each bit twice.
Solution: Repeating each bit twice produces the codeword 001111000011.
What errors can be detected when we repeat each bit of a codeword twice? Since the codewords are those bit strings that contain pairs of matching bits, that is, where the first two bits agree, the third and fourth bits agree, and so on, we can detect errors that change no more than one bit of each pair of these matching bits. For example, we can detect errors in the second bit, the third bit, and the eighth bit of when codewords have eight bits (such as detecting that 01101110, received when the codeword 00001111 was sent, has errors). On the other hand, we cannot detect an error when the third and fourth bit are both changed (such as detecting that 00111111, received when the codeword 00001111 was sent, has errors).
So far we have discussed codes that can be used to detect errors. When errors are detected, all we can do to obtain the correct codeword is to ask for retransmission and hope that no errors will occur when this is done. However, there are more powerful codes that can not only detect but can also correct errors. We now turn our attention to these codes, called error correcting codes.
Error Correcting Codes We have seen that when redundancy is included in codewords, such as when a parity check bit is added to a bit string, we can detect transmission errors. We can do even better if we include more redundancy. We will not only be able to detect errors, but we will also be able to correct errors. More precisely, if sufficiently few errors have been made in the transmission of a codeword, we can determine which codeword was sent. This is illustrated by the following example.
Example 3 To encode a message we can use the triple repetition code. We repeat a message three times. That is, if the message is x1x2x3, we encode it as x1x2x3x4x5x6x7x8x9 where x1 = x4 = x7, x2 = x5 = x8, and x3 = x6 = x9. The valid codewords are 000000000, 001001001, 010010010, 011011011, 100100100, 101101101, 110110110, and 111111111.
76 Applications of Discrete Mathematics
We decode a bit string, which may contain errors, using the simple majority rule. For example, to determine x1, we look at x1, x4, and x7. If two or three of these bits are 1, we conclude that x1 = 1. Otherwise, if two or three of these bits are 0, we conclude that x1 = 0. In general, we look at the three bits corresponding to each bit in the original message. We decide that a bit in the message is 1 if a majority of bits in the string received in positions corresponding to this bit are 1s and we decide this bit is a 0 otherwise. Using this procedure, we correctly decode the message as long as at most one error has been made in the bits corresponding to each bit of the original message.
For example, when a triple repetition code is used, if we receive 011111010, we conclude that the message sent was 011. (For instance, we decided that the first bit of the message was 0 since the first bit is 0, the fourth bit is 1, and the seventh bit is 0, leading us to conclude that the fourth bit is wrong.)
To make the ideas introduced by the triple repetition code more precise we need to introduce some ideas about the distance between codewords and the probability of errors. We will develop several important concepts before returning to error correcting codes.
Hamming Distance There is a simple way to measure the distance between two bit strings. We look at the number of positions in which these bit strings differ. This approach was used by Richard Hamming* in his fundamental work in coding theory.
Definition 1 The Hamming distance d(x, y) between the bit strings x = x1x2 . . . xn and y = y1y2 . . . yn is the number of positions in which these strings differ, that is, the number of i (i = 1, 2, . . . , n) for which xi �= yi.
Note that the Hamming distance between two bit strings equals the number of changes in individual bits needed to change one of the strings into the other.
* Richard Hamming (1915–1998) was one of the founders of modern coding theory. He was born in Chicago and received his B.S. from the University of Chicago, his M.A.
from the University of Nebraska, and his Ph.D. from the University of Illinois in 1942.
He was employed by the University of Illinois from 1942 to 1944 and the University
of Louisville from 1944 to 1945. From 1945 until 1946 he was on the staff of the
Manhattan Project in Los Alamos. He joined Bell Telephone Laboratories in 1946,
where he worked until 1976. His research included work in the areas of coding theory,
numerical methods, statistics, and digital filtering. Hamming joined the faculty of the
Naval Postgraduate School in 1976. Among the awards he won are the Turing Prize
from the ACM and the IEEE Hamming Medal (named after him).
Chapter 5 Coding Theory 77
We will find this observation useful later.
Example 4 Find the Hamming distance between the bit strings 01110 and 11011 and the Hamming distance between the bit strings 00000 and 11111.
Solution: Since 01110 and 11011 differ in their first, third, and fifth bits, d(01110, 11011) = 3. Since 00000 and 11111 differ in all five bits, we conclude that d(00000, 11111) = 5.
The Hamming distance satisfies all the properties of a distance function (or metric), as the following theorem demonstrates.
Theorem 1 Let d(x, y) represent the Hamming distance between the bit strings x and y of length n. Then
(i) d(x, y) ≥ 0 for all x, y (ii) d(x, y) = 0 if and only if x = y
(iii) d(x, y) = d(y, x) for all x, y
(iv) d(x, y) ≤ d(x, z) + d(z, y) for all x, y, z. Proof: Properties (i), (ii), and (iii) follow immediately from the definition of the Hamming distance. To prove (iv), we use the fact that d(x, y) is the number of changes of bits required to change x into y. Note that for every string z of length n the number of changes needed to change x into y does not exceed the number of changes required to change x into z and to then change z into y.
How can the Hamming distance be used in decoding? In particular, sup- pose that when a codeword x from a code C is sent, the bit string y is received. If the transmission was error-free, then y would be the same as x. But if errors were introduced by the transmission, for instance by a noisy line, then y is not the same as x. How can we correct errors, that is, how can we recover x?
One approach would be to compute the Hamming distance between y and each of the codewords in C. Then to decode y, we take the codeword of minimum Hamming distance from y, if such a codeword is unique. If the distance between the closest codewords in C is large enough and if sufficiently few errors were made in transmission, this codeword should be x, the codeword sent. This type of decoding is called nearest neighbor decoding.
Example 5 Use nearest neighbor decoding to determine which code word
78 Applications of Discrete Mathematics
was sent from the code C = {0000, 1110, 1011} if 0110 is received. Solution: We first find the distance between 0110 and each of the codewords. We find that
d(0000, 0110) = 2,
d(1110, 0110) = 1,
d(1011, 0110) = 3.
Since the closest codeword to 0110 is 1110, we conclude that 1110 was the codeword sent.
Will nearest neighbor decoding produce the most likely codeword that was sent from a binary string that was received? It is not hard to see that it will if each bit sent has the same probability p of being received incorrectly and p < 1/2. We call a transmission channel with this property a binary symmetric channel. Such a channel is displayed in Figure 1.
Figure 1. A binary symmetric channel.
Example6 Suppose that when a bit is sent over a binary symmetric channel the probability it is received incorrectly is 0.01. What is the probability that the bit string 100010 is received when the bit string 000000 is sent?
Solution: Since the probability a bit is received incorrectly is 0.01, the prob- ability that a bit is received correctly is 1 − 0.01 = 0.99. For 100010 to be received, when 000000 is sent, it is necessary for the first and fifth bits to be received incorrectly and the other four bits to be received correctly. The prob- ability that this occurs is
(0.99)4(0.01)2 = 0.000096059601.
We will now show that nearest neighbor decoding gives us the most likely codeword sent, so that it is also maximum likelihood decoding.
Chapter 5 Coding Theory 79
Theorem 2 Suppose codewords of a binary code C are transmitted using a binary symmetric channel. Then, nearest neighbor decoding of a bit string received produces the most likely codeword sent.
Proof: To prove this theorem we first need to find the probability that when a codeword of length n is sent, a bit string with k errors in specified positions is received. Since the probability each bit is received correctly is 1 − p and the probability each bit is received in error is p, it follows that the probability of k errors in specified positions is pk(1 − p)n−k. Since p < 1/2 and 1 − p > 1/2, it follows that
pi(1 − p)n−i > pj (1 − p)n−j
whenever i < j. Hence, if i < j, the probability that a bit string with i specified errors is received is greater than the probability that a bit string with j specified errors is received. Since is more likely that errors were made in fewer specified positions when a codeword was transmitted, nearest neighbor decoding produces the most likely codeword.
The Hamming distance between codewords in a binary code determines its ability to detect and/or correct errors. We need to make the following definition before introducing two key theorems relating to this ability.
Definition 2 The minimum distance of a binary code C is the smallest distance between two distinct codewords, that is,
d(C) = min{d(x, y)|x, y ∈ C, x �= y}.
Example 7 Find the minimum distance of the code
C = {00000, 01110, 10011, 11111}.
Solution: To compute the minimum distance of this code we will find the distance between each pair of codewords and then find the smallest such dis- tance. We have d(00000, 01110) = 3, d(00000, 10011) = 3, d(00000, 11111) = 5, d(01110, 10011) = 4, d(01110, 11111) = 2, and d(10011, 11111) = 2. We see that the minimum distance of C is 2.
Example 8 Find the minimum distance of the code
C = {000000, 111111}.
80 Applications of Discrete Mathematics
Solution: Since there are only two codewords and d(000000, 111111) = 6, the minimum distance of this code is 6.
The minimum distance of a code tells us how many errors it can detect and how many errors it can correct, as the following two theorems show.
Theorem 3 A binary code C can detect up to k errors in any codeword if and only if d(C) ≥ k + 1. Proof: Suppose that C is a binary code with d(C) ≥ k + 1. Suppose that a codeword x is transmitted and is received with k or fewer errors. Since the minimum distance between codewords is at least k + 1, the bit string received cannot be another codeword. Hence, the receiver can detect these errors.
Now suppose that C can detect up to k errors and that d(C) ≤ k. Then there are two codewords in C that differ in no more than k bits. It is then possible for k errors to be introduced when one of these codewords is transmitted so that the other codeword is received, contradicting the fact that C can detect up to k errors.
Theorem 4 A binary code C can correct up to k errors in any codeword if and only if d(C) ≥ 2k + 1. Proof: Suppose that C is a binary code with d(C) ≥ 2k + 1. Suppose that a codeword x is transmitted and received with k or fewer errors as the bit string z, so that d(x, z) ≤ k. To see that C can correct these errors, note that if y is a codeword other than x, then d(z, y) ≥ k + 1. To see this note that if d(z, y) ≤ k, then by the triangle inequality d(x, y) ≤ d(x, z) + d(z, y) ≤ k + k = 2k, contradicting the assumption that d(C) ≥ 2k + 1.
Conversely, suppose that C can correct up to k errors. If d(C) ≤ 2k, then there are two codewords that differ in 2k bits. Changing k of the bits in one of these codewords produces a bit string that differs from each of these two codewords in exactly k positions, thus making it impossible to correct these k errors.
Example 9 Let C be the code {00000000, 11111000, 01010111, 10101111}. How many errors can C detect and how many can it correct?
Solution: Computing the distance between codewords shows that the min- imum distance of C is 5. By Theorem 3, it follows that C can detect up to 5 − 1 = 4 errors. For example, when we use C to detect errors, we can de- tect the four errors made in transmission when we receive 11110000 when the codeword 00000000 was sent.
Chapter 5 Coding Theory 81
By Theorem 4, it follows that C can correct up to �(5 − 1)/2� = 2 errors. For example, when we use C to correct errors, we can correct the two er- rors introduced in transmission when we receive 11100000 when the codeword 11111000 was sent.
Perfect Codes To allow error correction we want to make the minimum distance between codewords large. But doing so limits how many codewords are available. Here we will develop a bound on the number of codewords in a binary code with a given minimum distance.
Lemma 1 Suppose x is a bit string of length n and that k is a nonnegative integer not exceeding n. Then there are
C(n, 0) + C(n, 1) + · · · + C(n, k). bit strings y of length n such that d(x, y) ≤ k (where d is the Hamming dis- tance).
Proof: Let i be a nonnegative integer. The number of bit strings y with d(x, y) = i equals the number of ways to select the i locations where x and y differ. This can be done in C(n, i) ways. It follows that there are
C(n, 0) + C(n, 1) + · · · + C(n, k) bit strings such that d(x, y) ≤ k.
We can describe the statement in Lemma 1 in geometric terms. By the sphere of radius k centered at x we mean the set of all bit strings y such that d(x, y) ≤ k. Lemma 1 says that there are exactly ∑ki=0 C(n, i) bit stings in the sphere of radius k centered at x.
Lemma 2 Let C be a binary code containing codewords of length n and let d(C) = 2k + 1. Then given a bit string y of length n, there is at most one codeword x such that y is in the sphere of radius k centered at x.
Proof: Suppose that y is in the sphere of radius k centered at two different codewords x1 and x2. Then d(x1, y) ≤ k and d(x2, y) ≤ k. By the triangle inequality for the Hamming distance this implies that
d(x1, x2) ≤ d(x1, y) + d(x2, y) ≤ k + k = 2k,
82 Applications of Discrete Mathematics
contradicting the fact that the minimum distance between codewords is 2k + 1.
We can now give a useful bound on how many codewords can be in a code consisting of n-tuples that can correct a specified number of errors.
Theorem 5 The Sphere Packing or (Hamming) Bound Suppose that C is a code of bit strings of length n with d(C) = 2k + 1. Then |C|, the number of codewords in C, cannot exceed
2n
C(n, 0) + C(n, 1) + · · · + C(n, k).
Proof: There are 2n bit strings of length n. By Lemma 1 the sphere of radius k centered at a codeword x contains
C(n, 0) + C(n, 1) + · · · + C(n, k)
bit strings. Since no bit string can be in two such spheres (by Lemma 2), it follows that the number of bit strings of length n is at least as large as the number of codewords times the number of bit strings in each such sphere. Hence,
2n ≥ |C|[C(n, 0) + C(n, 1) + · · · + C(n, k)]. We obtain the inequality we want by dividing by the second factor on the right- hand side of this inequality (and writing the inequality with the smaller term first).
Example 10 Find an upper bound for the number of codewords in a code C where codewords are bit strings of length seven and the minimum distance between codewords is three.
Solution: The minimum distance between codewords is 3 = 2k + 1, so that k = 1. Hence the sphere packing bound shows that there are no more than
27/[C(7, 0) + C(7, 1)] = 128/8 = 16
codewords in such a code.
The sphere packing bound gives us an upper bound for the number of codewords in a binary code with a given minimum distance where codewords are bit strings of length n. The codes that actually achieve this upper bound,
Chapter 5 Coding Theory 83
that is, that have the most codewords possible, are of special interest because they are the most efficient error correcting codes. Such codes are known as perfect codes.
Example 11 Show that the code consisting of just two codewords 00000 and 11111 is a perfect binary code.
Solution: The minimum distance between codewords in this code is 5. The sphere packing bound states that there are at most
25/[C(5, 0) + C(5, 1) + C(5, 2)] = 32/16 = 2
codewords in a code consisting of 5-tuples with minimum distance 5. Since there are 2 codewords in this code, it is a perfect binary code.
The code in Example 11 is called a trivial perfect code since it only consists of the two codewords, one containing only 0s and the other containing only 1s. As Exercise 8 demonstrates, when n is an odd positive integer there are trivial perfect codes consisting of the two codewords which are bit strings of length n consisting of all 0s and of all 1s. Finding perfect binary codes different from the trivial codes has been one of the most important problems in coding theory. In the next section we will introduce a class of perfect binary codes known as Hamming codes.
Generator Matrices Before describing Hamming codes, we need to generalize the concept of a parity check bit. When we use a parity check bit, we encode a message x1x2 . . . xk as x1x2 . . . xkxk+1 where xk+1 = (x1 + x2 + · · · + xk) mod 2. To generalize this notion, we add more than one check bit. More precisely, we encode a message x1x2 . . . xk as x1x2 . . . xkxk+1 . . . xn, where the last n − k bits xk+1,...,xn, are parity check bits, obtained from the k bits in the message. We will describe how these parity check bits are specified.
Consider a k-bit message x1x2 · · · xk as a 1 × k matrix x. Let G be a k × n matrix that begins with the k × k identity matrix Ik. That is, G = (Ik|A), where A is a k × (n − k) matrix, known as a generator matrix. We encode x as E(x) = xG, where we do arithmetic modulo 2. Coding using a parity check bit and using the triple repetition code are special cases of this technique, as illustrated in Examples 12 and 13.
Example 12 We can represent encoding by adding a parity check bit to a
84 Applications of Discrete Mathematics
three-bit message as E(x) = xG, where
G =
⎛ ⎝1 0 0 10 1 0 1
0 0 1 1
⎞ ⎠ .
Note that to obtain G we add a column of 1s to I3, the 3 × 3 identity matrix. That is, G = (I3|A), where
A =
⎛ ⎝11
1
⎞ ⎠ .
Example 13 We can represent encoding using the triple repetition code for three-bit messages as E(x) = xG, where
G =
⎛ ⎝1 0 0 1 0 0 1 0 00 1 0 0 1 0 0 1 0
0 0 1 0 0 1 0 0 1
⎞ ⎠ .
Note that G is formed by repeating the identity matrix of order three, I3, three times, that is,
G = (I3|I3|I3).
We now consider an example which we will use to develop some important ideas.
Example 14 Suppose that
G =
⎛ ⎝1 0 0 1 1 10 1 0 1 1 0
0 0 1 1 0 1
⎞ ⎠ ,
that is, G = (I3|A), where
A =
⎛ ⎝1 1 11 1 0
1 0 1
⎞ ⎠ .
What are the codewords in the code generated by this generator matrix?
Chapter 5 Coding Theory 85
Solution: We encode each of the eight three-bit messages x = x1x2x3 as E(x) = xG. This produces the codewords 000000, 001101, 010110, 011011, 100111, 101010, 110001, and 111100. For example, we get the third of these by computing
E(010) = (0 1 0)G = (0 1 0)
⎛ ⎝1 0 0 1 1 10 1 0 1 1 0
0 0 1 1 0 1
⎞ ⎠ = (0 1 0 1 1 0).
It is easy to see that we can find the codewords in a binary code generated by a generator matrix G by taking all possible linear combinations of the rows of G (since arithmetic is modulo 2, this means all sums of subsets of the set of rows of G). The reader should verify this for codewords in the code in Example 14.
It is easy to see that the binary codes formed using generator matrices have the property that the sum of any two codewords is again a codeword. That is, they are linear codes. To see this, suppose that y1 and y2 are codewords generated by the generator matrix G. Then there are bit strings x1 and x2 such that E(x1) = y1 and E(x2) = y2, where E(x) = xG. It follows that y1 + y2 is also a codeword since E(x1 + x2) = y1 + y2. (Here we add bit strings by adding their components in the same positions using arithmetic modulo 2.)
We will see that there is an easy way to find the minimum distance of a linear code. Before we see this, we need to make the following definition.
Definition 3 The weight of a codeword x, denoted by w(x), in a binary code is the number of 1s in this codeword.
Example 15 Find the weights of the codewords 00000, 10111, and 11111.
Solution: Counting the number of 1s in each of these codewords we find that w(00000) = 0, w(10111) = 4, and w(11111) = 5.
Lemma 3 Suppose that x and y are codewords in a linear code C. Then d(x, y) = w(x + y).
Proof: The positions with 1s in them in x + y are the positions where x and y differ. Hence d(x, y) = w(x + y).
We also will need the fact that 0, the bit string with all 0s, belongs to a linear code.
86 Applications of Discrete Mathematics
Lemma 4 Suppose that C is a nonempty linear code. Then 0 is a codeword in C.
Proof: Let x be a codeword in C. Since C is linear x + x = 0 belongs to C.
Theorem 6 The minimum distance of a linear code C equals the minimum weight of a nonzero codeword in C.
Proof: Suppose that the minimum distance of C is d. Then there are code- words x and y such that d(x, y) = d. By Lemma 3 it follows that w(x + y) = d. Hence w, the minimum weight of a codeword, is no larger than d.
Conversely, suppose that the codeword x is a nonzero codeword of min- imum weight. Then using Lemma 4 we see that w = w(x) = w(x + 0) = d(x, 0) ≥ d. It follows that w = d, establishing the theorem.
Parity Check Matrices Note that in Example 14 the bit string x1x2x3 is encoded as x1x2x3x4x5x6 where x4 = x1 + x2 + x3, x5 = x1 + x2, and x6 = x1 + x3 (here, arithmetic is carried out modulo 2). Because we are doing arithmetic modulo 2, we see that
x1 + x2 + x3 + x4 = 0 x1 + x2 + x5 = 0 x1 + x3 + x6 = 0.
Furthermore, it is easy to see that x1x2x3x4x5x6 is a codeword if and only if it satisfies this system of equations.
We can express this system of equations as
⎛ ⎝1 1 1 1 0 01 1 0 0 1 0
1 0 1 0 0 1
⎞ ⎠ ⎛ ⎜⎜⎜⎜⎜⎝
x1 x2 x3 x4 x5 x6
⎞ ⎟⎟⎟⎟⎟⎠ =
⎛ ⎝00
0
⎞ ⎠ ,
that is, HE(x)t = 0,
where E(x)t is the transpose of E(x) and H, the parity check matrix, is given by
H =
⎛ ⎝1 1 1 1 0 01 1 0 0 1 0
1 0 1 0 0 1
⎞ ⎠ .
Chapter 5 Coding Theory 87
Note that H = (At|In−k). With this notation we see that x = x1x2x3x4x5x6 is a codeword if and only if Hxt = 0, since checking this equation is the same as checking whether the parity check equations hold.
In general, suppose that G is a k × n generator matrix with G = (Ik|A),
where A is a k × (n − k) matrix. To G we associate the parity check matrix H, where
H = (At|In−k). Then x is a codeword if and only if Hxt = 0. Note that from a generator matrix G we can find the associated parity check matrix H, and conversely, given a parity check matrix H, we can find the associated generator matrix G. More precisely, note that if H = (B|Ir ), then G = (In−r|Bt).
We have seen that the parity check matrix can be used to detect errors. That is, to determine whether x is a codeword we check whether
Hxt = 0.
Not only can the parity check matrix be used to detect errors, but when the columns of this matrix are distinct and are all nonzero, it also can be used to correct errors. Under these assumptions, suppose that the codeword x is sent and that y is received, which may or may not be the same as x. Write y = x + e, where e is an error string. (We have e = 0 if no errors arose in the transmission). In general, the error string e has 1s in the positions where y differs from x and 0s in all other positions. Now suppose that only one error has been introduced when x was transmitted. Then e is a bit string that has only one nonzero bit which is in the position where x and y differ, say position j. Since Hxt = 0, it follows that
Hyt = H(xt + e)
= Hxt + et
= et
= cj
where cj is the jth column of H. Hence, if we receive y and assume that no more than one error is present,
we can find the codeword x that was sent by computing Hyt. If this is zero, we know that y is the codeword sent. Otherwise, it will equal the jth column of H for some integer j. This means that the jth bit of y should be changed to produce x.
Example16 Use the parity check matrix to determine which codeword from the code in Example 14 was sent if 001111 was received. Assume that at most one error was made.
88 Applications of Discrete Mathematics
Solution: We find that
Hyt =
⎛ ⎝1 1 1 1 0 01 1 0 0 1 0
1 0 1 0 0 1
⎞ ⎠ ⎛ ⎜⎜⎜⎜⎜⎝
0 0 1 1 1 1
⎞ ⎟⎟⎟⎟⎟⎠ =
⎛ ⎝01
0
⎞ ⎠ .
This is the fifth column of H. If follows that the fifth bit of 001111 is incorrect. Hence the code word sent was 001101.
Hamming Codes We can now define the Hamming codes. We define them using parity check matrices.
Definition 4 A Hamming code of order r where r is a positive integer, is a code generated when we take as parity check matrix H an r × (2r − 1) matrix with columns that are all the 2r − 1 nonzero bit strings of length r in any order such that the last r columns form the identity matrix.
Interchanging the order of the columns leads to what is known as an equiv- alent code. For details on equivalence of codes the reader is referred to the references at the end of this chapter.
Example 17 Find the codewords in a Hamming code of order 2.
Solution: The parity check matrix of this code is
H = (
1 1 0 1 0 1
) .
We have H = (B|I2) where B = (
1 1
) . Hence, the generator matrix G of
this code equals G = (I3−2|Bt) = (1 1 1). Since the codewords are linear combinations of the rows of G, we see that this code has two codewords, 000 and 111. This is the linear repetition code of order 3.
Example 18 Find the codewords in a Hamming code of order 3.
Chapter 5 Coding Theory 89
Solution: For the parity check matrix of this code we use
H =
⎛ ⎝0 1 1 1 1 0 01 0 1 1 0 1 0
1 1 0 1 0 0 1
⎞ ⎠ .
We have H = (B|I3) where
B =
⎛ ⎝0 1 1 11 0 1 1
1 1 0 1
⎞ ⎠ .
Hence the generator matrix G of this code equals
G = (I7−3|Bt) =
⎛ ⎜⎝
1 0 0 0 0 1 1 0 1 0 0 1 0 1 0 0 1 0 1 1 0 0 0 0 1 1 1 1
⎞ ⎟⎠ .
The 16 codewords in this code C can be found by taking all possible sums of the rows of G. We leave this as an exercise at the end of the chapter.
To show that the Hamming codes are perfect codes we first need to establish two lemmas.
Lemma 5 A Hamming code of order r contains 2n−r codewords where n = 2r − 1. Proof: The parity check matrix of the Hamming code is an r × n matrix. It follows that the generator matrix for this code is a (n − r) × n matrix. Recall that the codewords are the linear combinations of the rows. As the reader can show, no two linear combinations of the rows are the same. Since there are 2n−r different linear combinations of row, there are 2n−r different codewords in a Hamming code of order r.
Lemma 6 The minimum distance of a Hamming code of order r is 3 when- ever r is a positive integer.
Proof: The parity check matrix Hr has columns which are all nonzero and no two of which are the same. Hence, from our earlier discussion, a Hamming code of order r can correct single errors. By Theorem 3 we conclude that the minimum distance of this code is at least 3. Among the columns of Hr are the
90 Applications of Discrete Mathematics
following three columns:
c1 =
⎛ ⎜⎜⎜⎜⎝
1 1 0 ... 0
⎞ ⎟⎟⎟⎟⎠ , c2 =
⎛ ⎜⎜⎜⎜⎝
1 0 0 ... 0
⎞ ⎟⎟⎟⎟⎠ , c3 =
⎛ ⎜⎜⎜⎜⎝
0 1 0 ... 0
⎞ ⎟⎟⎟⎟⎠ .
Note that c1 + c2 + c3 = 0. Let x be the bit string with 1 in the positions of these columns and zero elsewhere. Then Hxt = 0, since it is c1 + c2 + c3. It follows that x is a codeword. Since w(x) = 3, by Theorem 6 it follows that the minimum distance is no more than 3. We conclude that the minimum distance of a Hamming code of order r is 3.
Theorem 7 The Hamming code of order r is a perfect code.
Proof: Let n = 2r − 1. By Lemma 5 a Hamming code of order r contains 2n−r codewords, each of which is an n-tuple. By Lemma 6 the minimum distance of the Hamming code of order r is 3. We see that this code achieves the maximum number of codewords allowed by the sphere packing bound. To see this, note that
2n−r(1 + C(n, 1)) = 2n−r(1 + n) = 2n−r(1 + 2r − 1) = 2n. This is the upper bound of the sphere-packing bound. hence a Hamming code of order r is perfect.
By Theorem 7 we see that the Hamming codes are examples of perfect codes. The study of perfect codes has been one of the most important areas of research in coding theory and has lead to the development of many important results. See the references at the end of the chapter to learn about what is known about perfect codes.
Summary In this chapter we have studied how codes can be used for error detection and error correction. We have introduced an important class of codes known as the Hamming codes. However, we have only touched the surface of a fascinating and important subject that has become extremely important for modern computing and communications. The interested reader can consult the references listed at the end of this chapter to learn about many other classes of codes that have practical applications.
Chapter 5 Coding Theory 91
For example, pictures of the planets taken by space probes have been en- coded using powerful codes, such as a code known as the Reed-Muller code (see [5] for details). This code has been used to encode the bit string of length 6 representing the brightness of each pixel of an image by a bit string of length 32. This Reed-Muller code consists of 64 codewords, each a bit string of length 32, with minimum distance 16. Another interesting example is the use of a family of codes known as Reed-Solomon codes used in digital audio recording (see [5] for details). Finally, many concepts and techniques from both linear algebra and abstract algebra are used in coding theory. Studying coding theory may con- vince the skeptical reader about the applicability of some of the more abstract areas of mathematics.
Suggested Readings
1. E. Berlekamp, editor, Key Papers in the Development of Coding Theory, IEEE Press, New York, 1974.
2. R. Hamming, Coding and Information Theory, 2nd Edition, Prentice Hall, Upper Saddle River, N.J., 1986.
3. R. Hill, A First Course in Coding Theory, Oxford University Press, Oxford, 1990.
4. V. Pless, Introduction to the Theory of Error-Correcting Codes, 3rd Edi- tion, John Wiley & Sons, Hoboken, N.J., 1998.
5. S. Vanstone and P. van Oorschot, An Introduction to Error Correcting Codes with Applications, Springer, New York. 1989.
Exercises
1. Could the following bit strings have been received correctly if the last bit is a parity bit?
a) 1000011 b) 111111000 c) 10101010101 d) 110111011100
2. Find the Hamming distance between each of the following pairs of bit strings.
92 Applications of Discrete Mathematics
a) 00000,11111 b) 1010101,0011100 c) 000000001,111000000 d) 1111111111,0100100011
3. Suppose the bit string 01011 is sent using a binary symmetric channel where the probability a bit is received incorrectly is 0.01. What is the probability that
a) 01011, the bit string sent, is received? b) 11011 is received? c) 01101 is received? d) 10111 is received? e) no more than one error is present in the bit string received?
4. How many errors can each of the following binary codes detect and how many can it correct?
a) {0000000, 1111111} b) {00000, 00111, 10101, 11011} c) {00000000, 11111000, 01100111, 100101101}
5. Suppose that the probability of a bit error in transmission over a binary symmetric channel is 0.001. What is the probability that when a codeword with eight bits is sent from a code with minimum distance five, the bit string received is decoded as the codeword sent (when nearest neighbor decoding is used)?
�6. Show that if the minimum distance between codewords is four it is possible to correct an error in a single bit and to detect two bit errors without correction.
7. Use the sphere packing bound to give an upper bound on the number of codewords in a binary code where codewords are bit strings of length nine and the minimum distance between codewords is five.
8. Show that whenever n is an odd positive integer, the binary code consisting of the two bit strings of length n containing all 0s or all 1s is a perfect code.
9. Suppose that x and y are bit strings of length n and m is the number of positions where both x and y have 1s. Show that w(x+y) = w(x)+w(y)− 2m.
10. Find the parity check matrix associated with the code formed by adding a parity check bit to a bit string of length 4.
11. Find the parity check matrix associated with the triple repetition code for bit strings of length 3.
Chapter 5 Coding Theory 93
12. Suppose that the generator matrix for a binary code is
⎛ ⎜⎝
1 0 0 0 1 1 1 0 1 0 0 1 0 1 0 0 1 0 0 1 1 0 0 0 1 1 1 0
⎞ ⎟⎠ .
What is the parity check matrix H for this code?
13. Suppose that the parity check matrix for a binary code is
⎛ ⎝1 0 1 0 01 1 0 1 0
0 1 0 0 1
⎞ ⎠ .
What is the generator matrix G for this code?
14. Find the 16 codewords in the Hamming code of order 3 described in Ex- ample 18.
�15. Sometimes, instead of errors, bits are erased during the transmission of a message or from a tape or other storage medium. The position, but not the value, of an erased bit is known. We say that a code C can correct r erasures if a message received with no errors and with no more than r erasures can be corrected to a unique codeword that agrees with the message received in all the positions that were not erased.
a) Show that a binary code of minimum distance d can correct d − 1 erasures.
b) Show that a binary code of minimum distance d can correct t errors and r erasures if d = 2t + r + 1.
Computer Projects
1. Given a binary code, determine the number of errors that it can detect and the number of errors that it can correct.
2. Given a binary code with minimum distance k, where k is a positive integer, write a program that will detect errors in codewords in as many as k − 1 positions and correct errors in as many as �(k − 1)/2� positions.

Get help from top-rated tutors in any subject.
Efficiently complete your homework and academic assignments by getting help from the experts at homeworkarchive.com