Académique Documents
Professionnel Documents
Culture Documents
CHAPTER
Acquiring IT Applications
14 and Infrastructure
594
c14.qxd 10/4/04 19:26 Page 595 Abhinav-10 Abhinav-10:Desktop Folder:
EQA
➥ THE PROBLEM
The company sells more than 4,000 products either directly to 350,000–400,000
dental professionals or through distributors to another 5 million dental profes-
sionals. Orders come in small quantities, very frequently from repeat customers,
with a frequent demand for same-day shipment. Sterngold realized that moving
its sales online might create easy ordering for its customers, reduce its own trans-
action costs, and enable customers to get its products faster—all of which could
provide a competitive advantage. The company had a Web site, but without sell-
ing capabilities. Sterngold decided that it had two choices to solve this problem:
(1) to develop an e-commerce application in-house, or (2) to find an outsourcer
to provide the application.
➥ THE SOLUTION
The company wanted a technology solution that allowed it fast time to market,
access to best-of-breed technology and people, high security, superb reliability,
and the ability to focus on core competency. Having only one IT person, the
company knew that the in-house solution required hiring additional personnel,
creating a temporary large IT department. Therefore, Sterngold decided to use
an application outsourcing.
The question then became how to select a trusted business partner who
understood the need to move quickly, but carefully. After long deliberation and
interviews with potential outsourcers, the company selected Surebridge Inc. to
develop and then host the e-commerce application. The selection was “blessed”
by the parent company, Cookson Group.
➥ THE PROCESS
Surebridge followed its own proprietary eMethodology approach. First, a ven-
dor’s implementation team was created. The team started by evaluating
Sterngold’s business needs, using interviews to gather the information. Then
goals and a timetable were created. A major consideration was to finish the proj-
ect before the industry’s annual trade show, so that Sterngold would be able to
demonstrate to its customers how easy is to order products in the online store.
The next step was to create an architecture. This step included a front-end or-
dering system (phase I) and its integration with the back-office systems (phase II).
This was not an easy task, given that there were over 4,000 products whose in-
formation attributes resided in disparate areas of the company. The relevant
information was channeled into a large database. A major task was the creation of
a search engine that would be useful to diverse groups of customers (e.g., dentists,
dental labs). Each group of customers had different knowledge, requirements, and
595
c14.qxd 10/4/04 19:26 Page 596 Abhinav-10 Abhinav-10:Desktop Folder:
EQA
➥ THE RESULTS
The new system offers a number of major capabilities: Because the ordering sys-
tem was integrated with the back office, the system reduces errors due to man-
ual data entry. Real-time inventory status is given to customers before they place
an order, and a tracking feature provides real-time status of orders. Discounts are
related to specific customers, so they know what they will pay as soon as they
log in. Real-time authorization of customers’ credit cards is provided when orders
are placed. In addition, the company now can offer promotions to its customers
without the need to send letters. The site also offers the ability to track customer
clickstream movements, allowing the company to personalize products and to of-
fer cross-sell and up-sell products and services. Also, the site includes capabilities
for conducting e-mail marketing campaigns using permission marketing.
By 2004, two years after implementation, Sterngold has recorded the fol-
lowing results:
● By offering free shipping, Sterngold has encouraged more and more cus-
tomers to order online, thus increasing the customer base (at the expense of
the competitors).
● More product promotion (which has been easy to do online) has resulted in
more customers and sales.
● Both the company and the customers have experienced increasing efficien-
cies and savings on administrative costs.
● Much fax and snail mail has been eliminated.
● The online presence has resulted in greater exposure to business partners.
● A strong relationship with the technology partners has been created. (Since
Sterngold owns the IT infrastructure and Surebridge just operates it, finger
pointing in case of problems is minimized.)
Use of an outside vendor enabled Phase I to be finished in less than three
months, rather than two to three years if it had been done in-house. This en-
abled Sterngold to be the first mover in its industry. The Web site is now being
translated into several languages for the global market.
Sources: Compiled from Craig (2003) and from sterngold.com (accessed July 2004).
The Acquisition The acquisition process of a typical IT application has five major steps, which
Process are shown in Figure 14.1 (page 598). The steps in the acquisition process are
outlined and discussed below.
IT Architecture (Step 2)
Business
process Information architecture Technical architecture
restructuring, Data architecture Organization architecture IT
redesign Application architecture Feasibility Infrastructure
14.2 IDENTIFYING, JUSTIFYING, AND PLANNING INFORMATION SYSTEM APPLICATIONS (STEP 1) 601
llege/tu
recommendations; recommendation of the steering committee; recommendation
of the IS department; top management requests (orders); or search for high-
co
w
ile
y. c o m /
payoff projects. For more discussion see Carroll (2004).
Identifying High- It is natural that organizations will prefer to search for high-payoff applications,
Payoff Projects especially if they are not difficult to implement. Some organizations use a sys-
tematic approach for such a search, as described in Online File W14.1.
Project Justification Once potential projects are identified, they usually need to be justified. To do
so one can use some of the methods described in Chapter 13. Since organiza-
tions have limited resources, they cannot embark on all projects at once. There-
fore, all proposed projects must be scrutinized. This may not be an easy task
due to the complexity of IT projects (see Xia and Lee, 2004).
Information system applications may be expensive. Therefore, an organiza-
tion must analyze the need for applications and justify it in terms of cost and
benefits. Because most organizations operate with tight budgets, this analysis
must be carefully done. The investigation is usually divided into two parts. First,
it is necessary to explore the need for each system (i.e., find the information
needs of the users and how the application will meet those needs). Second, it
is necessary to justify it from a cost-benefit point of view. The need for
information systems is usually related to organizational planning and to the
analysis of its performance vis-à-vis its competitors (see Chapter 12). The cost-
benefit justification must look at the wisdom of the specific IT investment vis-
à-vis investing in alternative IT or other projects.
Both of these topics are complex, involving many issues. For example, orga-
nizational and IT planning may involve business processes redesign (e.g., see
Sections 14.7 and 14.8, and El Sawy, 2001). Both issues are also related to mar-
keting and corporate strategy. For example, Ward and Peppard (2002) developed
a framework for deciding on what specific IT applications to choose, based on
their strategic versus high potential values. Such investigation is the subject of
special IS courses and will not be dealt with here. However, what is important
to stress is that such an investigation determines the relative importance of each
IT application.
Once justification is done, a plan for the application acquisition can be
made.
Planning for the Before a project is implemented, or even before a company decides how to
Specific Application acquire the software, it is necessary to understand the organization’s current
way of doing business (the business process) in the area the application is going
to be used. For example, if you plan to install an e-procurement application, it
makes sense to study the ins and outs of procurement in your business. This
can be done in a systematic way as part of system analysis, as described in Tech-
nology Guide 6.
The planning process includes documenting system requirements, studying
data and information flows, and studying the users’ community and their spe-
cific objectives. Also included is the risk of failure and how to manage that risk.
This then leads to the creation of a timetable (schedule) and milestones (which
c14.qxd 10/4/04 19:26 Page 602 Abhinav-10 Abhinav-10:Desktop Folder:
EQA
are needed in order to determine how to acquire the application). For exam-
ple, if you need the system very quickly, you will favor buying or leasing one.
an
The planning process covers resources other than time—specifically, money
rb
(budget), labor, and equipment (if needed). Project planning also examines the
llege/tu
w
ile
y. c o m /
mentation of the application, and so on. Online File W14.2 describes more about
milestones and about project properties and priorities.
Issues such as connecting to business partners and databases are the foun-
dations for the step 2, the creation of the IT architecture. This step is discussed
in detail in Technology Guide 6.
Buy the Standard features required by IT applications can be found in many commer-
Applications (Off- cial packages. Buying an existing package can be a cost-effective and time-saving
the-Shelf Approach) strategy compared with in-house application development. The “buy” option
should be carefully considered and planned for to ensure that all critical fea-
tures for current and future needs are included in the selected package. Other-
wise such packages may quickly become obsolete.
However, organizational needs are rarely fully satisfied by one software
package. It is therefore sometimes necessary to acquire multiple packages to
support even one business process. These packages then need to be integrated
with each other as well as with existing software (See Section 14.5).
The buy option is especially attractive if the software vendor allows for mod-
ifications. However, even this option may not be attractive in cases of high obso-
lescence rates or high software cost. The advantages and limitations of the buy
option are summarized in Table 14.1.
Lease the Compared with the buy option and the option to develop applications in-house
Applications (to be discussed soon), the “lease” option can result in substantial cost and time
savings. Leased packages may not always exactly fit the application require-
ments (the same is true with the buy option). But many common features that
are needed by most organizations are usually included in leased packages. (It
usually is more comprehensive than a “buy” package.)
In those cases where extensive software maintenance is required or where
the cost of buying is very high, leasing is more advantageous than buying. Leas-
ing can be especially attractive to SMEs that cannot afford major investments
in IT software. Large companies may also prefer to lease packages in order to
test potential IT solutions before committing to heavy investments. Also, because
there is a shortage of IT personnel with appropriate skills for developing novel
IT applications (such as EC or wireless), many companies choose to lease instead
of develop software in-house. Even those companies that have in-house expert-
ise may not be able to afford the long wait for strategic applications to be devel-
oped in-house. Therefore, they lease (or buy) applications from external
resources to establish a quicker presence in the market.
TYPES OF LEASING VENDORS. Leasing can be done in one of two ways. The first
way is to lease the application from an outsourcer and install it on the company’s
premises. The vendor can help with the installation and frequently will offer to
also contract for the operation and maintenance of the system. Many conventional
applications are leased this way. The second way, using an application system
provider (ASP), is becoming more popular. ASPs are explored in Section 14.4.
magine this scene. It’s noon on Friday and you just duking it out over how best to meet utility computing
I found out that your relatives are coming to spend the
weekend. It’s time to contact the electric company to let
requirements and command a leadership position.
them know that you will need extra electricity for the IMPLEMENTATION. Already present in a variety of capac-
weekend. You’re told you have to fill out a purchase ity-based pricing models, utility computing is poised to
order and it will be five to seven days before you can get expand throughout the enterprise as various key tech-
extra electricity. Of course, life is not like this, because nologies—such as Web services, grid computing, and pro-
basic utilities have extra capacity built into their delivery visioning—intersect. Growth of utility computing in the
systems. But this would be a likely scenario if you were enterprise will deliver to the industry not only equal
to find out at noon on Friday that you were expecting a access to supercomputing resources, but also new revenue
major spike in usage on your servers. You’d have to call streams for commercial data centers, new application pric-
your provider, do a bunch of paperwork, and maybe in ing models based on metered use, and an open comput-
a few days you could get the extra capacity you need. ing infrastructure for companies with little or no standing
That’s the kind of problem that utility computing aims IT maintenance budget. Utility computing is on track to
to solve. be the “next big thing” for IT vendors and services com-
panies that sell to large enterprises.
THE TECHNOLOGY. Utility computing vendors are looking
CONCLUSION. Utility computing (also called “on-demand
toward a future in which computing capacity is as easy
computing”) has become one of the hot topics in the IT
to acquire as electricity. Rather than having a fixed
community and, increasingly, in larger enterprises that are
amount of computing resources, you would have access
looking for ways to reduce the fixed costs and complex-
to computing resources on an as-needed basis—just like
ity of IT. Utility computing tools provide total flexibility
with electricity. Many IT market leaders are now starting
in information systems development, from in-house and
to catch on to the concept of utility computing as a bul-
self-managed to fully outsourced, with everything in
let-proof utility service that we can virtually take for
between—including a hybrid deployment model in which
granted. IBM announced it is spending $10 billion on its
in-house capacity can be supplemented by third-party
on-demand computing initiatives. HP also announced its
resources to handle peak needs.
Utility Data Center architecture, and Sun has its own N1
data virtualization center plans. Sun, HP, and IBM are Sources: Compiled from Zimmerman (2003) and from Neel (2002).
These tools share multisourcing delivery and framework services (left side of
figure) and provide for customer access and management services (right side of
figure).
Utility computing still faces daunting obstacles. One obstacle is the immaturity
of the tools. Another is the fact that each vendor prefers to tout its own unique
Management Services
Customer Access and
End-User In the early days of computing, an organization housed its computer in a climate-
Development controlled room (computer center), with locked doors and restricted access. The
only people who interacted with the computer (most organizations had only one
computer) were specialists: programmers, computer operators, and data entry per-
sonnel. Over the years, computers became cheaper, smaller, and more widely dis-
persed throughout the organization. Now almost everybody who works at a desk
or in the field has a computer in addition to, or instead of, the computer center.
Along with this proliferation of hardware, many computer-related activities
shifted out into the work area. Users now handle most of their own data entry.
They create many of their own reports and print them locally, instead of wait-
an
ing for them to arrive in the interoffice mail after a computer operator has run
rb
them at a remote computer data center. They provide unofficial training and sup-
llege/tu
port to other workers in their area. Users also design and develop an increasing
proportion of their own applications, sometimes even relatively large and com-
co
ile
y. c o m /
plex systems. End-user computing is ever-increasing (see Online File W14.3).
Beneficial as this trend is to both workers and the organization as a whole,
an
end-user computing has some limitations. End users may not be skilled enough
rb
in computers, so quality and cost may be jeopardized unless proper controls are
llege/tu
installed. Also, many end users do not take time to document their work and may
neglect proper security measures. For complete coverage, see Regan and O’Connor
co
ile
y. c o m /
(2002). For the different types of end-user computing, see Online File W14.4.
IT at Work 14.2
ANSETT AUSTRALIA AND IBM COLLABORATE POM
IN END-USER COMPUTING
Other Acquisition A number of other acquisition options are available to IT developers, and in
Options particular for e-commerce applications.
HYBRID APPROACH. A hybrid approach combines the best of what the com-
pany does internally with an outsourced strategy. Hybrid models work best
when the outsourced partner offers higher security levels, faster time-to-market,
and superb service level agreements.
any or all tasks in IT development. For example, they can plan, program, build
applications, integrate, operate, and maintain. The benefits and limitations of
co
ile
y. c o m /
outsourcing are presented in Online File W14.5. It is useful to develop good
relationships with the outsourcers (see Kishore et al., 2003).
Several types of vendors offer services for creating and operating IT system
including e-commerce applications:
● Software houses. Many software companies, from IBM to Oracle, among
others, offer a range of outsourcing services for developing, operating, and
maintaining IT applications.
● Outsourcers and others. IT outsourcers, such as EDS, offer a variety of serv-
ices. Also, the large CPA companies and management consultants (e.g.,
Accenture) offer some outsourcing services.
● Telecommunications companies. Increasingly, the large telecommunications
companies are expanding their hosting services to include the full range of
IT and EC solutions. MCI, for example, offers Web Commerce services for a
monthly fee.
While the trend to outsource is rising, so is the trend to do it offshore, mainly
in India and China. Offshore outsourcing is certainly less expensive, but it
includes risks as well (see cio.com, “The 10 most important issues in 2003,” and
Overby, 2003).
One of the most common types of IT outsourcing is the use of application
service providers.
Application Service An application service provider (ASP) is an agent or vendor who assembles
Providers the software needed by enterprises and packages them usually with outsourced
development, operations, maintenance, and other services (see Kern and Krei-
jger, 2001). The essential difference between an ASP and an outsourcer is that
c14.qxd 10/4/04 19:26 Page 609 Abhinav-10 Abhinav-10:Desktop Folder:
EQA
ity to adapt to changing market conditions. ASPs are particularly effective for
IT applications for which timing and flexibility and agility are crucial. For a list
co
ile
y. c o m /
of benefits and risks, see Online File W14.6.
Leasing from ASPs does have its disadvantages. Many companies are con-
cerned with the adequacy of protection offered by the ASP against hackers, theft
of confidential information, and virus attacks. Also, leased software often does not
provide the perfect fit for the desired application. It is also important to ensure
that the speed of the Internet connection is compatible with that of the applica-
tion, to avoid distortions in its performance. For example, it is not advisable to run
heavy-duty applications on a modem link below a T1 line or a high-speed DSL.
From the ASP vendor’s point of view, the benefits presented by the ASP
model are many. For one, in the long-distance carrier and Internet service
providers (ISP) markets, revenues are squeezed due to heavy competition. These
companies are looking to generate revenues from sources other than connec-
tivity and transport, and ASP services offer a new outlet. An interesting insti-
tution is the ASP Industry Consortium, whose founding members include AT&T,
Cisco, Citrix Systems, Ernst & Young, Verizon, IBM, Marimba, Sharp Electronic,
Sun Microsystems, UUNET, and Verio.
Criteria for Selecting A major issue faced by any company is which method(s) of acquisition to select.
an Acquisition To do so the company must consider many criteria, such as those provided in
Approach Table 14.2. Some criteria may conflict with others, so the company must decide
c14.qxd 10/4/04 19:26 Page 610 Abhinav-10 Abhinav-10:Desktop Folder:
EQA
14.5 VENDOR AND SOFTWARE SELECTION AND OTHER IMPLEMENTATION ISSUES 611
rb
an which criteria are most important to its needs. For a discussion of the criteria
llege/tu
in the table, see Online File W14.7.
In addition to the
co
ADDITIONAL CRITERIA FOR SELECTING AN ASP VENDOR.
w
ile
y. c o m /
general criteria cited in Table 14.2, see Online File W14.7.
Using all the previous criteria, one can select one or more methods for acquir-
ing systems. Comparison of the various methods is given in Table 14.3. (For
description of additional systems development methods, see Technology Guide 6.)
STEP 2: DETERMINE THE EVALUATION CRITERIA. The most difficult and cru-
cial task in evaluating a vendor and a software package is to determine a set
of detailed criteria for choosing the best vendor and package. Some areas in
which detailed criteria should be developed are: characteristics of the vendor,
functional requirements of the system, technical requirements the software
must satisfy, amount and quality of documentation provided, and vendor sup-
port of the package.
These criteria should be set out in a request for proposal (RFP), a doc-
ument that is sent to potential vendors inviting them to submit a proposal
describing their software package and how it would meet the company’s needs.
The RFP provides the vendors with information about the objectives and
requirements of the system: It describes the environment in which the system
will be used, the general criteria that will be used to evaluate the proposals, and
the conditions for submitting proposals. The RFP may also request a list of cur-
rent users of the package who may be contacted, describe in detail the form of
response that is desired, and require that the package be demonstrated at the
company’s facilities using specified inputs and data files.
c14.qxd 10/4/04 19:26 Page 612 Abhinav-10 Abhinav-10:Desktop Folder:
EQA
STEP 4: CHOOSE THE VENDOR AND PACKAGE. Once a short list has been pre-
pared, negotiations can begin with vendors to determine how their packages
might be modified to remove any discrepancies with the company’s IT needs.
Thus, one of the most important factors in the decision is the additional devel-
opment effort that may be required to tailor the system to the company’s needs
or to integrate it into the company’s computing environment. Additionally, the
an
opinions of the users who will work with the system and the IT personnel who
rb
will have to support the system have to be considered.
llege/tu
ile
y. c o m /
some of the criteria are provided in Online File W14.8. For an example of select-
ing enterprise systems, see Sarkis and Sundarraj (2003).
Several third-party organizations evaluate software and make their find-
ings public. For example, see eWeekLabs at eweek.com. Many other IT trade
journals provide periodic software evaluation. Also, professional associations
and interest groups provide evaluations and rankings, as do organizations such
as Software Testing Institute (sti.com), metagroup.com, technologyevaluation.com,
and knowledgestorm.com.
14.5 VENDOR AND SOFTWARE SELECTION AND OTHER IMPLEMENTATION ISSUES 613
Connecting to Connecting to business partners is critical to the success of IT, especially for B2B
Business Partners e-commerce. As described in Chapter 8, such connection is done via EDI,
EDI/Internet, XML, and extranets.
Connection to business partners is done usually along the supply chain. It
typically involves connecting a company’s front- and back-office e-commerce
applications, as shown in Figure 14.3.
In addition to the networking problem, one must deal with issues of con-
nectivity, compatibility, security, scalability, and more.
Business Business
My Company
Partners Partners
Production, HRM,
Finance, Accounting,
Engineering
CRM
Back Integration Front
FIGURE 14.3 Connecting Office Office
to databases.
c14.qxd 10/4/04 19:26 Page 615 Abhinav-10 Abhinav-10:Desktop Folder:
EQA
IT at Work 14.3
LINCOLN FINANCIAL EXCELS BY USING FIN
WEB SERVICES
incoln Financial is a $5 billion provider of life insur-
L ance, retirement products, and wealth management
services. It distributes its offering through financial advi-
The ultimate answer was Service Broker. It took three
developers four months to build the pilot of Service Broker,
which is a Web Services–based application with a front end
sors, banks, and independent brokers. In most of the insur- that the company calls a servlet. When the servlet is in-
ance industry, if consumers want to access their accounts stalled on a partner’s server, it provides a wrapper that can
or download a form from a broker site, they click on a link accept Lincoln’s content and applications and still maintain
that takes them to the insurance provider’s site, where they the partner’s look and feel.
input a separate password or user ID. To become a “partner The servlet manages in a Web Services application many
of choice” on such sites, Lincoln Financial wanted tighter of the functions the partner would have to manage, such as
integration with brokers’ Web sites. But Lincoln also authentication, digital signature, passwords, and page ren-
wanted to go a step further, providing content and account dering. When the partner wants to include Lincoln content
access within its partners’ Web sites, as well as single sign- or an application, it needs to add just one line of code.
on for consumers. In Spring 2004, Lincoln was the only insurer that did
This was not simple. Outlining the Lincoln content in an not require customers to leave a partner’s Web site to ac-
HTML frame would not provide the partner’s look and feel. cess information. This capability provided Lincoln with
A pure Web Services approach was also out, since most of competitive advantage.
Lincoln’s clients could not support that kind of system,
since the partner then had to process the XML/SOAP mes- Source: Compiled from Brandel (2004).
sages. For a short time, Lincoln maintained subsites for its
partners that wanted them, and those sites linked to re- For Further Exploration: What systems were con-
quested content. However, maintenance of the subsites nected between the business partners? Why was it so im-
was burdensome. portant to maintain the partner’s look and feel?
rb
an Companies are connected to business partners for many reasons. A com-
llege/tu
mon reason is to better work with vendors’ designers, as in the case of Boeing
described in Online File W14.9. Another example is content visualization from
co
a partner’s Web site; see IT at Work 14.3. Both internal and external connectiv-
w
ile
y. c o m /
ity can be improved by using Web Services. For details, see Technology Guide 6
and Casati (2003).
The Drivers of A business process is a collection of activities that take one or more kinds of
Process Redesign inputs and create an output. Here are some representative drivers behind the
need for business process redesign:
● Fitting commercial software. To reap the best benefit of buying or leasing soft-
ware, it is frequently best to use the software as it is rather than to modify it.
c14.qxd 10/4/04 19:26 Page 616 Abhinav-10 Abhinav-10:Desktop Folder:
EQA
(Remember the Nike disaster discussed in Chapter 1.) But what if the soft-
ware does not fit your business processes, and it is not possible or advisable
to change the software? The best solution sometimes is to redesign the af-
fected business processes. Typical software in this category are the functional
information systems, ERP, business intelligence, and business performance
management software.
● Streamlining the supply chain. As seen in Chapter 7, it is frequently neces-
sary to change segments in the supply chain to streamline its operations
and to better collaborate with business partners. Redesign is frequently
done on small segments of the chain, but sometimes the entire chain is re-
designed (e.g., the Orbis case of Chapter 1, where a linear chain was changed
to a hub).
● Participating in private or public e-marketplaces. With the increased trend
to use e-marketplaces comes the need to get connected to them, as well as
to the organization’s back-end processes. To enable such integration it is fre-
quently necessary to redesign internal as well as external processes. The
same is true with participation in auction sites. Not changing the processes
results in manual operations (e.g., data entry) which may be expensive,
slow, and error-prone.
● Improving customer service. To properly introduce CRM, it is often neces-
sary to change business processes. As will be seen later in this chapter, cen-
tralizing 800 numbers and empowering frontline employees involve process
restructuring.
● Conducting e-procurement. Introduction of e-procurement methods fre-
quently requires complete redesign of the purchasing process (requisition,
approval, control, and payment for purchases).
● Enabling direct online marketing. Many manufacturers as well as retailers are
using direct marketing to consumers, mostly via the Internet. Moving to
such a business model requires design or redesign of order taking and order
fulfillment.
● Reducing cost and improving productivity. For generations companies have
sought to reduce costs and increase productivity. An example is industrial
engineering methods. Many of these are part of continuous small improve-
ments, while others require radical changes in business processes (e.g., see
Barua et al., 2001, and Salladurai, 2002). This is part of the BPM process
(Chapter 11).
● Restructuring old processes prior to automation. Many organizations believe
that the solution to their problem is to automate business processes. While in
some cases it make sense to do it, in many others it does not. Automating in-
effective processes can result in only small savings, whereas restructuring can
result in a much larger savings.
● Transformation to e-business. When organizations transform themselves to
e-business, usually by automating processes or collaborating electronically, they
frequently need to change their business processes.
an
rb
Several other drivers may contribute to the need for redesign. In the follow-
llege/tu
ing sections we will describe some of them: reducing cycle time, need for cus-
tomization, and empowering employees. Another of these drivers, the problem
co
ile
y. c o m /
of the stovepipe, is described in Online File W14.10.
c14.qxd 10/4/04 19:26 Page 617 Abhinav-10 Abhinav-10:Desktop Folder:
EQA
ile
y. c o m /
W14.11. We will return to BPR in Section 14.9.
Source: Compiled from M. Hammer and J. Champy, Re-engineering the Corporation (New York: Harper Business, 2001).
Need for One objective of redesign is to overcome problems such as that of the
Information stovepipe by integrating the fragmented information systems. Besides creating
Integration inefficient redundancies, information systems developed along departmental
or functional boundaries cause difficulties in generating the information that
is required for effective decision making. For instance, consider a case where
the management of a bank wants to offer more mortgage loans to better uti-
lize large savings deposits. Management decides to send letters encouraging
specific customers to consider buying homes, using convenient financing avail-
able through the bank. Management also decides that the best customers to
whom to send such letters are: customers who do not currently have mort-
gage loans or who have loans for a very small percentage of the value of their
homes; customers who have good checking account records (e.g., few or no
overdrafts); customers with sufficient funds in their savings accounts to make
c14.qxd 10/4/04 19:26 Page 619 Abhinav-10 Abhinav-10:Desktop Folder:
EQA
the deal structurer, conducts all the necessary tasks. This one generalist
replaces four specialists. To enable one person to execute the above steps, an
expert system provides the deal structurer with the guidance needed. The
program guides the generalist in finding information in the databases, plug-
ging numbers into an evaluation model, and pulling standardized clauses—
“boilerplates”—from a file. For difficult situations, the generalist can get help
from a specialist. As a result, the turnaround time has been slashed from seven
days to four hours.
ile
y. c o m /
IT TOOLS FOR BUSINESS PROCESS REDESIGN AND BPR. A large variety of IT
tools can be used to support redesign and BPR. Some of these tools are generic
and can be used for other purposes, while others are specifically designed for
redesign and BPR. Let’s elaborate.
Special BPR and Process Redesign Software. According to El Sawy (2001),
special BPR software enables the capture of the key elements of a business
process in a visual representation made up of interconnected objects on a time
line. The elements of this visual representation usually include activities,
sequencing, resources, times, and rules. BPR software is much more than draw-
ing or flowcharting software in that the objects on the screen are intelligent
and have process and organizational data and rules associated with them. The
software is also interactive, in real time. BPR software may incorporate some
aspects of project management in terms of allocating resources and costs to
work activities and their time sequencing. BPR software also has “what-if”
an
capabilities in that it enables process simulation and performance comparison
rb
of alternative process designs. The better BPR software packages are quite intu-
llege/tu
itive and relatively easy to learn. The 10 major reasons why special BPR soft-
ware is of value for business process redesign are summarized in Online File
co
ile
y. c o m /
W14.13.
The most comprehensive special BPR suite, which includes many function-
alities, was BPR Workflow from Holosofx (now a part of IBM’s WebSphere). For
a detailed description of this package and usable software, see El Sawy (2001).
In addition to BPR Workflow one can find integrated BPR tool kits in some ERP
software (e.g., see Oracle 9i and SAP R/3).
Some people believe that BPR can be done with CASE tools (Technology
Guide 6). This is not the case, since CASE tools can be used to execute only a
few BPR activities, and they are difficult to use. Other believe that workflow
tools can be used. Again, this is true only for some redesign activities. Further-
more, the workflow capabilities in custom-designed BPR software are usually
an
superior to those of generic tools. However, for many projects there is no need
rb
for a comprehensive suite; in those situations, generic tools or special tools
llege/tu
designed to be used for only one or two BPR activities are both efficient and
effective. For a listing of some generic and single-activity tools that may be of
co
ile
y. c o m /
use in business process redesign, see Online File W14.14.
c14.qxd 10/4/04 19:26 Page 621 Abhinav-10 Abhinav-10:Desktop Folder:
EQA
Redesign of One Redesign efforts frequently involve only one or a few processes. One of the most
or a Few Processes publicized examples of process redesign is the accounts payable process at Ford
rb
an Motor Company, described in Online File W14.15. The Ford example demon-
llege/tu
ile
y. c o m /
CYCLE TIME REDUCTION. Cycle time refers to the time it takes to complete a
an
process from beginning to end. As discussed earlier, competition today focuses
rb
not only on cost and quality, but also on speed. Time is recognized as a major
llege/tu
element that provides competitive advantage, and therefore cycle time reduc-
tion is a major business objective. For a discussion of how this is done with IT,
co
ile
y. c o m /
see Online File W14.16.
Restructuring the We’ve seen that one recurrent problem in many organizations is communication
Whole Organization breakdowns in vertical structures. How should a contemporary organization be
organized? There are several alternatives. Let’s look at how it can be done with
business process redesign.
The fundamental problem with the hierarchical organizational structure is
that any time a decision needs to be made, it must climb up and down the hier-
archy. If one person says “no” to a pending decision, everything comes to a
screeching halt. Also, if information is required from several “functional sources,”
getting all the right information coordinated can be a time-consuming and frus-
trating process for employees and customers alike.
So, how is organizational redesign done? It varies, depending on the organ-
ization and the circumstances. For example, providing each customer with a
single point of contact can solve the stovepipe problem described earlier. In the
traditional bank, for example, each department views the same customer as a
separate customer. Figure 14.4 depicts a redesigned bank in which the customer
deals with a single point of contact, the account manager. The account man-
ager is responsible for all bank services and provides all services to the customer,
who receives a single statement for all of his or her accounts and can access all
accounts on the same Web page (“My Accounts”). Notice that the role of IT is
to back up the account manager by providing her with expert advice on spe-
cialized topics, such as loans. Also, by having easy access to the different data-
bases, the account manager can answer queries, plan, and organize the work
with customers.
An alternative to the single-point contact is a networked structure. In this
structure, regardless of where and when a client contacts the company, the
networked agents would have access to all customer data, so that any employee
can provide excellent customer service. Companies such as USAA, Otis Eleva-
tor, and others have all agents located in one city and give customers all over
the country the same toll-free number and a centralized Web address. In this
model, the company also can install a computer-based call-center technology,
c14.qxd 10/4/04 19:26 Page 622 Abhinav-10 Abhinav-10:Desktop Folder:
EQA
Customer
Account
Call My manager
center accounts supported
(via a portal)
by. . .
Customer
accounts
Databases
Expert system
Checking Installment
accounts loans
Backed up by. . .
Savings Mortgage
accounts loans
Investment Loan
expert expert
Etc.
FIGURE 14.4
Reengineered bank with Consolidated
integrated system. statement
ile
y. c o m /
restructuring projects. See Online File W14.17, which describes one such proj-
ect by the U.S. federal government.
BPR Failures During the 1990s, there were many success stories of BPR (Grant, 2002, El
and Successes Sawy, 2001) and just as many cases of failures.
BPR SUCCESSES. Despite the high failure rate of business process redesign,
there are many cases of success, especially when less than the entire organiza-
tion is restructured. While BPR failures tend to get more widespread publicity,
success stories are published mostly by vendors and in academic and trade jour-
an
nals. For example, there is evidence of the success of BPR in the public sector
rb
(Maclntosh, 2003). Khong and Richardson (2003) report on extensive BPR
llege/tu
ile
y. c o m /
cement manufacturing plant in India. (For details, see Online File W14.18.)
Organizations should consider restructuring their business processes or
sometimes the entire business. When successful, redesign has great potential to
improve an organization’s competitive position.
➥ MANAGERIAL ISSUES
1. Importance. Some general and functional managers believe that system
development is a technical topic that should be of interest only to techni-
cal people. This is certainly not the case. Appropriate construction of sys-
tems is necessary for their success. Functional managers must participate
in the development process and should understand all the phases. They
must also participate in the make-or-buy decisions and software selection
decisions. Inappropriate development methodologies can result in the
system’s failure.
2. Ethical and legal issues. Developing systems across organizations and coun-
tries could result in problems in any phase of system development. For
example, in developing the Nagano Olympics system in 1998, IBM found at
the last minute that pro-North-Korea groups in Japan took offense at a ref-
erence to the Korean War written on the Web site. Although the material
was taken from the World Book Encyclopedia, it offended some people. IBM
had to delete the reference and provide an apology. IBM commented, “Next
time we’re going to do a ton of research first versus just do it and find out
the hard way.” A special difficulty exists with Internet-related projects, where
legislation is still evolving.
3. User involvement. The direct and indirect users of a system are likely to be
the most knowledgeable individuals concerning requirements and which al-
ternatives will be the most effective. Users are also the most affected by a
new information system. IS analysts and designers, on the other hand, are
likely to be the most knowledgeable individuals concerning technical and
data-management issues as well as the most experienced in arriving at viable
systems solutions. The right mixture of user involvement and information
systems expertise is crucial.
c14.qxd 10/4/04 19:26 Page 624 Abhinav-10 Abhinav-10:Desktop Folder:
EQA
4. Tool use by developers. Development tools and techniques can ensure that
developers consider all necessary factors and standardize development,
documentation, and testing. Forcing their use, on the other hand, may
unnecessarily constrain innovation, development efficiency, and personnel
productivity.
5. Quality assurance vs. schedules. Quality counts in the short term and the
long term, but it can lengthen development and increase developmental
costs. Trying to meet tight development schedules can induce poor quality
with even worse schedule, cost, and morale problems. Control is done with
ISO 9000 standards (see Online File W14.18).
6. Behavior problems. People use information systems and often become quite
used to how existing systems work. They may react to new systems in
unexpected ways, making even the best technically designed systems useless.
Changes brought about by information systems need to be managed effectively.
Of special interest is the issue of motivating programmers to increase their pro-
ductivity by learning new tools and reusing preprogrammed modules.
7. Perpetual development. Information systems are designed to meet organiza-
tional needs. When they don’t accurately meet these needs, or these needs
change, information systems need to be redeveloped. Developing a system
can be a major expense, but perpetually developing a system to maintain its
usefulness is usually much more expensive.
8. Risk level. Building information systems involves risk. Systems may not be
completed, completed too late, or require more resources than planned. The
risk is large in enterprise systems. For how to manage such risk, see Scott
and Vessey (2002) and Levine (2004).
9. Business process redesign. Business process redesign can be driven by the
need to prepare for IT or by many other reasons. It can be done by method-
ologies ranging from BPR to BPM.
10. Structural changes. IT helps not only to automate existing processes but also
to introduce innovations that change structure (e.g., create case managers
and interdisciplinary teams), reduce the number of processes, combine tasks,
enable economic customization, and reduce cycle time.
11. Ethical and legal issues. Conducting interviews for finding managers’ needs
and requirements must be done with full cooperation. Measures to protect
privacy must be taken.
In designing systems one should consider the people in the system.
Reengineering IT means that some employees will have to completely reengi-
neer themselves. Some may feel too old to do so. Conducting a supply chain
or business process reorganization may result in the need to lay off, retrain, or
transfer employees. Should management notify the employees in advance
regarding such possibilities? And what about those older employees who may
be difficult to retrain?
Other ethical issues may involve sharing of computing resources or of
personal information, which may be part of the new organizational culture.
Finally, individuals may have to share computer programs that they designed
for their departmental use, and may resist doing so because they consider
such programs their intellectual property. Appropriate planning must take
these and other issues into consideration.
c14.qxd 10/4/04 19:26 Page 625 Abhinav-10 Abhinav-10:Desktop Folder:
EQA
12. Integration: The role of IT in redesign and BPR. Almost all major supply
chain management (SCM) and/or BPR projects use IT. However, it is impor-
tant to remember that in most cases the technology plays a supportive role.
The primary role is organizational and managerial in nature. On the other
hand, without IT, most SCM and BPR efforts do not succeed.
KEY TERMS
Application service provider Business process reengineering Request for proposal (RFP) xxx
(ASP) xxx (BPR) xxx Service level agreements
Business process xxx Cycle time reduction xxx (SLAs) xxx
Business process management On-demand computing xxx
(BPM) xxx
EXERCISES
1. Enter ecommerce.internet.com. Find the product review 3. Examine some business processes in your university
area. Read reviews of three software payment solutions. or company. Identify two processes that need to be
Assess them as possible components. redesigned. Employ some of El Sawy’s 10 principles
2. Prepare a comparison of the following utility computing (see Online File W14.11) to plan the redesign. Be
initiatives: IBM’s On-Demand, H-P’s Adaptive Enter- innovative.
prise, and Fujitsu’s Triole Utility. What is the focus of
each? What are their strategies?
GROUP ASSIGNMENTS
1. Assessment of the functionality of an application is a 3. As a group, design an information system for a startup
part of the planning process (Step 1). Select three to five business of your choice. Describe your chosen IT re-
Web sites catering to the same type of buyer (for in- source acquisition strategy, and justify your choices of
stance, several sites that offer CDs or computer hard- hardware, software, telecommunications support, and
ware), and divide the sites among the teams. Each team other aspects of a proposed system.
will assess the functionality of its assigned Web site by 4. Have teams from the class visit IT project-development
preparing an analysis of the different sorts of functions efforts at local companies. Team members should inter-
provided by the site. In addition, the team should assess view members of the project team to ascertain the fol-
the strong and weak points of its site from the buyer’s lowing information.
perspective. a. How does the project contribute to the goals and ob-
2. Divide into groups, with each group visiting a local com- jectives of the company?
pany (include your university). At each firm, study the b. Is there an information architecture in place? If so,
systems acquisition process. Find out the methodology how does this project fit into that architecture?
or methodologies used by each organization and the c. How was the project justified?
types of application to which each methodology applies. d. What project planning approach, if any, was used?
Prepare a report and present it to the class. e. How is the project being managed?
INTERNET EXERCISES
1. Enter ibm.com/software. Find the WebSphere product. (cio.com). Search for recent material about ASPs and
Read recent customers’ success stories. What makes this outsourcing, and prepare a report on your findings.
software so popular? 3. Enter the Web site of IDC (idc.com) and find out how the
2. Enter the Web sites of the Gartner Group (gartnergroup. company evaluates ROI on portals, supply chain, and
com), the Yankee Group (yankeegroup.com), and CIO other IT projects.
c14.qxd 10/4/04 8:51 PM Page 628 RKAUL-7 Abhinav-07:Desktop Folder:PQ1011:
EQA
4. Visit the Web site of Resource Management Systems c. Does StoreFront 5.0 support larger or smaller stores?
(rms.net) and take the IT investment Management Ap- d. What other products does StoreFront offer for creat-
proach Assessment Self-Test (rms.net/self_test.htm). Com- ing online stores? What types of stores do these
pare your organization’s IT decision-making process products support?
with those of best-practices organizations. 6. Surf the Internet to find some recent material on the
5. StoreFront (storefront.net) is the leading vendor of e- role IT plays in support BPR. Search for products and
business software. At its site, the company provides vendors and download an available demo.
demonstrations illustrating the types of storefronts that 7. Identify some newsgroups that are interested in BPM.
it can create for shoppers. The site also provides demon- Initiate a discussion on the role of IT in BPM.
strations of how the company’s software is used to cre-
8. Enter gensym.com and find their modeling products. Ex-
ate a store.
plain how they support BPR and redesign.
a. Run either the StoreFront 5.0 or StoreFront 6.0
9. Enter xelus.com/index.asp and find how Xelus Corporation
demonstration to see how this is done.
software can facilitate planning (e.g., see the Cisco case).
b. What sorts of features does StoreFront 5.0 provide?
Minicase 1
Enterprise Web at Pioneer Inc.
Pioneer is a large, global oil and gas company that needed Enterprise Web technologies offer an integrated solution of
IT tools to streamline business processes, automate work- portal and collaboration technologies, giving users a uni-
flows, and improve communication internally and with fied, interactive environment and project sponsors a low
business partners. The company also needed IT infrastruc- total cost of ownership.
ture that would be the foundation for building enterprise Enterprise Web applications are hosted on different ap-
Web applications. The employees needed a system that plication servers but managed within one framework. They
would enable them to collaborate and that would give differ from traditional applications in three ways: First,
them an up-to-date view of the company’s finance and Enterprise Web applications combine existing data and
production activities. The company selected a compre- processes from diverse enterprise systems with new shared
hensive software suite, Enterprise Web (from Plumtree. services, providing greater return on assets. Second, Enter-
com). The suite includes a corporate portal, a content prise Web applications are assembled dynamically, incor-
server, and a collaboration server. The suite fulfilled the porating new capabilities on-the-fly, allowing for greater
above requirements, and it also helped to better manage agility in solving business problems. Finally, Enterprise
the oil exploration and extraction processes. All of these Web applications are designed to be integrated into an en-
capabilites resulted in higher productivity and profit. terprisewide environment, providing greater economies of
The portal is bringing fundamental changes to the way scale; users can easily navigate between or search across
Pioneer works, from empowering employees in remote lo- applications, and Web Services developed for one enter-
cations to collaborate on data analysis, to giving executives prise Web application can be reused as-is in other applica-
and key employees the ability to monitor oil and gas field tions. Special functionalities of Enterprise Web applications
production volumes in near real time. The new system are the ability to unlock data hidden in complex systems,
simplifies access to information, freeing Pioneer employees provide real-time production monitoring via dashboards,
from the complexity of underlying systems. capture knowledge in collaborative communities, and pro-
vide balanced-scorecard applications.
Using Open Architecture Pioneer selected Plumtree for the functionalities listed
To integrate information and functionality from systems above, as well as because of its published success with
running on different application servers and coded in dif- other companies in the oil and gas industry. Pioneer leases
ferent languages, Pioneer needed the openness provided the software from Plumtree, paying a monthly fee based on
by Plumtree’s Web Services Architecture. In addition, the the number of users.
c14.qxd 10/4/04 19:26 Page 629 Abhinav-10 Abhinav-10:Desktop Folder:
EQA
MINICASE 2 629
Source: Compiled from a press release from Plumtree Software Inc. 3. Relate the case to the issue of integration.
(plumtree.com), October 14, 2003.
4. Why did the company need the collaboration server?
Questions for Minicase 1 5. What is the role of Web Services?
1. What acquisition option was selected? Why? 6. Which problems were solved by the use of the software?
2. Why was Plumtree selected?
Minicase 2
McDonald’s Global Network Comes Up Short
discontinued Innovate even before its development had Questions for Minicase 2
been completed. Because it had never been on the cutting
1. What are the major IOS and global information systems
edge of technology, the company had a lack of experience
that the company needed?
in this area. Though the company had shown little or no
expertise in large-scale information systems implementa- 2. What information requirements were needed by the
tions when Innovate was initiated, its executives thought company?
they could easily and completely revamp their entire core 3. What were the major problems that led to the failure of
technology infrastructure. Further, its executives did not Innovate?
understand technology and made it a low priority for the 4. Relate the case to Figure 14.1. In which of the steps did
company. McDonald’s had fallen victim to some of the clas- the company fail?
sic pitfalls that face corporations trying to justify and im- 5. If McDonald’s were choosing from among today’s tech-
plement information systems projects of this size for the nologies, it probably would have selected Oracle Infor-
first time. mation Architecture (Chapter 2) instead of Oracle ERP.
Examine the new architecture. Speculate on what con-
Source: Compiled from Barrett and Gallagher (2003). tribution it could have provided to McDonald’s.
REFERENCES
Barrett, L., and S. Gallagher, “McBusted,” Baseline (July 2, 2003). Gerlach, R., et al., “Determining the Cost of IT Services,” Commu-
Barua, A., et al., “Driving E-Business Excellence,” MIT Sloan Man- nications of the ACM, 45(9), September 2002.
agement Review, 43(1), 2001. Grant, D., “A Wilder View of Business Process Reengineering,” Ass-
Benaroch, M., “Managing Information Technology Investment ociation for Computing Machinery, 45(2) 2002.
Risk: A Real Options Perspective,” Journal of MIS, 19(2), Fall 2002. Gunasekaran, A., et al., “A Model for Investment Justification in
Brandel, M., “Lincoln Financial Syndicates Content with Web Ser- Information Technology Products,” International Journal of Informa-
vices,” Computerworld, March 15, 2004. tion Management, March 2001.
Briggs, R. O., “Information Systems Design—Theory and Method- Hammer, M., and J. Champy, Re-engineering the Corporation. New
ology,” Special issue, JMIS, Spring 2004. York: Harper Business, 2001.
Broadbent, M., and P. Weill, “Management by Maxim: How Busi- Hengst, M. D., and G. D. Vreede, “Collaborative Business Engi-
ness and IT Managers Can Create IT Infrastructures,” Sloan Man- neering: A Decade of Lessons from the Field,” Journal of Manage-
agement Review, Spring 1997. ment Information Systems, 2004.
Brobst, S., “Enterprise Application Integration and Active Data,” Here, T., “Utility Computing,” Analyst Views, February 2003. -
TDWI Flashpoint (Newsletter), dw-institute.com, September 11, analystviews.com/data/web/av/JSP/AnalystContent?SummitStrategies_
2002. 20030207.jsp.
Carroll, C. T., “Structured Project Requests for Control, Analysis and Kanter, J., and J. J. Walsh, “Toward More Successful Project Man-
Training,” Information Strategy—The Executive Journal, Summer 2004. agement,” Information Strategy—The Executive Journal, Summer
Casati, F., et al., “Business-Oriented Management of Web Ser- 2004.
vices,” Communications of the ACM, October 2003. Kaplan, R. S., and D. P. Norton, The Balanced Scorecard: Translating
CIO.com, cio.com/archive(040103)strategy.html (accessed July 2003). Strategy into Action. Boston: Harvard Business School Press, 1996.
Enhanced edition (e-book), 2001.
CIO Magazine, November 2000.
Coffee, P., “Data Integration Is IT’s Frontier,” eWeek, February 23, Kendall, K. E., and J. E. Kendall, Systems Analysis and Design, 6th
2004. ed. Upper Saddle River, NJ: Prentice Hall, 2005.
Craig, G., “Old Dental Manufacturer Adopts New IT Tricks,” Outs- Kern, T., and T. Kreijger, “An Exploration of Application Service
ourcing Magazine, November–December 2003. Provision Outsourcing Option,” Proceedings of 34th HICSS, Maui,
January 2001.
Database, “5-Minute Briefing: Data Integration,” Database: Trends
and Application, dbta.com/5_minute_briefing/3–10–03.html (accessed Khan, M. R. R., “BPR of an Air Cargo Handling Process,” Internat-
December 2003). ional Journal of Production Economics, January 2000.
Devaraj, S., and R. Kohli, The IT Payoff: Measuring Business Value of Khong, K. W., and S. Richardson, “BPR in Mayasian Banks and
Information Technology Investments. Upper Saddle River, NJ: Finan- Finance Companies,” Managing Service Quality, January 2003.
cial Times Prentice Hall, 2002. Kishore, R., et al., “A Relationship Perspective on IT Outsourcing,”
El Sawy, O., The BPR Workbook. New York: McGraw-Hill, 1999. Communications of the ACM, December 2003.
El Sawy, O., Redesigning Enterprise Processes for E-Business. New York: LeBlond, R., “BPM: Look Under the Hood,” CIO Asia, March 2003,
McGraw-Hill, 2001. cio-asia.com.
Evangelista, A. S., and L. A. Burke, “Work Redesign and Perfor- Levine, R., “Risk Management Systems: Understanding the
mance Management in Times of Downsizing,” Business Horizons, Needs,” Information Strategy—The Executive Journal, Summer
46(2), 2003. 2004.
c14.qxd 10/4/04 19:26 Page 631 Abhinav-10 Abhinav-10:Desktop Folder:
EQA
REFERENCES 631
MacIntosh, R., “BPR: Alive and Well in the Public Sector,” Internat- Sachdeva S., “Outsourcing Strategy Helps Ansett Australia
ional Journal of Operations and Production Management, 23(3/4), 2003. Streamline Its Business,” IBM Success Story, 2000, ibm.com/services/
Martin, E. W., et al., Managing Information Technology. Upper Saddle successes/ansett.html (accessed January 2004).
River, NJ: Prentice Hall, 2000. Salladurai, R., “An Organizational Profitability, Productivity, Per-
Mohanty, R. P., and S. G. Deshmukh, “Reengineering of Materials formance (PPP) Model: Going Beyond TQM and BPR,” Total Qual-
Management System: A Case Study,” International Journal of Pro- ity Management, 13(5), 2002.
duction Economics, 70(3), 2001. Sarker, S., and A. S. Lee, “It-Enabled Organizational Transforma-
Overby, S., “Bringing I.T. Back Home,” CIO Magazine, March 1, tion: A Case Study of BPR Failure at TELECO,” Journal of Strategic
2003, cio.com/archive/030103/home.html (accessed January 2004). Information Systems, Vol. 8, 1999.
Sarkis, J., and R. P. Sundarraj, “Evaluating Componentized Enter-
PC Week, 1998.
prise Information Technologies: A Multiattribute Modeling Ap-
Perry, R., “The Future of BPM,” ebizQ (ebizQ.net), April 19, 2004. proach,” Information Systems Frontiers, 5(3), 2003.
Plumtree Software Inc., plumtree.com, October 14, 2003. Smith, H., and P. Fingar, Business Process Management (BPM): The
Rajaram, K., and C. J. Corbett, “Achieving Environmental and Third Wave. Tampa, FL: Meghan-Kiffar, 2003.
Productivity Improvements Through Model-based Process Re- Sterlicchi, J., and E. Wales, “Custom Chaos: How Nike Just Did It
design,” Operations Research, 50(5), 2002. Wrong,” Business Online (BolWeb.com), June 2001.
Ravichandran, T., “Component-Based Software Development,” Ward, J., and J. Peppard, Strategic Planning for Information Systems,
Special issue. Data Base, Fblazesoft.com, February 2003. 3/e, New York: Wiley, 2002.
Regan, E. A., and B. N. O’Connor, End User-Information Systems, Whitten, J., et al., Systems Analysis and Design Methods, 6th ed.
2nd ed. Upper Saddle River, NJ: Prentice Hall, 2002. New York: Irwin/McGraw-Hill, 2003.
Rogers, S., InterSystems Ensemble: Integration for Today’s Rapidly Xia, W., and G. Lee, “Grasping the Complexity of IS Development
Changing Enterprise, special report. Framingham, MA: IDC, 2003. Projects,” Communications of the ACM, May 2004.