Professional Documents
Culture Documents
Week 1 – IT Strategy
Collis, Rukstad – Can You Say What Your Strategy Is?
A significant proportion cannot articulate the objective, scope, and advantage of their business in a simple
statement. How are the employees expected to do so? If you have 10,000 smart employee and everyone heads in
a slightly different direction, no progress is made. Thus, a concise and clear strategy statement should align all
employees similar to a magnet and make their actions exponentially more effective. With a clear definition two
things happen:
1. Formulation becomes infinitely easier because executives know what they are trying to create.
2. Implementation becomes much simpler because the
strategy can be readily communicated and internalised
by the whole organisation.
statement. Clarity about what makes the firm distinctive is competitors offer
what most helps employees understand how they can
contribute to successful execution of its strategy. The firm’s
competitive advantage includes 1) customer value
proposition (e.g. your value offered relative to competitors) and 2) the complex combination of activities
allowing that firm alone to deliver the customer value proposition.
The figure to the right expresses the firm’s strategic sweet spot: where the firm meet’s the customer’s needs where
the competitor can’t, given the context where it competes.
: instruments employed to achieve the motivation incl. business strategy), and business influencers (factors
influencing motivation and means i.e. PEST and SWOT).
• Business execution: the organization layer which includes business processes, information entities,
organizational structures (functional, geographical and legal), people, culture, resources, and their
aggregation into ‘‘logical’’ business capabilities. A business capability is an enterprise’s ability to
execute a defined and repeatable pattern of activities and produce a desired outcome (e.g., product,
(
a business. This level is best viewed as the Business
deployment of standard IT applications
1- minimal charges with minimal changes to the business e
(
capabilities Motivation
easy
to copy
potential capabilities and fails to provide
organizations with as many possible
(
a
Business
advantages if the company had attempted
to change the business processes to ✓ Efficiency Execution
leverage the technical functionality. The gains
Hilti Case
1. Business Strategy: What is Hilti’s path to market leadership? (operational excellence, customer intimacy,
product/service leadership)
2. Operating Model: Which operating model uses Hilti? (diversification, replication, coordination,
unification)
3. IT Alignment: How well is Hilti’s digital strategy aligned (with business strategy, organizational
processes, and IT processes)
Introduction
Hilti is a major player in the construction and building-maintenance industry, headquartered in Liechtenstein and
employing more than 22,000 employees. The company operates production facilities, R&D centres and has
diverse technological partnerships. The strategic foundation is a “caring and performance-oriented culture” while
following the company purpose of “passionately creat(ing) enthusiastic customers and build(ing) a better future”.
Hilti focuses on product and service differentiation, direct customer relationships, operational excellence,
and high performing global teams. Of the service department, most employees are involved in direct sales. A
series of initiatives to increase performance were taken to have mobile and real-time business solutions and
advanced analytics tools in place. The resulting technology-enabled opportunities require leveraging holistically
the potential of digital technologies to support process innovation.
The Journey
The company underwent a transformation that was radical in scope. This transformation included, local business
integration, global IT standardisation, achieving IT agility, and establishing balance (IT, business, employees and
customers) that supports digital innovation. First, Global Integration entails the removal of silos to establish
enterprise-wide processes and common data structures. Next, Modularity allows a certain degree of flexibility and
agility, moving to the Digital Take-off when leveraging previous innovation and transformation efforts in new
digital offerings. Finally, Digital Maturity occur when leveraging digital potential is daily business and an
integrated part of the business model.
Lecture 1 (27.10.2020)
Business architecture:
• Business motivation (why?)
• Business model (what?)
• Business execution (how?)
How to algin business strategy with IT?
Business transformation:
How can we transform businesses? redesign business processes either through:
• Changing the motivation
• Changing the execution
→ we do not redesign through the model
↳ link to article
Covered in this course:
1. Business architecture: IT Strategy, IT Governance
2. Business transformation: IT Process Management, IT Project Management, IT Risk Management
3. Business decisions: IT Sourcing, IT Decision Making
Business IT Strategy
Traditional approach: Strategy > IT > Alignment (IT supports strategy)
Technology-driven approach: IT > Strategy > Alignment (IT is part of the strategy), e.g. Google, Amazing, etc.
Vision and Mission
Breakout room (#11):
• VW’s main competitors?
o Traditional car makers: GM, Ford, BMW, Audi, etc.
o Electric car makers
o Autonomous driving
o Could also be public transport/ride hailing/alternative transport
• What might be its vision (business inspiration) & mission (goal)?
o Vision: Make this world a mobile, sustainable place with access to all citizen.
Uber has a very similar statement
o Mission: Offer vehicles
Uber wants to offer transport Uber and VW have different IT needs
• What strategy might VW follow?
o Making electric cars more reliable/accessible better technology
Strategies to Market Leadership
Competitive strategies for market leadership (excel in one and be good in the others): pleads to cost leadership
• Operational excellence: automate/streamline processes, reduce costs low costs →
business processes
o Toyota, VW, Action, etc.
• Customer intimacy: personalise service, customise, meet different needs differentiation → customer
segmentation
o Uber
• Product leadership: premium market, premium experience for customers differentiation → product
innovation
o Apple
→
production outsourced
Strategy is also influenced by internal/external drivers:
• External:
o Economic environment, market requirements, competitors
• Internal:
o Stakeholder demands, entry assets/capabilities, strategic aspects/capabilities
Operating Models
How you implement a certain strategy. → CORD knowing what the others are
doing
data
f
↳
access
Business process integration
Coordination
Unification
High
t
(banks,
(Amazon) tf
consultancies)
Diversification Replication
Low
t
(GE, Siemens, (McDonalds,
conglomerates) Starbucks)
""" """ " ""
Low High
)
• In the case of VW (it depends on how you think about a company) Diversification
.
.. . . .
.
• In the case of Uber Unification
Once we decide on a strategy and a model, IT can support our model.
Business IT Alignment
Strategic areas need to be aligned:
OKR Method
OKR >> Method
BSC >> Measures
CSF >> Actions
Tools
Balance Score Card → FILL
use OKR
critical
Consolidating BSC and CSF analysis
success factors
Week 2 – IT Governance
Weill, Ross – A Matrixed Approach to Designing IT Governance
Note: Session 2 required to create write-up based on this article.
Introduction
Weill and Ross studied almost 300 enterprises and found that IT governance is a mystery to most key decision
makers, only one in three senior managers knows how IT is governed at his/her company. Top-performing
enterprises, however, carefully design governance. 60 to 80% of those senior executives have a clear
understanding of IT governance, awareness of IT governance is the single best indicator of its effectiveness.
Effectiveness can be measured with four objectives:
:
1. Cot-effectiveness
2. Asset utilisation
3. Business growth
4. Business flexibility
Superior governance performance is positively correlated with superior financial performance.
Governance Mechanisms
Once the types of decisions and archetypes are mapped out, the company designs and implements a set of
governance mechanisms for manager to work on it on a daily basis.
Decision-making Structures
Organisational committees and roles that locate decision-making responsibilities according to intended archetypes
are most visible.
• Anarchies no decision-making structures at all.
• Feudal arrangements local decision-making.
• Monarchy, federal or duopoly structures with the representation and authority to produce enterprise
wide synergies.
:
Alignment Processes
Management techniques for securing widespread and effective involvement in governance decisions and their
implementation.
• IT investment proposal defining, reviewing and prioritising IT projects.
• Architecture exception formal assessment of the costs and value.
• Service-level agreements & chargebacks clarify costs and discussion what services are required.
• Formal tracking of business value determine the payback on completed projects.
Formal Communications
Lack of understanding of how decisions are made, what processes are implemented and desired outcomes, is a
huge barrier to IT governance. Overcome this by communicating:
• General announcements, institution of formal committees, regular communication, one-on-one sessions,
intranet, etc.
more communication generally means more effective governance.
10
2. Minimise constraints on creativity and business unit autonomy few, if any standards for tech and
business processes
3. Few governance mechanisms
4. Investment process identifies high-priority strategic projects and manages risks
Once a company becomes larger, a more centralised approach may be necessary.
Hybrid approaches and Asset Utilisation (J.P. Morgan Chase, ING DIRECT, DuPont, etc.)
This approach is a balance between the two formerly mentioned approaches (profitability, growth and innovation)
and focusses on shared services to achieve responsiveness or/and economies of scale. Emphasis on:
1. Sharing and reuse of processes, systems, technologies and data
2. Hybrid approach mixing elements of centralised and decentralised governance
3. Duopolies and federal governance design
4. Introduce governance mechanisms to address the tension between enterprise wide and local control
Large, global companies require a hybrid model to achieve the benefits of centralised (synergies) and decentralised
(autonomy) models. Also, they attempt to realise cost savings by sharing services to remove duplication or reduce
IT unit cost.
goals
4. Thoughtfully design IT governance on one page.
a. Outlining governance arrangements and then specify mechanisms that will implement the
intended arrangements
b. Invest in organisational learning if using IT strategically was not effective in past
11
Z• Economies of scope (benefits when a firm can share resources across multiple product types): requires
administrative mechanisms across subunits to ensure exploitation of common synergies i.e. economies
of scope. Feasibility depends upon:
1. Diversification mode: growth strategy driven by internal expansion or external acquisitions. Internal
expansion is done through internal capabilities and product-market expansions. Two determinants:
- The firm is familiar with new markets and adopted new technologies (e.g. to extend
administrative and operating systems to the new business venture).
- The pace of internal expansion is gradual allowing the firm to adopt governance mechanisms to
i
exploit synergies and economies of scop
External expansion faces challenges (cost of integration > economies of scope) when integrating new units for 3
reasons:
- Conflicting organizational designs
- Organizational inertia by management of the new unit new design not done
- Lack of harmony, goal alignment and competitive stance (rather than cooperative stance).
2. Diversification breath (degree of product/market relatedness of a multi-business firm): if a firm’s
operating units are characterized by unrelated product-markets, these operating units require specific
IT needs. Hence local IS staff are better positioned than corporate IS staff.
3. Exploitation strategy (exploit economies of scope through development of enterprise-wide
partnerships or through consolidation of enterprise-wide IT assets): Partnerships signal that relevant
knowledge is dispersed across the enterprise. On the other hand, IT assets must be consolidated and
managed by a centralized entity when dispersed. Note: these exploitation strategies are only possible
if corporate diversification mode or breadth permits leveraging economies of scope
3 • Absorptive capacity: the ability of a firm’s employees to develop relevant knowledge bases, recognize
valuable external information, make appropriate decisions, and implement effective work processes and
structures. If absorptive capacity rises, then there might be greater pressure towards decentralization
(given that managers are knowledgeable about IT)
• Multiple contingencies: 2 issues. First: individual contingency forces will likely be perceived differently
by each unit i.e. relative strength of contingency upon unit work design. Second: the effects of individual
contingency forces are amplified, dampened, or overridden depending on the size and type of
contingency forces (given context).
- Reinforcing: two contingency forces reinforcing a singular effect toward a centralized or
decentralized IT governance mode.
- Conflicting: one contingency force pushes towards a centralized mode, whereas the other favors
decentralization. Consequence: a federal mode of IT governance. The federal mode of
governance allows unbundling the authority for distinct segments of IT activities and vesting
the locus of authority for those segments in response to the effects of distinctive, and conflicting,
contingencies.
- Dominating: despite the presence of multiple contingencies, one or two contingencies impose
significantly higher opportunity costs than others, hence the firm must act as if these are the
only two contingencies present.
12
13
1 Architecture → Skeleton
2 Governance
→ Muscle
?
4. IP assets
5. Information and IT assets
6. Relationship assets
'
→
3
up costs for
• Content of an organisational function
understanding Bb requirements
Also, there are two different structures, also: + lower
costs for interacting with
• Functional (smaller firms, centralised corporate governance) users
IT Governance
Contingency Factors (influencing governance structure) →
related to article
• Corporate governance
o Overall governance mode
o Firm size
• Economies of scope
o Diversification mode
o Diversification breath
o Exploitation mode
• Absorptive capacity
o Line IT knowledge
14
IT Governance Mode
Business monarchy: senior management makes decision.
IT monarchy: IT professionals make decisions.
Feudal model: each local entity makes decisions (anarchy at
s
business unit level).
c.
Federal: joint decision-making between centre and business unit,
maybe IT professionals (might be the most difficult one).
IT duopoly: two-party arrangement between IT and business,
.
latter is represented through central or decentral entity.
Anarchy: no general structure.
↳ most difficult
→
Instant
15
IT Decision Types
→ strategic
→ business units
→
strategic
Balance!
I
→ strong CIO
( potential
Other decisions: poorer performance of federal
(slow, overly comprise, less effective)
synergy
IT governance design:
1. Identify the company’s needs for synergy and autonomy
a. Benefits and costs
16
}
a. Achieve objectives
4. Thoughtfully design IT governance on one page
Correct answer: D
Correct answer: A
17
↳ check answer in WA
18
19
5. Team development: the IT PM with effective team development skills has the ability to create a
productive team environment for those working on the project while demonstrating concern for their
personal and professional growth.
- The ideal IT PM is aware of positive ways of motivating and inspiring team members, which
could involve team-building exercises.
- When assigning tasks to individuals, the ideal IT PM is cognizant of the individual’s current
skill level and whether additional training or mentoring might be required for the person to
complete the assigned task
6. Client management: involve the IT PM’s ability to successfully relate to clients during all phases of
the project.
- PMs need to understand the client’s business environment enough to be able to consult with
them and solve the client’s problems
- Often, the PM needs to be able to look beyond the formally stated requirements.
7. Systems development: refers to the ability to understand and manage the technical aspects of
developing complex, technical systems while controlling for quality.
- The ideal PM understands the big picture of the system and how tasks are related. By contrast,
the incompetent IT PM is too detail oriented and does not have sufficient understanding of the
overall goal and complexity of the system to make good decisions.
8. Problem solving: involves the ability to address problems efficiently and effectively.
- Competent PMs must proactively address problems and know how to analyze the root causes
of problems and be willing to take responsibility for any problems that occur.
- Successful PMs have a high level of awareness about potential issues. When presented with
issues, they gather information about the problem and use their analytical abilities to get to the
root of the problem.
9. Personal integrity: the PM who demonstrates personal integrity acts in a manner consistent with high
ethical standards as opposed to self-interest. PMs who lack personal integrity were most likely to be
considered incompetent.
- Incompetent PMs are often more concerned about their own career advancement than the
success of the project. To that end, they would consider dishonesty and political manoeuvres to
be acceptable techniques.
• IT PM archetypes: During the final stage of data analysis, we examined how participants combined the
skill categories when describing the ideal IT PM. Participants were placed into four groups based upon
how closely their identified skill sets matched. To graphically represent the relative weights of our
categories, we totaled the number of times each category was mentioned by participants in this group.
The star chart shows the percentage of time each skill category was mentioned within the group. In the
following sections, the beliefs that most distinguish each of the four IT PM archetypes are described.
20
21
451
1. People: IT human capital issues
. - Undermined motivation probably has a larger effect on productivity and quality than any other
factor
- After motivation, the largest influencer of productivity is either the individual capabilities of the
team members or the working relationship among team members
- Most common complaint about team leaders is failure to take action to deal with a problem
employee
- Most classic mistake is adding people to a late project, this can take more productivity away
from existing members than it adds
43% 2. Process: includes both management processes and technical methodologies. Common ineffective
practices include:
- Wasting time before the project starts, in the so called ‘fuzzy front end’ (approval, budgeting,
etc.) and then having an aggressive schedule after the start. It is easier to save a few weeks or
months in the fuzzy front and then compress a development schedule.
- Human tendency to underestimate a project leads to undermining effective planning, short-
changing requirements determinations and/or quality assurance.
- Insufficient risk management – failure to proactively assess and control what might go wrong
with a project. Common risks are lack of sponsorship, include lack of sponsorship, changes in
stakeholder buy-in and contractor failure.
- Increase rise of contractor failures alongside the rise of outsourcing.
8%
3. Product: product size is the largest contributor to project schedule, giving rise to heuristics as the
80/20 rule. Common product-related mistakes:
- Requirements gold-plating
- Feature creep
- Developer gold-plating
- Research-oriented development
4% 4. Technology: the use and misuse of modern technology
- Silver-bullet syndrome: a solution for one project does not always work for other projects
- Overestimated savings from new tools or methods
- Switching tools in the middle of a project
• Results of paper: Most classic mistakes were categorized as either process mistakes (45%) or people
mistakes (43%). The remainder were classified as product (8%) or technology (4%) mistakes.
22
Technology is seldom the reason for failure, hence technical expertise is rarely enough to bring a project
on-schedule
• Avoiding classic mistakes through best practices: In addition to uncovering what went wrong on the
projects studied, the retrospectives also captured what went right. If leveraged properly, these methods,
tools, and techniques can help organizations avoid the classic mistakes from occurring in the first place.
This section describes the top seven classic mistakes (which occurred in at least one-third of the projects)
along with recommendations for avoiding each mistake.
1. Avoiding poor estimating and/or scheduling: sizing or scoping the project, estimating the effort and
time required and developing a calendar schedule:
- Using developer-based estimates (e.g. Delphi approach, historical data) and estimation software
- Make the estimation process a series of iterative refinements
- Timebox development, as smaller and shorter projects are easier to estimate
- Creating a work breakdown structure to help size and scope projects v. Retrospectives to capture
actual size, effort and time data
- A project management office to maintain a repository of project data
- Using agile methods and implementing short release cycles
2. Avoiding ineffective stakeholder management:
- Identify the stakeholders that are in most need of attention and map their power, influence and
control of resources (stakeholder worksheet and assessment graph)
- Use communication plans
- Create a project management office
- Portfolio management
3. Avoiding insufficient risk management:
- Use a prioritized risk assessment table
- Actively managing the top 10 risks
- Conducting interim retrospectives
- Appoint a risk officer to play devil’s advocate
4. Avoiding insufficient planning:
- Create an approved and comprehensive project charter
- Clearly define project governance
- Portfolio management
5. Avoiding short-changing quality assurance:
- Use agile development
- Joint application design sessions
- Automated testing tools
- Daily build-and-smoke test
6. Automated weak personnel and/or team issues:
- Get the right people assigned to the project from the beginning
- Take care of problem personnel immediately
- Co-location of staff (e.g. if you outsource/offshore, send staff there for face-to-face team
meetings)
7. Avoiding insufficient project sponsorship:
- Identify the right sponsor from the beginning
- Securing commitment with a project charter
- Manage the relationship throughout the life of the project (e.g. with communication plans and
well-timed deliverables)
23
• Leveraging IT project retrospectives: Aggregating retrospective findings across projects and over time
provides benefits, as this research study has demonstrated. Therefore, we encourage managers to
replicate this meta-retrospective process in their organizations. By uncovering patterns of practice, they
should reap higher organizational learning, accumulate benefits over the long term, and, ultimately,
increase business value. Roughly 50% of the projects experienced problems in three areas: estimation
and scheduling, stakeholder management, and risk management, while over one-third struggled with the
top seven classic mistakes. On the front end of a project, we encourage project managers and PMOs to
proactively identify the problems most likely to arise in each project and then use the matrix to help
prioritize their project specific best practices. At a more macro level, PMOs can use such a matrix to
identify practices that should be
incorporated into their organization’s
standard project methodology to avoid
common mistakes across the organization.
In conclusion, the proactive and well-
informed use of best practices is the best
way to steer clear of classic mistakes and
ultimately avoid becoming an infamous
failure. For project managers, best
practices are also the prescription for
avoiding Einstein’s definition of insanity:
doing the same thing over and over and
expecting different results.
• The matrix summarizes the classic mistakes and best practices
24
Project Charter
Is a central document that defines the fundamental information about a project and is used to authorise it.
in the initiation phase 1 Description
2 Scope
Part 2: Cost Management
3 Business case
Type of IT Costs
• Benefits
o Tangible: associated with an information system that can be measured in dollars with certainty
Cost reduction
Error reduction
Increased flexibility, etc.
o Intangible: derived from the creation of an information system, cannot be easily measured
Timely information
Better usage of resources, etc.
• Costs
o Tangible: associated with an information system that can be measured in dollars with certainty
Hardware, software, training, etc
o Intangible: associated with an information system that cannot be measured in dollars with
certainty
Employee morale, loss of customer goodwill
o One time: associated with project start-up and development
System development, new hardware and software, user training, data or system
conversion, etc.
o Recurring: resulting from the ongoing evolution and use of a system
Application maintenance, incremental data storage expense, incremental
communications, etc.
Breakeven Analysis → we need tangible benefits hosts
Example of using Trello:
• Benefit of introducing Trello: reduced coordination costs, increased operational efficiency
• What are the costs: subscription fee (recurring), training, implementation fee (one time)
25
Work-Breakdown Structure
• List tasks required to complete project
• Identify dependencies
• PMBOK 5: “hierarchical decomposition of the
total scope…”
• Steps:
o We break tasks down
o Then identify how long a step will take
with PERT
26
Network diagram:
slack
p
27
- Entities:
o Interorganizational process: take place between two or
more business organizations. It relates to all processes
between the buyer and supplier. For example, the
delivery process, the procurement process, and so on.
o Interfunctional: Cross several functional and divisional
boundaries, and are used to reach major operational
objectives, such as designing a new product. Supporting
the full process (so everything that’d be included when
designing the process for that product) is key.
28
o Interpersonal: Involve tasks within small teams. It usually helps integrating tasks, or supporting
communication for heavily dispersed teams.
- Objects: the types of objects manipulated. Often, the two categories below are combined.
o Physical: real tangible things are created, such as a product. The flexibility of outcomes
increases, and there is more control over the process itself.
o Informational: create or manipulate information. Can make complex decisions easier, and
support high-skilled workers in their decision-making.
- Activities:
o Operational: day-to-day processes in a business.
o Managerial: control, plan, or provide resources for operational processes. The potential of these
had yet to be realized, as the processes themselves were supported by IT systems, but had yet
to be analyzed and redesigned using IT. This should lead to some form of standardization. By
doing so, analysis could be improved, and participation could be increased.
Once a process has been redesigned, there are still some key management issues:
- Management roles: it is difficult to keep management committed. In order to prevent problems, process
:3
redesign teams should involve stakeholders, and even be composed partly of the stakeholders. For
example, the team should be headed by a senior executive, the affected divisions should be used, and the
customer should also be part of the team. Senior management has to show that it finds the redesigning
critical in order to gather employee support.
- Process redesign and organizational structure: Redesigning processes affects the company structure
greatly. Companies may choose to step away from their traditional structure (e.g. geographical), and
move towards a process-based structure. However, there are risks to this approach. Using a matrix
structure could also be a possibility according to the authors.
- New skill requirements: Managers have to develop facilitation and influence skills, in order for
employees to accept the changes.
4 - An ongoing organization: a group that’s well-versed in IT and business is necessary to redesign and make
the changes in the organization.
5 - Process redesign and the IT organization: IT professionals will have to start developing for the entire
organization, and gain senior management support to get the Industrial Engineering started properly
within their respective organization.
6 - Continuous process improvement: IT processes are dynamic. They must be constantly improved.
Mendling, Reijers & van der Aalst: Seven process modelling guidelines
Process modelling is incredibly important. However, it’s problematic, too, as the guidelines are either too difficult
to follow for beginners, or anecdotal at best. Therefore, the authors wrote 7 process modelling guidelines which
are empirically supported. They will be clear to stakeholders and contain few syntactical errors. The example in
this paper is an Event-Driven Process Chain. Here, functions correspond to specific tasks. Events describe a
situation before and after it is executed.
Important factors for model comprehension are:
- Process model understanding: the degree to which a process model can easily be understood.
- Error probability of process models: captures to what extent a modeler is still able to extend a process
without introducing errors.
- Ambiguity of activity labels.
The 7 guidelines (P means prioritization according to paper):
- G1: (P3) Use as few elements as possible. Large models are more difficult to understand.
- G2: (P5) Minimize the routing paths per element: more paths lead to more errors.
- G3: (P6) Use one start and one end event. This is easier to understand.
- G4: (P1) Model as structured as possible: everything should be connected.
- G5: (P7) Avoid OR routing elements, but use XOR (exclusive choices) or AND (concurrent). This makes
it less ambiguous and less prone to errors.
- G6: (P4) Use verb-object activity labels. Using verbs makes clearer what should be done at each stage.
- G7: (P2) Decompose models if it has more than 50 elements, to prevent errors.
29
New model:
G3: Only one start and ending point.
G6: Use verbs (registration vs. register call).
G2: Referring customers was simplified immensely.
G1: Remove most of the red (situation before and after a task).
G4: Improved model structure overall, but particularly on the referral side, with increased understandability and
structure.
G5: Removed some OR decisions (e.g. around follow-up).
30
o Group: does not affect sequence flow, but can be used for e.g. documentation. Rounded corners,
dashed lines.
o Annotation: mechanism for a modeler to provide additional text.
The BPMN helps bridge the gap between technical modelling and business modelling.
31
Celonis Lecture
Process Mining Theory
Process: A business process or business method is a collection of related, structured activities/tasks that in a
specific sequence produces a service or product (serves a business goal).
Event Logs: Stores data that is required for process mining. At minimum this is
case ID, activity name, timestamp.
32
Profittability:
• It seems that delivery man 2 is less efficient (2: 25%; 1: 38% and still 750$ cheaper)
• Ordering by phone is also more expensive, especially when making mistakes
33
¥
o Response
o Monitoring and control
The different controls and levels of detail of each phase require the application of the appropriate techniques, also
according to the nature of the information in each phase.
- The phase of the life cycle of the project: different phases to assure better management control. The life
cycle phases are as follows:
1 o Conceptualization: opportunity/need is identified a Novice
2 Normalised
2 o Planning: design a project + KPIs
3 o Execution: coordinate, control, and adjust the project as necessary 3 Naturel
4 o Termination: commissioning, reviewing the learned lessons. →
- The corporate maturity of risk: the degree of maturity towards risk of an organization is dependent on
its risk culture. Companies that are aware of risk, and proactively manage it have reached natural
maturity. Companies that are naïve still are unaware of risk management and do not manage it at all.
During the process, the nature and the quantity of available information determine which tools should be used for
which combination of the life cycle/risk process management phases.
34
÷ be useful.
Measures to prevent issues with computer viruses could be passwords,
employee education, audit processes, virus-scanning/removing software,
consistent security policies, and monitoring computer usage.
o Strategic risks: the organization’s inability to sustain its competitive advantage. Can
be prevented by:
Patents
Searching for new ways to compete through innovation
o Legal risks:
Policies and procedures
• Risk monitoring: ensures that effective countermeasures to control risks are appropriately
implemented.
The framework provides a comprehensive sequential framework for risk management. The
application of the framework should take place as early as the planning stage, and always be used by
managers when implementing a risk strategy. Training may be necessary so managers can
appropriately assess and mitigate risk.
35
For each step, the appropriate methodologies are specified in the table below:
36
Lecture 5 (24.11.2020)
IT Risk Management
37
Remedies:
• Two-factor authentication
• Penetration tests
• Force regular password changes
• Length, symbols, numbers of password
• Hacker rewards also events
• Encryption
• Employee security
IT Auditing
Typical Audit Process Phases
Planning:
1. Determine audit subject
a. Identify area to be audited (e.g., business function, system, physical location)
b. Example: VPN
2. Define audit object
a. Provide management with independent assessment of the VPN implementation and ongoing
monitoring/maintenance of effectiveness of supporting tech.
3. Set audit scope
a. Identify specific systems, function or unit to be included.
] examples
i. Security management and awareness
ii. Information security management
iii. Governance and management practices of IT and business units
4. Perform preaudit planning
a. Conduct risk assessment to set final scope of a risk-based audit.
5. Determine steps for data gathering
a. Select audit approach, identify key internal controls
i. VPN governance
ii. VPN policy
iii. VPN configuration
iv. VPN maintenance and monitoring
38
39
40
suppliers, technologies, and clients are immature. Most often, ASP is not perceived as a
strategic advantage, and firms become better at using it through increased experience.
o Business process outsourcing: suitable for well-defined, self-contained, modular IT- enabled
and easily measurable processes. Process standardization, contract completeness, relational
governance, consensus and coordination are associated with success.
41
42
67
- Break projects into segments to protect intellectual property to mitigate risk.
- Ready the infrastructure. Integrating offshore-supplier employees into the processes and work flows is
difficult, and has to be ready before the offshoring contract. New policies may be necessary.
8 - Understand how different contracts give suppliers different incentives. There are two major types:
±
o Fixed price contracts: useful for clear requirements, so suppliers can give realistic bids.
o Time-and-materials contracts: the work that is done is better, but the costs are often also a lot
higher. Capability Maturity Madd
Elevate your own organization’s CMM ,
q
(maturity) certification to close the process gap
between you and your supplier. Working together
is easier if you are both certified. The level of
certification that’s necessary differs between
others.
- Bring in a CMM expert with no domain
expertise to flush out ambiguities in
:
requirements. This can reduce the number of
iterations necessary to make the requirements
work.
- Negotiate flexible CMM: ensure that
documentation is only provided for options which
you actually need it for.
- Factor in the use of an on-site engagement manager into the staffing models and ratios. Initially, it is
important to keep more staff at the suppliers location, as the cultural differences/other differences are
12 great. An on-site engagement manager is one of those who can support integration. This can increase
transparency and employee morale.
- Give offshore suppliers domain-specific training to protect quality and lower development costs. This
13 will increase initial transaction costs, but lead to lower costs.
- Overlap onshore presence to facilitate supplier-to-supplier knowledge transfer. When switching
14 suppliers, the predecessor needs to train the other supplier.
- Create a balanced scorecard matrix to keep track of all of the costs and metrics that are important to
15 the company. The metrics that are used have to fit the strategy of the company, and the objective of
the offshoring.
43
Lecture 6 (01.12.2020)
Part 1: IT Outsourcing Decision
Sourcing Tasks and Modes (what and how)
Depends on three elements:
1. Task What tasks do I source?
7 2 3 4 5
2. Mode Do I outsource?
I
a. Internal market: internal IT department
44
I
✓
iv.
b. Transaction cost economics
i. There are costs of using the price mechanism Coase (1937), these are transaction
pu↳uism
costs
ii. Production costs transforming, assembling, etc.
iii. Transaction costs → costs of the
using
1. Initiation costs
2. Negotiation costs
3. Monitoring costs
4. Adaption costs
iv. Often difficult to measure!
v. Why do they exist? → assumptions
1. Bounded rationality:
a. Inability to foresee future
b. Inability to develop complete contract
45
vi.
vii.
46
Asset Specificity
Extra/Hidden costs in offshore outsourcing
1. Specification/design costs
2. Knowledge transfer costs
3. Control costs
4. Coordination costs
I
✓
→ the higher the client specific
-
knowledge ,
the higher the cost
Contract Type
1. Time and materials
2. Fixed price
47
48
49
50
o Always reframe the question in different ways, no matter who it was formulated by.
o Try posing the problems in a neutral way.
o Think critically about the way you framed the problem throughout the decision- making
process.
o Examine the way others framed the problem when they make recommendations to you.
- Estimating and forecasting traps: it is difficult to know whether your estimates were right/wrong in
uncertain situations, and probabilities of occurrences cannot always be measured overtime. There are
three uncertainty traps:
o Overconfidence trap: people tend to be overconfident, and set estimates which are too narrow,
leading to errors in judgment.
o Prudence trap: overcautious, just to be safe, can lead to entirely wrong estimations, especially
if done by several people on the same decision on a sequential basis.
o Recallability trap: people recall probabilities of certain events to be more dramatic than they
are if they actually experienced them, or if a greater impression was made on them.
The way to avoid these traps:
o When making estimates and trying to avoid the overconfidence trap, first consider the
extremes. Then, challenge these estimates in order to avoid anchoring
o To avoid the prudence trap, ask for input from others in your estimates.
o To avoid the recallability trap, always check your own assumptions.
51
Schneider, Weinmann & vom Brocke - Digital nudging: Guiding online user choices
Heuristics and biases affect how we make decisions every day. Due to these heuristics and biases, the interface
design affects how we shop online. This is something that can be employed by companies to gain more profit, and
achieve the intended behavioral effects.
Interface designs offer no neutral way in order to present information. This article gives designers insight in how
to consider the effects of certain nudges when designing their user interfaces and choice environments, no matter
what the objective is (e.g. sales, honesty when filing taxes, and so on).
The authors present three effects that may be useful when designing interfaces:
- Decoy effect: Increase an option’s attractiveness by presenting an unattractive option thatno one would
reasonably choose.
- Scarcity effect: scarce items are more attractive. By suggesting a reward is limited, people are more
likely to choose it, no matter whether it is really attractive or not.
- Middle option bias: People presented with 3 options tend to choose the middle option.
There are four steps that designers need to follow when implementing a nudge:
- Define the goal: consider the goals, and their ethical implications, especially if a nudge might be
detrimental to their well-being. In addition, consider the type of choice: is it binary, discrete (e.g. two
products), continuous, or any other type of choice?
- Understand the users: understand heuristics and users biases (such as the ones from the prior two
articles) and how these might affect the users’ behavior in making certain decisions.
- Design the nudge: choose the nudge that fits with the heuristics and goals which can guide the users’
decisions. This does not have to be limited to only one nudge: designers can combine different
nudges. However, it is important that usability is not reduced by this, as users have to be able to use a
platform/product the same was as they did before.
- Test the nudge: a nudge that works in one place might not work in another, dependent on the context
and the target audience. Thankfully, nudges can be tested quickly and removed/adapted relatively
quickly as well, through, for example, A/B testing. If a nudge does not work, reexamining the
implementation should be the first step. If the nudge is hidden, or just not hidden enough, it may not
work.
There is not a one-size-fits-all approach, due to the differences in target audiences and how they respond to
certain nudges. Therefore, nudges have to be tailored to these groups. This way, the intended effects can be
maximized, and the unintended effects minimized.
52
Lecture 7 (08.12.2020)
Part 1: Decision Making Theories
⑦
Dual-Process Theory
choices consume working memory
• We can only store 7 items and 15-20 seconds
• System 1: intuition & instinct (95%)
o Unconscious, fast, associative, automatic pilot
• System 2: rational thinking (5%)
o Takes effort, slow, logical, lazy, indecisive
Bounded rationality:
• No sufficient information to make fully informed judgements
: • We opt to satisfice rather maximising
3 • Decisions are as rational as possible given the context
9 • We use rules of thumb (heuristics)
② Prospect Theory
Assume two options:
1. Option 1 give you $100
2. Option 2 gives you $200 but takes away $100
option 1 is preferred as you avoid pain.
\
Losses loom larger than gains. Low
High
• Certainty effect
• Loss aversion
f-
.
Tools:
1. Weighted decision matrix/Pugh matrix
a. Note baseline
checklist b. Identify alternatives
c. Identify criteria
I d. Assign weights
e. Populate (+1 better, 0 same, -1 worse)
2. Maximum difference scaling
a. Prioritisation of a list of items
b. Procedure:
i. Identify one (or two) dimensions
ii. Identify (number of) alternatives/attributes
↳ come
up
with matrix
54
3. Algorithms
a. Linear regression (observational data available)
i. Use past performance data
b. Model of the judge (judgement data available)
i. Let experts judge future performance and run a regression on the models
c. Unit weighting model (no data available)
i. Assign +1 or -1 to each attribute
55