Sunday 16 December 2007

Mars Incorporated - Online Procurement

Procurement between businesses and their suppliers is traditionally done manually through negotiations and bargaining. However, online procurement or e-procurement, has already been adopted by millions of companies, and is fast becoming the most common way of buying goods from a supplier thanks to the growth of the internet. Online procurement is about “taking the manual process online and automating the whole procedure with the underlying aim centred on saving money.” (http://213.198.108.89/ebew/e2000plen/leonard.html) This reasoning is illustrated in the Mars case study where it is stated that, “many major firms achieve savings of around five per cent through the use of online procurement auctions.” Although money would appear to be the main motivator for this, there are a number of further advantages and disadvantages that go along with online procurement. These will be discussed in greater detail along with an analysis of the benefits and drawbacks of using auctions to fix prices.

Obviously the main advantage to online procurement is the cost savings to be made, “Reducing indirect procurement costs can immediately improve an organisation's bottom line”. (http://213.198.108.89/ebew/e2000plen/leonard.html) For companies who are struggling to reduce costs, this would be a highly worthwhile and beneficial transition to make. Online procurement enables a company to cut out time and money spent on negotiations and contact with suppliers by enabling the whole system to be accessed online. This point is emphasised in the Mars case study where, “many different contracts and negotiations were used to address the huge number of different purchasing situations involving private businesses, brokers, governments, monopolies and cartels.” By moving this process online, these additional costs would be significantly reduced, if not abolished.

Another main advantage of using online procurement is the increase in efficiency which results from it. According to Leonard, 2001 (http://213.198.108.89/ebew/e2000plen/leonard.html) online procurement increases efficiency in three ways; reduced cost of purchasing, reduced cost of goods purchased, and reduced inventory days. This is one of the most important aims when companies move to online procurement as demonstrated in the Mars case study, “Mars’ objective was to obtain the needed materials from its list of approved suppliers fairly and at minimum cost.” Online procurement aims to achieve these goals by providing companies with “real time information as to the status of a customer's needs.” (http://en.wikipedia.org/wiki/E-procurement) This is a huge advantage to companies as it allows them to see what changes have been made and who is currently the lowest bidder, meaning they are able to select a bidder based on current up to date information.

In addition, an important advantage to a buyer-managed purchasing model is the fact that “the solutions can be highly customised to meet the buying organisation’s needs.” (http://www.usherproject.org.uk/support/hb/HBs27v2.pdf) This is important to a company like Mars who needed a highly specific and complicated model, “Mars attempted to aggregate individual small lots in a way that benefited suppliers but different suppliers had different requirements and different opportunities for efficiencies.” The fact that online procurement can be customised is hugely important for all companies involved in the process, as it means that the system can be changed and modified to suit their requirements rather than trying to adjust their buying or selling habits to incorporate a particular procurement system.

These advantages are naturally beneficial to companies when buying/selling materials, however online procurement encompasses a number of disadvantages that should also be taken into consideration. One major disadvantage for certain companies is the fact that the potential suppliers are provided with far more information than they would normally in a manual system. This could lead to serious problems for businesses, “the vendor has the power to take advantage of the customer by knowing more information about them”. (http://en.wikipedia.org/wiki/E-procurement) Companies may discover that suppliers are more tactical than usual as they have more information at their disposal and can easily undercut competitors which is illustrated in the Mars case study in Exhibit 1, where the suppliers are constantly reducing their prices to win the bidding war.

Another potential disadvantage of using online procurement is the initial investment costs involved for companies. In a buyer focused procurement model, the set up costs will be significantly higher than the costs borne by the sellers, “These solutions will require fairly high up-front investment for the buying
organisation.” (http://www.usherproject.org.uk/support/hb/HBs27v2.pdf)
Of course this investment is made with the hope of acquiring reduced maintenance costs which is illustrated by the vice president of Business Solutions at Mars who believed that using online procurement auctions would enable Mars to achieve the savings necessary to allow the company to prosper. However, further research attempts to disprove this theory, “there will be higher system maintenance costs in these solutions for the buyer”. (http://www.usherproject.org.uk/support/hb/HBs27v2.pdf) Although not evidenced in the Mars case study, the potential savings can only be calculated over time.

Using auctions to fix prices also has a number of advantages and disadvantages for companies. Reverse auctions such as those employed by Mars have an important advantage of being extremely up to date, “reverse auctions offer the ability to conduct real-time price competitions within hours.” (http://acquisition.gov/articles/feb2007_art5.htm) This enables the supply process to be far more efficient by reducing the time invested in each transaction. In addition, an advantage to a buying company like Mars is that auctions encourage increased competition among suppliers. This ensures that the buying company is paying the lowest price possible for their materials further reducing their operating costs.

However, there are various disadvantages to this process. For companies such as Mars who value their relationships with suppliers, using auctions to fix prices can mean there is “a brute force reliance on price.” This can lead to a breakdown in communication which can be detrimental to a company’s reputation and their rapport with suppliers. To combat this, Mars realised that “additional efforts” were needed to maintain their good working relationships, however only time will tell if this technique is effective.

For millions of companies, online procurement is an extremely effective and successful way to reduce the costs of purchasing materials. However, while this technique may be seen as effective to some, it still has its disadvantages which should be taken into consideration before implementation. In addition, the use of auctions to fix prices should be carefully considered prior to applying an online procurement system. Some companies may find this a highly efficient and effective method to use, however many companies who value their relationships with suppliers may be deterred by the formal system.


References

Bell, Peter C. (2003) Mars Incorporated: Online Procurement, Richard Ivey School of Business, Version (A) 9B05E004

Integrated Acquisition Environment, 2007, Spotlight on Reverse Auctions,
Available at: http://acquisition.gov/articles/feb2007_art5.htm
[accessed 7 December 2007]


Leonard, Steven R., Cheshire Henbury, 2001, Electronic Procurement,
Available at: http://213.198.108.89/ebew/e2000plen/leonard.html
[accessed 5 December 2007]


Usher Project, 2002, e-Business Advisor Handbook,
Available at: http://www.usherproject.org.uk/support/hb/HBs27v2.pdf
[accessed 5 December 2007]


Wikipedia, 2007, E-Procurement,
Available at: http://en.wikipedia.org/wiki/E-procurement
[accessed 7 December 2007]

Assignment - Case Study - Compound

Compound UK is a division of a multinational pharmaceuticals company, and their primary focus is to sell products to hospitals and General Medical Practices in the UK. Following a massive restructuring of the National Health Service (NHS) in the 1980s/1990s, Compound UK had to react quickly and follow suit by reorganising its commercial function to adjust for various changes in the market. In 1993, Compound UK was split into eight regions each consisting of a regional manager, area managers and 150 sales representatives which led to the introduction of the software package, Lotus Notes. While Notes has been a relatively successful software package for Compound UK, there are a number of ways in which its introduction and use could have been managed more effectively and efficiently by the company which will now be discussed in greater detail.

The timing of the introduction of Lotus Notes should have been managed differently. Compound UK introduced Notes six months after the restructuring took place in 1993. This meant that employees would have had time to settle into a new routine and get used to a new structure before Notes was even introduced to them, which would have caused even more upheaval and unrest among the workforce following the restructuring of the Company. Lotus Notes should have been selected and implemented by Compound UK in parallel with the restructuring of the organisation to avoid added confusion and stress for the employees. This would mean that the employees were not given time to get used to a system that would change in six months, which would be extremely frustrating, and in addition Compound UK would benefit from an enthusiastic workforce who are excited by the prospect of a change.

Prior to the introduction of Notes, it appears that there was no training given to current staff members. New additions to the company are sent on a six week training course to introduce them to Notes and meet other people from the company. During the introduction of Notes to Compound UK in 1993, all staff should have been given extensive training on how to use Notes and it's purpose within the company. More specifically, staff should have been trained on the technical side of Notes and they should also have been trained on the principles behind Notes. This would include the details that it's purpose is to encourage the sharing of information and knowledge across the company, and not to increase competition among the reps. This is to ensure that employees do not abuse the system in any way by false or creative reporting.

Finally, during the introduction phase of Notes, the reward structure should have been revised. Obviously rewards are a great motivational tool, however when used in the wrong way, they can have the opposite effect. The reward scheme should have been made standard for everyone instead of being at the discretion of one area manager, to ensure a fair system which is healthily competitive. The reward system should have been set at a particular level, for instance, a contract target should be set for each rep which should be rewarded equally across the company if attained. This ensures that no favouritism is shown and the morale amongst the workers is high.

Although the introduction of Lotus Notes caused problems, the package was not being used for its intended purpose. Within Lotus notes there is a contact recording system. Although this can be useful for recording visits made by staff, this tool was used in the wrong way by Compound. Management implemented a “league facility which would indicate centrally” the contacts achieved by each employee. This was then used by management to assess employees. However, using this to assess employees had a negative affect on the workforce as being at the bottom of a league table could create low morale. Further it also detracts from the true purpose of the function which was a method for employees to share knowledge. Therefore, management should rethink this table and revert to the intended purpose of the recording system.

The second problem associated with the use of this contact recording system is the way that it was used by employees. The idea behind the recording system was that employees should be ‘only recording relevant calls". However, in order to manipulate their place in the league tables, employees would "register a large number of contacts". Therefore, again the use of this league table was causing further negative implications, as Compound would not be receiving an accurate picture of sales. Therefore, the use of this recording system should be scaled down and Compound should remove the league table so that the business is gaining affective use of the system.

There were further problems with the use of the email-system and discussion databases introduced by Lotus Notes. These were misused by employees with a political agenda. Firstly, with this email system, management would receive emails from employees which were non relevant or urgent or simply employees attempting to make themselves look good. Management have high level priorities to deal with, and these sort of issues should be delegated to lower levels. Therefore, this email system was not effective for Compound, as these types of emails should be filtered before they reach management so they only have to deal with issues that concern them.

Further, the discussion debates were also used by employees with agendas to impress management. These debates were used by employees “to make political statements” in order to further their career. However, some employees did not wish to take part in these debates as they saw it as a tool for career furtherance rather than sharing ideas and asking questions . Therefore, management should not use these debates as a way of assessing employees and should ensure that employees use them in the correct way.

Although the implementation of notes was not a complete failure for Compound, but it could have been used and introduced more effectively. Management could have limited some of the uses of Notes so that it was being used for its correct purpose. If they had considered its effect in more detail then they could have had a more successful system.

This assignment was prepared in collaboration with Katherine Keane.

Sunday 9 December 2007

MYSQL - Open Source Database

“Open source is a development method for software that harnesses the power of distributed peer review and transparency of process.” (http://www.opensource.org/) Open source software is the most common example of open source development, and has grown in the past ten years to become a rival to many large closed source software companies such as IBM and Microsoft. This is highlighted in the case study of MySQL, where it is stated that they experienced “a compound annual growth rate of over 100 percent over the last five years”. This illustrates perfectly how much growth this sector of the software market has experienced in recent years. Numerous businesses now use open source software to run their operations and it has many advantages for this function, however as with most products, there are also disadvantages which may deter businesses from using it.

The main advantage of using open source software is the fact that the source code is available. Without being excessively technical, the availability of the source code essentially means that everyone using the software has access to the source code to make any changes. For many companies this is a huge advantage, as it means “the code can be implemented in other pieces of software and adapted to changing environments.” (http://timjimnetworktech.wikidot.com/advantages-disadvantages-of-open-source) For many businesses, this means that the software can be adapted to suit their operations which has huge advantages over closed source packages where businesses have to adapt their operations to suit the software provided. This is highlighted in the MySQL case study where it states that “companies valued the ability to modify parts of the underlying software to differentiate themselves in their own markets.” It meant that they had the freedom to run the business the way they saw fit, rather than being restricted by their choice of software.

Leading on from this point, the fact that the source code is accessible means that anyone can modify or change the software to improve it or make it more secure, “Open Source software has huge communities of programmers involved, allowing for the rapid implementation of new features and security fixes”. (http://www.tamingthebeast.net/articles5/open-source-software.htm) This means that the software is constantly being changed and updated which is a huge advantage to business users as it means they have access to the most up to date version of the software at all times. In addition to this, companies will have peace of mind that the software is secure due to the constant updating, and bugs are far more easily fixed in open source software rather than closed source. The source code availability also means that there are various support facilities to which users can relay any questions they might have. This would be a huge advantage to a business which is looking for well informed, quick answers to any technical problems they may be experiencing which is why MySQL introduced this in early 2005, “MySQL introduced the ‘MySQL Network’, a support offer for end users”.

The most obvious advantage to using open source software in business is the fact that it is free. This point is clearly highlighted in the MySQL case study as companies stated that they were attracted to “the lower cost advantages of open source”. The popularity of the free software was further emphasised later in the study, “as the company began charging for services, there was a change in expectations from their customers”. In fact, many MySQL customers began complaining that they had to pay for services. Although this may not be the driving force behind the choice of software for every company, it certainly an important factor to take into consideration, particularly for smaller, newer businesses which are looking for ways to reduce costs. However, the decision to use open source software should only be taken after examining the disadvantages it brings to businesses.

One serious disadvantage of using open source software in business is the fact that there is no guarantee of development meaning some projects can die. This can occur “if programmers just lose interest with being involved or they become fraught with infighting; arresting further development.” (http://www.tamingthebeast.net/articles5/open-source-software.htm) This is very risky for businesses as they have the threat of losing the support service and continual improvement of the software if they decide to implement unusual software which is unpopular and others have no interest in. In order to combat this danger, MySQL created “version 5.0” which included various improvements requested by users, in the hope that most customers would implement this and gain the various support services that accompanied it.

Another downside of using open source software in business is the danger of violating any previous intellectual property rights. This can occur due to the fact that many people can contribute to an open source project, and “it is almost impossible to audit the entire code base for violations of previous licence conditions.” (http://www.cippic.ca/open-source/) This could essentially mean that a business could be using a software programme which is illegal in terms of intellectual property infringements, which could have serious consequences for the company as a whole. However, it is well known that “contributors do not vouch for the integrity of the code they contribute to the project”, (http://www.cippic.ca/open-source/) which also poses a problem for businesses as it effectively means there is no guarantee of the quality of certain open source software, and so companies may be taking further risks by choosing open source in the first place.

Finally, the advantage of the support services, like most things, has its disadvantages. Many questions can go unanswered if no-one has any interest in the topic or quite simply, doesn’t know the answer. This can frustrating for businesses as there is no legal obligation for companies such as MySQL to answer any questions set to them. This is yet another risk that companies will take if they opt to use open source software instead of the traditional close source format.

For millions of companies, open source software has been hugely beneficial in terms of flexibility, cost effectiveness, quality and support services available. Despite the obvious advantages, there are still underlying disadvantages which may deter business from fully adopting open source software in all its operations. Overall, it seems the advantages by far outweigh the disadvantages; however companies which have used closed source software for years may see it as a risky move and be unwilling to change.


References


Cippic, ‘Open Source’, 2007, http://www.cippic.ca/open-source/, [accessed 28/11/07]


Open/Closed Source Networking, ‘Advantages and Disadvantages of Open Source’, 2007, http://timjimnetworktech.wikidot.com/advantages-disadvantages-of-open-source, [accessed 30/11/07]


Open Source Initiative, 2007, http://www.opensource.org/, [accessed 30/11/07]


Taming the Beast, ‘Open Source Software in your Online Business’, 2007, http://www.tamingthebeast.net/articles5/open-source-software.htm,
[accessed 28/11/07]


Witting, C and Burgelman, R. (2006) MySQL Open Source Database in 2006 (B), Stanford Graduate School of Business, Case: SM-124(B)

Assignment - Long Essay - Are We Building a Surveillance Society?

For many years the UK and the rest of the world have been building what is described as a 'big brother' society. Due to the huge rise in technology during the 20th century, surveillance has become increasingly possible. However, since the digital revolution, it is fair to say that we are no longer building a surveillance society, but are living in one. Of course, this causes immeasurable controversy throughout the world and countless debates have been conducted on the subject, yet it seems that we are powerless to stop it. In order to examine our surveillance society further, it is important to look at the history of surveillance, the areas in which it is increasing and how this affects society today.

The practice of surveillance has been going on for centuries, however it is only in the last 150 years that it has taken a strong hold over our society. Surveillance using technology was first established in the late 1800's, "Wiretapping began as early as the U.S. Civil War, when both sides tapped into the other force's telegraph lines and simply copied down the messages." (http://www.recording-history.org/HTML/surveillance1.php) Since then, it has expanded and grown through audio surveillance, and more commonly today, video and Internet surveillance, and the fact that we now live in a surveillance society has come about for a variety of reasons. As already mentioned, surveillance aided by technology was first used to spy on the enemy and effectively 'steal' information, however technology has evolved so much since then that there are a number of reasons for the increase in surveillance.

Many of the changes in society have arisen from the Government’s desire to cut down on crime and protect society. Initially, the intent was to either deter the occurrence of crimes, or to have a more thorough and secure way of catching and convicting criminals. While this was effective at the time and is still relatively effective today, Governments across the world are now faced with the even bigger problem of international security issues. The terrorist attacks on America in 2001 sparked a panic across the western world which inevitably led to a huge increase in surveillance and tightened security through the introduction of biometrics and stricter controls on passport pictures. While these adjustments are still being introduced today, there are further proposals to increase security by introducing national Identification Cards for everyone in the UK.

In addition to national security, another reason behind the increase in surveillance is the prevention of fraud. Although technology is vital for our society to survive, it is also the cause of many illegal activities as criminals become more subtle about their movements. These are but a few of the main reasons behind the growing trend of surveillance in our society, and through the development and advancements in technology it has only become easier for the Government to implement new techniques to monitor our activities. In order to examine this area further, it is necessary to examine the surveillance techniques which have been introduced over the years.

One method of surveillance which has been in existence for years and is an integral part of our society is video surveillance, "almost as soon as it was invented, the camera was being used to record the faces and other physical characteristics of criminals." (http://www.ico.gov.uk/upload/documents/library/data_protection/practical_application/surveillance_society_full_report_2006.pdf) The introduction of video surveillance has had a huge impact on our society, none more so than the use of Closed Circuit Television (CCTV). This involves the "use of video cameras to transmit a signal to a specific, limited set of monitors", (http://en.wikipedia.org/wiki/Closed-circuit_television) and was first introduced to society in an attempt to reduce crime and increase public security. It has evolved through time to become an integral part of our lives, however there is constant debate that it is simply being overused, "according to statistics, the average citizen is caught on CCTV cameras 300 times a day." (http://news.bbc.co.uk/1/hi/sci/tech/1789157.stm) Although highly controversial, it is indisputable that video surveillance is a necessity for society as it is proved effective in deterring crime. This point is emphasised by the fact that thousands of homes across the world now use CCTV as a means of extra security. Countless criminals have been caught through the use of CCTV, and although difficult to measure, it is highly likely that they have deterred numerous crimes from happening in the first place. Despite these positive aspects, the use of video surveillance has been the cause of much controversy over the years which shall be discussed later.

Also, one technological advancement which has changed our lives completely is the introduction of the computer, particularly the computer database, "it is this storage capability that has formed perhaps the biggest change already brought about by the information technology revolution." (http://www.ico.gov.uk/upload/documents/library/data_protection/practical_application/surveillance_society_full_report_2006.pdf) The computer database has made it possible for Government bodies to store intricate details about every person throughout the country. Naturally this is more efficient and timely than a paper based filing system, however it can be a very dangerous tool as the information on these databases can include personal details which could be used for unlawful actions. Despite this danger, it is a highly effective aid for catching criminals as it enables files to be cross referenced and shared worldwide. In addition to this, it is an essential part of some businesses, "the collection, use and communication of large stores of personal data held on citizens are now central to the functioning of private business and the public services." (http://www.ico.gov.uk/upload/documents/library/data_protection/practical_application/surveillance_society_full_report_2006.pdf) It is probably this point which has caused most controversy in recent years with a huge increase in companies 'cold calling' people whose personal details they have on a database. However, it is difficult to imagine a world without databases; doctor surgeries, dentist surgeries, libraries, even the local video store holds personal details about every customer.

The use of the database will only increase in the future, and this point is highlighted by a new proposal by the government for National Identification cards for every UK resident. The idea behind the national ID cards is that the details (including retinal scan and fingerprints) of each resident in the UK over 16, will be stored on this one card. The details of these have been published on BBC news along with the reasoning behind them; "The government says it wants to give people a sure-fire way of proving they are who they say they are" (http://news.bbc.co.uk/1/hi/uk_politics/3127696.stm). Although they may seem unnecessary, their introduction is essentially to increase national security. The national security issues mentioned earlier have provoked a strong response by the government in the form of further surveillance and security. Their introduction also ensures that each person can be easily identified, in particular those who are residents and those who are non-residents.

However, due to the overwhelming power of the information it will need to be further secured, ensuring that it can only be accessed for the right reasons by the right people. This security problem has come under closer scrutiny recently due to a mishap which occurred with the tax office. Two discs containing the details of over 25 million people went missing when they were sent through the postal service. Mr Darling was quoted apologising saying it was an "extremely serious failure on the part of HMRC to protect sensitive personal data entrusted to it in breach of its own guidelines". (http://news.bbc.co.uk/1/hi/uk_politics/7103566.stm) This highlights the levels of high security which should be implemented when storing and using data to prevent a situation like this from reoccurring with the ID cards.

New legislation has also promoted increased surveillance, "information technologies have developed enormously and pervade the economies and societies in western states. Their uses are for both good and ill." (Taylor et al, 2001) It is because of this misuse of technology that there is an increase in legislation, and some acts which are playing a part in regulating this misuse include;

The UK Interception of Communications (Lawful Business Practice) Regulations 2000
The UK Anti-Terrorism, Crime & Security Act 2001
The UK Privacy & Electronic Communications (EC Directive) Regulations 2003
Regulation of Investigatory Powers Act 2001

The Regulation of Investigatory Powers Act 2001, "updates the law on the interception of communications to take account of technological change such as the growth of the Internet" (http://security.homeoffice.gov.uk/legislation/current-legislation/ripa-2000/). Part three of the Act illustrates the increase in surveillance by regulating cryptography. This can impose a requirement of disclosure to anyone in possession of an encryption key if it is for the purpose of national security or preventing crime. Although this seems reasonable in the circumstances, it is again imposing increased surveillance which may not be wholly necessary.

The issue of data retention also contributes to our surveillance society, "the primary objective in government data retention is traffic analysis and mass surveillance." (http://en.wikipedia.org/wiki/Data_retention) Data retention includes phone calls, emails and web sites which have been visited and has been reinforced by the Anti Terrorism and Crime Act which introduced a voluntary regulation on Telephone Operators and Internet Service Providers to retain details of customers. This has been justified as a matter of security and to prevent crime however, some people may be unaware that this information is being tracked and retained and so it could cause major controversy.

These methods of surveillance can have a significant impact on our day to day lives. For instance, video surveillance is in operation in almost every town and city in the country and many people are under the impression that it is overused. As already mentioned, someone can be caught on CCTV cameras up to 300 times a day, which may seem excessive however there is a flip side to the coin. A huge proportion of society ascertain that there are in fact not enough CCTV cameras and the man power behind the surveillance is severely inadequate, "monitoring crime on Glasgow's streets is an impossible task as each CCTV operator has to monitor 50 screens." (McKinnon, 2007) Obviously for one man to monitor fifty screens is an absurd and impossible task. Granted the video tapes can be rewound and criminals can then be caught, but that does not deter the crimes from happening in the first place. In addition to this, the article states that there are no cameras on two of Glasgow's busiest streets which is obviously a worry for residents and regular visitors to the city. For safety reasons, CCTV cameras are a fundamental part of our society and for our own safety and protection, it is vital that they are continually used in the future.

In the case of computer databases, again there are various advantages and disadvantages to it's use. The advantages of increased efficiency and timeliness are obvious to the government, however for society there appear to be more downsides. Cold calling seems to cause the biggest upset among our society as it can seem like a breach of peoples privacy, however many companies survive by using this technique. In light of the recent scandal of the lost discs, there is a huge risk borne by society that their details will fall into the wrong hands. The consequences of an inadequate security system would be disastrous for society, and so the correct measures should be implemented to protect any future projects such as the proposed ID cards. In this case, the government will need to ensure that the database is encrypted and has restrictions on those that can access it. Increased security seems to be the only compromise with databases, as it would be difficult for society to operate without them.

The introduction of Acts such as the Regulation of Investigatory Powers Act means that it has become almost impossible for the public to send information that cannot be intercepted in some way. People believe they are sending data which is secure, but this is not the case. It has been argued that this is a breach of "human rights", (Taylor et al, 2001) and it also undermines “e-commerce and the integrity of service providers, as well as causing huge potential costs in global key revocation and change.” (DTI, 1999). This Act could hinder the development of e-commerce as people will become more wary about sending information. Therefore, although this Act is suppose to simply prevent anything unlawful, it could cost a great deal to society to breach personal privacy rather than anything which is criminal.

Data retention will not have an immediate or direct affect on the public, as most will be unaware of its existence. However, data retention does seem to be a complete invasion of privacy and the public will find it difficult to carry out their day to day activities without worrying if they are being watched.

With security issues affecting the UK and other parts of the world, this has been the perfect opportunity for the Government to justify increased surveillance. Whether the majority of surveillance techniques are necessary or not is irrelevant. The fact is, with surveillance comes increased security and reduced crime. Therefore, with the government always striving for their country to be less vulnerable, it seems likely that surveillance will only continue to increase in the future.


References

BBC, 'Q&A: Identity Card Plans', 2006, http://news.bbc.co.uk/1/hi/uk_politics/3127696.stm, [accessed 26 November 2007]

BBC, 'UK's Families Put on Fraud Alert', 2007, http://news.bbc.co.uk/1/hi/uk_politics/7103566.stm, [accessed 21 November 2007]

BBC, 'Watching Your Every Move', 2002, http://news.bbc.co.uk/1/hi/sci/tech/1789157.stm, [accessed 28 November]

DTI, 1999, "Promoting Electronic Commerce: Consultation on Draft Legislation and the Government’s Response to the Trade and Industry Committee’s Report"

Home Office Security, 'Legislation', 2000, http://security.homeoffice.gov.uk/legislation/current-legislation/ripa-2000/, [accessed 30 November 2007]

Information Commissioner's Office, 'A Report on the Surveillance Society', 2006, http://www.ico.gov.uk/upload/documents/library/data_protection/practical_application/surveillance_society_full_report_2006.pdf, [accessed 21 November 2007]

McKinnon, Ross., 2007. Big Brother Isn't Watching, The Evening Times, 26 Nov. p.4-5

Nick Taylor, Yaman Akdeniz, Clive Walker, 2001, "BigBrother.gov.uk: State surveillance in the age of information and rights", Criminal Law review, pp73-90

Recording History, 'The History of Recording Technology', N.D, http://www.recording-history.org/HTML/surveillance1.php, [accessed 28 November 2007]

Wikipedia, 'Closed-circuit Television', 2007, http://en.wikipedia.org/wiki/Closed-circuit_television, [accessed 2 December 2007]

Wikipedia, 'Telecommunications Data Retention', 2007, http://en.wikipedia.org/wiki/Data_retention, [accessed 2 December 2007]

This assignment was prepared in collaboration with Katherine Keane

Sunday 2 December 2007

BBC Outsourcing Case Study

“Outsourcing involves the transfer of the management and/or day-to-day execution of an entire business function to an external service provider.” (http://en.wikipedia.org/wiki/Outsourcing) A high proportion of companies now use outsourcing as a way to increase efficiency and performance in a certain area of their business. This may seem a novel technique to some, however outsourcing is not a new concept; it has been a growing trend among businesses for a number of years and continues to expand across business sectors today. For the BBC, the decision was a brave one as it was unprecedented in their sector. Although controversial at the time, the decision seems to have been a success, which is in part thanks to the process employed by the BBC to select a supplier. This process had many positive and negative aspects which had a substantial effect on the overall outcome of the project.


One positive aspect of the selection process was the fact that it was done over a relatively long period of time. It took the BBC eight months to actually select Siemens Business Services and a further three months to complete the whole process. This would have been of great benefit to the BBC, “investing effort in the early stages of the outsourcing can help to prevent an outsourcing disaster.” (http://www.out-law.com/page-501) This ensured that due time and consideration was given to the actual process itself, not simply the planning and preparation of the project, enabling the BBC to make the best choice possible. Further to this, the number of man hours spent on the project would have only aided the selection process.


Another positive aspect of the selection process is the way the BBC evaluated the bidding companies. It is extremely important to “technically, know and understand your existing IT operation and what you seek by way of external IT services from the service provider.” (http://www.out-law.com/page-501) Despite having no comparison to use, the BBC was able to establish certain criteria on which to judge the companies. The criteria mainly focused on the size of the bidding firm, their cultural fit with the BBC, their value for money, their understanding of the BBC business, and their commitment to the project. These factors were extremely effective in aiding the selection process, as it enabled the BBC to differentiate between companies based on specific factors which were important to them. In addition, it meant that the companies were judged on a variety of factors and not simply on their IT skills and knowledge meaning that an overall scope of the bidding companies was established before making any decisions.


Expanding on this, another positive aspect of the selection process was the fact that the evaluating team did not consist solely of experts from the BBC’s IT department. Initially there was an evaluating team of twenty six “core members” which may seem excessive, however they were to evaluate eighty bidding companies. After these companies were whittled down to thirty one, the BBC created an evaluating team of only eight members. This was a highly effective move by the BBC as they selected experts from different fields such as finance, procurement and technology, meaning the individual bids could be judged from different view points within the BBC, giving them a complete overview of each company.


Despite these more positive features, there were still some negative aspects which could be improved upon in the future. Firstly, the fact that over one hundred people located in different departments within the BBC carried out negotiations with bidding companies was a basic error. This could result in a severe lack of co-ordination between departments and employees, resulting in the wrong company being chosen. Although the BBC seem to have been lucky this time, future negotiations should be left to a smaller team of dedicated staff, working in close proximity with each other to ensure any decisions are completely correct.


The most notable error on the part of the BBC was the lack of communication between management and the employees. The choice to outsource would inevitably have a detrimental effect on the workforce, “it is difficult to dispute that outsourcing has a detrimental effect on individuals who face job disruption and employment insecurity.” (http://en.wikipedia.org/wiki/Outsourcing) When the implementation of the project began, the employees did not know anything about it, “This was completely unexpected”. This showed poor management skills by the BBC, as it implies there was no respect given to employees, and as a result, the employees were against the project from the word go. This initial lack of respect shown to the employees created a huge problem for the BBC. During the selection process BECTU, the union, ran a series of ballots because the BBC failed to conduct negotiations regarding the employees’ future. This then led to the threat of a strike which was thwarted by the BBC threatening BECTU with legal action. This was yet another mistake made by the BBC as it seemed like a desperate attempt to regain control of the situation, however the result was further alienation of their workforce.


Overall, the decision to outsource seems to have been a great success for the BBC. The process the BBC employed to select a supplier was undoubtedly going to be extremely difficult as this move was completely unprecedented. The management team were effectively going in blind as they had no comparison to give them direction or ideas. All things considered it was a relatively successful implementation and a very wise decision by the BBC, with only a few errors along the way. However, like most new projects, “Once an outsourcing deal has been concluded, committed management of the outsourcing relationship is critical to its success.” (http://www.out-law.com/page-501) Of course the first major test was the broadcasting of the general elections, which SBS and the BBC passed with flying colours. Overall it seems as though the BBC have reaped the rewards for their initial bravery, however only time will tell if it is a sustainable operation for the BBC.


References

CIO Insight, ‘IT Outsourcing: Expect the Unexpected’, 2007, http://www.cioinsight.com/article2/0,1397,2104842,00.asp, [accessed 20/11/07]


Outlaw, ‘An Introduction to IT Outsourcing’, 2004, http://www.out-law.com/page-501, [accessed 20/11/07]


Wikipedia, ‘Outsourcing’, 2007, http://en.wikipedia.org/wiki/Outsourcing,
[accessed 22/11/07]

Sunday 18 November 2007

How Will Offshoring affect UK Accountants?

“Outsourcing of manufacturing jobs has been going on for decades, but now white-collar, service-sector jobs seem to be at risk” (Dudley, et al, 2004) The frequency of Business Process Outsourcing (BPO) has been mounting for many years. Although previously offshoring has been popular with blue collar work to countries such as China, it has now become quite common for white collar work to be transferred to India. This has had a huge impact on many professions and industry sectors, none more so than accounting. It is important to examine this area further in order to ascertain the consequences and effects it may have on the accounting profession and the accountants themselves.

In terms of accounting functions, offshoring has had a great effect on all service lines, however it has emerged that tax departments have seen the biggest change. “As many as 360,000 US tax returns were prepared in India in 2006”
(http://www.pressbox.co.uk/detailed/Business/Offshoring_Tax_Returns_Preparation_to_India_90516.html ) These figures are relatively similar to what is happening in the UK today, and they are set to rise in the very near future. Tax has seen the biggest change mainly due to the fact that it would be incredibly difficult, if not impossible, for audits to be conducted from another country. Tax returns and computations however, can easily be transferred by means of the internet or file sharing. One main cause of this drastic change in service is the competitive pressures which accounting firms now face. The current market is more competitive than ever, and accounting firms are constantly looking for ways to make their operations more efficient. It can also be said that tax is a very ‘seasonal’ service. Tax departments in accounting firms will be busiest in the lead up to April, the end of the tax year, and so may need to transfer their operations offshore in order to meet client demand. On top of this there is currently a significant shortage of accountants in the UK, creating even more reason for the existing offshoring pattern. One particular reason which could make this pattern change course is the reserves of the accounting firms. There are various justified reasons why firms may be apprehensive about offshoring, in particular, data security.

Naturally, data security is of particularly high importance to firms to ensure client protection and maintain a good reputation. However the consequences of offshoring could prove to be disastrous if the chosen country has not got the adequate protection laws in place. Obviously the main priority of an accounting firm looking to offshore its services would be to “insist on security certification, or adherence to laws, standards and business practices prevalent in their respective countries.” (http://www.networkmagazineindia.com/200304/cover1.shtml) Fortunately there are security certifications that companies can acquire such as ISO 17799 which is an information security standard published by the International Organisation for Standardisation. This provides best practice guidelines on information security management for companies responsible for data. On top of this, there are various other protections which could be utilised by accounting firms in the UK, for instance, “Indian firms that deal with US companies are also asked to comply with US laws like the Graham-Leach-Bailey Privacy Act and the Patriot Act.” (http://www.networkmagazineindia.com/200304/cover1.shtml) UK firms should employ this tactic to ensure strict policies and regulations are adhered to regardless of the country they operate in. With these in place, offshoring will only become more common and easy to implement, causing huge impacts on employment patterns.

As would be expected, employment levels fall when offshoring is implemented by large companies, and it is estimated that this will cost the UK economy £5.7bn in “unemployment benefits and retraining costs” in the next six years. (http://management.silicon.com/itdirector/0,39024673,39118025,00.htm) However, were UK companies to persevere with using a home-grown workforce, this may also have a detrimental effect on the economy in terms of companies being less profitable and slowing GDP growth. While this debate is still on-going, one thing is certain; UK accountants may need to learn new skills in order to survive. In particular, tax accountants may need to establish new, fresh, flexible, and innovative skills to maintain there position within the sector and ensure they are carrying effective, and more importantly to organisations, efficient work. Without these skills, offshoring is likely to become the norm for tax accounting, and many skilled workers may find themselves jobless.

Offshoring has been developing and growing for many years, and currently it shows no sign of waning. For the accounting sector this could potentially result in whole tax departments being transferred overseas, and numerous specialised accountants out of work. For them to compete with this worrying trend, it may be necessary to learn exciting, novel skills to differentiate them from the foreign workforce. Although data security and other legislation may prove to be a stumbling block, it does not seem to be slowing down the migration of work to other countries.


References

Dudley, W, Hooper, P and Resler, D, (2004), “Ease the pain, but don’t stop Offshoring services”, FT.com.


Network Magazine, ‘Information Security: A New Approach’ [April 2003]
http://www.networkmagazineindia.com/200304/cover1.shtml
[accessed 9/11/07]


Pressbox, ‘Offshoring Tax Returns Preparation to India’ [Nov 2006]
http://www.pressbox.co.uk/detailed/Business/Offshoring_Tax_Returns_Preparation_to_India_90516.html
[accessed 9/11/07]


Silicon, ‘Offshoring will Cost UK £5.7bn and 250,000 jobs by 2010’ [Jan 2004]
http://management.silicon.com/itdirector/0,39024673,39118025,00.htm
[accessed 11/11/07]

Friday 16 November 2007

Assignment - Case Study - Geneva ERP Implementation

Introduction

Geneva Pharmaceuticals Inc., is a generic drugs manufacturer. There are many key points in the case study, the most important being the fact that the manufacturing industry is highly competitive meaning there is a constant pressure on Geneva and its competitors to reduce their cost of operations in order to increase the efficiencies within the company. To do this they decided to implement an Enterprise Resource Planning System (ERP). We will therefore look at the key decision-making processes behind the implementation and the main points that can be learned from this process.

Phase One - Supply Side Processes

The first stage of implementation concentrated on the 'Supply Side Processes'. During this phase there were a number of key decisions made which had a substantial effect on the progress of the implementation.

Firstly, Verne Evans, a "super user" of MacPac was selected as the project manager of this phase. This proved to be disastrous as he had no prior knowledge of R/3 systems and was unable to resolve problems or provide leadership. On top of this, Geneva decided to employ ten Information Systems personnel along with twenty users from across the business units who had no experience with R/3 systems, and hire Whitman-Hart to oversee the migration. Whitman-Hart employed six specialists to aid the implementation, however, with no knowledge of the business process on their part, there was a severe lack of communication and co-ordination during the project.

To combat this problem, Geneva hired Randy Weldon as the new CIO, who had prior experience using R/3 systems. This was a valuable decision as he put in place a new project management team consisting of one person from each stakeholder group (functional users, IS staff and consultants). In addition, Anna Bourgeois, who had over three years experience working with R/3 systems, was employed to lead the internal IS team.

Another key decision was selecting to follow the ASAP methodology, which meant that the implementation was as short as possible. This had a detrimental effect on the project as it turned out that this system was highly inflexible, however, Geneva decided to persevere with it until the end of phase one for the purpose of project expediency.

Phase Two - Demand Side Processes

During phase two, the main goal was to “improve sales and operations planning”, and there were a number of important decisions taken which made this possible.

One of the key decisions made was assigning an efficient management team. Whitman Hart was replaced with consulting firm Oliver White and Arthur Andersen Business Consulting. The roles of the two firms were clearly identified so that each could concentrate on their strengths. Both of these firms had extensive experience which was a virtue during this implementation.

Geneva set up three clear stages in this Phase, conceptual design, conference room pilot and change management. Having clear goals helped to give the team something to work towards and made sure that each stage was completed before moving on to the next.

Conceptual design involved gain sharing, where the most knowledgeable in the firm were identified, interviewed and had their input into any beneficial changes that could be made to the system. This was done through identifying the value adding processes against the unnecessary processes which finally led to the final R/3 system.

Stage two was the conference room pilot. Geneva spent a lot of time and capital using prototypes to fully test their system processes before it went live. This was a highly useful and invaluable decision, as leaving testing to the last minute could create a lot of problems and delays.

The final stage was change management. Geneva recognised that a new system implemented could bring a change in corporate culture within the firm. They therefore thought it was essential for extensive training of the staff before the system came into place. Each employee received in-depth, detailed training and was provided with support if they had any problems or questions.


Phase Three - Integrating Supply and Demand

During phase 3, the primary focus was to integrate the supply and demand processes.
In 1997 Geneva decided to implement a manual Sales and Operations Planning (SOP) process. Initially, this seemed to be worthwhile, however it emerged that the process created a huge time delay and mistakes were made when re-entering data manually. Worst of all, the process took a whole month to complete and so Geneva decided it was time for a change. They chose to implement Manufacturing and Resource Planning (MRP-II) and SOP processes to create 'just-in-time' production scheduling. Although a vast improvement on the manual process, Geneva felt this was still lacking in the advanced technology they required, and so took the decision to add Advance Purchase Optimiser (APO) software to aid data analysis.

This enabled Geneva to satisfy their primary business metric, 'available to promise' (ATP). This measures whether they are able to deliver to a customer by the promised time, which according to them is the key element of their business.

Conclusion

By considering all the key decisions made by Geneva, there are a number of things to learn from their experience.

Firstly, choosing an appropriate number of staff and the correct people for the job is a necessity for communication and co-ordination. Where this went wrong, Geneva rectified it quickly and efficiently. In addition, setting clear goals and strategies for the workforce is extremely important so they all have a common target to reach and can work in unison.

Also, choosing a methodology which requires implementation of the system so quickly was an error on Geneva's part. For successful implementation, the process should be completed over a long period so problems can be tackled effectively and not rushed.

Another lesson to be learned is the strategies employed by Geneva during the implementation. Such things as gain-sharing, using prototypes to test system processes, and extensive staff training are extremely important for effective implementation as they ensure that the process is running smoothly and efficiently.

Finally, for a completely successful implemented system, it is important to always look for improvements. Geneva went from manual to computerised and added further improved software systems over time. For companies to be an all round success, they must always strive to improve themselves, and Geneva are a perfect example of this theory.


This assignment was prepared in collaboration with Katherine Keane.

Monday 5 November 2007

Why did TAURUS fail and CREST succeed?

The London Stock Exchange (LSE) has seen many changes in the past few decades, none more so than the transition into computerisation. Despite having gone through numerous Chief Executives, one fact has remained the same; the LSE are dependent on technology for growth and international competition. Pre-TAURUS, the LSE thought itself as the “foremost among the world’s bourses in international dealings, and first in Europe on any measure.” Laughably, TAURUS was intended to maintain this position however it had a very different outcome. CREST on the other hand was a highly successful project for a variety of reasons which will now be looked at in greater detail.

TAURUS was a large computerisation project introduced after the ‘big bang’ to tackle the problem of settlement. One main difference between TAURUS and CREST was that the former was compulsory for all member firms, whereas the latter was optional. This meant that the TAURUS team carried out significant consultation and negotiation with the majority of member firms over the design and business approach. Naturally, this meant that each firm wanted TAURUS to incorporate their unique approach to business, making it a complex and difficult program to design. The opposite happened with CREST. Being optional, their team used the Pareto effect and interviewed all interested parties which resulted in it delivering a blue print in only three months. Further to this, the TAURUS software catered for a possible 21 events which could occur during the course of business, resulting in the design team struggling to understand and cope with the complex system. This was obviously a downfall, and so CREST was designed with only 2 events making it simple and easy to implement and test. Probably the most obvious reason why CREST succeeded over TAURUS with regards to the design was that TAURUS was built with the intention of being “all things to all men” whereas CREST’s purpose was “to follow the recipe”. This highlights the main design problem in that TAURUS was aiming too high. Nothing can be ‘all things to all men’ and so in a way they had failed before they even began. CREST on the other hand took a simple approach which was able to cater for all members and was a relatively simple design.

Aside from the design aspect, TAURUS failed for a number of other reasons. Firstly they had a destructively bad relationship with the press. There was no real communication between the two parties and so the press would report on anything they could find, and it was rarely ever in a positive way. In fact when TAURUS was terminated, the press ran multiple reports claiming different reasons for the failure. This would not have happened if the TAURUS team had simply kept them informed. This is the area in which the CREST team were highly successful. They fully briefed the press on their progress throughout the project building a strong relationship and mutual respect between the two.

Another downfall of TAURUS was the huge number of people involved in its design and creation. This resulted in low morale amongst the workers as there were hundreds of people working on this project with no clear strategy or outline. On top of this, they kept missing deadlines while two senior directors and managers left in 1992 causing major unrest among the workforce. CREST combated this problem by initially only having ten men on the taskforce to design the system, followed by approximately 60 people for the programming and creation. This meant that the team all knew their specific tasks and had a clear target to meet, resulting in high team morale and growing confidence among them.

To an outsider, it seems as though TAURUS was destined to fail from the word go. From design problems to numerous legal constraints and heavy pressure from various Government bodies, there were few positive aspects of the project. CREST on the other hand, was a success from start to finish. The approach to the project and attitude of the workforce meant that CREST went live on time and within its budget with only a few hiccups along the way.

Wednesday 17 October 2007

How could the ICAS website be improved?

As a professional accountancy body, ICAS have thousands of members and potential members perusing their website on a daily basis. While the site is well established and full of vital information, there are still a number of improvements which could be made to enhance the users' experience.


First and foremost, there is no site map to aid the users’ navigation around the pages. This is an important tool as many visitors will use it to find specific areas of information on pages. Without one, users may have to search through headings and additional sub-headings to find exactly what they are looking for, which may cause frustration and deter the user from returning to the site again.


This leads on to the fact that while the website has topic headings down the left hand column, it appears unorganised and untidy. In comparison with other websites of a similar purpose, such as ACCA (http://www.accaglobal.com/) and ICAEW (http://www.icaew.co.uk/), ICAS has far more headings than either of these, which makes it seem very complex and difficult to navigate. Users will have to spend much more time trying to get to the section they want on the ICAS site than any others.


In addition, the ACCA, ICAEW and in particular, CIMA (http://www.cimaglobal.com/cps/rde/xchg/live/root.xsl/index.htm) websites all use vibrant colours to make each section stand out, whereas ICAS simply use blue text against a white background. The use of colours gives each section its own classification which can be used to identify further sub-sections by associating them with a particular colour. That is why people associate Coca-Cola mainly with red and Pepsi with blue. Colours can be used to brighten up the site and make it more exciting to look at, as at the moment the blandness of using only two colours gives the website an old fashioned and boring appearance which may deter users from visiting the site again.


Further to this, the site could be improved by becoming more innovative in its layout and structure. A perfect example is the ACCA website, which uses a simple and effective design to make it easier for users to access appropriate sections and to get more enjoyment from their time on the site. In comparison, the ICAS homepage in particular has an excessive amount of information on it which can be overwhelming when first entering the site. Instead of overloading the user with information, ICAS should keep it uncomplicated and try to make it effortless for visitors.


While many websites are aided by the use of images on their pages, it is important to only use images which advance the purpose of the site. (http://www.netmechanic.com/news/vol5/beginner_no2.htm) At the moment, the images on the ICAS site seem very basic and do not tell the user what they actually relate to. Interestingly, ICAEW and ACCA use very little, if any images on their sites. Instead they use colourful, vibrant, abstract text to highlight the importance of a particular page or section. ICAS should use a similar approach to their site as it gives the impression of a well organised, modern and innovative professional body.


Finally, the advertisement which is at the top of the ICAS page, while very relevant to the subject matter, is not consistent with the design and layout of the homepage. This makes the site look even more untidy as the first thing a visitor sees is a bright red advertisement flashing across the top of the screen. Granted there are financial reasons for having an advertisement, however it could be re-designed and placed in a more appropriate area in order for the homepage to remain easy to read and appear more consistent and well organised.