Foreword 1. Foreword Editorial Foreword to the...

80
Foreword SEFBIS Journal 2009 No. 4 1 Foreword 1. Foreword Editorial Foreword to the Special Edition on the Occasion of CONFENIS’2009 A decade ago those John von Neumann Computer Society members, who are involved in business information science and practice have founded a special professional Com- munity Forum. The Scientific and Educational Forum on Business Information Systems (SEFBIS) gathers up the professionals from the academic and the business and it has become increasingly popular in the last years. As Hungary is a member state of the European Union whose key vision is the information and knowledge management, so the scientific and educational cooperation turned more and more important. The committed leaders of SEFBIS take the responsibility of collaborating with profes- sionals in realizing the knowledge based society, and do the best to provide worldwide access to and interchange of information. After some successful national and international conferences (OGIK and ISBIS) the participants expressed their need for an international publication possibility and the idea of pub- lishing a professional journal was realized. The initiative is supported by the International Federation for Infor- mation Processing (IFIP). The formal chairman of the TC8 (Technical Committee on Information Systems), Dewald ROODE emphasized that only the nationwide activity of the specialists manifested by meetings, con- ferences and publications of a high standard can realize the international goals. The Enterprise Information Systems International Conference on Research and Practical Issues of EIS (CONFENIS) is a primary international event of the IFIP TC8 Working Group 8.9 (Enterprise Information Sys- tems). This program provides an opportunity for academicians and practitioners throughout the world to gather, exchange ideas, and present original research in the field of enterprise information systems. It is our great pleasure that the CONFENIS’2009 Conference sponsoring mainly by the IFIP, TC8 and WG 8.9, can be hosted by the John von Neumann Computer Society (NJSZT) and locally organized by the Szechenyi Istvan University (SZE) and the SEFBIS Community. On the occasion of organizing the CONFENIS’2009 in Hungary we publish a special edition of the SEFBIS Journal with the papers of keynote speakers and some other excellent authors. The articles deal with different approaches of Enterprise Information Systems, so this volume provides comprehensive coverage of various ERP topics, and gives a wide overview about the issues and results of ERPs with reflections of internationally acknowledged scientists and experts in this field. Concluding with my sincere greeting to the Readers I whish to obtain new ideas, concepts, to know new effective business solutions and research results from all over the world! Editor in Chief IFIP Honorary Secretary; professor at Széchenyi István University

Transcript of Foreword 1. Foreword Editorial Foreword to the...

Page 1: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Foreword����

SEFBIS Journal 2009 No. 4 1

Foreword

1. Foreword EEddiittoorriiaall FFoorreewwoorrdd

ttoo tthhee SSppeecciiaall EEddiittiioonn oonn tthhee OOccccaassiioonn ooff CCOONNFFEENNIISS’’22000099

A decade ago those John von Neumann Computer Society members, who are involved in business information science and practice have founded a special professional Com-munity Forum. The Scientific and Educational Forum on Business Information Systems (SEFBIS) gathers up the professionals from the academic and the business and it has become increasingly popular in the last years. As Hungary is a member state of the European Union whose key vision is the information and knowledge management, so the scientific and educational cooperation turned more and more important.

The committed leaders of SEFBIS take the responsibility of collaborating with profes-sionals in realizing the knowledge based society, and do the best to provide worldwide

access to and interchange of information. After some successful national and international conferences (OGIK and ISBIS) the participants expressed their need for an international publication possibility and the idea of pub-lishing a professional journal was realized. The initiative is supported by the International Federation for Infor-mation Processing (IFIP). The formal chairman of the TC8 (Technical Committee on Information Systems), Dewald ROODE emphasized that only the nationwide activity of the specialists manifested by meetings, con-ferences and publications of a high standard can realize the international goals.

The Enterprise Information Systems International Conference on Research and Practical Issues of EIS (CONFENIS) is a primary international event of the IFIP TC8 Working Group 8.9 (Enterprise Information Sys-tems). This program provides an opportunity for academicians and practitioners throughout the world to gather, exchange ideas, and present original research in the field of enterprise information systems. It is our great pleasure that the CONFENIS’2009 Conference sponsoring mainly by the IFIP, TC8 and WG 8.9, can be hosted by the John von Neumann Computer Society (NJSZT) and locally organized by the Szechenyi Istvan University (SZE) and the SEFBIS Community.

On the occasion of organizing the CONFENIS’2009 in Hungary we publish a special edition of the SEFBIS Journal with the papers of keynote speakers and some other excellent authors. The articles deal with different approaches of Enterprise Information Systems, so this volume provides comprehensive coverage of various ERP topics, and gives a wide overview about the issues and results of ERPs with reflections of internationally acknowledged scientists and experts in this field.

Concluding with my sincere greeting to the Readers I whish to obtain new ideas, concepts, to know new effective business solutions and research results from all over the world!

Editor in Chief

IFIP Honorary Secretary; professor at Széchenyi István University

Page 2: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� Business Intelligence Maturity

2 SEFBIS Journal 2009. No.4.

Business Intelligence

2. Business Intelligence Maturity BBuussiinneessss IInntteelllliiggeennccee MMaattuurriittyy:: aann EEvvaalluuaattiioonn ooff AAuussttrraalliiaann CCoommppaanniieess

1PAUL HAWKING – 2ROBERT JOVANOVIC – 3CARMINE SELLITTO – 4SUSAN FOSTER

1,2,3Victoria University School Management and Information Systems, Institute of Logistics and Supply Man-agement, 4School Management and Information Systems Monash University Melbourne Australia

eMail: [email protected]

Effective business intelligence (BI) is essential for companies in today’s business environment. However companies utilizing BI in a variety of ways to maximize its potential. Authors have developed maturity models to map BI usage and potential. This research evaluates the applicability of different BI maturity models to Australian companies.

IInnttrroodduuccttiioonn Companies today have all come to realize the im-portance of providing accurate, relevant and timely information— information that allows their organ-izational personnel to engage in effective decision-making practices. Aristotle Onassis, the famous Greek shipping tycoon once commented that “the secret of business is to know something that no-body else knows” (cited Lorange, 2001 p.32). Ev-ans and Wurster (1997, p.72) in their paper on In-formation Economics stated that “… information is the glue that holds business together”. Clearly, the consequences of treating information as a strategic resource and corporate investment can result in companies gaining industry-wide advantages that are reflected through increased reputation and profitability (Loshin, 2003, p. 11).

Companies have developed and implemented systems to facilitate the collection, processing and dissemination of information. One such system, Enterprise Resource Planning (ERP) system, has enabled companies to gain efficiencies in their busi-ness processes and associated transactions through the high degree of integration of their company-wide business processes and associated data (Davenport et al, 2003). ERP systems are an essential element of the corporate information systems infrastructure allowing a business to be competitive in today’s world, as well as providing foundation for future growth (Chou et al, 2005). A survey of 800 top US companies showed that ERP

systems accounted for 43% of their information tech-nology budgets (Somers and Nelson, 2001). The ARC Advisory Group (2006) estimated that the worldwide market for ERP systems was $USD16.67 billion in 2005 and is forecasted to surpass $USD21 billion in 2010.

Accentors interviewed 163 executives from large enterprises around the world to identify how com-panies were using ERP systems to improve busi-ness performance and the specific practices that resulted in sustained value creation (Davenport et al, 2003). They found that the implementation of an enterprise-wide information system resulted in sustained value creation however; some corpora-tions realized far more comparable benefits than others. A more extensive follow up study in 2006 involving 450 executives from 370 companies identified the factors that drove value from their ERP system, as well how companies used these systems to enhance competitiveness and differen-tiation (Harris and Davenport, 2006). One of the key findings from this study was that improved deci-sion-making was the most sought out and realized benefit. Related to this finding was that the top performing companies aggressively used informa-tion and analytics to improve decision-making. Gartner, a leading business analyst firm, who con-ducted a worldwide survey of 1,500 Chief Informa-tion Officers and identified Business Intelligence (BI) as the number one technology priority for compa-nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a Cutter Consortium Report

Page 3: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Business Intelligence����

SEFBIS Journal 2009 No. 4 3

(2003), a survey of 142 companies found that 70% of the respondents had implemented data ware-housing and BI initiatives. This is reflected in the forecasted BI vendor revenue expected to be $7.7 billion by 2012 (Sommer, 2008).

This increased expenditure on BI reflects the level of impact these systems can have on a com-pany’s performance. IDC, another technology ana-lyst firm, found in a survey of 62 companies that there was an average a 401 percent ROI over a three year period (IDC, 1996). The Data Ware-housing Institute (TDWI, 2005) identified that the use of BI in a number of organizations such as Hewlett Packard and the US Army had a signifi-cantly positive impact on their performance. Hew-lett Packard found in 2004 that due to their BI ini-tiative, the value of worker productivity increased by approximately USD$10.6 million, whilst the com-pany’s reporting costs being reduced by some $8.6million. The US Army NGIC found that as a result of their BI implementation, 10 trained analysts could complete as much work as 200 traditional analysts. In another example of the value of BI, Harrah’s, a major hotel and casino owner in Amer-ica, believe that BI contributed to their improvement in performance and $235 million profit in 2002. Harrah’s spent $10 million to build a 30 terabyte data warehouse (Lyons, 2004) and used BI to better un-derstand their customers and their gambling habits (Williams and Williams, 2006). The IDC group col-lected data from forty-three companies in North America and Europe that had implemented a BI and found that twenty companies achieved a ROI of less than 100 percent; fifteen achieved an ROI between 101 and 1000 percent, whilst eight achieved an ROI greater than 1000 percent (Morris, 2003).

WWhhaatt iiss BBuussiinneessss IInntteelllliiggeennccee?? The desire by companies to collect, store and ana-lyse data to support organisational decision making activities, coupled with the availability of appropriate computing technology has resulted in the evolution of existing IT systems and the emergence of new powerful analytical solutions. These included Deci-sion Support System (DSS), Executive Information System (EIS), Data Warehousing (DW), Knowledge

Management (KM), Data Mining (DM), Collabora-tive Systems (CS), Corporate Performance Man-agement (CPM), Knowledge Discovery (KD) and Analytics, with the term Business Intelligence (BI) tending to be used to encompass all (Gibson et al, 2004; Gray, 2003; Olszak and Ziemba, 2007). Gray (2003) believes that BI is not a new technology but an evolution of previous systems used to sup-port decision making.

Some researchers (Vitt et al, 2002) consider the actual term “business intelligence” to be relatively new with Howard Dresner, from the Business Intel-ligence vendor Hyperion, claiming ownership of the term (Smalltree, 2006). However, Luhn (1958 p.314) used the term more than 50 years ago when ex-plaining his dissemination of information technique. Although it is possible to narrow down the origin of the term, a common definition is more elusive. Vitt et al (2002, p.13) refer to BI as “an approach to management that allows an organization to define what information is useful and relevant to its cor-porate decision making.” Howson (2007, p. 2) de-fined BI as allowing …“ people at all levels of an organization to access, interact with, and analyze data to manage the business, improve performance, discover opportunities, and operate efficiently”. These definitions appear to ignore the role IT plays in BI. Golfarelli et al (2004, p.1) defines BI “as in-formation systems which processes data into in-formation and then into knowledge to facilitate de-cision making”. Loshin (2003, p.4) believes that it is “a set of tools and methodologies designed to ex-ploit actionable knowledge discovered from the company’s information assets”.

BBuussiinneessss IInntteelllliiggeennccee MMaattuurriittyy MMooddeellss Similar to ERP systems, researchers have identified that companies utilize BI in a different ways, with varying levels of success. hese researchers have attempted to map BI usage and benefits through maturity models (Watson et al, 2001; McDonald, 2004; Hamer, 2005; Eckerson, 2007, ASUG, 2007; Hewlett Packard, 2007). The purpose of these mo-dels is to provide companies with a roadmap to im-prove the management of their corporate data, as well as maximize the benefits obtained from BI.

Page 4: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� Business Intelligence Maturity

4 SEFBIS Journal 2009. No.4.

Each BI maturity model identifies distinct stages associated with a company’s BI progress and growth. However, each model utilizes different factors to identify the different stages. Davenport and Harris (2007) created a model (see Figure 2-1) to assist companies to understand the role of Analytics within BI and the impact each stage would have on the

company’s performance. The model classifies BI usage as per purpose of the output. Eckerson (2007) proposed a six-stage model; Prenatal, Infant, Child, Teenager, Adult, and Sage that is based on; Ex-ecutive perception, Analytical Tool, Architecture, and Scope (see Table 2-1).

Optimization What is the best that can happen? Predictive modeling What will happen next? Forecasting What if these trends continue? Statistical Analysis What is this happening?

An

alyt

ics

Alerts What actions are needed? Query Drilldown Where is the problem exactly? Ad Hoc Reports How many, how often, where?

C

ompe

titiv

e Ad

vant

age

Stand Alone Reports What happened? Ac

cess

and

R

epor

ting

Degree of Intelligence

Figure 2-1. Business Intelligence and Analytics (Davenport and Harris, 2007)

Table 2-1. Eckerson (2007) six-stage model of BI growth

Stage 1 Prenatal 2 Infant 3 Child 4 Teenager 5 Adult 6 Sage Executive Perception

Cost Centre Reporting

Inform Executives

Knowledge Worker

Monitor Busi-ness Prosses

Drive The Business

Drive The Market

Analytical Tool

Static Reports Spreadsheets OLAP/Ad Hoc Reports

Dashboards Scorecards

Predictive Analytics

Customer BI Embedded BI

Architecture Operational reports

Spreadsmarts Data Marts Data Ware-houses

Enterprise DW

Analytical Ser-vices

Scope Systems Individuals Department Division Enterprise Inter-Enterprise

The Americas SAP User Group (ASUG) developed a series of benchmarking studies for its members that related to BI, allowing the details about a company’s implementation and usage of Business Intelligence to be collected. These details were compared to details from other companies as well as industry standards, allowing a range of BI benchmarks to be created. Part of the bench-marking derivation process as the mapping of companies to a maturity model. The ASUG Busi-ness Intelligence Maturity Model (see Table 2-2) allows BI maturity to be classified into the stages of Application Architecture, Standards and Processes, Governance, and Information and Analytics.

Generally maturity models are designed to provide a roadmap for companies to move forward and maximize the benefits of their BI initiatives. A review of literature indicates that a number of companies often fail to realize expected benefits of BI and sometimes consider the project to be a failure in itself (Chenoweth et. al., 2006; Hwang et al., 2004; Johnson, 2004; Arte 2003; Adelman and Moss 2002). Gartner predicted that more than half of the Global 2000 enterprises would fail to realize the capabilities of BI and would lose market share to the companies that did (Dresner et al, 2002). A survey of 142 companies found that 41 percent of the re-spondents had experienced at least one BI project failure and only 15 percent of respondents believed

Page 5: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Business Intelligence����

SEFBIS Journal 2009 No. 4 5

that their BI initiative was a major success (Cutter Consortium Report, 2003). Moss and Atre (2003) indicated that 60% of BI projects failed due to poor planning, poor project management, undelivered business requirements, or of those that were deliv-

ered, many were of poor quality. A number of au-thors believe that in many BI projects the informa-tion that is generated is inaccurate or irrelevant to the user’s needs or indeed, delivered too late to be useful (Ballou and Tayi, 1999; Strong et al., 1997).

Table 2-2. The ASUG (2007) Business Intelligence Maturity Model

Stage 1 Information Dictatorship

2Information Anarchy

3 Information Democracy

4 Information Collaboration

Information and Analytics

Requirements are driven from a limited executive group

KPI’s and analytics are identified, but not well used

KPI’s and analytics are identified and effec-tively used

KPI’s and analytics are used to manage the full value chain

Governance IT driven BI Business driven BI evolving

BI Competency Centre developing

Enterprise wide BI governance

Standards and processes

Do not exist or are not uniform

Evolving effort to for-malise

Exist and are not uni-form

Uniform, followed and audited

Application Architecture

BI “silos” for each business unit

Some shared BI ap-plications

Consolidating and up-grading

Robust and flexible BI architecture

The three identified BI maturity models have simi-larities but there are also significant differences. They indicate maturity through a variety of factors. It would be expected that if the models were a true indication of BI maturity then there would be a relationship between the stages of each of the models. In addi-tion, in terms of the applicability of these models, they are designed in such a way that companies can easily identify which stage applies to their BI prac-tices? The increased adoption and usage of BI re-quires research into the various maturity models and their applicability.

RReesseeaarrcchh MMeetthhooddoollooggyy The primary objective of the research was to survey a range of information system professionals and seek responses to how they perceived the maturity of their company’s business intelligence initiative. In addition, more specific research questions consi-dered include:

– What is the Business Intelligence maturity of the Australian companies?

– Is there a relationship between the stages in the different models?

– Can companies easily use these maturity mod-els to classify their BI usage?

In order to study the maturity of business intelligence usage in Australia we used the ASUG (2007), Eck-erson (2007) and Davenport and Harris (2007) BI maturity models. Each of these models viewed BI maturity from different perspectives. A survey was developed where respondents were asked to iden-tify which stage of each model best described, or corresponded to their company’s BI usage. The survey was distributed to attendees at a user group conference who were attending a BI presentation.

The attendees at the user group conference rep-resented employees of companies, which are mem-bers of the SAP Australian User Group (SAUG). The SAUG has approximately 300 corporate members which are representative of many of Australia’s leading companies. SAP is the leading vendor of ERP systems in Australia with approximately 70% of the market (McBride 2003) and the user group is representative of approximately 65% of the SAP customer base.

As part of the SAUG membership each company is eligible to send employees to SAUG events. The user-group conference used to source potential re-spondents consisted of 15 sessions and 3 keynotes covering a range of SAP related topics. These ses-sions are arranged in 3 concurrent streams. One of

Page 6: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� Business Intelligence Maturity

6 SEFBIS Journal 2009. No.4.

the sessions included 2 BI presentations. The ses-sion had 34 attendees. There were 180 attendees registered for the SAUG event.

The survey was distributed before the presenta-tions commenced and a brief explanation was pro-vided. The surveys were collected as attendees left the session providing 28 completed surveys rep-resenting a response rate of 82%.

RReessuullttss –– DDiissccuussssiioonn Demographics was collected to provide background information on the respondent companies and in-cluded data on business activity (services, manu-facturing, etc) and company size as measured by annual revenue. In terms of company size 66% had revenues of greater than $1 billion and 30% had revenues of between $750 million and $1 billion. he remainder of the sample had revenues of less than $250 million. Most of the respondents were from companies whose main business activities were mining, consumer products or public sector. This is consistent with previously reported demographics of the SAP customer base in Australia (Stein and Hawking, 2002).

An analysis of the results revealed that many respondents struggled to classify their BI usage entirely in one stage of each model. The ASUG model faired the best with 50% of respondents able to select a single stage to best describe their usage with the initial stages of the model (Information Dictatorship and Information Anarchy) being the stages predominantly selected. Thirty two percent of the respondents selected a single stage in the Eckerson (2007) model; however, these selections were spread across the model. Arguably, the Dav-enport and Harris (2007) model was not designed to classify companies into a single stage in that it is identified with the output or purpose of reporting practices. The majority of respondents (60%) se-lected Query/drill down (Where exactly is the problem?) to best describe their BI usage. However, 35% of the respondents selected more than one category for BI usage. This would be a reasonable expectation as companies would have a range of BI usage depending on the users and the types of decisions they are responsible for.

As many of the respondents felt that a single stage did not reflect their degree of BI usage or level of adoption hence, to better understand the results for each model, the frequency of each stage was calculated. Table 2-3. includes the frequency for the ASUG (2007) model and Table 2-4. the Eckerson (2007) model. The results associated with the ASUG model reveals that this set of Australian companies suggest that the key performance and the impact these have on their BI practices vary. However an important initial step in BI is the identification of appropriate KPI’s. This is reinforced by 57% of the respondents indicating that BI usage is being driven by the business rather than IT. In addition 68% of respondents indicated that standards and proc-esses associated with BI usage are evolving or already exist. However, these are yet to be con-sistent throughout the company. Finally, the BI so-lutions are being rationalized in terms of sharing solutions or consolidation.

The different response frequencies encountered in the Eckerson (2007) model were not as pronounced as those found with the ASUG (2007) model. The Eckerson (2007) model indicates that the majority of users are knowledge workers using OLAP/Ad Hoc reporting. A relatively high proportion of respondents indicated that they had implemented a data ware-house. The architecture focus of the model might have been a little confusing for respondents given that in terms of architecture there is a reference to operational reports. Arguably, operational reports do not reflect architecture but rather a reporting purpose and it would not be unreasonable to expect that the respondent companies were users of SAP BI. Ac-cordingly, they would be users of a data warehouse and OLAP technology. It was expected from our experiences that very few companies were using predictive analytics. A previous analysis of more than 10,000 industry presentations revealed that no companies were involved in data mining or associ-ated practices. To determine the BI maturity of Aus-tralian companies the frequency of characteristics was used. Information Anarchy is clearly identified in the ASUG (2007) model however; it is difficult to gauge the BI maturity stage with the Eckerson (2007) model. Table 2-5 is a consolidation of the most select char-acteristics for each stage from both models and it is

Page 7: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Business Intelligence����

SEFBIS Journal 2009 No. 4 7

proposed that this tends to provide a more realistic view of Australian BI maturity–arguably, this consoli-dation approach draws on the strengths of both mod-els. The grouping of the most selected features in the various stages of the ASUG (2007), Eckerson (2007) models suggest that the governance stage is the most

common area of BI maturity that Australian compa-nies group themselves. Collectively these nine areas of BI maturity can be viewed as those areas in which these companies have chosen to concentrate their resources and actions in order to advance BI in the firm.

Table 2-3. BI usage mapped to the ASUG model

Stage

1 Information Dictatorship

2 Information Anarchy

3 Information Democracy

4 Information Collaboration

Information and Analytics

Requirements are driven from a limited executive group (7)

KPI’s and analytics are identified, but not well used (11)

KPI’s and analytics are identified and effectively used (6)

KPI’s and analytics are used to manage the full value chain (3)

Governance IT driven BI (6) Business driven BI evolving (16)

BI Competency Cen-tre developing (2)

Enterprise wide BI gov-ernance with business leadership (3)

Standards and processes

Do not exist or are not uniform (5)

Evolving effort to formalize (9)

Exist and are not uni-form (10)

Uniform, followed and audited (3)

Application Archi-tecture

BI “silos” for each business unit (4)

Some shared BI applications (9)

Consolidating and upgrading (9)

Robust & flexible BI ar-chitecture (4)

(22) (45) (27) (13)

Table 2-4. BI usage mapped to the Eckerson (2007) model

Stage 1 Prenatal 2 Infant 3 Child 4 Teenager 5 Adult 6 Sage Executive Perception

Cost Centre Reporting (6)

Inform Executives (5)

Empower Knowledge Worker (11)

Monitor Busi-ness Proc-esses (2)

Drive The Business (2)

Drive The Market (2)

Analytical Tool

Static Reports (3)

Spreadsheets (8)

OLAP/ Ad Hoc Reports (13)

Dashboards Scorecards (2)

Predictive Analytics (0)

Customer BI, Embedded BI (2)

Architecture Operational reports (6)

Spreadmarts (3)

Data Marts (2) Data Ware-houses (6)

Enterprise DW (7)

Analytical Ser-vices (4)

Scope Systems (3) Individuals (4) Department (2)

Division (4) Enterprise (13) Inter-Enter-prise (2)

(18) (20) (28) (14) (29) (10)

CCoonncclluussiioonn BI is a priority for many companies however similar to there technologies there are early adopters and laggards. A number of maturity models have been developed identify usage and provide a roadmap for companies to maximize the benefits from their BI initiatives. The models used in this study indicated that there are a range of factors that can be used to characterize BI usage. Respondents found it diffi-

cult to classify their usage into any one stage within a model. However this problem was less pronoun-ced with the ASUG (2007) model. The simple statements, without explanations, contained in each model could easily contribute to misinterpretation by respondents. These models are probably better suited for a specialist to observe the companies and then determine which stage best characterizes the BI usage.

Page 8: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� Business Intelligence Maturity

8 SEFBIS Journal 2009. No.4.

Table 2-5. Common BI usage mapped to the [ASUG (2007) & Eckerson (2007) Models

Stage Description (N) Frequency (%)

Governance [ASUG Model] Business driven BI evolving (16) 57 Analytical Tool [Eckerson Model] OLAP/Ad Hoc Reports (13) 46 Scope [Eckerson Model] Enterprise (13) 46 Information and Analytics [ASUG Model] KPI’s and analytics are identified, but not well used (11) 39 Executive Perception [Eckerson Model] Empower Knowledge Worker (11) 39 Standards and processes [ASUG Model] Exist and are not uniform (10) 35 Application Architecture [ASUG Model] Some shared BI applications (9) 32 Application Architecture [ASUG Model] Consolidating and upgrading (9) 32 Architecture [Eckerson Model] Enterprise DW (7) 25

RReeffeerreenncceess [1] ARC Advisory Group, (2006), “ERP Market to Ex-

ceed $21 Billion, Says ARC Advisory” located at http://www.tekrati.com/research/News.asp?id =6828 , accessed October 2006

[2] ASUG, (2007), “ASUG/SAP Benchmarking Initia-tive: Business Intelligence/Analytics” Presentation at American SAP User Group Conference, Atlanta

[3] Chou, D. C., Tripuramallu, H. B., and Chou, A. Y., (2005), “BI and ERP integration”, Information Management and Computer Security, 13(5)

[4] Cutter Consortium Report (2003) “Cutter Consor-tium Report on Corporate Use of BI and Data Warehousing Technologies” http://www.dmreview. com/article_sub.cfm?articleid=6437 August 2008

[5] Davenport, T., Harris, J. and Cantrell, S., (2003), “The Return of Enterprise Solutions: The Director's Cut”, Accenture.

[6] Eckerson W, (2007), Performance Dashboards: Measuring, Monitoring, and Managing Your Busi-ness’, Published by Wiley-Interscience, NYC.

[7] Harris, J. G. and Davenport, T. H., (2007), “Com-peting on Analytics: The New Science of Winning”, Harvard Business School, Massachusetts.

[8] Eckerson, W., (2006), “Performance dashboards: Measuring, monitoring, and managing your busi-ness”. John Wiley and Sons Inc., New Jersey

[9] Evans, P and Wurster, T., (1997), “Strategy and the new economics of information”, Harvard Business Review, September-October, 70-82.

[10] Gartner (2008), 2008 Gartner Executive Programs CIO Survey, available at www.Gartner.com ac-cessed June 2008.

[11] Gibson, M., Arnott, D., Carlsson, S., (2004), “Evaluating the Intangible Benefits of Business Intelligence: Review & Research Agenda”, Deci-sion Support in an Uncertain and Complex World:

The IFIP TC8/WG8.3 International Conf., Prato, [12] Gray, P., (2003a), “Business Intelligence: a new

name or the Future of DSS?”, in " DSS in the Un-certainty of the Internet Age. Eds Bui T., Sroka H., Stanek S. Goluchowski J., Publisher of the Karol Adamiecki, University of Economics, Katowice.

[13] Golfarelli, M., Rizzi, S. and Cella, I., (2004), “Be-yond Data Warehousing: What’s next in Business Intelligence?” Proceedings of the 7th ACM interna-tional workshop on Data warehousing and OLAP, Washington, DC, USA, 1-6.

[14] Hamer, P. den, (2005), “De organisatie van Business Intelligence”, Den Haag: Academic Service. cited in Hindriks, C. (2007). Towards chain wide Business Intelligence, University of Twente.

[15] Hewlett-Packard, (2007), “The HP Business Intel-ligence Maturity Model: describing the BI journey”, Hewlett-Packard.

[16] Howson, C., (2007), “Successful Business Intelli-gence: Secrets to Making BI a Killer App”. McGraw-Hill Professional.

[17] Lorange, P., (2001), “Strategic re-thinking in ship-ping companies”, Maritime Policy & Management, 28(1), 23-32

[18] Loshin, D., (2003), Business Intelligence: The savvy manager’s guide, Morgan Kaufmann, San Francisco.

[19] Luhn, H. P., (1958), “A Business Intelligence Sys-tem”, IBM Journal, October, 314-319

[20] Lyons, D., (2004). “Too much information”, Forbes, [21] McBride, G., (2005) “Business in 2010” proceed-

ings of the SAP Australian User Group Summit, Sydney, Australia

[22] McDonald, K., (2004), “Is SAP the Right Infra-structure for your Enterprise Analytics” Presenta-tion at American SAP User Group Conference, April, Atlanta

Page 9: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Development Methodology����

SEFBIS Journal 2009 No. 4 9

[23] Morris, H., (2003), “The Financial Impact of Busi-ness Analytics: Build vs. Buy”, DM Review (13:1),

[24] Olszak, C. M. and Ziemba, E., (2007), “Approach to building and implementing Business Intelligence Systems”, Interdisciplinary Journal of Information, Knowledge, and Management, 2, 135-148

[25] Smalltree, H., (2006), “BI’s founding father speaks: Q&A with Howard Dresner” Data Management News, located at http://searchdatamanagement.techtarget.com/news/interview/0,289202,sid91_gci1174419,00.html accessed June, 2007.

[26] Somers, T. and Nelson, K., (2001). “The impact of Critical Success Factors across the Stages of En-terprise Resource Planning Systems Implementa-tions”, proceedings of the 34th Hawaii International Conference on System Sciences, HICSS., Hawaii

[27] Sommer, D., (2008), “Gartner Says Worldwide Business Intelligence Spending to Grow 11 Per-cent in 2008”, located at www.gartner.com, ac-cessed February 2008.

[28] Stein, A. and Hawking, P., (2002), "The ERP Mar-ketplace: An Australian Update" Enterprise Re-source Planning Solutions and Management, IDEA Group Publishing

[29] Vitt, E., Luckevich, M., Misner, S., (2002), “Busi-ness Intelligence: Making Better Decisions Faster”, Microsoft Press, Redmond, Washington.

[30] Watson, H., Ariyachandra, T. and Matyska, r. J., (2001), “Data Warehousing Stages Of Growth”, Information Systems Management, 18(3): 41-50.

[31] Williams, S. and Williams, N., (2006), “The Profit Impact of Business Intelligence”, Morgan Kauf-mann, New York

Development Methodology

Paul Hawking is one of the leading commentators on ERP systems and specifically SAP solutions. His knowledge is well respected in both industry and academia and accord-ingly is often required to assist companies with their ERP strategies. He is a senior lecturer at the Victoria University School of Management and Information Systems, and SAP academic program director. He has been a committee member of the SAP Aus-tralian User Group for the past six years and is responsible for knowledge transfer. He graduated Diploma of Business Information Technology (Swinburne Institute of Tech-nology, 1992), Master of Business Computing (Victoria University, 1996), and he has

doctorate degree in Business Administration (Victoria University). Paul Hawking is one Australia's best selling IT authors having written 10 books that are sold throughout the world. His areas of teaching and research are ERP systems strategy and implementation, and Business Intelligence.

Mapping Agile Methods to ERPs MMaappppiinngg AAggiillee MMeetthhooddss ttoo EERRPP:: DDiirreeccttiioonnss aanndd LLiimmiittaattiioonnss

1ROGERIO ATEM DE CARVALHO – 2BJÖRN JOHANSSON – 3RODRIGO SOARES

1Instituto Federal Fluminense, Brazil, 2Copenhagen Business School, Denmark, and Lund University, Sweden, 3Universidade Estadual do Norte Fluminense, Brazil

eMail: [email protected] [email protected], [email protected]

Historically Enterprise Resource Planning (ERP) systems have been developed in a waterfall-like approach, which has been resulting in that when they are finally deployed in the adopter organization often ends with misalignment problems between its delivered functionalities and the business requirements the organization would like to have supported. The way for organizations to deal with the problem of misalignment is to customize the ERP system to a high extent. However, the proposals for minimizing misalignment problems are mostly focused on the same tradi-tional, heavyweight waterfall-like approaches, therefore creating a loop where requirements are identified long before they are implemented, going back to misalignment problem. On the other side, the last decade has wit-nessed the rise and growth of agile methods, which have both close communication and fast response to changes among their main values. This paper aims to provide a mapping between the main agile methods and ERP de-velopment processes, as well as to present and discuss directions and limitations to this approach.

Page 10: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� Mapping Agile Methods to ERPs

10 SEFBIS Journal 2009. No.4.

IInnttrroodduuccttiioonn The ERP environment faces constant changes and reassessment of organizational processes and technology, therefore project management methods used within ERP deployment must provide adapta-bility and agility to support this evolutionary envi-ronment in which ERP customization takes place. Alleman (2002) and Meszaros and Aston (2007) agree that the application of scientific management –here represented by “high-ceremony” or docu-ment-driven processes– is understandable in many ERP deployment cases since many target compa-nies has a tradition in engineering and business that make them think in terms of waterfall development processes. However, Alleman (2002) alerts that “the use of predictive strategies in this environment is inappropriate as well as ineffective since they do not address the emergent and sometimes chaotic be-haviors of the market place, the stakeholders, and the vendors’ offerings.”

In the context of ERP customization, a well--known problem is the misalignment or misfit between the ERP functionalities and the business requirem-ents (Soh et al., 2000). It can be claimed that this problem is caused mainly by communication bottle-necks and difficulties on responding to changes on requirements (Johansson & Carvalho, 2009). Tradi-tionally, heavyweight waterfall-like approaches are applied to try to minimize the misalignment problem, with results that are still unsatisfactory. On the other side, during recent years we have witnessed the rise and adoption of agile methods, having both close communication and fast response to changes among their main values. This paper maps some of the main agile methods to ERP development and presents some limitations and future directions on agile methods as an approach for ERP development.

AAggiillee MMeetthhooddss –– EERRPP DDeevveellooppmmeenntt Johansson and Carvalho (2009) suggest that the misalignment problem is related to requirements management processes used in ERP development. In fact, communication between business people and development teams to a high extent occurs in a waterfall-like approach, which creates a bureauc-ratic environment where communication is done by

documents and not directly between people. Be-sides that, the ever-changing globalized business environment makes requirement changes could be seen as “natural” events. Therefore, it is necessary to have a development process that simultaneously enhances communication between ERP stake-holders and copes with changes. Another angle of this problem is that information systems, such as ERPs, deliver too much functionality, which over-load users with information. The information over-load results in that even if the system contains needed functionality, user may not know about it and have a hard time to find as well as understand how to use the specific functionality. This indicates that instead of talking about misalignment a better way of describing what is needed could be syn-chronization between stakeholders, or more spe-cifically, business synchronization. From this it can be said that a focus on business synchronization in the form of describing how ERPs as well as or-ganizations could be developed in tandem would be fruitful. This implies that a focus on how to achieve efficient communication between developers and users, and fast response to change is needed.

A way of both achieving an efficient communi-cation and fast response to change is to deliver software in small and frequent increments, as ad-vocated by agile software development methods. Agile methods can be said are a reflection of Lean Manufacturing techniques in the software engi-neering realm. Sutton (1996) pointed out that Lean can be a good middle ground between craft de-velopment and “software factories”, stating that use of lean techniques lead to both quality improvement and cost reduction. Later, Raman (1998) argued that lean software development is a feasible meth-odology for software development. It is important to note that the term “Lean Development” (LD) is be-coming more used nowadays, however the authors understand, in concordance to Fowler (2008), that agile methods are conceptually aligned to Lean Manufacturing and adopt a series of its concepts. Agile methods are well accepted in general by the software development community, however, there is no evidence that they are in use in the ERP de-velopment community.

Page 11: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Development Methodology����

SEFBIS Journal 2009 No. 4 11

Agile development is a generic label for all meth-odologies based on Agile Manifesto values (Beck et al., 2001). This manifest is a document recognizing four values and twelve principles that basically points out: close collaboration and proximity be-tween the development team and the stakeholders; recognizing requirement changes as results of learning and opportunities to achieve competitive advantage for the organization; the search for sim-plicity and elimination of unnecessary documenta-tion and processes; emphasizing people rather than processes; and establishment of delivering busi-ness value to the stakeholders as the ultimate goal and the ultimate measure of progress.

Fowler (2005) lists two fundamental differences between agile and traditional methods to software development. First, agile methods are adaptive rather than predictive. While predictive methods see change as a problem to be avoided and an undesir-able and costly deviation from the plan, adaptive methods embrace change as an opportunity for im-provement. Second, agile methods are people-ori-ented, not process-oriented. In the agile view, proc-esses are intended to support people's work rather than to be strictly followed. This leads to recognizing software developers as self-organizing “responsible professionals” and not as disposable and inter-changeable “plug compatible programming units”.

Unlike traditional methods, agile methods do not make comprehensive up-front planning. From an agile point of view, planning is a “constant process of reevaluation and course-correction throughout the lifecycle of the project” (Beck and Fowler, 2000). Development is a learning process, an exercise in discovery (Poppendieck and Poppendieck, 2003), and constant planning is the key point for achieving a process that accommodates learning. However, it is impossible to improve learning if the development team has few or no contact with stakeholders, which are the ultimate requirements specification produ-cers. In fact, agile methods recognize that develop-ers and stakeholders must have close cooperation, so development activities are based on concrete feedback rather than speculation.

Agile methods use short iterations, which means that in short periods of time, working software is released so that the stakeholders can check if the

implemented software is exactly what they need. For each iteration is allocated a small number of features, which are implemented by the team within the itera-tion. The iterations must be as short as possible. This means that the software is delivered into frequent and small increments. This technique is common to all iterative and incremental lifecycles, and is used to cope with not well established or instable require-ments. In that way, it is possible for both developers and users to explore incrementally the requirements and the way the software is built, allowing a better adherence to the users’ demands. Furthermore, smaller increments and shorter iterations, faster feedback cycles, leads to a very fine granularity project control and allows rapid correction of devia-tions from business needs (Martin, 1999). In the same way, the requirements elicitation process should also be incremental. The features are not detailed at the beginning of the project, but only a list of features is initially extracted. In this context, each item from this list is not a requirement, but a record of its existence, a commitment for future conversation (Jeffries et al., 2000). The details about a feature are only analyzed in depth within the iteration which the feature is allocated.

Currently, the most widely adopted agile methods are Scrum (Schwaber, 2004) and Extreme Program-ming (Beck, 1999; Beck and Andres, 2004). Scrum is a management-centered approach characterized by time-boxed iterations called sprints, project tracking by feature lists called backlogs, diary meetings and iteration periodic retrospectives for continuous im-provement. Scrum do not prescribe engineering practices, the team must choose the techniques that best adapt to its environment. Extreme Programming (XP) is an approach that strongly supports the de-velopment team at the engineering point of view. XP is built around a set of values, principles and prac-tices.

The values are the philosophical background, the practices are the concrete expressions of the values and principles are guidelines to translate the values into practices. XP's practices focus on very small it-erations (1-2 weeks), all-time peer review, test-first programming, refactoring, emergent design and con-tinuous integration. In the real world, several teams use both Scrum for project management and XP for

Page 12: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� Mapping Agile Methods to ERPs

12 SEFBIS Journal 2009. No.4.

engineering issues (Kniberg, 2007), though XP itself also covers management, planning and so on. In the next section the main agile-related practices are discussed in relation to ERP development. It is im-portant to note that some of them are directly related to agile methods, while others were embraced by these methods. Since the distinction of techniques’ origins is not in the scope of this paper, they are treated equally in this text.

MMaappppiinngg AAggiillee MMeetthhooddss ttoo EERRPPss In this section the mapping of the main agile prac-tices to the ERP realm is done, by presenting their principles and suggesting how they can be used in this specific environment.

IItteerraattiivvee aanndd IInnccrreemmeennttaall DDeevveellooppmmeenntt Developing an ERP incrementally conflicts with the common sense in the Enterprise Information Sys-tems community of the necessity of modeling the organization’s processes, manufacturing resources and structure, as suggested by Vernadat (2002) and Shen et al (2004), in advance to the system devel-opment. In fact, modeling beforehand is necessary to, among other things, to identify possible process improvements and integration points, however, this creates a waterfall-like development process, bring-ing all the well known problems related to this kind of process.

Therefore, one question to be solved when using agile methods (or any iterative incremental lifecycle in general) for developing ERPs, is how to both achieve (a) incremental requirements elicitation and (b) light rework due to late process integration iden-tification. This second situation, which occurs when, during the system development, a given business process is implemented into the software without identifying all its connections with other process, or even as it was a standalone process – a natural situation in a process where the requirements are identified incrementally. Thus, what happens in later iterations, when requirements are better understood, is the realization that this requirement needs to be integrated to other requirements, leading to changes in code and consequent rework.

This situation can be described as the “Late Inte-gration Problem”, which will occur every time the whole business process modeling not is done be-fore the actual development of the system takes place. Moreover, this problem can be generalized to how to cope with constant changes in business processes, without incurring in excessive rework.

The answer to this problem is that the ERP de-velopment framework must provide fast and flexible process integration – preferably through configura-tion instead of coding, so that integration points identified late not will demand heavy rework. In that way it is possible to rapidly reconfigure and inte-grate business processes so that both incremental requirements elicitation and changes in require-ments are dealt with. For achieving this, the frame-work must provide ways to rapidly connect business process while keeping louse coupling, enabling the automatic –or configurable– creation of proper call-ing chains, GUI navigation, and information passing between processes. With these features, it is pos-sible to identify late integration points and rapidly provide integration among processes.

UUbbiiqquuiittoouuss LLaanngguuaaggee The concept of ubiquitous language is very impor-tant for communication, feedback and close col-laboration between a customers and developers (Evans, 2004). When communication between cus-tomer and the development team uses less docu-ments and textual specifications and goes more too face-to-face dialogue and learning, there is a need for an effective shared language between those groups. The ubiquitous language is a common lan-guage, covering the entire communication chain from customer and business analysis to the team’s internal conversations and coding. The ubiquitous language reflects and provides feedback about the domain and must be exercised all the time in all communication tasks. This language does not necessarily uses the exact customer jargon, but an unambiguous and contradiction-free version of the domain knowledge. A ubiquitous language is not built in a single step, but it is iteratively refined and improved.

Page 13: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Development Methodology����

SEFBIS Journal 2009 No. 4 13

According to Evans (2004), the model has to be used “as a backbone of a language”, so “a change in the ubiquitous language is a change to the model”. Creating a ubiquitous language is ex-tremely important for making communication be-tween developers and users more effective. How this can be done in the ERP system case to a high extent depends on the ERP business model. Grudin (1991) describes this problem by identifying when and how the users are identified in the development process. He distinguishes between three different development situations: competitively bid/contract development, product development, and in-house/ custom development. The difference between these three is that, when it comes to when users are identified, the product development situation first identifies the users when the system is delivered.

TTeesstt--DDrriivveenn DDeevveellooppmmeenntt Test-driven development (TDD) is a technique that consists of writing test cases for any programming task (feature creation or adaptation, improvements, bug corrections etc), before these implementations are performed. Koskela (2007) said TDD is inten-ded for “solving the right problem right”, meaning to achieve the correct solution that exactly matches the business problem.

TDD is not only a set of testing tools, but, pri-marily, a design technique, and in TDD design are made all the time (Beck and Andres, 2004), having no place for a “design phase”. In the TDD approach, the current design is only suitable in the current iteration, being the design improved for accom-modating new requirements within each iteration. With good programming and design techniques, the design of a system can be continuously improved without falling into the famous Boehm's cost of change curve (Boehm, 1981).

Modern programming techniques, powerful de-velopment tools, more expressive and simple lan-guages, more powerful computing and other ad-vances make the cost of change increase very slowly through the time for the most features. Poppendieck and Poppendieck (2003) pointed out that there are a few “high-stake constraints” such as the choice of programming language and architectural layering

decisions that could have a high cost of change later on. All other, largely the most follow a hori-zontally asymptotic cost of change curve.

TDD is directly applicable to ERP development, in special when dealing with high-level (black-box) testing. Given that an ERP will either substitute an existing system (or collection of systems) or will automate business processes, plenty of test cases will be available. However, the presence of testing data is not enough. Since ERP is both integrated software and an adaptable framework, regression testing is a must. Regression testing occurs, for instance, when a given module is altered to meet a given customer’s specific needs. After proceeding with the unit tests, it is necessary to run integration tests to ensure that modifications do not create side effects on related parts of the system. Although this seems to be obvious, one of TDD tenets is that automated test are built in an incremental way, so when the system becomes more complex, testing also becomes more complex, but if the tests follow this complexity growing, they will cope with heavy testing jobs. Therefore, a possible difference be-tween current ERP customization and this tech-nique is that besides supplying the necessary in-formation for changing the system code; including the code itself or proper APIs, it is necessary also to supply all the test scripts, so that integration also can be tested. Moreover, when new updates are provided to all users, customers that have imple-mented exclusive features must (a) re-implement these features on the upgraded version and (b) run all the tests against the new version of the system.

CCoonnttiinnuuoouuss IInntteeggrraattiioonn In many projects, integration brings up a series of problems that needs to be taken into account: in-compatibility between modules, broken dependen-cies, out of date modules, low test coverage, lack of compliance to coding standards etc. This is the so called “integration hell” which implies that the greater the amount of code to integrate is, the more complex is the integration process, as described by Fowler (2006).

Page 14: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� Mapping Agile Methods to ERPs

14 SEFBIS Journal 2009. No.4.

Continuous integration (CI) is a practice proposed to solve the integration problems by providing both agility and fast feedback, consisting of making (at least) daily project builds (Fowler, 2006). The con-cept of build used here is the whole process com-prising: get the latest source code from the main repository, build the application and the database, perform both testing, inspection and deploying, run software in a production similar environment and give automatic and real-time feedback to develop-ers, ensuring that the integrated parts act as a co-hesive whole and that there is always a working version of the software available in the repository.

The environment needed for CI to work can be from a simple script to complex, full-featured con-tinuous integration servers. Though CI seems to be an infrastructural topic, it is primarily a “shared agree-ment by the team” so that they keep the source code always passing on all tests and inspections and running the build process every few hours (Shore, 2005).

The main goals of continuous integration are im-proving quality and reducing risk (Duvall et al., 2007). Quality improvement comes from the execution of all tests, code inspections and deployments for each build. This assures that overall software is always on a valid state and prevents the system to be inad-vertently broken by a developer's code commit. The risk reduction is provided by the high frequency of builds and the fast feedback mechanisms. CI imme-diately warn the developers if something goes wrong, usually by e-mail, but even by SMS messages or visual warnings.

This technique can bring a series of benefits for ERP development involving code changes. First, CI can help to continuously provide working versions of a customized module, which can in a incremental way be checked by users as modifications and new features are introduced, reducing the risks of oc-curring misfits. To achieve such benefit, it is nec-essary that key users stay near the development team, testing the increments and providing constant feedback. In fact, using CI automated tests and expressive code – that provides direct mapping between requirements and code can automate part of the validation tasks, reducing the effort of key users, and providing very fast feedback. An ERP

provider and/or its partner network must keep not only a CI environment but also all configuration and test cases, both the ones used for standardized deployments, and also the customized ones. This environment can be recovered at the time of any future upgrade, and will help when a new upgrade comes and the modifications of specific customiza-tions must be re-inserted into the upgraded module.

EEmmeerrggeenntt DDeessiiggnn In an iterative and incremental, agile-style lifecycle, design is not performed up-front, but is increment-ally evolved as it meets the current iteration requi-rements. Any feature that can be useful to future iterations must be designed in future iterations, which avoids both speculation and resource wast-ing and keeps the team focused on designing the features prioritized by the stakeholders.

Bain (2008) defines emergent design (ED) as “a process of evolving systems in response to chang-ing requirements, better understanding of existing requirements, and in response to new opportunities that arise from new technology, better ideas, and a changing world”. To be able to follow this principle, some disciplines must be applied, such as TDD, refactoring, expressive code and heavy use of de-sign patterns. When it comes to ED and ERP de-velopment it can be stated that this technique is lim-ited, given that in any ERP environment (which also can be said is a fact in any framework based envi-ronment), ED has limitations in refactoring deepness, since the core framework cannot be changed ad hoc. One restriction could be access to the ERP source code which is directly related to the basic architec-ture of the ERP. For instance, in the SAP case there is the use of advanced business application pro-gramming (ABAP) which probably restricts the pos-sibilities to implement an ED approach. From that it could said maybe ED is more applicable to the crea-tion of entire new ERP modules, when programmers have access to all design decisions in this particular piece of the system. Also, it is highly applicable in in-house and open source ERP development, but also in some proprietary ERP systems such as Mi-crosoft Dynamics Navision that provides its end-user with total accessibility to the source code.

Page 15: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Development Methodology����

SEFBIS Journal 2009 No. 4 15

LLiimmiittaattiioonnss iinn EERRPP DDeevveellooppmmeenntt The mapping of agile methods to the ERP devel-opment realm presents cultural and technical limi-tations, while some of them also exist in the context of other types of systems; others are very specific to ERP customization and life cycles:

Cultural Limitations

– Scientific Management and its predictive plan-ning approach are well disseminated and work well in other types of projects, making it hard to high management to accept following a reactive way of managing the ERP customization and deployment project.

– Many ERP, such as SAP, uses document-driven processes to make clear separated roles com-municate. This type of process not only makes communication slower, but also stimulates the creation of modeling and communication arti-facts that do not aggregate value to final users. Besides that, stimulates the high specialization of the workforce, making people less flexible in skills, going against one of the modern produc-tion principles of flexible production resources. Flexible resources makes adaptation to fluctua-tions (such as in specific skills during the project) easier and cheaper, reducing resource bottle-necks and allowing higher degrees of product customization.

Technical Limitations

– Pioneer ERPs pay the price of legacy technologies and their limitations, which sometimes becomes a burden for the use of fully object oriented tech-niques, in which Agile methods rely. Moreover, built-in tools, such as SAP’s ABAP, on one hand simplify some development tasks, but on the other, make the whole ERP development community depend on a single supplier to evolve these tools - while ERPs based on open languages and stan-dards take advantage of all language and tool evolution, independently of the ERP supplier.

– The database-centric ERP configuration task brings all the limitations of using RDBMS, include-ing the difficult of using agile techniques such as Refactoring and Emergent Design (Ambler, 2008).

– A limitation to agile-based ERP customization can be in the ubiquitous language, if the ERP, because of eventual architectural idiosyncrasies, does not allow a one-to-one mapping between business domain and domain model. In some cases, uncoupling techniques as façades (Gamma et. al, 1995) or even an anticorruption layer (Ev-ans, 2004) can be useful. These techniques, however, does not eliminate the duplicity of lan-guages (non-compliant to UL in the ERP itself and compliant in the customization).

CCoonncclluussiioonnss,, RReesseeaarrcchh DDiirreeccttiioonnss The statistics on unsuccessful ERP implementta-tions urge for new ways of facing the misalignment problem. It can be concluded that agile methods in ERP development can achieve efficient communi-cation between developers and ERP end-users if some limitations can be overcome.

This paper started on the premise that the adopter has already chosen a specific ERP and already decided to change part of its code to make it fit better to the adopter’s business needs. Although this situation seems to be somehow a paradox for the ERP world, it is more common than it should be. Additionally, considering new ways of providing and developing ERPs, such as Open Source ERPs, it can be stated that the role that end-users have in development have changed, indicating that they are more involved in the development and in that way it could be a change towards agile methods.

This paper contributes by providing a mapping between the specific techniques used by agile methods and ERP development, complementing Meszaros and Aston (2007), who describe the crea-tion of a development environment and the cultural changes needed for agile development for a specific ERP product; and Alleman (2002), who describes the decision process involved in customizing and deploying agile methods in ERP development.

It can be concluded that agile methods in de-velopment of ERPs builds on the premises that efficient communication between developers and ERP end-users can be achieved. One way that agile methods advocate how this could be achieved is by delivering software in small and frequent in-

Page 16: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� Mapping Agile Methods to ERPs

16 SEFBIS Journal 2009. No.4.

crements. However, interesting research questions are then how efficient communication can be gained in different kinds of business models used to deliver the ERP system (Open Source ERP, In-house De-velopment, based on open source or not, External Hosting ERP, Direct Sale ERP, the vendor sales directly to the customer or Indirect Sale ERP, the vendor uses a partner channel as distributor). Since these models differ a lot on how communication can be done between developer and end-user.

It can also be concluded, that a potential benefit in agile development of ERPs, which is especially relevant for ERP customization, is the fact that agile methods are adaptive rather than predictive. This means that if it is possible to implement them in ERP development, it can be stated that it is more likely that the ERP and the organizations’ business processes will develop in tandem and thereby fulfill the goals of business synchronization. The main conclusion is that agile methods for ERP develop-ment have a great potential but it demands a close cooperation between different ERP stakeholders, so that customization is based on concrete feed-back and not speculation.

A future outcome of this work is to identify agile and lean practices adoption level in ERP develop-ment, differentiating between proprietary, free open source, and in-house solutions. In addition, investi-gating how ERP frameworks technologies have evolved to accompany new demands for flexible solutions would help understanding the technological hindrances to better ERP development. By doing so, it would be possible to identify process and product related problems that have been making ERP de-velopment sometimes become a failure.

RReeffeerreenncceess [[11]] Alleman, G. B. Agile Project Management Methods

for ERP: XP/Agile Universe 2002, Springer Verlag, [[22]] Ambler, S. Agile Modeling: Effective Practices for

Extreme Programming and the Unified Process. Wiley, 2002.

[[33]] Ambler, S. When IT Gets Cultural: Data Manage-ment and Agile Development, IEEE IT Professional, vol. 10, no. 6, pp. 11-14, 2008.

[[44]] Bain, S. Emergent Design: The Evolutionary Nature of Professional Software Development. Addi-son-Wesley, 2008.

[[55]] Beck, K., Extreme Programming Explained: Em-brace Change. Addison-Wesley, 1999.

[[66]] Beck,K.; Andres,C., Extreme Programming Explained: Embrace Change. 2nd ed. Addison-W., 2004.

[[77]] Beck, K.; Fowler Martin, Planning Extreme Pro-gramming. Addison-Wesley, 2000.

[[88]] Beck, K. et al. Manifesto for Agile Software Devel-opment. 2001. http://agilemanifesto.org

[[99]] Boehm, B. Software Engineering Economics. Pren-tice-Hall, 1981.

[[1100]] Duvall, P. et al., Continuous Integration: Improving Software Quality and Reducing Risk. Addison-W, 2007

[[1111]] Evans, E., Domain-Driven Design: Tackling Comp-lexity in the Heart of Software. Addison-W. 2004.

[[1122]] Fowler, M., The New Methodology. 2005. http://mar tinfowler.com/articles/newMethodology.html

[[1133]] Fowler, M. Continuous Integration. 2006. http://mar tinfowler.com/articles/continuousIntegration.html

[[1144]] Gamma, E. et al. Design Patterns – Elements of Reusable Object-Oriented Software. Addi-son-Wesley, Reading, MA, 1995.

[[1155]] Grudin, J.: Interactive Systems: Bridging the Gaps Between Developers and Users. Computer 1991.

[[1166]] Jeffries, R. et al. Extreme Programming Installed. Addison-Wesley, 2000.

[[1177]] Johansson, B. and Carvalho, R.A., Management of Requirements in ERP development: A Comparison XXIV ACM Symposium on Applied Computing, 2009,

[[1188]] Kniberg, H., Scrum and XP from the Trenches: How We Do Scrum. 2007. http://www.crisp.se/henrik. kniberg/ScrumAndXpFromTheTrenches.pdf

[[1199]] Koskela, L., Test-Driven: TDD and Acceptance TDD for Java Developers. Manning, 2007.

[[2200]] Martin, R. Iterative and Incremental Development. 1999. http://www.objectmentor.com/resources/ articles/IIDII.pdf

[[2211]] Meszaros, G.; Aston, J. Agile ERP: "You don't know what you've got 'till it's gone!" Proceedings of the Agile 2007 Conference, Washington D.C., 2007,

[[2222]] Poppendieck, M.; Poppendieck, T., Lean Software Development: An Agile Toolkit. Addison-W., 2003.

[[2233]] Raman, S., Lean Software Development: Is It Fea-sible?, in 17th Digital Avionics Systems Conference. 1998, IEEE: New York. 13-18.

[[2244]] Schwaber, K., Agile Project Management with Scrum. Microsoft Press, 2004.

[[2255]] Shen, H., Wall, B., Zaremba, M., Chen, Y., Browne, J. “Integration of Business Modeling Methods for En-terprise Information System Analysis and User Re-quirements Gathering”, Computers in Industry, vol. .54, n. 3, pp. 307-323, 2004.

Page 17: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Development Methodology����

SEFBIS Journal 2009 No. 4 17

[[2266]] Shore, J. Continuous Integration is an Attitude, 2005. http://jamesshore.com/Blog/Continuous-Integration-is-an-Attitude.html

[[2277]] Sleeper, S.Z. AMR analysts discuss role based ERP interfaces - the user-friendly enterprise. 2004;

[[2288]] Available from: http://www.sap design-guild.org/editions/edition8/print_amr.asp

[[2299]] Soh, C., Kien, S.S., and Tay-Yap, J., Cultural fits and misfits: Is ERP a universal solution? Communica-tions of the ACM, 43,4 (2000), 47-51.

[[3300]] Sutton, J.M., Lean Software for the Lean Aircraft, in 15th Digital Avionics Systems Conference. 1996, IEEE: New York. p. 49-54.

[[3311]] Vernadat, F. B. “Enterprise Modeling and Integration (EMI): Current Status and Research Perspectives,” Annual Reviews in Control, vol. 26, 2002.

Rogerio ATEM DE CARVALHO holds Doctoral and Master Degrees in Production Engi-neering, and a Bachelor degree in Computer Science. He is a teacher and researcher with Fluminense Federal Institute (IFF) and State University of North Fluminense (UENF), Campos, Brazil; a consultant for Brazilian and foreign companies and gov-ernments, including being a project leader for enterprise information systems (EIS) ini-tiatives of the Brazilian Ministries of Education and Communications, and the Ministry of Education of Angola. He is a member of the IFIP TC8 WG8.9 (EIS), and IEEE SMC Society Technical Committees on EIS and Intelligent Learning in Control Systems. He has published circa 100 conference papers, books, and journal papers on EIS, Free

Software, Project Management, Software Engineering and Operations Research. In the editorial arena, he is an Associated Editor of Enterprise Information Systems Journal from Taylor & Francis, and a co-editor of the Handbook of Research on Software Engineering and Productivity Technologies: Implications of Globalization, from IGI Global. He is the head of Information Systems Research Group (NSI/IFF), a research and development laboratory with 30 researchers, under-graduation and graduation students.

Björn JOHANSSON holds a PhD and a Licentiate degree in Information Systems Devel-opment from the Department of Management & Engineering at Linköping University and a Bachelor degree in Business Informatics from Jönköping International Business School. He defended his doctoral thesis “Deciding on Sourcing Option for Hosting of Software Applications in Organisations” in 2007. Currently he works as an Associate Senior Lec-turer at the Department of Informatics at School of Economics and Management, Lund University. Before that he had a Post Doc position for three years at Center for Applied ICT at Copenhagen Business School, within the 3gERP project (http://www.3gERP.org). He is a member of the IFIP Working Group on Diffusion, Adoption and Implementation of In-formation and Communication Technologies (IFIP TC8 WG8.6), the IFIP Working Group on Enterprise Information Systems (IFIP TC8 WG8.9) and the research networks: VITS Work practice develop-ment, IT usage, Coordination and Cooperation and KiO Knowledge in Organizations.

Rodrigo SOARES MANHÃES holds a Master degree in Operations Research and Com-putational Intelligence. He is a associated researcher with Fluminense Federal Institute, system developer on North Fluminense State University, agile development practitioner and has been teaching undergraduate courses for the last five years. He is author of articles on decision support systems, agile methods and software development.

Page 18: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� Critical Problems in ERP Implementations

18 SEFBIS Journal 2009. No.4.

Barriers and Success of ERPs

3. Critical Problems in ERP Implementations

AAnnaallyyssiiss ooff CCrriittiiccaall PPrroobblleemmss iinn EERRPP IImmpplleemmeennttaattiioonn ttoo EEnnhhaannccee SSOOAA ffoorr EEnneerrggyy aanndd UUttiilliittiieess –– aa CCaassee SSttuuddyy

1V. BALAKRISHNAN – 2AIROBI DAS 1Anna University, Coimbatore, India 2 Computer Science and IT and SAP-SOA-Energy Technologies; Univer-

sity (UGC and AICTE), Ministry of Power, IISWBM, IIT, India eMail: [email protected] [email protected]

This paper analyzed the critical problems faced during ERP implementation which has been based on the re-views of various research papers as well as industry specific case-studies. The major problems areas of ERP implementation are categorized here. Simultaneously this paper illustrated the ways the critical problem areas has been handled by the SAP Software of ERP to overcome the critical failure factors during ERP implementa-tion to make the ERP a successful most efficient businesses process in industry. Specifically cases of SAP-SOA architecture has been illustrated with criticalities of its implementation in Energy and Utilities.

IInnttrroodduuccttiioonn This paper illustrates the criticalities of ERP imple-mentation to enhance the deployment of SAP SOA EP for Renewable Energy Resources. This SAP EP based on Business Information Warehouse, will be utilized as Decision Support System for Energy Service Companies (ESCOs) and the Energy In-formation System Manager as well as the Enter-prise Management System in the peak load time to utilize renewable energy resources to reduce power failure, to take decision about resource utilization of renewable energy resources in present global scenario of creating a pollution free environment based on Kyoto Protocol1.

ERP Basic Concepts Enterprise-wide resource planning (ERP) is a plan-ning philosophy enabled with software that attempts to integrate all the business processes of different departments and functions across a company onto a single computer system that can serve particular needs of different departments. ERP combines all the business requirements of the company together

1 The Kyoto Protocol is a protocol to the United Nations Framework Convention on Climate Change (UNFCCC or FCCC), an international environmental treaty with the goal of achieving "stabilization of greenhouse gas concentrations in the atmosphere at a level that would prevent dangerous anthropogenic interference with the climate system”

into a single, integrated software program that runs off a single database so that the various depart-ments can more easily share information and communicate with each other. ERP can be defined as a planning methodology or philosophy that is based on the seamless integration of all the busi-ness processes of an enterprise.

Main Vendors of ERP Systems Out of more than 100 ERP providers worldwide, SAP AG, Oracle, JD Edwards, PeopleSoft, Bann-collec-tively called “Big Fire” of ERP software vendors control approximately 70 percent of the ERP market share (Mabert et.al., 2001) .Established in Germany in 1972, SAP AG, with 33 percent market share , is the major ERP package vendor for the Fortune 500 companies. Today, more than 82,000 customers in more than 120 countries run SAP applications from distinct solutions addressing the needs of small businesses and midsize companies to suite offer-ings for global organizations. Powered by the SAP NetWeaver technology platform to drive innovation and enable business change, SAP software helps enterprises of all sizes around the world improve customer relationships, enhance partner collabora-tion and create efficiencies across their supply chains and business operations.

Page 19: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Barriers and Success of ERPs����

SEFBIS Journal 2009 No. 4 19

What is enterprise SOA? Service Oriented Architecture (SOA) is a design for linking business and computational resources (prin-cipally organizations, applications and data) on de-mand to achieve the desired results for service con-sumers (which can be end users or other services). SOA is an information systems architectural concept for creating and using independent functions pack-aged as services. SOA is essentially a collection of services. These services communicate with each other, and that communication can involve either simple data passing or two or more services coordi-nating some activity. Some means of connecting ser-vices to each other is needed. A service is a function that is well defined, self contained, and not dependent on the context or state of other services. Web services are a common connection technology of ser-vice-oriented architectures. At the heart of SAP’s ap-proach to SOA is the concept of enterprise services. Enterprise services allow leveraging SAP solutions in conjunction with partner solutions and homegrown solution landscapes to build new, flexible, and inno-vative solutions based on the consistent integration concept of SOA. Enterprise services can be used in application-to-application (A2A), business to business (B2B) integration, and application to user interface-composite (A2X) scenarios, where a composite ap-plication makes use of data and functions, provided as services by underlying applications and combines these into a coherent business scenario, supported by its own business logic and specific user interfaces.

Enterprise services are highly integrated Web services combined with business logic and seman-tics that can be accessed and used repeatedly to support core business processes. Enterprise SOA is a business-driven software architecture that increa-ses adaptability, flexibility, openness, and cost effi-ciency. With enterprise SOA, organizations can compose applications and enable business proc-esses rapidly using enterprise services. With enter-prise SOA, organizations can improve their reuse of software and become more agile in responding to change (Source: SAP AG).

To successfully utilize SOA on an enterprise level, several additional aspects have to be considered. All interfaces need to be clearly defined and stable and to make use of global data types. Both points ensure

loose coupling and reliability for service consumers and avoid superfluous transformations caused by technically different definitions of semantically iden-tical information. To establish additional reliability, all services must follow clearly defined communication and behavioral patterns – Clients need to know whether services are synchronous or asynchronous, whether they return an answer, how they handle exceptions, which security policy they use etc. Addi-tionally, the underlying business model (Figure 3-1 and Figure 3-2; interaction between business objects) needs to be transparent to establish common ground in terms of relationships between business objects, which play a role when calling services.

Figure 3-1. Enterprise SOA

How does SAP deliver enterprise SOA? Industry-Rich Business Process Platform

Figure 3-2. Enterprise SOA powered by SAP NetWeaver

Page 20: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� Critical Problems in ERP Implementations

20 SEFBIS Journal 2009. No.4.

Levels of Integration in SAP NetWeaver SAP NetWeaver replaces the mySAP Technology application platform and provides a basis for En-terprise Services Architecture to meet the require-ments for flexibility and integration between sys-tems, interfaces, users, and processes. This is be-cause integration requirements not only pose technological questions but also questions regard-ing business processes, the integration of em-ployees and partners, and so on. A sound solution must be flexible and take into account the relevant processes, people, information, technical infra-structures, and heterogeneous system landscapes within the company and beyond. SAP NetWeaver is the Business Process Platform, which is the foun-dation in SAP for building and running business applications (both traditional and servicebased). SAP NetWeaver also provides the Enterprise Ser-vices Repository, which stores the basic elements that are used to build applications and services.

Integration Level: Employees, Customers, Part-ners; Using Enterprise Portal An enterprise portal ensures a central point of ac-cess to information, applications, and services in the company. All SAP and non-SAP systems, data warehouse, desktop documents, Web contents, and Web services are brought together in a single user interface. With Single Sign-On, one can get benefit from the simplified process of authentication and communication between different IT systems. Knowledge Management in the portal converts unstructured data into important company infor-mation, Collaboration facilitates cooperation be-tween people within the company and beyond, and Personalization adapts the portal structure to suit the requirements of the individual users.

BBaacckkggrroouunndd aanndd LLiitteerraattuurree RReevviieeww Problems and Risk Factors of ERP Implementa-tionEnhancement of SAP-SOA Deployment in the Energy and Utilities.

TThhee CChhaalllleennggeess ooff IImmpplleemmeennttaattiioonn ERP systems projects involve considerable time and cost, and it may take some time to realize ERP’s benefits. Research by Standish Group illus-trates that 90 % of ERP projects are late or over

budget. Meta group survey data, based on 63 com-panies, showed that average implementation cost of ERP was $ 10.6 million and took 23 months to complete (Stein, 1999). The successful implemen-tation of ERP requires a multi-stage approach (Mar-kus, Axline, Pelrie, and Tanis, 2000; Parr– Shanks, 2000; Holland–Light, 2001), and the benefits of ERP may not occur until later stages. In general, ERP systems projects bring about a host of new questions. Some of these questions and issues are:

– What technology challenges (e.g., Hardware, software and networking) are encountered in implementing an enterprise-wide information management system?

– What organizational challenges (impact on business processes) are addressed?

– What people challenges (e.g., recruitment, train-ing, retaining, and retraining) are encountered?

– What challenges are associated with project size and scope?

– What are the strategies for minimizing the risks associated with the technology, organization, people, and size, scope?

CCrriittiiccaall PPrroobblleemmss

– Budget Overshoot: According to the prelimi-nary investigation on ERP implementtation costs (R.J. Kusters, F.J. Heemstra, and A. Jonker, 2008), budget overshoots in ERP implementation can be considered to be a serious problem that war-rants further attention, which can be concluded from following research findings.

– ERP System Implementation Challenges: About 90 % of ERP implementations are late or over budget (1998) and the success rate of ERP implementations is only about 33 %.

– Get Ready for the Next Generation of SAP Business Applications: It is based on the En-terprise Service-Oriented Architecture (Enter-prise SOA) (R.Heidasch, 2007).

– The Rise of Business Reengineering: Back in 1990s many ERP systems only supported some aspects of the business cycle – for example the financial, material management, sales, and dis-tribution processes, which turned the attention of

Page 21: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Barriers and Success of ERPs����

SEFBIS Journal 2009 No. 4 21

management consultants and business leaders to the innovative approach of business process reengineering, that combined complete business process redesign with information technologies to support rapid change in operation of companies. But in practice, most exiting business applications either did not support or partially supported end to end business processes. SAP R/3 was missing the ability to support relationships between cus-tomers and suppliers that functionality later arrived in the SAP. Customer Relationship Management (CRM) and SAP Supply Chain Management (SCM) solutions, which are now part of the SAP business suite. Yet all of these SAP CRM, SAP SCM were rather inflexible and difficult to integrate, which provide to be the new challenge of difficul-ties in system integration.

– The Difficulties of System Integration: Busi-ness application from different vendors (that is, SAP and non-SAP) supported different com-munication technologies and used different data formats, making system integration a challenge. The applications are often running on different hardware platforms and operating systems, which further complicated system integration. The main-frame and client-server applications were mono-lithic, can use its own central database. Related date was spread across and often duplicated in different applications across the system land-scape. For example, SAP material master data existed in the SAP ERP, SAP CRM, SAP SCM and SAP Advanced Planner and Optimizer (APO) solutions. Therefore, data maintenance across different systems was often manual, time con-suming and error-prone, which resulted in data consistency issues. Business processes often involved entities both inside and outside of the company, resulting in the need to integrate processes and therefore systems across com-panies. For example, a collaborative business process, such as developing new devices, re-quires communication between different entities that are involved in design, engineering and production and using the SAP Product Lifecycle Management (PLM) solution to support this business process would require integrating the systems of each participating entity. Because

SAP systems were integrated with many nonSAP systems, common standards for crossapplication communication and integration were lacking. Consequently, system integration problems were typically, solved in different ways using different technologies.

– ERP Selection Methodology: Empirical research has shown that selecting an inappropriate sys-tem is a major reason for ERP implementation failures. Empirical research shows that out-comes from IT investment initiatives to a very large extent fail to deliver the promised business value (Henderson and Venkatraman, 1999; McDonagh and Coghlan,’06) .Economic focus on ROI has tended to drive IT acquisition initia-tions, while little attention has been paid to aligning the selection of the ERP system with the organization’s strategies, process and infra-structure.

– Difficulty of Integrating ERP: Manufacturers face many challenges in eliminating the disc-onnection between ERP and the shop floor. Exist-ing systems are hard to integrate. Companies have no unifying manufacturing architecture. There are too many applications to support and aging or proprietary systems to consider. It is also difficult to get the right information to the people who need it in time for them to make critical business decisions.

– The Need for Standardized Interfaces-Enterprise Control Integration Standard: The standard ad-dresses the interface or exchange of data between enterprise systems (planning, scheduling, and procurement) and production management sys-tems (production dispatching and execution).

TThhee AAnnaallyyssiiss ooff RRiisskk FFaaccttoorrss

– Organizational Risks: When business processes are re-designed to fit the package, the risk of ex-cessive time and cost investments decreases. Customization poses the risk of extra, if not ex-cessive project costs. Hammer and Champy (2001) defined Business process reengineering (BPR) as the fundamental rethinking and radical redesign of business processes to achieve

Page 22: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� Critical Problems in ERP Implementations

22 SEFBIS Journal 2009. No.4.

dramatic improvements in critical contemporary measures of performance, such as cost, quality, service and speed”. Somers and Nelson (2004) stated that BPR plays a significant role in the early stages of implementation. Nah (2003) noted that reengineering should continue with new ideas and updates to take full advantage of the ERP system when the system is in use. Organizations should be willing to change their businesses to fit the software in order to reduce the degree of customizations (Murray and Coffin, 2001). Many organizations have made unnec-essary, complex customizations to ERP software because the people making the changes do not fully understand the organization’s business practices (Nah 2003). According to Somers and

(2004) the new business model and reengi-neering that drives technology choice is an en-abling factor that can give to ERP success. Furthermore, Davison (2002) argued that ERP implementation often requires changes in job descriptions and essential skills.

– Technology Risks: The technology risks de-pend upon how consistent the new technology is with the current corporate infrastructure and operating system environment. When an or-ganization introduces technology that is incon-sistent with current database, operating system, and network management environments, the risk is greater.

Table 3-1. Summary of Risk Factors in ERP Projects

.Risk Category Risk Factor Organizational fit Failure to re-design business processes

Failure to follow an enterprise-wide design which supports data integration Skill set Insufficient training and re-killing

Insufficient internal expertise Lack of business analyst with business and technology knowledge Failure to effectively mix internal and external expertise Lack of ability to recruit and retain qualified ERP system developers

Management strategy Lack of senior management support Lack of proper management control structure Lack of a champion Ineffective communications

Software design Failure to adhere to standardized specifications which the software supports Lack of integration

User involvement and training

Insufficient training of end-users, Ineffective communications Lack of full-time commitment of customers to project management and project activities Lack of sensitivity to user resistance Failure to emphasize reporting

Technology planning/ integration

Inability to avoid technology bottlenecks Attempting to build bridges to legacy applications

Source: Sumner, M.2002. “ Risk factors in managing enterprise-wide/ERP projects.” Journal of Information Technology 15: 317-327

– Human Factors: If the current skill mix of the IT

staff does not include knowledge of applica-tion-specific ERP modules, the organization will incur significant costs in re-skilling the workforce or in acquiring external consultants. Also user representatives of the organization should be motivated to acquire knowledge about applica-tion-specific ERP modules. User involvement

increase user satisfaction and acceptance by developing realistic expectations about system capabilities (Esteves et al., 2003). According to Zhang et al., (2002) there are two areas for user involvement when the company decides to im-plement an ERP system: user involvement in the stage of definition of the organization’s ERP system needs, and user participates in the im-

Page 23: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Barriers and Success of ERPs����

SEFBIS Journal 2009 No. 4 23

plementation of ERP systems. The ERP team should involve of the best people in the organi-zation (Loh and Koh 2004). The success of projects is related to the knowledge, skills, abili-ties, and experiences of the project manager as well as the selection of the right team members (Al-Mashari et al., 2006). An ERP project de-mands the effort and cooperation of technical and business experts as well as end-users (Loh and Koh 2004). The sharing of information be-tween the implementation partners is essential and requires partnership trust (Loh and Koh 2004). Moreover, the team should be familiar with the business functions and products so that they know what needs to be improved to the current system (Rosario 2000). Education and training users to use ERP is important because ERP is not easy to use even with good IT skills (Woo 2007). Nah et al., (2003) argued that sufficient training can assist increase success for ERP systems while lack of training may lead to failure. According to Zhang et al., (2002) the main reason for education and training is to increase the ex-pertise and knowledge level of the users within the company. Project Size: As an ERP project can be the largest single investment in a corpo-rate technology project that an organization un-dertakes, hence the sheer size of these projects, as measured in time, staff commitment, budget, and scope, poses considerable risk and causes increased concern for accountability on the part of users and senior management. A summary of the risk factors of ERP projects described in Table 3-1.

AAnnaallyyssiiss ooff PPrroobblleemm AArreeaass Among the points that should be controlled for the purpose of the ERP’s success, the most important point is for company executives to have a definite time-table. If time schedules and deadlines are not set and adhered to then it must be borne in mind that not only the ERP implementation, but anything that the company attempts to do will be in vain. Also, there are many misunderstandings caused by wrong estimates. In the case of ERP implement-tation, there are substantial additional costs that are necessary, such as consultation, customization,

training and education. The most common prob-lems faced during ERP implementation are need for customization, inadequate training resources and lack of support from management. Other problems identified as being associated with ERP imple-mentation include:

– Enormous technical challenges of rolling out ERP systems which are complex pieces of software that requires large investments of money, time and expertise to install

– Failure to reconcile the technological imperatives of the ERP system with the needs of the busi-ness. An enterprise system imposes its own logic on a company’s strategy, organization and culture

– Pushing companies towards generic processes even when customized processes may be in its best interest. For example, do not develop cus-tomized product

– Conflicts between the system logic may conflict with the logic of the business which may result in a failed implementation or a weakening of the company’s important sources of competitive advantage

– Convergence around a single software and similar processes by members of the same in-dustry raises questions regarding how competi-tive advantage can be maintained

– Higher costs associated with customizing ERP systems when the ERP system and company strategy clash

– Companies installing enterprise systems having to adopt or completely rework their processes in order to fit the requirements of the system.

RReesseeaarrcchh MMeetthhooddoollooggyy It has been argued that ERP failure could occur only when the installed system is underutilized and, hence many of the idiosyncratic features have not been fully extended by their target user (Davenport 1998; Shehab et al., 2004; Jasperson et al. 2005). When behavioral events cannot be adequately con-trolled and when little is known about a phenomenon due to the lack of theory, qualitative approach such as the case study method is highly recommended as an alternative means to gather evidence and to un-

Page 24: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� Critical Problems in ERP Implementations

24 SEFBIS Journal 2009. No.4.

derstand complex phenomenon (Yin, 1994, Eisin-hardt, 1989; Stuart et al., 2002). In this article, ERP systems projects represent a SAP SOA implemen-tation for Energy and Utility companies, requiring heavy investments in both time and money. All these factors contribute to the ERP systems initiative complexity. Future scope of research also has been illustrated assuming proposed methodology incor-porating data from NASA Surface meteorology and Solar Energy database for calculating solar irradi-ance in a particular geographical location to project solar energy potential in specific.

IImmpplliiccaattiioonnss ffoorr FFuuttuurree RReesseeaarrcchh

EEnneerrggyy aanndd SSuussttaaiinnaabbllee DDeevveellooppmmeenntt For all practical purposes energy supplies can be divided into two classes: – Renewable Energy obtained from natural and

persistent flows of energy occurring in the imme-diate environment (for e.g. solar). The Green En-ergy or Sustainable Energy is already passing through the environment as a current or flow, ir-respective of there being a device to intercept and harness this power.

– Non-Renewable Energy, energy obtained from static stores of energy that remain underground unless released by human interaction (e.g. nuclear fuels, fossil fuels of coal, oil and natural gas).

SSuussttaaiinnaabbllee DDeevveellooppmmeenntt Sustainable development can be broadly defined as living, producing and consuming in a manner that meets the needs of the present without compro-mising the ability of future generation to meet their own needs. The aim of sustainable development is for the improvement to be achieved whilst main-taining the ecological process on which life de-pends. At a local level, progressive business aim to report a positive triple, i.e. a positive contribution to the economic, social and environmental well-being of the community in which they operate. The con-cept of sustainable development becomes widely accepted following the seminar report of the World Commission on Environment and Development (1987). Energy resources exemplify these issues. In the 21st century, further increase in world energy

consumption can be expected, much for rising in-dustrialization and demand in previously less de-veloped countries, aggregated by gross inefficien-cies in all countries. Whatever the energy resource, there is an overriding need for efficient generation and use of energy. Fossil fuels are not being newly formed at any significant rate, and thus present stocks are ultimately finite. Fossil fuel resources are limited and so the present patterns of energy con-sumption and growth are not sustainable in the longer term. Moreover, it is the emissions from fossil fuel use (and indeed nuclear power) that increas-ingly determine the fundamental limitations. In-creasing concentration of CO2 in the atmosphere is such an example. Indeed, from an ecological un-derstanding of our earth’s long-term history over billions of years, carbon was in excess in the at-mosphere originally and needed to be sequestered below ground to provide our present oxygen-rich atmosphere. Therefore from arguments of: (i) the finite nature of fossil and nuclear fuel materials , (ii) the harm of emissions and (iii) ecological sustain-ability, it is essential to expand renewable energy supplies and to use energy more efficiently.

Climate change is one of the greatest and poten-tially most challenging environmental social and economic threats facing the world this century. Hu-man activities have altered the chemical composition of the atmosphere through the build-up of significant quantities of greenhouse gases (GHGs). A number of gases are involved in the greenhouse effect. The main greenhouse gases are: carbon dioxide (CO2), water vapour (H2O), methane (CH4) , nitrous oxide (N2O), tropospheric ozone (O3), and halocarbons (CFCs, HFCs, etc.). The earth’s average surface tempera-ture has already increases by about 0.6 0C during the 20th century. The Intergovernmental Panel on Cli-mate Change (IPCC) in its Third Assessment Report (IPCC, 2001) projects that the global average sur-face temperatures will raise by about 1.4 to 5.8 0C by the year 2100. This change would be larger than any climate change experienced over the last 10 000 years. This global temperature increase is likely to trigger serous consequences for humanity and other life forms with significant regional variations.

Page 25: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Barriers and Success of ERPs����

SEFBIS Journal 2009 No. 4 25

CCaassee 11 Renewable Energy Integration into Competitive Electricity Industries Growing concerns about climate change and energy security have heightened interest in harnessing re-newable energy resources as a response to these critical issues (Ackerman 2006; Bauer and Mast-randrea, 2006; Energy Watch Group 2006 & 2007; Galvin Electricity Initiative, 2006; Hansen, 2005; IPCC, 2007; Stern, 2006). The most important renewable energy resources are bioenergy, hydro, geothermal, wind, solar and (in the future) ocean energy systems (International Energy Agency-IEA, 2006). Thus, we need to consider the integration of renewable energy within the broader set of challenges facing modern electricity industries, where price and technical per-formance are critical issues as well as energy secu-rity, environmental sustainability and enhanced end-use efficiency (e.g. Doherty et al, 2006; Kushler et al, 2006). CCaassee 22 Renewable Energy Integration in Restructured Electricity Industries Renewable energy currently provides 14% of the world’s energy supply and is projected to remain at the

fraction by the IEA despite a projected 60% increase in global energy consumption by 2030. Renewable energy resources are often transformed into electrical energy for transfer to end-user premises (direct bio-mass combustion is an exception, and hydrogen may in future provide an alternative energy pathway).

Thus it is important to consider the question of integration of renewable energy resources into the electricity industry. The IEA has been engaged in such activities for some time under implementing agreements for wind energy and photovoltaics (www.ieawind.org, www.iea- pvps.org). Distributed renewable energy resources are energy fluxes that are often geographically dispersed, in some cases storable to varying degrees within varying time-scales, in other cases not storable at all. Some renewable energy resources are best regarded as shared public resources – e.g. solar and wind en-ergy – raising policy issues about access, man-agement and forecasting accountability, particularly as they are often transformed into electrical energy using privately owned generators, which is then injected into shared networks. Figure 3-3 shows a decentralized decision-making framework for an electricity industry.

Figure 3-3. Interactions between decision-makers in a restructured electricity industry (Thorncraft, 06)

Page 26: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� Critical Problems in ERP Implementations

26 SEFBIS Journal 2009. No.4.

Solution through SOA: An intelligent electricity solution created on IBM’s integrated, open-stan-dards-based Service Oriented Architecture (SOA), connectgaia.com (see Figure 3-4) enables the In-telligent Grid work, to the advantage of all stake-holders – maintaining balance of electricity supply and demand in real time; allowing consumer par-ticipation in optimizing power and saving expenses through improved visibility; offering valuable de-mand response flexibility at relatively low cost. It will enable the creation of an intelligent power network that will pool dispersed and diverse resources and form a network that communicates and is in synergy with nature. The convergence of IT and Power Highway, the birth of an intelligent grid that is alert, smart and communicates end to end.

CCoonncclluussiioonnss The assessment of critical risk factors, failure fac-tors of unsuccessful ERP projects in com parison to successful ERP projects will enhance the chance of successful implementation of enterprise-wide ser-vice oriented architecture (SOA) for Green Energy

Resources from disparate geographical remote locations for a sustainable development of com-posite applications integrating leveraging SAP NetWeaver to integrate the underlying SAP and non-SAP applications and databases and enabling energy and utility industries to publish its regular- and green-power capacities via its portal.

RReeffeerreenncceess [1] Enterprise SOA Development Handbook, Enter-

prise Services Enhancement Guide [2] A.N Parr,., G.Shanks, P.Darke. 8/21-22/1999 Iden-

tification of necessary [3] factors for successful implementation of ERP

systems,” in Ngwerryama [4] 3 Sumner, Mary.2002.” Risk factors in managing

enterprise-wide/ERP projects.” [5] Journal of Information Technology 317-327. [6] SAP Developer Network www.sdn.sap.com SAP

ecosystem and partners: www.sap.com/ecosystem, The Open Group Architecture Forum: (TOGAF):www.opengroup.org/architecture

Figure 3-4. Connectgaia.com architecture enabling DRM & Energy efficiency

AAppppeennddiixx ffoorr FFuuttuurree SSccooppeess Green Power Marketing The more general concept of green power marketing refers to selling green power in the competitive marketplace, in which multiple suppliers and service offerings exist. Green energy is popular; a growing number of customers are prepared to pay a premium

for “clean” power. That is why an energy and utility company wants to keep customer-facing information up-to-date at short refresh intervals without tying up scarce resources. To sharpen its competitive edge in a highly competitive and sometimes volatile market, an energy and utility company wants to deploy a solution designed to ensure the quality and currency of data; to automate the tasks of data gathering,

Page 27: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Barriers and Success of ERPs����

SEFBIS Journal 2009 No. 4 27

aggregation, validation, and presentation; and to ensure sustained regulatory compliance. SAP-SOA EP for energy and utility company integrating re-newable and non-renewable energy resources might be a possible solution in this scenario. Objectives For creating a successful SAP-EP based on SAP SOA, criticalities of ERP implementtation have to be considered. Based on the scale of local application ranging from tens to many millions of watts, and the totality of global resources, four questions are asked for practical application: 1. How much energy is available in the immediate environment – what is the resource? 2. For what purpose can this energy be used-what is the end use? 3. What is the envi-ronmental impact of the technology-is it sustainable? 4. What is the cost of the energy-is it cost effective?

Features of SAP Enterprise Portal (SAP-EP) The SAP-EP is the core SAP NetWeaver compo-nent from the point of view of the role-based user access to a world of applications and Web services. the SAP-EP is designed to provide standardized, role-based access to all relevant information and functions throughout the enterprise. It is the user’s central point of entry into the mySAP Business Suite solutions or other applications.

Criteria of the Prototype Model Building an enterprise portal for renewable and non-renewable energy system and essentially proposes a methodology on market potential map-ping (MPM )of solar energy system which would generate the absolute figures indicating the ac-ceptance level of any system/product, and also estimate its acceptance relative to its possible non-renewable competitor. Economic, social and environmental factors (parameter) influence the level of acceptability of any commodity, including solar systems.

Proposed Methodology Incorporating data from NASA on renewable energy resources, specifically on solar energy resources, calculating acceptance index (AI) based on the al-gorithm in appendix for renewable energy resources and comparing solar thermal with coal based power plant and design and deployment of SAP SOA EP for renewable energy resources-solar energy resources

specifically and developing an decision support system integrating renewable and no-renewable energy sources base on Enterprise SOA.

Conclusion The development of SAP-SOA-EP and continuous monitoring as well as updating of the data (identified parameter) would be essential. Dedicated software would process the raw data, and generate Accep-tance Index (AI) of the solar system and MPM with colour coding facility. The software should also be capable to generate data for another system (already in the market), which is thought to be replaced. The corresponding data may be compared by finding their ratios, which would be the relative Acceptance Index (RAI). Thus an Enterprise SAP-SOA Energy Portal will be developed for any energy, utility sector.

FFoorrmmuullaa ffoorr CCaallccuullaattiinngg AAcccceeppttaannccee IInnddeexx 1. Acceptance Index (AI; Life Cycle Cost: LCC):

LCC of its Competing Conventional System

LCC of Proposed System

2. Consider SPV (Solar Photo Voltaic) System as Pro-posed System and Coal Based Thermal Power Plant as Competing Conventional System. Hence AI of SPV:

LCC of its Competing Conventional System

LCC of Proposed SPV System

LCC of Coal Based Thermal Power Plant

LCC of Proposed System

n

dii

i

dCRF

+

=

3. LCC of Proposed SPV System=Fixed Cost X CRF + Maintenance Cost (Salary and Wages) + Fuel Cost (~0) – Cost of Power Sold – Subsidies

4. LCC of Conventional Coal Based Thermal Power Plant = Fixed Cost X CRF + Maintenance + Fuel Cost + Social Cost –Cost of Power Sold where

Sample of NASA Surface Metrological and Solar Energy Data is seen on the Table 3-2.

where: d discount rate n life in number of years I capital investment

Page 28: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� Critical Problems in ERP Implementations

28 SEFBIS Journal 2009. No.4.

Table 3-2. A sample of NASA Surface Metrological and Solar Energy Data

NASA Surface meteorology and Solar Energy: RETScreen Data

Longitude °Unit Climate Data Location

Latitude °N 25

Longitude °E 87

Elevation m 37

Heating design temperature °C 12.70

Cooling design temperature °C 31.26

Earth temperature amplitude °C 15.95

Month Air tempr. °C

Relative hu-midity%

Daily solar radiation kWh/m2/d

Atmospheric pressure

kPa

Wind speed

m/s

Earth tempr °C.

Heating degree

days °C-d

Cooling degree Days °C-d

January 17.6 47.9% 4.25 99.3 1.7 19.3 27 237

February 20.7 43.5% 5.30 99.1 2.1 23.5 2 302

March 25.1 40.4% 6.27 98.7 2.1 28.8 0 465

April 26.6 58.0% 6.70 98.4 2.6 29.8 0 499

May 26.6 76.8% 6.51 98.2 3.0 28.8 0 517

June 27.6 82.9% 5.39 97.8 2.9 28.9 0 527

July 27.4 85.7% 4.39 97.9 2.5 28.3 0 538

August 27.4 84.9% 4.44 98.0 2.1 28.1 0 539

September 26.3 84.3% 4.12 98.4 2.0 27.0 0 493

October 24.2 76.9% 4.86 98.8 1.6 24.9 0 450

November 21.6 57.5% 4.72 99.2 1.6 22.3 0 359

December 18.9 49.3% 4.17 99.4 1.6 20.1 7 284

Annual 24.2 65.7% 5.09 98.6 2.1 25.8 36 5210

The proposed research is divided into three parts:

Part 1: To determine how much radiation is available outside the earth’s atmosphere .The proportion of that radiation reaches a device depends on geo-metric factors, such as latitude, longitude, and on atmospheric characteristics, such as infrared radia-tion absorption by water vapour, carbon dioxide and other such molecules. Measurement of that solar radiation likely to be available as input to solar device at a specific geographical location, orientation and time. For this purpose, NASA Surface meteorology and Solar Energy Data can be mapped.

Part 2: Survey on economic, social and environ-mental factors (parameter) which influence the level of acceptability of any commodity, including solar systems and make a comparative analysis of solar energy system with coal-based power plant and other non-renewable energy system or nonrenew-able or other renewable competitors.

Part 3: Development of SAP-SOA-EP for energy and utility integrating renewable energy sources with non-renewable energy sources in the present global scenario of creating a pollution free environment based on Kyoto Protocol for a sustainable devel-opment of any region.

Page 29: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Barriers and Success of ERPs����

SEFBIS Journal 2009 No. 4 29

Aurobi DAS is an SAP-SOA professional in Energy and Utility. Currently she has a PhD degree from University Coimbatore, India on Computer Science and Management Studies on ERP-SAP-SOA. She also obtained M. Phil. Business Administration ERP and MBA from Indian Institute of Social Welfare and Business Management (IISWBM), Calcutta University (CU), MSc in Computer Science and graduated in Physics (Honours-CU). Her technical skills include Software Engineering, ERP-SAP-SOA, ABAP, Cryptography etc. She is accredited Energy Engineer of Ministry of Power, India. She has 12 years of prac-tical research experiences in projects of Energy Efficiency Financial Intensive Mechanism in collaboration of Indian Chambers of Commerce and Industry (ICCI), Nexant Inc, USAID, Energy Society of India (SESI), Indian Association of Cultivation of Science

(IACS), IREDA, in Clean Development Mechanisms (CDM), Energy Linkages in collaboration of Bengal Chambers of Commerce and Industry (BCCI), Ernst & Young and BCCI along with her academic experiences in MBA, MCA and B. Tech. at University (UGC, AICTE),IISWBM and also life membership of ISI, 5 papers( journals & conferences) to her credit.

Professor Balakrishnan is eminent expert in Business Administration and eBusiness with his contribution of new concepts development to his credit. He is MBA, M. Phi. PhD, FDMP (IIM -Ahmedabad). He has more than 35 years of teaching and practical research experiences in more than one thousand numbers of projects. He has 84 publications and presentations, 28 exclusive publications in his credit. He is the author of three books in his specialization of Marketing, Human Resource Management and eBusiness. He has guided 15 numbers of M. Phil. Scholars, and 31 numbers of Ph. D. scholars in their projects until now. He has contribution on independent research and already taught subjects in various disciplines along with his 11 numbers of National and International Awards. He is UGC Visiting Fellow and former Director of Anna University, Coimbatore (CBE) along with his designation of Vice Chancellor he has been honoured until now. Barriers and Success of ERPs

4. Improving the Success of EIS Implementation IImmpprroovviinngg tthhee SSuucccceessss ooff EEnntteerrpprriissee IInnffoorrmmaattiioonn SSyysstteemm IImmppllee--

mmeennttaattiioonn –– CCuurrrreenntt FFiinnddiinnggss aanndd FFuuttuurree RReesseeaarrcchh

1RADHIKA SANTHANAM – 2SHARATH SASIDHARAN – 3PRIYANKA MEHARIA – 4DAN BRASS – 5V. SAMBAMURTHY

1,3,4University of Kentucky, 2Emporia State University, University 5Michigan State University, eMail: [email protected], [email protected], [email protected], [email protected],

[email protected]

Enterprise Information Systems, the predominant form of systems adopted by organizations today, have yielded mixed and unpredictable implementation outcomes, making it a risky investment. To identify factors that can facilitate success, we first conducted a survey of existing research. We found that existing research had not focused on understanding post implementation issues particularly how users learn and assimilate a system. We felt that social learning among employees will play a critical role. We posited that social network characteristics of employees affect post adoption information exchanges, and influence the extent of implementation success. We conducted a three-phase longitudinal one-year study of the effects of social network structure on the im-plementation success of an EIS. We found that employees’ social relationships including their access to the help-desk had an impact on implementation success. We discuss some preliminary findings here.

Page 30: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� Improving the Success of EIS Implementation

30 SEFBIS Journal 2009. No.4.

IInnttrroodduuccttiioonn aanndd BBaacckkggrroouunndd Many large organizations have integrated Enter-prise Information Systems (EIS) and it is estimated that over 80 percent of Fortune 500 companies have installed these as the information system of choice (Davenport 1998; Brown and Vessey 2003; Gattiker and Goodhue 2005; Cotteleer and Bendoly 2006; Liang et al. 2007.) EIS attempt to integrate information across departmental and functional units within an organization by implementing an integrated software program with a unified data-base. Examples include Materials Requirements Planning (MRP) systems, Airline Reservation Sys-tems, Inter-Organizational Information Systems Enterprise Resource Planning systems.

Enterprise Resource Planning Systems (ERP) are among the most popular of EIS and are im-plemented using software such as SAP, PeopleSoft, etc. to replace disparate smaller systems, It is adop-ted in order to streamline operational processes, have a smooth and coordinated data collection and information delivery method to support decision makers spread across distant units of the organi-zation. ERP been described as the “seamless in-tegration of processes across functional areas with improved workflow, standardization of various business practices, improved order management, accurate accounting of inventory and better supply chain management (Mabert et al. 2000). These systems have been rapidly growing in its deploy-ment, and as per a recent report, ERP vendor revenues is expected to grow to 50 billion dollars by 2011 (AMR Research). It is no wonder then that practicing business persons, academics and tech-nology specialists are very interested in under-standing these systems and ensure their successful implementation.

The rise of ERP type systems started in the early 1990’s, with Material Requirements Planning (MRP); Manufacturing Resource Planning (MRPII); and Computer Integrated Manufacturing (CIM) with all software applications supporting the automation of various aspects of a manufacturing enterprise (Klaus et al. 2000). Application software was de-veloped to support the financial transactions, such as payroll, general ledger, and billing was devel-

oped which later came to be known as the "R/2 system" where "R" stands for real-time data proc-essing and 2 represented the two tier architecture of the IBM mainframe computers (Davenport 1998). “Enterprise Systems” or ERP today have expanded their reach to offer products for customer relation-ship management, product lifecycle management, strategic enterprise management, business ware-house, business intelligence tools, and supplier relationship management. While the growth rate of ERP adoption in large scale organizations may not be as spectacular as it was a few years ago, they are still being implemented in many large and in-creasingly in small and medium size organizations and even non-profit institutions such as Universities and Federal Governmental agencies (Bingi et al. 1999, Nah et al. 2003, Chabrow 2004). From a vendor perspective, as per surveys by AMR Re-search, there has been consolidation in the industry with the major vendors such as SAP, Oracle, Sage, Microsoft and others accounting for over 70% of revenues and projected to grow. The midrange and small range markets continue to grow, and some clients have opted to buy functional modules in an incremental manner rather than make a big pur-chase upfront. Furthermore, in the globalized world other variations of EIS, such as supply chain management systems, collaborative systems and e-logistics systems are being implemented. Hence, understanding the most effective ways to implement EIS systems is of utmost importance.

FFuunnccttiioonnaalliittyy aanndd BBeenneeffiittss ooff EERRPP As shown in Figure 4-1, instead of having separate interfaces and having to manually enter and/or transfer data from one system to another, ERP systems provide almost standardized, cross-func-tional transaction automation. It organizes all of the company's information into one centralized system. This means that there is no need for different de-partments to enter information and lesser need for manual paperwork, thus reducing the potential for errors. It helps in electronic data interchange and a paperless office and less pressure on our ecosys-tem. The newly developed web services based on service-oriented architecture (SOA) helps the busi-ness innovative business processes from existing

Page 31: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Barriers and Success of ERPs����

SEFBIS Journal 2009 No. 4 31

resources. The Web Services technology lets cus-tomers more easily share information, linking older systems into the new software. With disappearing or changing organizational boundaries and emer-gence of global markets, companies that have their businesses and office located all over the world have integrated their operations after the imple-

mentation of ERP systems. In the world of elec-tronic data interchange (EDI), fast processing, and global processes, it is very important to connect the business processes under a central system. ERP products are necessary to coordinate complicated, multifaceted operations and to promote a strong competitive position over the long term.

Figure 4-1. Pictorial Representation of an ERP

With ERP systems order cycle times (the time from when an order is placed until the product or service is delivered) can be reduced, resulting in improved throughput, customer response times and delivery speeds, generate more accurate demand forecasts, speed production cycles and enhance customer service, enables a company to link their business processes, ties together disparate business func-tions (integrated business solution) and helps the organization run smoothly in real-time environment. It allows scalable and flexible Integration, business process re-engineering on-redundant data, auto-matic international conversions, complete audit trail and compliance with Sarbanes-Oxley accounting rule in United States. It provides up-to-the-minute information on vendor’s performance as well as upcoming materials requirements. This enables the organization to select appropriate vendors and provide them with information they need to meet the requirements. Studies document instances of or-ganizations that achieved decline in inventory bal-ances of about 35%, increase in profits of 25%, reductions in working capital, better understanding

of customer requirements and enhanced decision making capabilities (Gupta 2000, Chen 2001; Kal-ling 2003; Holsapple and Sena 2005). Nestle cor-poration was paying 24 different prices for same vanilla to same vendors before it had implemented SAP (ERP Odyssey).

PPrroobblleemmss aanndd BBeenneeffiittss Despite the above descriptions of many benefits that can accrue after implementation of an ERP system, however, there have been quite a few instances where ERP projects have been doomed as failures. Furthermore, some organizations claim impressive benefits, whereas several others report serious dif-ficulties in implementation and getting the targeted benefits (Davenport 1998; Hitt et al. 2002; Nah et al. 2003; Liang et al. 2007).

In fact, reports have chronicled high profile fail-ures and extensive difficulties at well-known corpo-rations, such as FoxMeyer, Hershey Foods Hewlett Packard, Boeing, and Siemens (Ross 2000; Robey et al. 2002; Wang et al. 2006). Some large educa-

Page 32: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� Improving the Success of EIS Implementation

32 SEFBIS Journal 2009. No.4.

tional institutions have implemented these systems and have seen its share of difficulties (Brown and Vessey 2003; Gattiker and Goodhue 2005).

In a large-scale survey on ERP implementation success, about 51% stated that their implementation was unsuccessful (Robins-Gioia 2002). This survey covered 232 survey respondents from multiple in-dustries including financial, healthcare and gov-ernment agencies. About 46% of these respondents stated that although their organization implemented an ERP, they did not understand how to assimilate the system to improve their business operations or change the manner in which they conduct their business. The survey concluded with an urgent message to understand and better manage the implementation of such large scale EIS, otherwise it would erode the confidence in Information Tech-nology departments.

Because the costs of implementing ERP systems run into millions of dollars, a failure to properly im-plement the system and achieve the stated goals can lead an organization into financial difficulties (Wal-lace 1998; Bingi et al. 1999; Chen 2001; Hong and Kim 2002; Gefen 2004). Some researchers have even used the term “bet-our-company” type of failure because problems in ERP implementation could lead an organization into financial ruin (Brown and Vessey 2003). Therefore, it is no surprise that researchers and practitioners have called for urgent and sys-tematic research to identify conditions that foster the successful assimilation of ERP systems and to avoid failures (Ross–Vitale 2000; Gattiker 2002; Robey et al. 2002; Brown–Vessey 2003; Koh et al. 2005).

What Factors Could Help ERP Implementation?

To identify factors that could promote the successful implementation of EIS, we surveyed key Information Systems journals such as MIS Quarterly, Information Systems Research, Journal of Management Infor-mation Systems, proceedings of Information System conferences and a few practitioner journals for the period 1997-2008. In Figure 4-2, we summarize our findings in a pictorial form with the main ideas syn-thesized from various sources (Swanson 1994, Gallivan 2001, Robey et al. 2002; Brown–Vessey 2003; Gefen 2004; Swansson 1994; Gattiker–Goodhue 2005; Wang et al. 2006).

Primary Adaption

Managarial Intervention

Organizational Attributes

Project Management

Environmental Influences

ERP Capabilities

Other Factors

Secondary Adaptions

User Attributes

Product Attributes

Facilitating Conditions

Continued Usage

Organizational Consequences

(change in efficiency, effectiveness, probability)

(Employee Level)

Figure 4-2. Synthesized Factors Affecting ERP Implementation Success

As can be seen from Figure 4-2, the identified fac-tors for successful implementation are grouped into two major categories: Primary adoption at firm level and Secondary adoption at employee level. This reflects the stages by which ERP systems are adopted and helps us also examine in a systematic manner factors that facilitate ERP success.

PPrriimmaarryy AAddooppttiioonn aatt tthhee FFiirrmm LLeevveell Our findings indicate that most existing studies have focused on factors that influence the success of ERP systems adoption at firm level, and not paid as much attention to adoption at the employee level. The factors that facilitate successful adoption at the firm level are classified under a few major categ-ories and discussed below.

– Managerial intervention: Top management’s proactive role has been identified as a critical factor. Change management, and creation of

Page 33: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Barriers and Success of ERPs����

SEFBIS Journal 2009 No. 4 33

satisfying mindset are all factors that can be in-fluenced by top management and could help in successful adoption at the firm level ( Brown and Vessey 2003; Wang et al. 2006). “Technology Champions” play an important role (Barker and Frolic 2003; Somers and Nelson 2004).

– Organizational attributes: The success and re-turn on investment (ROI) of ERP implementation will differ from organization to organization even in the same industry as the success of the sys-tem depends on the organization’s attributes. Relationship between units, interconnectedness between units, Interdependence, differentiation between organizational units adopting ERP systems can affect ERP adoption (Gattiker and Goodhue 2005).

– Project Management: A skilled project team, good project planning and project management are essentially critical to the success of ERP system adoption at the firm level [Loh and Koh 2004]. Because EIS systems are complex, the challenges with traditional project management are amplified (Markus et al. 2000; Amoako- Gyampah and Salam 2004). A group must to manage the project must be identified and the project scope, project milestones should be de-termined. Critical events should be determined and monitored closely (Holland et al.1999).

– Environment influences: External factors could play a role in the successful adoption of large in-tegrated systems such as EIS. Firms with greater international presence, facing higher competitive pressure, and higher degree of industry concen-tration and facing higher regulatory support are more likely to achieve a greater extent of ERP use (Fichman 2000).

– ERP capabilities: Relative advantages of ERP use, its capabilities, and compatibility with existing systems and practices, have an effect on the ex-tent of ERP adoption and use. We would predict that greater ERP capabilities, including both front-end functionality and back-end integration, are positively associated with higher ERP value. Rerceived Innovation characteristics, such as re-sult demonstrability, complexity, absorbability, tri-alability, absorbability, ease of use have been

studied in context of IS usage, and are likely to affect ERP success but one has to add that these have not been studied in depth in the context of ERP use (Karahanna et al. 1999).

– Other Factors: Apart from the factors identified above, factors that influence the success of sys-tem adoption at the firm level include relationship between vendor and organization, and overall communication patterns in the organization (Jan-son– Subramanium 1996; Gefen 2004).

SSeeccoonnddaarryy aaddooppttiioonn aatt iinnddiivviidduuaall lleevveell Success of an EIS depends not only on success of adoption at the firm level, but it is equally important for the system to be accepted and used by the us-ers. In other words, the system has to be assimi-lated and put into routine use by employees even if it is adopted at the firm level. There is not as much research at the employee level but a few factors that have been identified are outlined below:

– User attributes: Characteristics of the users should have an impact on the ability to learn and use the system. Individual differences among users, presence of both domain and technical knowledge and its effect on adoption by users has not been investigated. User involvement in the configuration of systems has been identified as facilitating suc-cess. Their self-efficacy and their perceptions ease of use of the system is also useful (Igbaria and Iivari 1995; Venkatesh 2000; Chau 2001).

– Product attributes: The ERP suite offered by dif-ferent vendors has varying levels of complex fea-tures which can sometimes get difficult to use. But those systems that have a good Task Technology fit, and are perceived to have a good system qual-ity are more easily adopted and used by the user (Wang et al. 2006). Our findings indicate that there has been fairly less amount of studies focusing of usability issues of ERP systems.

Page 34: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� Improving the Success of EIS Implementation

34 SEFBIS Journal 2009. No.4.

– Facilitating conditions for user learning: There are some factors in the organizational environ-ment which the makes it more conducive for users to adopt the system. For example, good training and continued end-user support through help desk is considered to help users easily as-similate the system (Robey et al. 2002; Mabert et al. 2003; Loh and Koh 2004). In fact, training is an avenue to develop positive attitudes toward the system (Aladwani 2001). But once again, these issues have not been studied in depth.

SShhoorrttccoommiinnggss iinn eexxiissttiinngg rreesseeaarrcchh While research has identified several factors that facilitate successful implementation, our literature survey results indicate that the bulk of academic research on ERP focuses on selection and deploy-ment of the system and not on post-implementation issues (Lee 2000; Esteves and Pastor 2001, Esteves and Bohorquez 2007). Hence, there is a greater emphasis on successful adoption of systems at the firm level but not on continued usage and successful assimilation at the individual employee level, even though researchers emphasize that the extent of ERP use by employees will have a positive effect on ERP value (Ranganathan and Brown 2006). Per-haps the focus on firm level issues has existed be-cause ERP implementation process in general takes few years to complete and most implementations were completed in the past few years. Hence, there was not much data available to study post imple-mentation issues.

In a survey of 62 Fortune 500 companies by Benchmarking Partners Inc. for Deloitte Consulting; one in four admitted that they suffered a drop in performance when their ERP system went live. The reason for the drop in the performance was attrib-uted to several reasons including difficulties in post-implementation, failure to achieve the prom-ised benefits, low adoption and use by users, re-duced actual usage, which taken together can lead to negative impact on the business performance. ERP implementation takes several years, and to successfully obtain the stated benefits, it is impor-tant to understand how to assimilate the system into business processes and lead it to routine use. Our survey findings indicate that that we must shift the

focus of EIS research to understanding post im-plementation management issues, that is, after the system is deployed, what factors can enhance the assimilation of the new system? One question we want to focus is the following: how do users learn to assimilate the system in their routine work and how does this influence EIS success? Research on this matter will help us develop recommendations as to how management can better manage postimple-mentation learning and adoption by users so as to realize the value of investments in the new system.

UUnnddeerrssttaannddiinngg tthhee EERRPP SSuucccceessss We start with the premise that the user finally makes or breaks the system. These complex systems are often forced on employees, that is, they tend to be mandated, and employees have no option other than to learn the system or leave their current job. However, the extent to which they learn to suc-cessfully use and assimilate the system in their daily tasks will determine the success of the system. Training is a good start. During training, not only technical knowledge is should be transferred, but users have to be trained in new business processes and educated about the potential changes it could bring into their work practices (Bingi et al. 1999, Kang and Santhanam 2003).

Typically, organizations provide custom training by developing an internal training curriculum that focuses on their unique business processes and enables users to come to terms with the changes introduced by the system (Gupta 2000). However, knowledge acquired via training is incomplete be-cause it cannot provide users with all the informa-tion necessary to adapt the system to work, nor can system misspecifications and problems be antici-pated prior to system implementation (Kang and Santhanam 2003; Gallivan et al. 2005; Sharma – Yetton 2007). A proper understanding of how an individual employees’ task relates to and interacts with other tasks across multiple departments can be obtained only when an employee deploys the EIS in actual work and shares information with others. EIS are geared to redesign business process and the full impact of these changes in business routines will be apparent to the employee only during actual

Page 35: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Barriers and Success of ERPs����

SEFBIS Journal 2009 No. 4 35

system use. Hence, much learning occurs during actual system use as a function of the activity, con-text and work patterns (Desanctis and Poole 1994; Orliwkowski 2000; Kang and Santhanam 2003; Santhanam et al. 2007; Sharma and Yetton 2007).

Referred also as situated learning, employees revise their prior understanding of the system based on their daily interactions with the system and with their co-workers (Brown and Duguid 1991; Lave and Wenger 1991; Orliwkowski 1996, 2000; Cook and Brown 1999; Jasperson et al. 2005). EIS span mul-tiple users across functional units within the organi-zation; hence, existing business functions within the organization may need to be reconfigured to meet the requirements of the EIS, entailing users to ac-quire complex new knowledge and at the same time unlearn large portions of what they already know (Robey et al. 2002; Jones and Price 2004). This requires considerable learning, information sharing, and coordination among users after the system goes live (Amoako-Gyampah and Salam 2004; Loh and Koh 2004; Stapleton and Rezak 2004). Furthermore, the integrated and interdependent nature of EIS requires users to understand the manner in which their tasks relate to and interact with other processes at the unit, divisional and organizational levels. Thus, in addition to learning new business processes di-rectly relevant to their work, users have to commu-nicate and coordinate to create new routines, and participate in a collective learning process (Attewell 1992; Edmondson et al. 2001; Amoako-Gyampah and Salam 2004; Loh and Koh 2004; Stapleton and Rezak 2004). In situated learning contexts, learning takes place as a function of employee interactions with other employees within the context of work practices (Cook and Brown 1999).

To facilitate situated learning, employees may have to use their social relationships with one another, and exchange information. The smoother the flow of such information exchanges, the greater the lowering of knowledge barriers, and the faster the assimilation of the system into the work practices of the organiza-tion (Fichman and Kemerer 1997; Fichman 2000; Robey et al. 2002). In particular, the post implemen-tation period of multi-user EIS consists of extensive interactions and exchanges of information among employees as they adapt the system and modify ex-

isting business practices and procedures (Barley 1990; Attewell 1992; Fichman and Kemerer 1997; Paw-lowski and Robey 2004). Appropriate social structures are absolutely critical to facilitate these exchanges of information; otherwise learning may be hindered and the system could fail (Robey and Sahay 1996; Fichman and Kemerer 1997; Fichman 2000). We use social network theory to examine whether social networks of employees facilitate the sharing of tech-nology related information during post implementation and impact the successful assimilation of an EIS.

FFrraammeewwoorrkk –– SSoocciiaall NNeettwwoorrkk PPeerrssppeeccttiivvee

As seen in Figure 4-3, the social network perspec-tive views individuals as embedded within a network of interpersonal relations. A social network is a set of nodes, with each node representing an actor, and a set of ties, with each tie representing a relationship between the actors (Brass 1995; Scott 2000). In Figure 4-3, the node F (say an employee) is con-nected to only one other node/employee while G (employee) is connected to three others.

A

B

C

D

EF

G

H

Figure 4-3. A Sample Network Diagram

These types of differences in connections, strength and diversity of employee relationships with other individuals in the network influence their preferences, actions, and behaviors (Brass et al. 2004). The ac-tors may be individuals, groups or organizations. The actors and the corresponding set of ties can be depicted in the form of a network diagram and the features (providing network measures) of the net-work can be computed at both the level of the network as a whole (i.e. the organizational unit) and

Page 36: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� Improving the Success of EIS Implementation

36 SEFBIS Journal 2009. No.4.

at the level of the individual actor (i.e. employee) (Brass 1995). The focus is on the pattern of rela-tionships among the actors rather than on the attrib-utes of the actors. Social Network Analysis (SNA) has been applied to understand many organiza-tional phenomena, including the diffusion of medical innovations, success of technical innovations, and changes in social structures that occur after the introduction of an information system (Barley 1990; Burkhardt and Brass 1990; Burkhardt 1994; Cross and Cummings 2004; Obstfeld 2005). We use SNA to gauge the pattern of situated information ex-changes that take place during the post adoptive stage of EIS implementation and its impact on the successful assimilation of the system.

RReesseeaarrcchh SSttuuddyy OOvveerrvviieeww Our study was a longitudinal study with data col-lected at three points in time over a one year time period. We collected data on several different net-work measures and its job impact. In this paper, due to exigencies of space, we present a few key pre-liminary findings. Using a survey questionnaire, we collected data from over 500 users of an ERP system deployed in a large educational institution. Our users responded to the survey questionnaire immediately after the system was rolled out (phase 1), six months after it was rolled out (phase 2) and then after a year.

The survey measured users’ perceptions of sys-tem impact on their jobs. Our findings indicate that social structures and relationships of employees indeed play a very important role in facilitating in-formation exchanges about the system. Employees with strong ties to other employees and to the help desk assimilate the system and perceive it as having a significant impact on their jobs. We also found that such network relationship measures of employees at phase 1, related to measures of success after 6 months, and after a year. Overall, our findings indi-cate that the social relationships of individual em-ployees affect EIS implementation over an above individual employee attributes such as an employee’ perceptions of ease-of-use of the system, and their self-efficacy beliefs. This suggests that organizations must pay much greater attention to social learning during the post implementation period.

SSyysstteemm aanndd ssaammppllee The major vendor involved in the implementation of this ERP was System-analyse und Programment-wicklung (SAP), and the software being imple-mented was the SAP R/3 (Higher Education & Research) portfolio of ERP solutions. This included several modules and we focused on the Financials (FI) module because this was the first module im-plemented, the most complex of the modules, and involved the maximum number of users within the university community. We collected data from the administrative staffs of the university who were users of the “legacy” financial system and transi-tioning to the newly implemented FI module. We had 55 distinct organizational units having 702 us-ers of the ERP system.

DDaattaa CCoolllleeccttiioonn We collected data using a survey questionnaire. Network properties were obtained using the roster method wherein each respondent was provided with a list of other users of the ERP system within their organizational unit and required to indicate their ties with them. They were also asked to list other sources where they obtained information such as the help desk. The social network data were analyzed using UCINET 6 (Borgatti et al. 2002).

SSuucccceessss MMeeaassuurree As ERP systems are implemented primarily to en-hance organizational efficiency and productivity, individual impact would be an appropriate measure of implementation success. Individual impact is defined as “an indication that an IS has given the user a better understanding of the decision context, has improved an employees’ decision-making pro-ductivity, has produced a change in user activity, or has changed the decision makers’ perception of the importance of usefulness of the system (DeLone and McLean 1992). This can include the generation of new and innovative ideas, meeting client re-quirements, enhanced productivity and decision quality, and time savings. We adapted an existing questionnaire (Doll and Torkzadeh 1998) to suit this study’s context.

Page 37: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Barriers and Success of ERPs����

SEFBIS Journal 2009 No. 4 37

AAnnaallyyssiiss One of the social network measures we tested was the individual employees’ ego network. An employ-yees’ ego network describes his/her relationships with other employees, i.e. the network anchored around a particular employee (Brass 1995; Scott 2000). The size of an individual employee’s ego network refers to the number of direct connections an individual has. Because the successful integra-tion of an ERP system requires users to acquire and discuss features of the new system and how it might be integrated into their work routines, a large ego network will provide an employee with increased access to other employees knowledge, and the abil-ity to exchange much needed information. Employ-ees with large ego networks will be thus better able to use the system and find it to have a bigger impact on their work. Based on the above, we proposed:

The size of an employee’s ego network will be positively related to implementation success. Users may not only learn from other employees but also from the help desk-personnel. The helpdesk can function as an important source of information re-garding the ERP system. The help-desk can be conceptualized as an actor within the network, with users approaching it for system and job-related information. A network in which users and support systems (such as the help-desk) are conceptualized as interacting with one another is called a multi-modal network (Kane and Alavi 2005). Users that have ties with the help desk will have increased access to information regarding the EIS system and hence will be able to utilize the EI system more effectively. Hence, we proposed: An employees’ tie with the help-desk will be positively related to im-plementation success.

Table 4-1. Descriptive Statistics (Mean SD) on Individual Employees

1 - Measured as: 0 = High school diploma, 1 = Associate’s, 2 = Bachelor’s, 3 = Master’s, 4 = Ph.D. 2 - Measured as number of training sessions

FFiinnddiinnggss aanndd DDiissccuussssiioonn On Table 4-1, we present the descriptive statistics on our data. We conducted regression analysis to identify the impact of social relationships by in-cluding several individual attribute variables to control for their effects and to uniquely identify the effects of social relationships. Three control vari-

ables (self-efficacy, task structure, and ease of use) were significantly related to individual impact. After controlling for these effects, we found ego size to be significantly related to individual impact in all three time periods with beta coefficients of 0.15(p<0.01), 0.18 (p<0.01), 0.22 (p<0.01) in time periods 1, 2 and 3 respectively.

Measure Phase 1 (n=207)

Phase 2 (n=156)

Phase 3 (n=142)

Age (Years) 44.33 (10.36) 44.45 (10.64) 44.53 (10.82)

Experience (Years) 6.70 (7.01) 6.96 (7.40) 7.01 (7.64)

Education1 1.47 (1.11) 1.45 (1.14) 1.43 (1.14)

Involvement 1.44 (0.82) 1.48 (0.88) 1.5 (0.91)

Training2 3.74 (1.39) 3.81 (1.33) 3.92 (1.22)

Unit Size 7.96 (2.71) 7.86 (2.59) 7.93 (2.69)

Self Efficacy 4.13 (1.27) 4.22 (1.23) 4.21 (1.24)

Task Structure 3.99 (1.10) 4.00 (1.11) 4.00 (1.12)

Ease of Use 3.93 (1.27) 4.13 (1.27) 4.10 (1.24)

Ego Size 57.31 (23.41) 58.58 (25.04) 61.41 (24.05)

Individual Impact 4.28 (0.96) 4.32 (1.22) 4.35 (1.25)

Page 38: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� Improving the Success of EIS Implementation

38 SEFBIS Journal 2009. No.4.

Thus, we find strong support for our hypothesis that “The size of an employee’s ego network will be positively related to implementation success.” If a user approached the help desk we coded it as 1 and 0 otherwise. We found similar results with the help desk tie which had a significant positive relationship with individual impact (p<.01), thus we find support for H2 that “A user’s tie with the help-desk will be positively related to implementation success.”

We conducted a survey of existing research on EIS systems and found that not much attention was being paid to what happened during the post-imp-lementation period after a system had been rolled out. We believed that user experiences, particularly their learning related to system assimilation during this critical period could impede or facilitate the success of an EIS. We theorized that employees’ social relationships are important in this respect and could help them have smooth information exchan-ges within other employees in their unit and else-where. At the individual level, we found that em-ployees with a large ego network found the new system to have greater impact on their job and to provide better quality information, even when con-trolling for individual attributes such as self-efficacy. These results were consistent at all three phases, and Phase 1 network measures related to Phase 2 and Phase 3 success. Several social network cha-racteristics of an employee measured immediately after implementation were found to be significantly related to individual impact and other dimensions of implementation success. These strong positive fin-dings underscore the importance of employee so-cial relationships and their ability to easily exchange information about the system with other employees. We found users with strong ties to the help-desk perceived the system to have a greater impact. This finding is very critical given that in many corpora-tions, helpdesks are being outsourced even though some researchers have been stating that help desks serve an important role (Govindarajulu and Reithel 1998; Haggerty and Compeau 2002). In spite of its importance, due to standardization of service offerings and introduction of advanced support technologies, there has been an increasing emphasis on outsourcing of help-desk operations (McNeill and Ragsdale 2004). Our findings indicate

that these could have adverse consequences par-ticularly in the context of implementation of large EIS systems.In terms of practical implications, there are plenty. Organizations typically rely on formal training programs as the primary venue where us-ers learn to use the new system, and thus, training has been identified as the critical factor in imple-mentation success of an EIS. Our research indi-cates that it is not only knowledge gathered during training, but knowledge gained via information transfers in the workplace that influences imple-mentation success. Project managers and imple-mentation teams must become cognizant of this issue and start to work with employees during the post implementation stage. It is important that fa-cilities are established so that employees can in-teract and exchange system related information. The importance of project management in the im-plementation of complex EIS systems has been noted, but our findings go a step further and show that project managers must pay attention to the social context and structures in organizations. Management could provide opportunities for social interaction in the form of management retreats, discussion forums, etc. One approach could be via interventions such as forming discussion forums, ad hoc meetings or setting-up electronic bulletin boards for people to interact. Another approach could be to use the formal training programs to foster employee relationships and helping them understand who knows what (Borgatti and Cross 2003; Sharma and Yetton 2007). Our research suggests that it may be important to provide considerable time for informal interaction and discussion during formal training program. Providing more opportunities to build connections during training may facilitate posta-doption interactions and implementation success.

There has been an increasing trend towards outsourcing the help-desk function. Though the cost savings might be considerable, it can lead to rapid user dissatisfaction due to drop in service levels arising out of a lack of knowledge on the part of the service provider regarding the internal operations of the organization (McNeill and Ragsdale 2004). Our results indicate that for complex technology such as EIS, the information flow between the user and the help-desk played an important role in enhancing

Page 39: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Barriers and Success of ERPs����

SEFBIS Journal 2009 No. 4 39

user productivity. Users who approached the help desk for information regarding the system were able to incorporate the system into their job tasks more effectively. As an external help-desk service pro-vider may not be aware of the job and task-specific context in which users operate, they may not be able to provide the quality of support needed to master complex technologies. Organizations need to approach their outsourcing activities carefully, particularly for the institution of help-desks, as it might have detrimental effects on technology im-plementation.

We are engaged in a program of research on understanding the social relationships of employees and its impact on EIS success, and these are some preliminary results. Based on our findings, we be-lieve that post-implementation processes must be attended to, and therefore, we urge other resear-chers to examine the events during the post im-plementation period of an EIS.

RReeffeerreenncceess [1] Aladwani, A. M. 2001. Change management

strategies for successful ERP implementation. Business Process Management Journal 7(3)

[2] Amoako-Gyampah, K., and A. F. Salam. 2004. An extension of the technology acceptance model in an ERP implementation environment. Information and Management 41(6) 731-745.

[3] Attewell, P. 1992. Technology diffusion and organ-izational learning: The case of business computing. Organ. Sci. 3(1) 1-19.

[4] Barker, T. and M. N. Frolic. 2003. ERP implemen-tation failure - A case study. Information Systems Management 20(4) 43-50.

[5] Barley, S. R. 1990. The alignment of technology and structure through roles and networks. Admin. Sci. Quarterly 35(1) 61-103.

[6] Bingi, P., M. K. Sharma, and J. K. Godla. 1999. Critical issues affecting an ERP implementation. Information Systems Management 16(3) 7-14.

[7] Borgatti, S. P., M. G. Everett, L. C. Freeman. 2002. Ucinet 6 for Windows: Software for Social Network Analysis. Analytic Technologies, Harvard, MA.

[8] Borgatti, S. P. and R. Cross. 2003. A relational view of information seeking and learning in social net-works. Management Sci. 49(4) 432-445.

[9] Brass, D. J. 1995. A social network perspective on human resources management. G. Ferris, ed. Research in Personnel and Human Resources

Management. JAI Press, Greenwich, 39-79. [10] Brass, D.J.J. Galaskiewicz, H.R. Greve, and W. Tsui.

2004. Taking stock of networks and organizations: A multilevel perspective. Acad. Mgmt J. 47(6)

[11] Brown, J. S. and P. Duguid. 1991. Organizational learning and communities-of-practice: Toward a unified view of working, learning, and innovation. Organ. Sci. 2(1) 40-51.

[12] Brown, C., and I Vessey. 2003. Managing the next wave of enterprise systems: Leveraging lessons from ERP. MIS Quarterly Executive, 2(1), 65-77.

[13] Burkhardt, M. E. 1994. Social interaction effects following a technological change: A longitudinal investigation. Acad. Management J. 37(4) 869-898.

[14] Burkhardt, M. E. and D. J. Brass. 1990. Changing patterns or patterns of change: The effects of a change in technology on social network structure and power. Admin. Sci. Quarterly 35(1) 104-107.

[15] Chabrow, E. 2004. Fed ERP spending to jump, available online

[16] http://www.informationweek.com/showArticle.jhtml?articleID=29116654, last accessed Mar 25, 2005.

[17] Chau, P. Y. K. 2001. Influence of computer attitude and self-efficacy on IT usage behavior. J. End User Comp. 13(1) 26-33.

[18] Chen, I. J. 2001. Planning for ERP systems: Analysis and future trend. Business Process Management Journal 7(5) 374-386.

[19] Cook, S. D. N. and J. S. Brown. 1999. Bridging epistemologies: The generative dance between organizational knowledge and organizational knowing. Organ. Sci. 10(4) 381-400.

[20] Cotteleer, M. J. and E. Bendoly. 2006. Order lead-time improvement following enterprise-IT imple-mentation: An empirical study. MIS Quarterly 30(2)

[21] Cross, R. and J. N. Cummings. 2004. Tie and net-work correlates of individual performance in knowl-edge intensive work. Acad. Management J. 47(6).

[22] Davenport, T. H. 1998. Putting the enterprise into the enterprise system. Harvard Business

[23] Review, 76 (4), 121-131. [24] DeLone, W. H. and E. R. McLean. 1992. Informa-

tion success: The quest for the dependent variable. Inform. Systems Res. 3(1) 60-95.

[25] DeSanctis, G. and M. S. Poole. 1994. Capturing the complexity in advanced technology use: Adap-tive structuration theory. Organ. Sci. 5(2)

[26] Doll, W. J. and G. Torkzadeh. 1998. Developing a multidimensional measure of system-use in an organizational context. Inform. Management 33(4)

[27] Edmondson, A. C., R. M. Bohmer, and G. P. Pisano. 2001. Disrupted routines: Team learning and new

Page 40: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� Improving the Success of EIS Implementation

40 SEFBIS Journal 2009. No.4.

technology implementation in hospitals. Admin. Sci. Quarterly 46, (4), 685-716.

[28] Esteves, J, and J. Pastor. 2001. Enterprise re-source planning systems research: An annotated bibliography. Communications of the Association for Information Systems, 7(8), Available at http://aisel.aisnet.org/cais/vol7/iss1/8/

[29] Esteves, J, and Bohorquez, V. 2007. An Updated Enterprise Resource Planning systems Bibliogra-phy. Communications of the Association for Infor-mation Systems, 19 (18), available at: http://aisel.aisnet.org/cais/vol19/iss1/18

[30] Fichman, R. 2004. Going beyond the dominant paradigm for information technology innovation research: Emerging concepts and methods. Journal of the Association of Information Systems, 5(8),available at Available at: http://aisel.aisnet.org/jais/vol5/iss8/11.

[31] Fichman, R. G. 2000. The diffusion and assimila-tion of information technology innovations. R. Zmud, ed. Framing the Domains of IT Management Research: Glimpsing the Future through the Past. Pinnaflex Educational Resources, Inc., Cincinnati,

[32] Fichman, R. G. – C. F. Kemerer. (1997). The as-similation of software process innovations: An or-ganizational learning perspective. Management Sci. 43(10) 1345-1363.

[33] Gallivan, M. 2001. Organisational Adoption and Assimilation of Complex Technological Innovations: Development and Application of a New Framework, The Database for Advances in Informaiton Sys-tems, 32(3), 51-85.

[34] Gallivan, M. J., V. K. Spitler, and M. Koufaris. 2005. Does IT training really matter? A social information processing analysis of coworkers' influence on IT usage in the workplace. J. Management Inform. Systems 22(1) 153-192.

[35] Gattiker, T. F. and Goodhue, D. L. 2005. What happens after ERP implementation: Understanding the impact of interdependence and differentiation on plant-level outcomes. MIS Quarterly, 29 (3),.

[36] Gefen, David. 2004. What makes an ERP imple-mentation relationship worthwhile: Linking trust mechanisms and ERP usefulness. Journal of Management Information Systems 21(1), 263-288.

[37] Govindarajulu, C. and B. J. Reithel. 1998. Beyond the Information Center: An instrument to measure end-user computing support from multiple sources. Information and Management 33(5) 241-250.

[38] Gupta, A. 2000. Enterprise resource planning: The emerging organizational value systems. Industrial Management & Data Systems 100(3) 114-118.

[39] Haggerty, N. and D. Compeau. 2002. A social cognitive view of technical support and its influence on learning, in Proceedings of the International Conference of Information Systems, DeGross, J. I. and Kumar, K. (Eds.), Atlanta, 791-795.

[40] Hitt, L. M. 2002. Investment in enterprise resource planning: Business impact and productivity meas-ures. Journal of Management Information Systems, 19(1), 71-98.

[41] Holland, P., Light, B. and Gibson, N. (1999), A critical success factors model for enterprise re-source planning implementation, Proceedings of the 7th European Conference on Information Systems, 1, 273-287.

[42] Holsapple, C.W.and M.P.Sena. 2005. ERP plans and decision-support benefits. Decision Support Systems, 38 (4), 575-690.

[43] Hong, K. and Y. Kim. 2002. The critical success factors for ERP implementation: An organizational fit perspective. Information and Management 40(1),

[44] Igbaria, M. and J. Iivari. 1995. The effects of self-efficacy on computer usage. Omega 23(6).

[45] Janson, M . A. and Subramanian, A. 1996. Pack-aged software: Selection and implementation policies. INFOR 34(2) 133-151.

[46] Jasperson, J. S., P. E. Carter, and R. W. Zmud. 2005. A comprehensive conceptualization of post adoptive behaviors associated with information technology enabled work systems. MIS 29(3)

[47] Jones, M. C. and R. L. Price. 2004. Organizational knowledge sharing in ERP implementation: Les-sons from industry. Journal of Organizational and End User Computing 16(1) 21-41.

[48] Kalling, T. 2003. ERP systems and the strategic management processes that lead to competitive advantage. Information Resources Management Journal 16(4) 46-67.

[49] Kane, G. and M. Alavi. 2005. Casting the net: A multimodal network perspective on knowledge management, in Proceedings of the 26th Interna-tional Conference on Information Systems, Las Vegas, NV, December.

[50] Kang, D. and R. Santhanam. 2003. A longitudinal field study of training practices in a collaborative application environment. J. Management Inform. Systems 20(3) 257-281.

[51] Karahanna, E., D. W. Straub, and N. L. Chervany. 1999. Information technology adoption across time: A cross-sectional comparison of pre-adoption and post-adoption beliefs. MIS Quarterly 23(2)

Page 41: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Barriers and Success of ERPs����

SEFBIS Journal 2009 No. 4 41

[52] Klaus, H., M. Rosemann, and G. G. Gable. 2000. What is ERP? Information Systems Frontiers – portal.acm.org.

[53] Koh, D.-G., L. J. Kirsch, and W. R. King. 2005. Antecedents of knowledge transfer from consult-ants to clients in enterprise system implementa-tions. MIS Quarterly 29(1) 59-86.

[54] Lave, J. and E. Wenger. 1991. Situated Learning: Legitimate Peripheral Participation. Cambridge University Press, Cambridge, UK.

[55] Lee, A. 2000. Researchable directions for ERP and other new information technologies. MIS Quarterly 24(1) iii, 6.

[56] Liang, H., N. Saraf, Q. Hu, and Y. Xue. 2007. As-similation of enterprise systems: The effects of in-stitutional pressures and the mediating role of top management. MIS Quarterly 31(1) 59-87.

[57] Loh, T. C., and S. C. L. Koh. 2004. Critical elements for a successful enterprise resource planning im-plementation in small and medium-sized enter-prises. International Journal of Production Re-search 42(7) 3433-3455.

[58] Mabert, V. A., A. Soni, and M. A. Venkataramanan. 2000. Enterprise resource planning survey of US manufacturing firms. Production and Inventory Management Journal, 41(2), 52-58.

[59] Markus, M. L., Tanis, C., and van Fenema, P. C. 2000. Multisite ERP Implementations,

[60] Communications of the ACM (43:4), p. 42-46. [61] McNeill, R., and J. Ragsdale. 2004. Making an IT

Help Desk Outsourcing Decision, Forrester Re-search, Cambridge, MA.

[62] Nah, F., K. Zuckweiler, and J. Lau. 2003. ERP implementation: Chief information officers' percep-tions of critical success factors. Internat. J. Hu-man-Computer Inter. 16(1) 5-22.

[63] Obstfeld, D. 2005. Social networks, the tertius iungens orientation, and involvement in innovation. Admin. Sci. Quarterly 50(1) 100-130.

[64] Orlikowski, W. 1996. Improvising organizational transformation over time: A situated change per-spective. Inform. Systems Res. 7(1) 63-92.

[65] Orlikowski, W. J. 2000. Using technology and constituting structures: A practice lens for studying technology in organizations. Organ. Sci. 11(4)

[66] Pawlowski, S. and D. Robey. 2004. Bridging user organizations: Knowledge brokering and the work of information technology professionals. MIS Quarterly 28(4) 645-672.

[67] Robbins-Gioia (2002) Press-Releases, available online http://www.robbinsgioia.com/news_events/-012802_erp.aspx, last accessed September 2009.

[68] Ranganathan, C. and C. V. Brown. 2006. ERP investments and the market value of firms: Toward an understanding of influential ERP project vari-ables. Information Systems Research, 17 (2),.

[69] Robey D. and S. Sahay. 1996. Transforming work through information technology: A comparative case study of geographic information systems in county government. Inform. Systems Res. 7(1)

[70] Robey, D., J. Ross, M. Boudreau. 2002. Learning to implement enterprise systems: An exploratory study of the dialectics of change. J. Management Inform. Systems 19(1) 17–46.

[71] Ross, J. W. and M. Vitale. 2000. The ERP revolu-tion: Surviving versus thriving. Inform. Systems Frontiers 2(2) 233-241.

[72] Santhanam, R, L. Seligman, L., and D. Kang. 2007. Post-implementation knowledge transfers to users and information technology professionals. Journal of Management Information Systems, 24(1) Scott, J. P. 2000. Social Network Analysis: A Handbook. Sage Publications, London.

[73] Sharma, R. and Y. Yetton, 2007. The contingent effects of training, technical complexity, and task interdependence on successful information sys-tems implementation. MIS Quarterly. 31(2),

[74] Somers, T. M. and K. G. Nelson. 2004. A taxonomy of players and activities across the ERP project life cycle. Information and Management 41(3)

[75] Stapleton, G., and C. J. Rezak. 2004. Change management underpins a successful ERP imple-mentation at Marathon Oil. Journal of Organiza-tional Excellence 23(4) 15-23.

[76] Swanson, E. B. 1994. Information Systems Inno-vations among Organizations,” Management Sci-ence (40:9), p. 1069-1092.

[77] Venkatesh, V. 2000. Determinants of perceived ease of use: Integrating perceived behavioral con-trol, computer anxiety and enjoyment into the technology acceptance model. Inform. Systems Res. 11(4) 342-365.

[78] Wallace, B. 1998. Now it’s cost-cutting time. Computerworld, 32, 47-82.

[79] Wang, E. T. G., G. Klein, and J. J. Jiang. 2006. ERP misfit: Country of origin and organizational factors. Journal of Management Information Systems 23(1)

Page 42: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� EIS Outsourcing

42 SEFBIS Journal 2009. No.4.

Radhika SANTHANAM is a Gatton Endowed Research Professor in the Gatton College of Business & Economics, at the University of Kentucky. She has conducted exten-sive research to understand and enhance user learning of new information tech-nologies. Recently, along with her doctoral students and colleagues, she has con-ducted several longitudinal studies on Enterprise Information Systems, and proposed training and learning approaches that can facilitate their successful implementation. Findings from her research have been published in leading information system journals such as, MIS Quarterly, Information Systems Research, Journal of Man-agement Information Systems, Information and Organization, Decision Support

Systems, and European Journal of Information Systems, among others. She is an Associate Editor at Informa-tion Systems Research and Decision Support Systems, and on the editorial board of Enterprise Information Systems. Earlier, she was an Associate editor at Management Information Systems Quarterly and Computer and Operations Research. She was the Program Co-chair for the 2005 Annual Conference of the Association of Information Systems (AIS). Efficient ERP Solutions

5. EIS Outsourcing EEnntteerrpprriissee IInnffoorrmmaattiioonn SSyysstteemmss OOuuttssoouurrcciinngg::

aa LLooookk bbeehhiinndd tthhee CCuurrttaaiinn

1PER SVEJVIG – 2JAN PRIES-HEJE 1Aarhus Business School, Denmark, 2Roskilde University, Denmark

eMail: [email protected], [email protected]

Outsourcing is now a feasible mean for Enterprise Information Systems (EIS) cost savings, but do however in-crease the complexity substantially when many organizations are involved. We set out to study EIS outsourcing with many interorganizational partners in a large Scandinavian high-tech organization SCANDI, trying to answer the question: Why does SCANDI engage in very complex EIS outsourcing arrangements? To answer this question we observed numerous meetings and collected data from interviews in four parts of SCANDI. After transcribing and analyzing our data we found at first just the rational cost saving explanation; but then with a more careful analysis focusing on institutional factors, other explanations “behind the curtain” were revealed, such as man-agement consultants with a “best practice” agenda, people promoting outsourcing thereby being promoted themselves, and outside training leading to a belief in outsourcing as a “silver bullet” solving everything.

IInnttrroodduuccttiioonn Enterprise Information Systems (EIS) is a techno-logy that provides an organization the possibility of integrating and coordinating business processes. An EIS is one single (big) system central to the organization. Today many EIS are bought as packages from vendors such as the German SAP or the American ORACLE. EIS outsourcing is the practice where the organization purchases goods or services that were previously provided internally (Lacity and Hirschheim 1993: 74). We further mean

any type of outsourcing involving EIS and Informa-tion Technology (IT). This includes application de-velopment on top of the EIS, operation of a data center running EIS, project management in relation to EIS, business processes enabled by the EIS, or the entire IS function (this definition inspired by Dibbern et al. 2004).

EIS outsourcing thus means aggregating spe-cific tasks or entire processes and moving them to one or more outsourcing vendors, typically to a place where wages are lower or where a more ap-

Page 43: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Efficient ERP Solutions����

SEFBIS Journal 2009 No. 4 43

propriate business structure can be provided to deliver the IS goods and services (McFarlan and DeLacey 2004). Organizations have claimed that IS outsourcing reduces cost and time, increases qual-ity and reliability of product and services, improves business performance, and releases organizations to concentrate on core competencies (McFarlan and DeLacey 2004). A McKinsey study shows that for every dollar that US companies spend on ser-vices moved offshore, a saving of 58 cents is achieved mainly on wages, and further concludes “that offshore services are identical to those they replace – and at better times” (Bloch and Spang 2003; McFarlan and DeLacey 2004: 1)

The reasons why organizations outsource IS are dominated by rational explanations related to bounded rationality and opportunism (Williamson 1981) where cost savings seem to be a prevailing explanation repeated in literature (Bloch and Spang 2003; Dibbern et al. 2004; Lacity and Hirschheim 1993; McFarlan and DeLacey 2004; Olson 2007).

However, though a majority of extant literature finds mainly rational explanations for engaging in IS outsourcing (Dibbern et al. 2004; McFarlan and DeLacey 2004; Olson 2007), our own experience from many companies and from many outsourcing arrangements made us speculate whether there was more to it? Could it be that there were both “front stage” rational explanations as well as other different “back stage” explanations – “behind the curtain” to use a theater metaphor?

To address this curiosity we set out to study IS outsourcing in a large Scandinavian high-tech or-ganization, SCANDI, which is a case with many inter-organizational partners involved in their sourcing arrangements, our research question being: Why does SCANDI engage in very complex IS out-sourcing arrangements?

The paper is organized as follows. First we in-troduce our research method based on the interpre-tive paradigm. Then we explain the Institutional Theory which is the theoretical lens used in this pa-per. The section that follows outlines the SCANDI case study. The analysis behind the curtain is then presented, and is followed by discussion and impli-cation. Finally, we present some concluding remarks.

RReesseeaarrcchh MMeetthhoodd To answer our research question we studied many relevant documents, gathered data from interviews in four parts of SCANDI, and we observed numerous meetings, our aim being to obtain in-depth knowl-edge about outsourcing arrangements and events in SCANDI, contextualized by an EIS life cycle, which makes up the scenery for the outsourcing events – describing content, context and process (Pettigrew 1987). The methodology we adopted was a contex-ualized, interpretive one, using the technique of case study research (Pettigrew 1990; Walsham 2002; Walsham 2006; Yin 2003). Interpretive research attempts to understand phenomena through the meanings that people assign to them (Myers and Avison 2002), and access to reality is through social constructions such as language, consciousness and shared meanings (Berger and Luckmann 1966; Myers and Avison 2002).

We designed our study to be longitudinal, starting early 2008, with an overall interpretive research ap-proach - the empirical study is still ongoing (as of June 2009). Fieldwork was (and is) conducted in four parts of SCANDI. We are using a number of data collection methods such as twenty semi-structured interviews, document analysis and participant ob-servation. The aim of the data collection was to un-derstand and interpret from the interviewee’s per-spective why SCANDI engage in the multiple out-sourcings, and how the interviewee sees the context and process, for instance the business context. A number of participant observations were also con-ducted.

Data analysis has followed the interpretive tradition (Walsham 2002; Walsham 2006). Interviews were transcribed and notes were taken from the meetings we observed. These data and documents were then coded and analyzed. At first we just found the rational cost saving explanation. But then a more careful qualitative data analysis (Miles and Huberman 1994) revealed a number of explanations “behind the cur-tain”. In the specific case, we followed five steps in-spired by Goetz and LeCompte (1981). First, we scanned and coded all the data and documents col-lected. Second, we went back and forth between data and categories to reveal everything in the data. Third,

Page 44: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� EIS Outsourcing

44 SEFBIS Journal 2009. No.4.

we set out to create typologies for the categories. In doing that, we decided to use institutional theory (Scott 2008) as we found it to be very useful. Fourth, we determined relationships that existed between the categories using institutional theory. And finally, as the fifth step we created our conclusion.

TThhee RRaattiioonnaall EExxppllaannaattiioonn The theoretical lenses used in this study have evolved over time in reaction to our progressive understanding of data collected during field work. Rational explanations were fairly straightforward identifiable while the institutional explanations came out of the idea of looking for complementary “behind the curtain” explanations in interpreting the field data and inspiration from IS literature.

We adopted Institutional Theory (INT) to explain outsourcing decisions because the theoretical con-structs in INT are recognizable in our empirical study, where INT is related to institutional pressures like regulations, social norms and copying other institu-tions' structures and practices as a collective rational-ity (DiMaggio and Powell 1991; Scott 2008). The theoretical lens applied is presented in the conceptual framework below, which is used to answer the re-search question.

Figure 5-1. Conceptual framework combining ra-

tional and institutional factors

Figure 5-1. shows that both rational and institution-nal factors influence the outsourcing process that is the decision-making process to adopt outsourcing, and thereby make up the determinants for out-sourcing (why outsource). Rational and institutional

factors are effecting each other (hence the arrows between them in the figure above) where for in-stance rational factors rooted in organizational effi-ciency elaborates into rationalized institutional myths.

As said above we found institutional theory (INT) to be very useful in coding and understanding our data. Scott (2008) presents a two-dimensional analytical framework with pillars and carriers. One dimension is the regulative, the normative and the cognitive pillars. The regulative pillar represents repeated actions because of explicit laws or rules that exist, like the Sarbanes Oxley in USA. The normative pillar implies repeated actions due to values and norms (Scott 2008), for instance pro-fessional associations which provide guidelines for IS outsourcing and thereby promote outsourcing to organizations. The last pillar is cognitive, where repeated patterns occur from a desire to be or look like others, e.g. executives are mimicking out-sourcing practices as “organizations tend to model themselves after similar organizations in their field that they perceive to be more legitimate or suc-cessful” (DiMaggio and Powell 1991: 70). The bases of legitimacy of the three pillars are different and sometimes in conflict (Scott 2001: 61).

The three pillars exert institutional pressures on institutions leading to a process of homogenization captured as isomorphism, i.e. “a constraining pro-cess that forces one unit in a population to resemble other units that face the same set of environmental conditions” (DiMaggio and Powell 1991: 66). Pro-fessionals with a formal standardized education are important sources of isomorphism in organizations (DiMaggio and Powell 1991), for instance MBAs trained in outsourcing at business schools can make up a normative institutional pressure on organiza-tions to adapt outsourcing strategies as an organ-izational norm. Rational arguments are sometimes stated, but are actually disguised emotional argu-ments based on institutional pressures, which can-not be objecttively tested. These are known as ra-tionalized myths, and are part of the institutional context where organizations pursue to “maximize their legitimacy and increase their resources and survival capabilities” (Meyer and Rowan 1991: 53). The other dimension in Scott’s analytical framework

Page 45: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Efficient ERP Solutions����

SEFBIS Journal 2009 No. 4 45

is designated carrier. Institutions are embedded in various kinds of carriers, repositories or vehicles (Scott 2008). The formation and development of these carriers can be viewed as involving structure and action (Giddens 1984; Scott 2008). Carriers could be symbolic systems, relational systems, rou-tines, ideas, and artifacts, and they are all viewed as consisting of structure and action, but relate to dif-ferent subtypes of structure (Scott 1995). EIS are for instance artifacts carrying institutional logic (Gosain 2004), which are adopted in organizations, but also customized to align with local requirements.

TThhee SSCCAANNDDII ccaassee This section describes the empirical case study and provides a time-ordered process view of the case study (Miles and Huberman 1994: 110-122; New-man and Robey 1992). SCANDI, a pseudonym, is a Scandinavian company with 10,000+ employees producing and selling high-tech services. Today SCANDI is a result of a merge of several companies, some of which have existed for more than 100 years. SCANDI has existed in its present form since the beginning of the 1990s. SCANDI is operating in a highly competitive environment.

SCANDI has been a traditional full-fledged com-pany, performing primary activities like logistics, op-erations, sales and marketing, services as well as supporting activities like administration, human re-source management, procurement, information sys-tems services etc. (Porter and Millar 1985). SCANDI started to outsource both primary and secondary activities including IS from the beginning of the new millennium, and the rate of outsourcing has in-creased since then. In 1996 SCANDI decided to implement one of the globally leading enterprise systems in the market. The next section describes the story of this enterprise system (ES). Figure 5-2. shows a timeline with several milestones (M1 to M5) and four outsourcing events (O1 to O4). The financial system (FS) is part of the EIS and was launched in 1996 (milestone M1) while the supply chain system (SCS) was operational from 2001-2002 (milestone M2) with a major extension in 2004 (milestone M3) where a logistic legacy system was closed down and the functionality transferred to the EIS. A reimple-

mentation project (milestone M4) was started in 2007 and is expected to be launched in January 2009 (milestone M5).

Figure 5-2. Important Milestones at SCANDI.

In the lower right corner the four outsourcing events are placed time wise; more information in Figure 5-3 FS covers financial management including general ledger, account receivables and payables etc. with about 40 heavy users. SCS is used by more than 100 heavy users for purchasing management and inventory management. Another user group of 3000+ ad hoc users is using SCS much like an online shopping solution with shopping cart to reg-ister purchase order requisitions.

The EIS, consisting of both FS and SCS, is in-tegrated to 40+ other information systems via middleware integration or simple batch oriented in-tegration, which means that the EIS is part of a fairly complex technical infrastructure. The four out-sourcing events are detailed in Figure 5-3. Four different tasks are shown to the left (of the timeline): (1) IT development which is configuring the EIS and developing interfaces etc., (2) IT project manage-ment responsible for managing projects related to the EIS, (3) IT operation taking care of operating the technical infrastructure, and (4) finally a task called other project tasks (employees in SCANDI who gradually build up EIS expertise and take care of project tasks).

Page 46: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� EIS Outsourcing

46 SEFBIS Journal 2009. No.4.

Figure 5-3. Outsourcing events with related vendors

Four organizations are involved in performing the tasks. The bars in Figure 5-3 indicate (containing vendor names inside) which organization is assigned to which task at a given period; the mixture of bars and texture illuminating the increasing complexity with many interorganizational partners.

11999966--22000077 tthhee FFiirrsstt LLoonngg PPeerriioodd wwiitthh EEIISS The financial system (FS) part of the EIS was op-erational back in 1996 (milestone M1), and has been used for more than 10 years with several up-grades since then. Discussions with finance users indicate that FS is well institutionalized at SCANDI. SCS was in operation from 2001-2002 (milestone 2). A major extension to SCS was completed in spring 2004 (milestone 3) by SCANDI, and this re-lease has been operational for several years. The first operational period with the extended SCS from spring 2004 was harsh with severe problems and performance drops during the first half year accord-ing to interviewee A. The period from the major ex-tension of SCS in spring 2004 and until summer 2007 could be characterized as a period with mainly operation of the ES and only few IT development activities like bug fixing and implementation of minor enhancements.

Further development of the EIS was outsourced to Outsourcing Vendor A in summer 2005 (outsourcing event #1) as part of a more comprehensive out-sourcing agreement covering many applications, and the EIS was “suddenly” managed by two parties. One of the reasons for this outsourcing is that “the ERP-area is not business critical for SCANDI and therefore suitable for outsourcing” (Press Release #1).

TThhee RRee--IImmpplleemmeennttaattiioonn ffrroomm 22000077 The EIS had evolved into a much customized stan-dard system since the first implementation in 1996. About 400 customizations were part of the “EIS lug-gage” leading to difficulties in upgrading the EIS, and thereby locking SCANDI into an old EIS architecture. This situation was untenable, and something had to be done! A re-implementation project (RE-ES project), was therefore started in summer 2007 covering both FS and SCS functionality. The purpose of the project was amongst other things to (1) reduce the number of customizations to less than 150, (2) modernize ap-plication architecture and thereby prepare for future functionality, (3) optimize business processes, and (4) better utilize standard functionality. The RE-ES project is seen as a technical reimplementation project with very few benefits for business.

Page 47: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Efficient ERP Solutions����

SEFBIS Journal 2009 No. 4 47

SCANDI takes another outsourcing step in spring 2008 (outsourcing event #3) by outsourcing more than 200 employees to Outsourcing Vendor B, meaning that “project management” and “other project tasks” are transferred to Outsourcing Vendor B (see Figure 5-3) reducing the number of SCANDI employees fur-ther, which muddles the water even more, since Outsourcing Vendor B has several resources involved in RE-ES, but is still not represented at management level. This additional outsourcing is expanding the outsourcing agreements with Outsourcing Vendor B, and the SCANDI chief information officer states in a press release (Press Release #3):

“We already have an excellent relationship with [Outsourcing Vendor B] in several areas and are

pleased to expand it further to include management of our legacy application portfolio…The new

agreement will enable us to further modernize and consolidate our applications so they deliver the

capabilities our business requires”

Finally, the internal anchoring of RE-ES in SCANDI is changed during summer 2008, when RE-ES becomes part of a large company-wide program, which is managed by Outsourcing Vendor C (out-sourcing event #4). The consequence for RE-ES is that Outsourcing Vendor C takes over the respon-sibility for project management, and is overall re-sponsible for RE-ES.

AAnnaallyyssiiss:: BBeehhiinndd tthhee CCuurrttaaiinn The SCANDI case study both makes up the scenery for the complex EIS outsourcing engagements and shows the consequences of these engagements, but does only to some extent answer the research question, “why does SCANDI engage in such a complex IS outsourcing landscape” as shown in Figure 5-3. above. The answer came out of the data analysis At first we just found rational cost savings as the prevailing explanation, then a more careful analysis revealed a number of institutional expla-nations “behind the curtain”.

RRaattiioonnaall EEccoonnoommiicc EExxppllaannaattiioonnss Outsourcing is in many cases directly linked to at-tained cost savings, but often together with many other factors like higher flexibility, access to specialist

expertise etc. (Olson 2007). All of the outsourcing engagements mentioned in the case study are re-lated “to simplifying and obtaining effectiveness in business operation” (Press-release #4), being prox-ies for cost savings (Williamson 1981). The cost saving is also perceived to lead to a healthy and attractive company for the shareholders.

The rational economic explanations for out-sourcing are fairly overt when reading press re-leases and interviewing people, while institutional explanations are more covert. For example inter-viewee A states, “my impression is that the man-agement team at SCANDI is driven by key eco-nomic figures and management consultants' ana-lyzes”, and this is supported by another quotation, “I know that management consultants are working with executive management at the highest le-vel …and very close to the chief information offi-cer…positioning what to outsource [based on best practices, benchmarks etc.]” (Interviewee C). This means that the management consultants “bring” analyzes with benchmark numbers for companies to SCANDI, for instance how many IT people should be employed by SCANDI? Thereby impacting out-sourcing decisions whether they are rationally sub-stantiated or not. This is an example where man-agement consultants “travel with best practices” (Czarniawska and Joerges 1996), and they could be seen as a profession, enacting normative insti-tutional pressures on the organizations they en-counter (Scott 2008). The executive management team at SCANDI nevertheless disguises the out-sourcing decision on benchmark numbers as a rational economic decision to obtain organizational efficiency.

IInntteerrpprreettiivvee EExxppllaannaattiioonnss The culture about using EIS at SCANDI has been driven by dissimilarity, where each department is different, and has its own requirements and needs, to be fulfilled by different information systems. E.g. one of the reasons for the many interfaces to the central financial system (FS) presented in the case study, is that many departments have their own de-centralized financial systems, and the management has accepted this “culture of dissimilarity”.

Page 48: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� EIS Outsourcing

48 SEFBIS Journal 2009. No.4.

EIS outsourcing is used to change the culture, which is difficult to change as it is highly institution-alized “I think SCANDI tries to break up the struc-tures by virtue of outsourcing, and that might be possible in the long run” (interviewee B), and “Outsourcing could be a good instrument if you want to change a culture which is so highly institutional-ized, and driven by that we are all different” (inter-viewee C). The number of change requests was reduced dramatically after outsourcing of IT de-velopment to Outsourcing Vendor A in 2005, and this was an important change in operating style, which would have been nearly impossible without outsourcing. Outsourcing is thus used to force a cultural change!

The outsourcing practice at SCANDI has become institutionalized, designated as a typified action. A typified action does not come out of thin air or vac-uum, but is created by actors of flesh and blood over time as a historical process (Berger & Luckmann 1966; Weber and Glynn 2006: 1645), and there seems to be at least two key actors at SCANDI doing this institutional work (Lawrence & Suddaby 2006). Two key actors (manager 1 and 2) say:

– Manager 1: “I think…that it gives prestige to undertake outsourcings…the people who got promoted at SCANDI, are the people who have carried through several outsourcings and cut down the number of employees…let me give an example: [Manager 1] was responsible for out-sourcing of IT development [outsourcing event O1] in 2005, he was promoted to an important line of business, where he has been head of di-vision for the last couple of years, and nearly everything has been outsourced in his reign…and he gets a lot of attention from the executive management” (interviewee A).

– Manager 2: “If I should point towards a central individual who has relatively much to say…it is [Manager 2]. He was three years ago a suc-cessful head of a purchasing department…and he created an extreme large power base and position, by virtue of good outsourcing deals for SCANDI…and I am quite sure that the “out-sourcing silver bullet” from the purchasing de-partment also characterizes the governance of

the IT department [where Manager 2 is currently responsible]” (interviewee C).

So undertaking the outsourcing practice gives prestige to key actors and creates an extreme power base, which is supporting values like power, wealth and management control (Hatch 1997: 211) and encouraging key actors in SCANDI to continue to undertake outsourcings. The “prestige and pro-motion factor” associated with outsourcings has probably a contagious influence on other actors, both as an attractive norm (unwritten rule) and as a script to copy (Scott 2001; Scott 2008) – in short a “silver bullet” or “a recipe for success”.

CCoonncclluussiioonn

EIS outsourcing arrangements are often quite com-plex and it is feasible to ask why companies engage in such very complex outsourcing arrangements? To answer this question we analyzed documents, ob-served meetings and gathered data from interviews in four parts of SCANDI. Our first round of analysis revealed just the rational cost saving explanation. But then a second round of analysis using institu-tional theory found other explanations - “behind the curtain” as we called it - such as management con-sultants with a “best practice” agenda, people pro-moting outsourcing thereby being promoted them-selves, and a believe in outsourcing as a “silver bul-let”, a recipe to success, solving everything.

It is thus relevant to consider both rational and institutional explanations in a given EIS outsourcing case, and not just “run away” with obvious front stage explanations without considering behind the curtain back stage institutional explanations. This finding could be used to understand one's own behavior in similar situations and maybe especially other peo-ple's behaviors, statements and arguments.

RReeffeerreenncceess [1] Berger, P. L. and Luckmann, T. (1966) The Social

Construction of Reality. a Treatise in the Sociology of Knowledge. New York: Doubleday.

[2] Bloch, M. and Spang, S. (2003) Reaping the bene-fits of business-process outsourcing. McKinsey

[3] Czarniawska, B. and Joerges, B. (1996) Travels of ideas, in B. Czarniawska and G. Sevón (eds.),

Page 49: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Efficient ERP Solutions����

SEFBIS Journal 2009 No. 4 49

Translating Organizational Change, Berlin: Walter de Gruyter, pp. 13-48.

[4] Dibbern, J., Goles, T., Hirschheim, R., and Jayati-laka, B. (2004) Information Systems Outsourcing: A Survey and Analysis of the Literature, Database for Advances in Information Systems 35(4): 6-102.

[5] DiMaggio, P. and Powell, W. W. (1991) The Iron Cage Revisited: Institutional Isomorphism and Collective Rationality, in W.W. Powell and P. Di-Maggio (eds.), The New Institutionalism in Organ-izational Analysis, Chicago: University of Chicago Press, pp. 63-82.

[6] Giddens, A. (1984) The Constitution of Society: Outline of the Theory of Structure. Berkeley: Uni-versity of California Press.

[7] Goetz, J. P. and LeCompte, M. D. (1981) Ethno-graphic Research and the Problem of Data Reduc-tion, Anthropology & Education Quarterly 12(1):

[8] Gosain, S. (2004) Enterprise Information Systems as Objects and Carriers of Institutional Forces: The New Iron Cage, Journal of the Association for In-formation Systems 5(4): 151-182.

[9] Hatch, M. J. (1997) Organization theory. modern, symbolic, and postmodern perspectives. Oxford: Oxford University Press.

[10] Lacity, M. C. and Hirschheim, R. A. (1993) Informa-tion Systems Outsourcing; Myths, Metaphors, and Realities. John Wiley & Sons, Inc. New York, NY

[11] Lawrence, T. B. and Suddaby, R. (2006) Institutions and institutional work, in S. Clegg, C. Hardy, T. Lawrence and W.R. Nord (eds.), The Sage Hand-book of Organization Studies, pp. 215–254.

[12] McFarlan, F. W. and DeLacey, B. (2004) Outsourc-ing IT: The Global Landscape in 2004, Harvard Business School.

[13] Meyer, J. and Rowan, B. (1991) Institutionalized Organizations: Formal Structure as Myth and Ceremony. , in W.W. Powell and P. DiMaggio (eds.), The New Institutionalism in Organizational Analysis, Chicago: University of Chicago Press, pp. 41-62.

[14] Myth and Ceremony, American Journal of Sociology

83(2): 340-363. [15] Miles, M. B. and Huberman, A. M. (1994) Qualitative

Data Analysis: An Expanded Sourcebook. Sage. [16] Myers, M. D. and Avison, D. (2002) An introduction

to qualitative research in information systems, in M.D. Myers and D. Avison (eds.), Qualitative Re-search in Information Systems - A Reader, SAGE Publications.

[17] Newman, M. and Robey, D. (1992) A Social Process Model of User-Analyst Relationships, MIS Quarterly 16(2): 249-267.

[18] Olson, D. L. (2007) Evaluation of ERP outsourcing, Computers and Operations Research 34(12):

[19] Pettigrew, A. M. (1987) Context and Action in the Transformation of the Firm, The Journal of Man-agement Studies 24(6): 649-671.

[20] Pettigrew, A. M. (1990) Longitudinal Field Research on Change: Theory and Practice, Organization Science 1(3): 267-292.

[21] Scott, W. R. (1995) Institutions and Organizations: Theory and Research. Thousands Oaks: Sage.

[22] Scott, W. R. (2008) Institutions and Organizations: Ideas and Interests, (3rd ed.). Thousands Oaks: Sage

[23] Walsham, G. (2002) Interpretive Case Studies in IS Research: Nature and Method, in M.D. Myers and D. Avison (eds.), Qualitative Research in Information Systems - A Reader, SAGE Publications, pp. 101-113.

[24] Walsham, G. (2006) Doing interpretive research, European Journal of Information Systems 15(3): 320-330.

[25] Weber, K. and Glynn, M. A. (2006) Making Sense with Institutions: Context, Thought and Action in Karl Weick's Theory, Organization Studies 27(11):

[26] Williamson, O. E. (1981) The Economics of Or-ganization: The Transaction Cost Approach, American Journal of Sociology 87(3): 548-577.

[27] Yin, R. K. (2003) Case Study Research: Design and Methods. Sage Publications.

Per SVEJVIG is PhD student at Aarhus School of Business, Aarhus University. His re-search interest are in the area of implementation and use of enterprise systems, man-aging IT-enabled change, interplay between technology and organizations, and IS project management. He holds a BSc in Engineering, Engineering College of Aarhus and MSc in IT, Aarhus University. He has more than 25 years business experience as manager, project manager and consultant. He is Certified Senior Project Manager (IPMA level B).

Page 50: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� The Challenge of IT Donwturn

50 SEFBIS Journal 2009. No.4.

Jan PRIES-HEJE is professor in Information Systems and head of User Driven IT In-novation Research Group. He holds MSc and PhD degrees from Copenhagen Busi-ness School. He is a certified ISO 9000 auditor and Bootstrap assessor, has been project manager for a number of multi-media and IT-related change projects and also research manager for several projects. Before coming to Roskilde he worked at the IT University of Copenhagen and as Professor in Software Engineering and Management at the IT University in Gothenburg. He is past President of the Association of Informa-tion Systems in Scandinavia (IRIS); he serves as the Danish National Representative

to IFIP Technical Committee on Information Systems and he is also the Vice-Chair of that Committee. He is currently Associate Editor for MIS Quarterly, Information Systems Journal and Business and Information Sys-tems (Wirtschaftsinformatik); three of the best journals in the field of IS. His research interests include informa-tion systems development, software engineering, and software process improvement with focusing on organ-izational and managerial issues and with special interest in designing and building solutions. He has published 14 books, 29 Chapters in books and more than 150 papers in high quality journals and conferences.

6. The Challenge of IT Donwturn TThhee CChhaalllleennggee ooff IITT iinn DDoowwnnttuurrnn

PETER FEHÉR Corvinus University of Budapest, Department of Information Systems

Email: [email protected]

Organizational IT departments has to face economic downturn, and because of the strong demand of business areas, cost reduction is inevitable. Short term cost cutting efforts are highly visible but they risk the long term competitiveness. Long term cost cutting efforts have sustainable impact, but cannot help in the current fight for survival. The survey among Hungarian IT departments showed, that the organizations try to find the balance in these challenging times.

IInnttrroodduuccttiioonn Stevie Sacks, an executive of a leader IT service management supplier prepared a study in 2004 about IT cost reduction (years before the current economic crisis). The study started as the following: “In an economic climate of slow and cautious growth, IT is under intense pressure to manage costs and ensure that spending is well aligned with business drivers” (Sacks, 2004). If these thoughts were true in 2004, in the area of slow and cautious growth, how should be information technology managed during downturn?

An economic downturn always creates the pres-sure for organisations to rethink their operations. There are already several studies and analysis on managing critical situations (e.g. Nunes et al, 2009; Rhodes-Stelter, 2009; Williamson-Zeng, 2009).

Conclusions of these studies suggest traditional solutions, that are useful in any economic climate: cost reduction, conscious debt management, analy-sis of customer behaviour, reducing organisational complexity, increase the visibility of organisational processes. Bőgel (2009) summarises these advices as the following: “...take the issues seriously, you have not take before. Do, what you have not done”.

Although there are several possible solutions, organisations started to concentrate on cost cutting issues, stop investments, developments and hires. The question is, whether these actions will increase the efficiency of the organisations, and what will happen, when the crisis is over?

Through stopping developments inside, and postponing strategy executions, organisations are not able to enhance their productivity, and while the world is changing, these organisations have no an-

Page 51: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Efficient ERP Solutions����

SEFBIS Journal 2009 No. 4 51

swer to the present and future challenges. Of course organisations should decide wisely where to put the money in these times, but they have to consider both short-term and long-term investments.

The pressure of the crisis is also a good oppor-tunity to reconsider the current practice of the or-ganisation: Are we doing everything perfectly? In which points can we enhance our practice? Where are the bottlenecks? Are our resources used effi-ciently and effectively?

VVaalluuee ooff IITT iinn ddoowwnnttuurrnn In order to understand the role of information technology, especially the role during downturn, its value creating function of information technology should be explored. Each business unit in an en-terprise has different requirements on IT support, therefore through the standardisation of IT services this unique advantage can be lost. In order to avoid losing flexibility, every business unit, and every business service requires unique analysis of the problems that will provide an added value (Mar-waha-Willmott, 2006):

– Cost reduction: Typically in case of transac-tion-dependent activities, e.g. back-office activi-ties. In this case economies of scale can be achieved, and standardisation is usually not a problem. Centralised ERP systems, central procurement systems, business process man-agement solutions can provide cost reduction.

– Enhancing time-to-market ratio, or quality: It is hard to apply standard solutions in this field, IT investments are evaluated based on the con-tribution to the business, but IT solutions can create new, and more efficient ways for produc-tion, marketing, customer analysis and for al-ternative distribution channels.

– Business innovation with IT: Should be managed as a separate unit in an organisation or as an integrated subsidiary. Because innova-tion, research and development activities in-clude high level of risk, and success rate is very low, these areas can not be managed as any other business unit, or part of any business unit. Moreover: while IT efficiency can be achieved by

any organisation, innovative use of information technology is rare (Sevillia, Monnoyer, 2008).

Offered IT services should be based on the organ-isational IT strategy, that sets good basis for any operational, but especially for the development activities. During strategic review, analysis of every service is required in order to explore the widely accepted and used solutions. If standardisation is available, these services should be transformed into a cost-effective mass-service, and concentrate on other business services with unique IT solutions.

During development of the IT service portfolio, every business requirements should be analysed uniquely. Based on the analysis phase, the IT ser-vice portfolio should include both centralised stan-dard services and unique, innovative services and projects for business units. The analysis provides also a good basis for the priorising of IT resources. Centralised solutions, based on the IT strategy have importance even in case of tailormade solutions through providing a common technological back-ground, infrastructure, guidelines for vendor man-agement, or platforms.

The question is, whether these basic guidelines on using information technology and developing a service portfolio are useable during downturn?

IT costs consist of operational and development costs. If operational costs are reduced, the opera-tional quality may be endangered. If development costs are cut, future business opportunities will be delayed, and critical capabilities will be missing to support business. For conscious cost cutting IT and business have to work together to prioritise future developments and consider the business case be-hind expectations.

Moreover, IT investments can create more value than any saving gained from cost cutting (Kaplan et al, 2008). Top of that, in several companies IT is successfully integrated with business processes, and cost cutting became highly complicated. It is also time for efficiency development: rationalising IT processes, standardisation and applying best prac-tices. If a company does not have visible IT proc-esses, it is high time to develop them, based on ITIL, and reduce costs based on CobIT.

Page 52: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� The Challenge of IT Donwturn

52 SEFBIS Journal 2009. No.4.

Another question is how technology trends and developments in the near future can provide new opportunities for introducing new solutions? The pressure on the IT departments for cost reduction and enhanced efficiency will increase, therefore the question of sourcing solutions (insourcing, out-sourcing, co-sourcing, partnerships, KPOs, service centers, etc.) will arise with the expectation of fast solutions. (Spang, 2009). Decision makers should consider, that any cost cutting on IT will have impact even in the next month, while enhancements re-quire 6-18 months.

Planning the IT budget for a year or securing additional resources for development projects was always hard for CIOs, because the financial back-ground and clear financial benefits of IT develop-ments were far from clear. In downturn we should see this challenge as an opportunity: CIOs should present the expected results based on hard evi-dence and facts, and it pressures IT departments to manage IT in a more conscious basis. The compe-tition for internal resources will increase, and even in radical situations the whole IT budget for devel-opment will be erased, and transformed into part of the budget of business units (Spang, 2009). Seems to be dangerous, but thinking positively it results a tighter cooperation between IT and business, and new developments will be perceived as business, and not as IT projects.

CCuuttttiinngg IITT CCoossttss Cutting IT costs are usually one of the first areas, that seems to be promising for business areas. In the following, the main cost factors of an IT de-partment are identified, especially concentrating on the cost cutting and optimisation possibilities, both in the areas of operations and development.

OOppeerraattiioonn ccoossttss Operation costs related to providing IT services and business as usual, concentrating to the manage-ment of existing services, and the background in-frastructure. The main cost categories are: human resources, licence fees, public utilities (like electric-ity), renting fees, background materials (like a

printer toner), security tools, etc. In the following the main cost cutting possibilities are analysed. – Human resources: Although operating an IT infra-

structure demands high cost level itself, human resources take serious part of the budget. The first idea for reducing costs is the optimisation of hu-man resources, meaning considering layoffs, or stopping new hires. If these steps are based on a conscious analysis, and performed together with the optimisation of operational processes, the re-sults can be promising. But without a wellgrounded plan, layoffs can result declining work efficiency, overloaded workforce, or increasing number of mistakes.

– Process management: In order to provide visible, controllable IT operations, process management is the first step for any further enhancement. Ex-ploring and modelling the processes themselves is a good basis for performance development, be-cause executives can see a clear structure of ac-tivities and required resources. Recorded proc-esses create a clear responsibility and account-ability structure, therefore it is a good basis for human resource optimisation. For IT process management international best practices, like ITIL, MOF or eSCM are a good basis to start with.

– Conscious supplier management: Organisations tend to follow a low-risk, conservative supplier policy, meaning maintaining long-term partnership with existing, good performing suppliers. Over the time, as a supplier builds strongly in daily opera-tions, this long term relationship results a high level of dependency on existing partners. In these situations the supplier has power to raise prices. In a more conscious supplier management ap-proach, suppliers should be selected along with the goals of the information strategy, considering long term risks and benefits.

– Sourcing models: For reducing operation costs, business decision makers usually consider the option of changing the sourcing model for IT services, reorganising the IT department into an internal or external centralised service centre, or outsourcing the whole function. Although these options can result a significant cost reduction, based on the mass-efficiency, these approaches

Page 53: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Efficient ERP Solutions����

SEFBIS Journal 2009 No. 4 53

cannot provide a universal solution. Partly or fully outsourcing services, or centralising func-tion are mostly efficient in case of services that are easy to standardise, and flexibility is not the first priority. Moreover, the results of these models in cost will appear only in medium term, although these cost cuttings have long term impact. The challenge of these decisions is that outsourcing of an unorganised internal operation can not be changed in a few days, but it can cause additional costs in short term. To prevent this trap, prior changing the sourcing model process and service optimisation is necessary.

– Reducing losses, managing risks: Operational risks can cause serious losses for every organi-sation, and IT services are strongly vulnerable. Identifying and assessing risks is a good basis for risk management efforts, to prevent future losses. These efforts should consider the costs of risk management against expected losses, and approaches should target the main risk categories.

– Operation optimisation: Organisations maintain several IT services that are rarely used, and do pay for licenses and supports that are never used. In order to reduce costs the assessment of these services should be performed, analysing the rate and intensity of usage, business impact of a service, and real business requirements. Services, and the required infrastructure can be evaluated based on these assessments, and existing capacities can be used for more im-portant services. Moreover, based on the new-est technologies, like virtual servers, or central-ised services, additional costs can be spared.

DDeevveellooppmmeenntt ccoossttss aanndd iinnnnoovvaattiioonn Comparing to operations, developments concen-trate on creating new projects for business advan-tage. Developments are organised and managed in projects, with dedicated resources, time limits and clear expectations. Unfortunately the success rate and effectiveness of IT projects is rather challenging in every industry, and with more conscious project management efforts, significant cost reduction can be achieved. During downturn, the risk of stopping

or reducing the number of development projects becomes high that results static IT and business capabilities. Main areas for a more conscious management of innovation are the following: – Specify business demands: Changing business

requirements during a project, especially in the second part of projects can result in significant and increasing level of additional costs. Busi-ness requirements should be explored and re-corded in the early phases of a project, to avoid unnecessary changes. Unfortunately, decision makers try to reduce projects cost on reducing the resources and time for these specification efforts. A good requirement specification can reach 25-35% of project costs and 30-50% of project time. As development reaches newer and newer stages, any change in the require-ments results in exponentially increasing costs, and can result a multiple level of project costs and time comparing to the original baseline.

– Conscious project management: There is a strong inverse correlation between project suc-cess and project complexity (project length, developed functions, impacted units, etc.). Re-ducing project risk (and costs) is to reduce the complexity of the projects through dividing pro-ject goals into independent segments, and managing more, but smaller projects. Another tool is to prepare regular milestones to check project health. With these simple efforts, projects become more controllable, and problems can be identified earlier, giving a chance to intervene.

– Unnecessary developments: A regular problem is the development of already existing solutions in organisations. The problem is not counting the existing capacities and capabilities. Why should a billing system be changed, if the existing one is working perfectly? A telecom company wanted to acquire a service management tool in a de-velopment project. The company selected a well-known, international supplier, and during the preparatory phase this supplier suggested to check the existing software the telecom com-pany already has, because a few years ago they bought already licences. The supplier manager did not know this fact, and after checking the existing licences that can be also used for ser-

Page 54: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� The Challenge of IT Donwturn

54 SEFBIS Journal 2009. No.4.

vice management, the telecom company had to spend less on this procurement.

– Project business case: Although IT developments are usually hard to justify, and in order to secure development budget both business and IT de-partments have to provide clear calculations about the business costs and expected benefits of developments. Although calculations cannot be perfect, efforts on creating a business case provides a better understanding of business ex-pectations and IT possibilities, and helps to filter the not-viable solutions. This approach is a pro-active risk (and cost) reduction solution.

– Open source solutions: Several companies ex-clude the use of open-source solutions, that could cost only a fraction of other tools. Using open-source solutions does not mean free solutions, but considering the TCO (total cost of ownership) calculations, and the expected functionality, it can be a good alternative of traditional programmes.

RReesseeaarrcchh bbaacckkggrroouunndd This paper presents the findings of a research on IT challenges, performed among the Hungarian IT ser-vice management applying companies in the first half of 2009, concentrating on downturn issues. Re-search data were collected through anonymous questionnaires, and complemented with case study findings. The questionnaires were filled voluntarily, mostly by mid-level IT executives and IT employees.

The target sample consists of organisations that have critical IT infrastructure, and the do plan or currently use IT service management solutions, therefore they are valid representatives of the Hungarian information management practitioners. 15% of the organisations are micro or small enterprise, 20% are medium-sized enterprise, and 65% of them are largesized enter-prises. Organisations both represent the public sector (35%) and the private sector (65%).

RReesseeaarrcchh FFiinnddiinnggss oonn CCoosstt RReedduuccttiioonn The practice of information technology is mostly one the first areas, where executives try to start cost cutting (Spang, 2009): providing IT and business services demands high operational costs, but the return of IT services is hard to measure. IT de-partments continuously face the extreme challenge of showing the value of their work, but failing this challenge means, that business customers perceive information technology as a rather expensive, but mostly useless area, and results increased interest of cutting IT costs. Based on our research findings the crisis already reached the IT departments. Every researched organisation reported several measures in the area of IT to reduce costs. Other surveys (Worthen, 2008) already indicated preliminary cost reduction activities: The CIO Executive Board polled its members, 59% of the surveyed CIOs already started negotiations to change parameters of the existing supplier contracts, and 61% of them started to rethink the actual IT budget.

0,00%

20,00%

40,00%

60,00%

80,00%

100,00%

Not expected

Planned

Already accomplished

Figure 6-1. Short term crisis measures ordered by accomplished actions (Research findings)

Page 55: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Efficient ERP Solutions����

SEFBIS Journal 2009 No. 4 55

SShhoorrtt tteerrmm ccoosstt rreedduuccttiioonn Our survey shows, that first measures concentrate on stopping as much thing, as possible, to recon-sider the status and possibilities of the IT Depart-ment (see Figure 6-1). IT departments identified the huge cost group of human resources: the most popular measure was stopping to hire any new employee to the IT departments, indicated by over 68% of the respondents, but layoffs started only in less than quarter of the companies, and only less than 18% of the organizations started to reduce the salaries of IT employees. Although salaries and other allowances create huge cost for organiza-tions, companies plan to wait, instead of intervening in this area. If further short term plans are analyzed, measures on human costs are the least wanted actions, comparing to other activities.

The crisis has strong impact on a TOP5 Hun-garian Bank. Because of the organization-wide cost cutting expectation (driven by the multinational parent-bank), several investments and develop-ments had to be stopped. It has serious impact on the IT department, because a deep transformation project was on the way, that expected to have im-

pact on the performance and long term operation costs of the whole IT department. The IT depart-ment managed to accomplish several short term cost cutting actions successfully, but whole, and part budgets were decreased. The bank has chosen the surviving strategy: beside ongoing develop-ments, every new innovation was stopped. These measures have short term impact on costs, but in medium term the expected solutions will be missed, and will have negative impact on incomes. Bank employees hope that after these times of rigorous budgets, with newer solutions they will be able to close the gap that arises in the following months and years. Following the international trends, CIOs concentrate on postponing procurements (espe-cially hardware and software), stopping or limiting already running developments. Almost half of the respondents reported postponed procurements, but together with short term plans almost 95% of the companies is using this tool. Almost the third of the organisations stopped or limited already the de-velopment projects but with the short term plans almost 90% of the respondents use this approach.

0,00%10,00%20,00%30,00%40,00%50,00%60,00%70,00%80,00%90,00%

100,00%

Planned

Already accomlished

Figure 6-2. Planned and already accomplished short term crisis measures (Research Findings)

Renegotiating contracts and future plans with sup-pliers and consultants requires the cooperation of both parties. Suppliers can try to resist to customer demands, but risking their long term partnerships, and the renewing of their contracts, therefore they are leaning towards finding a compromise. A little more than 40% of the companies already started

the negotiation, which shows that Hungarian com-panies are behind the international trends (com-paring to the international 58% at the end of 2008). Considering the planned actions, almost 90% of the companies will start negotiations with suppliers in this year, which makes the third popular measure in this survey.

Page 56: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� The Challenge of IT Donwturn

56 SEFBIS Journal 2009. No.4.

Consultants are in a little better position: Only 20% of the companies suspended the consulting projects, that mirrors the results of another international sur-vey (Sevillia-Monnoyer, 2008), in which consultants were evaluated as the most value adding players among external IT suppliers, while contractor agen-cies and hardware providers were the least recog-nised among CIOs. Consultants cannot be happy, because with the short term plans, altogether 55% of the companies try to cut costs on them.

LLoonngg tteerrmm ppllaannss In longer terms, organisations consider several other options that require a more conscious preparation, and have no immediate impact on costs (see Figure 6-3). Following the pre-crisis trends operation opti-misation efforts are the most popular solutions: or-

ganisations continuously look for new technologies and solutions to exploit their existing infrastructure, or to achieve higher service levels with lower costs. A little over 72% of the respondents plan to concentrate on operation optimisation. Process management, especially BPR was one of the magic concepts in the 1990s (Davenport-Short, 1990; Hammer, 1990). The approach passed the peak of inflated expectations and finally reached its maturity to be a productivity tool. Unfortunately process management creates a less flexible, but more controllable environment. In IT departments employees are not good in following rules and policies, but the complexity of IT depart-ments demand these efforts, and more than 60% of the companies plan to investigate this opportunity, especially in the IT department.

.

0,00%

10,00%

20,00%

30,00%

40,00%

50,00%

60,00%

70,00%

80,00%

Operation

optimisation

Process

management

Development

of IT Service

Management

Changing

sourcing

models

Developing

project

management

Using open-

soruce

solutions

IT risk

management

Figure 6-3. Planned actions to reduce cost in long term (Research findings)

The development of IT Service Management prac-tices is in the mind of more and more Hungarian IT employee, especially if it is a basic expectation of employment. Unfortunately in practice only a few key processes are used daily, especially in the field of operations. Although the international best practices (ITIL, MOF, eSCM, etc.) cover the whole life-cycle of IT activities; covering IT strategy, planning, devel-opments, deployment, operations and improvement; Hungarian companies mostly concentrate on opera-tions (service desk, incident and problem manage-ment, demand management, etc), and developments

are slow. Although these challenges, half of the companies plan to expand or start their IT service management practice, expecting a more conscious and cost effective IT operation.

The crisis increased the interest on alternative sourcing models. The interest shown in this survey will not result change in the sourcing models neces-sarily, but the interest of almost 45% of the res-pondents show, that in the current economic situation companies do look for alternative solutions, espe-cially to share the risk of operations.

Page 57: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Efficient ERP Solutions����

SEFBIS Journal 2009 No. 4 57

Project management issues were already men-tioned among the short term cost cutting efforts, but as third of the respondents see, more conscious project management efforts have also long-term impact on cost and effectiveness. Efforts include creating centralised project offices, project man-agement teams, methodologies, trainings and support tools.

At the end of the list 16,7% of the respondents plan to consider open-source investments, partly because the promising total cost of ownership (TCO), and partly because of the reliability of spe-cial applications that became industry standards. Partly surprising, that plan for IT risk management is the least important issue, but we should take into consideration, that IT risk management, especially IT security issues are already part of the daily prac-tice in almost every organisation at least in a basic level, and in more than 40% of the respondents in a conscious level, and companies do not expect fur-ther cost reductions because of these actions.

CCoonncclluussiioonnss Although the identified long term cost cutting plans can be independent of the current crisis, the economic downturn pressured organisations to rethink their current practices, and to speed up the promising de-velopments. IT departments decided on several short term solutions, navigating themselves into a stasis, and waiting for better times. Only a few organisations were able to see the big picture and try to harmonise business and IT goals.

Beside short term cost cutting, another TOP5 Hungarian Bank started a long lasting cost reduction project. In the first part of the project financial data is analysed in order to identify possible overspendings, comparing to international and local benchmarks. In the second step (partly parallel with the financial analysis) international best practices are collected for cost cutting, and not only for IT departments, but also for the business units, but concentrating on IT solu-tions. In the final step the results, demands and pos-sibilities are synthesized and clear development pri-orities are set. In this case the business and IT side should work strongly together to identify the role of information technology in business processes that is a

key for long term cost reduction, while maintaining user satisfaction. Environments, where operational costs have a high share in the IT budgets, short term solutions have only limited impacts. In order the achieve enduring results, long term solutions (process management, optimisation, IT service management) efforts should be applied. Beside the popular cost cutting efforts, the value creation capability of IT de-partments should be also taken into account. If costs are reduced along with decreasing performance, there is no benefit on company level. In order to un-derstand these benefits, the business areas (and so the IT department) should understand the value chain and the cost structure of IT supported business ser-vices. The forthcoming months and years provide a great challenge for IT departments and CIOs: opera-tional efficiency and showing business value was never as important as it is now. IT departments should achieve results in a climate where cost cutting is a priority, and the business side leans to forget the im-portance of IT services and innovation.

RReeffeerreenncceess [1] Bőgel, Gy. (2009) Vezetés válság idején, in: IT

lábjegyzet, 24 February 2009, http://www0.kfki.com/blog_8E210F31B2AC45668D7C83CB0FFFFB33.php?blogId=1269%234c1e7e3# (accessed: 15.03.2009.)

[2] Cramm, S. (2008) Smaller IT Budget? Pursue Value-Driven Development, in: Having IT your way – HBR Voices, November 20, http://blogs.har vardbusiness.org/hbr/cramm/2008/11/valuedriven -development.html (accessed: 23.06.2009)

[3] Davenport, T.H. & Short, J.E. (1990 Summer). The New Industrial Engineering: Information Technol-ogy and Business Process Redesign, in: Sloan Management Review, pp. 11-27.

[4] Hammer, M. (1990, July-August). Reengineering Work: Don't Automate, Obliterate, in: Harvard Business Review, pp. 104-112.

[5] Kaplan, J.M. - Roberts, R.P. - Sikes, J. (2008) Managing IT in a downturn, in. McKinsey Quarterly, 2008 Fall, pp. 66-71.

[6] Marwaha, S. - Willmott, P. (2006) Managing IT for scale, speed and innovation, in: McKinsey Quar-terly, 2006 Fall, pp14-21.

[7] Nunes, P.F. - Firstbrook, C. - Ellis, J.M. (2009) New choices for new challenges, in: Outlook, 2009, No.1. January, pp. 1-9.

Page 58: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� Information Security Governance of EIS

58 SEFBIS Journal 2009. No.4.

[8] Rhodes, D. - Stelter, D. (2009) Seize Advantage in a Downturn, in: Harvard Business Review, 2009 February, pp. 50-58.

[9] Sacks, S. (2004) Ten Steps to Modifying User Behavior and Reducing IT Costs, in: Computer-world, 2004 October 25

[10] Sevillia, O. – Monnoyer, E. (2008) The Role of the IT Function in Business Innovation, Innovator vs Operator, Global CIO Survey 2008, Cap Gemini

[11] Spang, S. (2009) Five Trends that will shape

business technology in 2009, in: McKinsey Quar-terly, 2009 February, http://www.mckinseyquar terly.com/Five_trends_that_will_shape_business_technology_in_2009_2296 (accessed: 05.03.2009.)

[12] Williamson, P.J. - Zeng, M. (2009) Value-for-Money Strategies for Recession Times, in: Harvard Busi-ness Review, 2009 March, pp. 66-74.

[13] Worthen, B. (2008) Tech Budgets Become a Victim of the Credit Crunch, in: Wall Street Journal - Business Technology, October 1.

Peter FEHER has got their diploma with specialty of Information Management at the Budapest Corvinus University in 2000, and obtained a PhD degree in 2005. Before gaining his job as associate professor at the same University, he continued studies in Germany (University of Padernborn, 1999), in France (HEC, 2001) and in United Kingdom (Kingston Business School, 2003). The focus of his research is project con-trolling, knowledge, risks, IT-services and project management. He is member of the John von Neumann Computer Society, the Project Management Alliance. He is the editor of the Electronic Journal of Knowledge Management. His highest Hungarian acknowledges with that Peter Feher was awarded for his effective work is the „Pro-fessor Award of the Year” in 2006.

7. Information Security Governance of EIS IInnffoorrmmaattiioonn SSeeccuurriittyy GGoovveerrnnaannccee ooff EEIISS::

aa UUnniitteedd SSttaatteess PPeerrssppeeccttiivvee

BENJAMIN KS KHOO New York Institute of Technology, USA

eMail: [email protected]

Enterprises are now operating in the network economy. The network economy is dependent on the information infrastructure via the Internet. Organizations of all types (business, academia, government, etc.) are facing risks resulting from their ever-increasing reliance on the information infrastructure. Because of this, the US govern-ment implemented a number of National Security Presidential Directives (NSPD) and legislations to secure cyberspace. This paper will examine the issue of Information Security Governance (ISG) of an enterprise in-formation system as a pro-active way of mitigating these risks which can be framed to meet legislations, show due diligence and continuous process monitoring.

IInnttrroodduuccttiioonn The technological explosion of the Internet in the late 1980s and early 1990s has resulted in a paradigm shift that has affected all aspects of our lives; an emerging trend is a movement toward network cen-tric computing. The term Enterprise Information Systems (EIS) is used to refer to the enterprise wide computer-based systems that gather and store data,

process information and generate reports for man-agement. EIS are now operating in the network economy with expansion to the external stake-holders. he network economy is dependent on the information infrastructure. Each day millions of dol-lars of business transactions and many com-munication channels flow through the information infrastructure via the Internet. Organizations of all

Page 59: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Efficient ERP Solutions����

SEFBIS Journal 2009 No. 4 59

types (business, academia, government, etc.) are facing risks resulting from their ever-increasing reli-ance on the information infrastructure. Businesses, government, and non-profit institutions have been found wanting in information security. The high risks in cyberspace needs to be mitigated and managed. Because of this, the USA government implemented a number of National Security Presidential Directives (NSPD) and legislations to secure cyberspace. In-formation Security Governance (ISG) is a pro-active way of mitigating these risks. This paper will exam-ine the issue of Information Security Governance of an enterprise information system at various levels of management and its relationship to the legislations. It will discuss the ISG framework, its implementation and finally, how they can be framed to meet legisla-tions to show due diligence and continuous process monitoring.

CCuurrrreenntt SSeeccuurriittyy GGoovveerrnnaannccee Businesses and organizations in the US have come to the realization that security is more than just a technical issue (Allen, 2006). Leaders at the high-est level of businesses, organizations and gov-ernments are coming to realize that effective secu-rity in today’s network economy requires securing the confidentiality, integrity and availability of in-formation assets in four dimensions – the technical (hardware and software), physical (media, building, equipment, etc), organizational (IT alignment, struc-ture, corporate governance, legal, etc) and manage-rial (policies, procedures, etc) aspects of the asset.

This paradigm shift has elevated information security to the upper echelon of corporate manage-ment as an enterprise-wide issue. Information se-curity is now a business problem. The enterprise will have to utilize all the available resources to manage the security risks and make information security a core part of business operations by integrating it into the existing internal controls and policies that constitute corporate governance. Quoting F. William Conner, Chairman, CEO and President, Entrust Inc. (Entrust, 2004):

“By integrating information security into our corpo-rate governance processes, we can allow for the

deep integration with customers, suppliers, partners

and other stakeholders that is so important to the extended enterprise, while protecting the critical

infrastructure that is a cornerstone of our homeland security.“

Information Security Governance (ISG) is a subset of corporate governance that relates to the security of information systems. (Allen, 2005) defined “gov-erning for enterprise security” as:

– directing and controlling an organization to es-tablish and sustain a culture of security in the organization’s conduct (beliefs, behaviors, ca-pabilities and actions)

– treating adequate security as a non-negotiable requirement of being in business

The huge volume of business transactions that are processed through the information infrastructure via the Internet makes it a prime target for online crimin-als. The confidentiality, integrity and availability of information assets, the privacy of individuals, the accountability and integrity of the transactions are threatened. As a result, the USA government im-plemented a number of National Security Presi-dential Directives (NSPD) and legislations to secure cyberspace.

As the 21st century gets more competitive, busi-nesses, governments and organizations continue to push the envelope of the extended enterprise by extending deeper access to their information assets and services while at the same time balancing their compliance with the myriad legislations around in-formation privacy and corporate governance. Se-cure information systems provide the support for maintaining the balance (Entrust, 2004). See Figure Figure 7-1. Cyberspace cannot be secured just by depending on government officials or CIOs. Or-ganizations must elevate the issue to a corporate governance priority in order to systematically streng-then information security at all levels of the organi-zation. Boards and CEOs who treat it as corporate governance issue best address US information se-curity; this resulted in the formation of the Corporate Governance Task Force in December 2003. Its goal is to develop and promote a coherent governance framework to drive implementation of effective in-formation security programs. Information security is a governance challenge that involves risk manage-

Page 60: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� Information Security Governance of EIS

60 SEFBIS Journal 2009. No.4.

ment, reporting and accountability from top-level executive management. This private sector Corpo-rate Governance Task Force subsequently devel-oped a framework for organizations to improve ISG on a voluntary basis. The ISG framework was documented in the report (CGTF, 2004), “Information Security Governance: A Call to Action”, released in April 2004 and is available online at http://www. cy-berpartnership.org. This report recommended an ISG framework that facilitates organizational self-evaluation and mitigation of information security issues while complying with various legislations.

Figure 7-1. Balancing the Extended Enterprise with

Governance and Regulation

IISSGG FFrraammeewwoorrkk The ISG framework includes recommendations and tools that will enable organizations to create or im-prove their ISG. This framework will enable organi-zations to enhance the process of securing informa-tion systems, complying with regulations, increasing business process efficiency and strengthening homeland security. (CGTF, 2004)

The ISG framework provides guidelines to en-sure “the effectiveness of information security con-trols over information resources; to provide effective management and oversight of the related informa-tion security risks; to provide for development and maintenance of minimum controls required to pro-tect an organization’s information and information systems, and; to provide a mechanism for oversight of the information security program.” (CGTF, 2004, p. 12). The major elements of the ISG framework include (CGTF, 2004): – Organizational Responsibilities and Authority:

Describes the significant role each member of

an organization plays in ISG, from the Board of Directors/Trustees to the employees.

– Information Security Program Components: De-scribes the essential components of an informa-tion security program, with detailed guidance specified in the security practices based on ac-cepted international standards like ISO/IEC 27001/BS17799, Committee of Sponsoring Or-ganizations of the Treadway Commission (COSO) Internal Controls-Integrated Framework and Control Objectives for Information and Related Technology (COBIT®). This includes assess-ment, policies and procedures, training, testing, remediation of risks, detection and response to incidents and business continuity planning.

– Reporting and Independent Evaluation Recom-mendations: Describes how each independent organizational unit should assess, remediate and report on its information security program including the contents, frequency and audience for reporting to satisfy governance oversight requirements. In addition, if appropriate, each year an independent information security pro-gram evaluation should be completed in accor-dance with generally accepted auditing stan-dards and the results reported to the Board of Directors/Trustees.

IISSGG FFrraammeewwoorrkk IImmpplleemmeennttaattiioonn As the ISG framework is new to most organizations, it is recommended that the IDEAL model which was developed by Carnegie Mellon University’s Software Engineering Institute, would be a beneficial model for organizations when adapting and implementing the framework and assessment tool for use within their own organizational structures (CGTF, 2004). The model serves as a roadmap for initiating, planning and implementing improvement actions shown in Figure 7-2. The IDEAL model is named for the five phases it describes: Initiating, Diagnosing, Establishing, Acting and Learning. Associated with the IDEAL Model is an ISG assessment tool when properly implemented by organizations will facilitate the incorporation of information security into an organization’s corporate governance structure.

Page 61: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Efficient ERP Solutions����

SEFBIS Journal 2009 No. 4 61

Figure 7-2. IDEAL Model Activities

IISSGG AAsssseessssmmeenntt TTooooll The ISG Assessment Tool is developed to support the ISG framework. The tool is intended to help organi-zations determine the degree to which they have im-plemented an ISG framework. The ISG assessment tool is divided into four sections (CGTF, 2004):

– Business Dependency: Measures an organi-zation’s reliance on information technology for business continuity as well as the degree of sector interdependency and regulation.

– Risk Management: Evaluates the risk man-agement process as it relates to creating infor-mation securing strategy and program.

– People: Evaluates the organizational aspects of the information security program.

– Processes: Identify the processes that should be part of an information security program. The threats to the information infrastructure have resulted in the US government implementing new legislations to address those threats. Leg-islations can be logically separated into criminal laws and laws implementing security require-ments for critical infrastructure. The ISG frame-work provides a platform to develop metrics to assess an organization’s compliance to the legislations and show due diligence and con-tinuous process monitoring.

LLeeggiissllaattiioonnss The advent of the Internet has blurred the traditional borders between states and nations. People of every nation are now able to interact on a daily basis. The use of the Internet to facilitate trans-border commerce provides Congress with the power to establish Federal legislation defining le-gally acceptable behaviour involving computers and information technology (United States Constitution,

Article I). The use of the Internet for interstate and international communication requires that informa-tion security professionals are aware of legislation affecting network security (Robinson, 2003a). The US government’s legislation regulates either criminal activity or national defence in information security. There are two definitions of the term “computer crime”: (1) the use of a computer by a criminal to conduct illegal activity or (2) a computer as the target of illegal activity (Robinson, 2003c). Congress has instituted Federal legislations regulating criminal activity involving information technology in an at-tempt to address these two facets of computer crime including the: Computer Fraud and Abuse Act, Elec-tronic Communications Protection Act, Digital Mil-lennium Copyright Act, Anti-Cyber Squatting Con-sumer Protection Act, CAN-SPAM Act, and Com-munications Decency Act.

National defense in information security legis-lations implemented include Gramm -Leach-Bailey (GLB) Act and Sarbanes-Oxley Act for the financial industry; Health Insurance Portability and Account-ability Act, Personal Health Information Act (PHIA) for the health care services; Organization for Eco-nomic Cooperation and Development (OECD) Pri-vacy, Cryptographic and Security Guidelines, and Privacy Act – USA for privacy; and Federal Informa-tion Security Management Act (FISMA), Homeland Security Presidential Directives (HSPDs), North American Electronic Council (NERC) Cyber Security Standards and the Patriot Act for homeland security.

The Sarbanes-Oxley Act of 2002 is of particular interest because it mandates stronger internal cont-rols and institutes personal liability for executives of companies that are publicly traded in the United States. It is important note that the work required to meet the Sarbanes-Oxley requirements not only ensures compliance but is an opportunity to establish strong governance models that ensure account-ability, responsiveness to business needs and com-petitive advantage (Damianides, 2005).

MMoovviinngg FFoorrwwaarrdd Embarking on an enterprise information security governance program (ESP) and acting on the tasks in the ISG framework requires tenacity and perse-verance. There will be significant challenges along

Page 62: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� Information Security Governance of EIS

62 SEFBIS Journal 2009. No.4.

the way and may occur at all levels of the organi-zation and throughout all phases of the ESP. Some challenges to consider often include: appreciating the enterprise-wide nature of the security problem, establishing the proper organizational structure and segregation of duties, overcoming the lack of a game plan, understanding complex global legal compliance requirements and liability risks, as-sessing security risks and the magnitude of harm to the organization, determining and justifying appro-priate levels of resources and investment, dealing with the intangible nature of security, reconciling inconsistent deployment of security best practices and standards and overcoming difficulties in creat-ing and sustaining a security-aware culture. The effectiveness of the ESP is enhanced if enterprises understand, anticipate and response to these challenges.

RReeffeerreenncceess [1] (AESRM, 2005) The Alliance for Enterprise Secu-

rity Risk Management. "Convergence of Enterprise Security Organizations." Booz Allen Hamilton, November 8, 2005.

[2] (Allen, 2005) Allen, Julia H. "Governing for Enter-prise Security." (CMU/SEI-2005-TN-023). Pitts-burgh, PA: Software Engineering Institute, Carne-gie Mellon University, June 2005.

[3] (Allen 2006) Allen, Julia H. "Security Is Not Just a Technical Issue.” Build Security In web site, De-partment of Homeland Security, October 2006. Retrieved June 27, 2009, https://buildsecurityin. us-cert.gov/daisy/bsi/articles/best-practices/management/563.html.

[4] (Allen, 2007) Allen, Julia H. “Governing for Enter-prise Security.” CERT.org, February 2007.

[5] (Caralli, 2004) Caralli, Richard. "Managing for Enterprise Security" (CMU/SEI-2004-TN-046). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, December 2004.

[6] (CGTF, 2004) “Information Security Governance: A Call to Action”, Corporate Governance Task Force, April 2004. Retrieved June 20, 2009, from http://www.cyberpartnership.org.

[7] (Damianides, 2005) Damianides, Marios. “Sar-banes-Oxley and IT Governance: New Guidance on IT Control and Compliance.” Information Sys-tems Management, Winter

[8] (Entrust, 2004) Entrust Inc. “Information Security Governance (ISG): An Essential Element of Cor-porate Governance.” April 2004.

[9] (Herrmann, 2007) Herrmann, Debra S., “Complete Guide to Security and Privacy Metrics,” Auerbach Publications, 2007.

[10] (Robinson, 2003a) Robinson, S. (02.02.2003.) “U.S. Information Security Law, Part 1.” 06.27.2009, http://www.securityfocus.com/infocus/1669.

[11] (Robinson, 2003b) Robinson, S. (April 1, 2003.) “U.S. Information Security Law, Part 2.” 06. 27, 2009, from http://www.securityfocus.com/infocus/1681.

[12] (Robinson, 2003c) Robinson, S. (May 12, 2003.) “U.S. Information Security Law, Part 3.” Retrieved June 27, 2009, from http://www.securityfocus.com/infocus/1693.

[13] (Robinson, 2003d) Robinson, S. (July 9, 2003.) “U.S. Information Security Law, Part Four.” 06.27, 2009, http://www.securityfocus.com/infocus/1710.

[14] (Steven, 2006) Steven, John. "Adopting an En-terprise Software Security Framework.” IEEE Security & Privacy, IEEE CS, March/April 2006.

[15] (United States Constitution, Article I) Retrieved June 27, 2009, from http://www.law.cornell.edu/ constitution/constitution.articlei.html#section8.

Benjamin KHOO completed his Ph.D at the University of Maryland, Baltimore County. He is a member of two honor-societies and was awarded the Phi Kappa Phi Disser-tation Research Grant. He has published regularly in the major information systems journals. His areas of interests are Information Systems Development (including Web-based Systems), Electronic Commerce, Security, Management Issues in Infor-mation Technology, Human Computer Interaction and Pedagogy. He is interested in both basic and applied research to further the effectiveness, usability, and ultimately the utility of information systems; and the pedagogical issues related to these areas. Prior to becoming an academician, he was a member of the Technical Staff Software Engineer of a large telecommunication corporation.

Page 63: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Human-Social Approach����

SEFBIS Journal 2009 No. 4 63

Human-Social Approach

8. Software like an Understanding Friend CChhaalllleennggeess aanndd PPiittffaallllss ooff LLooccaalliizzaattiioonn

GERHARD CHROUST Johannes Kepler University Linz, Austria

eMail: [email protected]

The ubiquity of Information and Communications Technologies requires software products to be offered on a global scale. Consequently, software providers have to market and sell software products in many different countries, bringing different people into direct (often unexpected) contact with computerized interfaces. Potential customers expect the software product not only ’to speak their language’ but also to show a pattern of behaviour which is compatible with their cultural expectations and predispositions. They expect reactions from a software product in the manner of an "understanding, well-meaning friend". This involves a great deal more than a pure language translation: it implies the transfer of the software product into a different cultural environment taking into account all aspects of cultural divergence. We speak of localization. In this paper, we identify seven localization layers of increasing cultural sensitivity and dependency, from infrastructural to social issues. We discuss their interdependence and issues of technical implementation. Additionally we introduce examples of problems, pitfalls and embarrassments.

MMoottiivvaattiioonn Today practically every product showing a minimal sophistication contains large amounts of software: we call them software-intensive systems [Kossia-koff-03]. They are systems where software provides an integral and essential part of functionality without necessarily being noticed from the outside. Today an ever increasing number of people use such software- intensive products, often without the necessary pre-knowledge about software, also not in- tending to get acquainted with the "computer’s way of thinking". These users only want to perform their job or as-signment with the help of the new tools.

Today the world is interconnected by global net-works offering seamlessness connection (for exam-ple e-mail, World Wide Web, e-commerce, etc.) to the electronic world everywhere. At the same time Information and Communication Technology allows an almost cost-free access to and distribution of software products worldwide. For reasons of econ-omy software products have to be marketed and sold world-wide. Technological progress allows commu-nication not only via text (as 25 years ago) but also via pictures and displays providing a colourful, ani-mated images showing people in their traditional surroundings, utilizing software products as part of our daily environment. These products execute more

complex tasks in closer imitation of human behaviour than ever. Thus people often forget that their ’com-munication partner’ on the other side of the computer interface (which does not look like a computer inter-face!) is not a human but a machine. The misinter-pretation of a socially welldesigned computer inter-face was dramatically shown back in 1966 by Joseph Weizenbaum’s famous ’Eliza Experiment’ [Weizen-baum-66].

Users expect the software product not only ’to speak their language’ but also to show a behavioural pattern which is compatible with their cultural ex-pectations and preconditions, this means a certain adherence to conventions and behaviour. Consequ-ently, humans tend to ascribe human qualities to complex sophisticated computer interfaces. When software is used in an assisting way people tend to expect reactions from software product like an "un-derstanding, well-meaning friend" or as stated in [Miller-04] "good behaviour, etc., ... with the sensitiv-ity of an intuitive, courteous butler".

This means that the software product has to be-have in accordance with the expectations induced by the environment. In a face-to-face conversation, the (geographic) context is obvious to all partners. A conversation in a pub carries another connotation than a formal meeting with the boss in his office!

Page 64: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� Software like an Understanding Friend

64 SEFBIS Journal 2009. No.4.

For an (acoustic) tele-conversation this context is almost completely eliminated. As long as the inter-face is pure text, many human communication channels [Chroust-04u] and context indicators are missing. Nowadays technology makes it possible to supplement the spoken word not only with written text but also with images of the context (most mobile phones have this option!). A communication with a software product is often augmented by visual envi-ronmental context, including moving generated characters (avatars) showing unavoida- ble some kind of body language [Morris-94c]. Without appro-priate localization this easily leads to misunder-standing, embarrassment and ridicule.

The situation is even aggravated by the fact that many people interact with computer inter- faces from their home (e.g buying via e-commerce etc.). While a sterile office atmosphere might make people less aware of a cultural match on the other side - being at home makes such discrepancies even more no-ticeable.

An added difficulty is that larger and larger sec-tors of the population have to get into contact with computerized interfaces (cf. e-government [Wim-mer-05]). An increasing percentage of users is not willing, interested or able to communicate in a foreign language with the system. They expect high-quality communication in their mother tongue [Miller-04] compatible with their cultural expectations.

All these considerations make it necessary to explicitly transfer a software product into a geo-graphically (and culturally!) different environment. This implies much more than a simple language translation: We speak of localization [Ishida-05], i.e. the process of adapting a product to reflect the local standards, culture and language of another market [GSSI-00], or the infusion of a specific culture into an international product.

"Culture" is very difficult to define; at best we can say that culture is a shared complex system of lan-guage, value system, norms, religion, myths, beliefs, manners, behaviour, and structure which is charac-teristic of a society or part of it [Hampden-00].

Cultural incompatibilities start with minor nui-sances as every tourist to a foreign country might notice, e.g. indicating numbers on your fingers (see

Figure 8-1.) up to cultural clashes as exemplified the uproar in 2005 about the Danish cartoons about the prophet Mohammed [Wikipedia-e, keyword: Jyl-lands Posten Muhammad cartoons controversy].

Figure 8-1. Counting on one’s fingers

Even worse, if you advertise a holiday resort and you show (as is the habit in Europe) scantily clad women in bikinis, disco dancing and drinking at the bar you will create considerable objections in Mus-lim countries, but the internet does not allow you to limit the geographic coverage of your advertisement (in contrast to regular mail!).

PPrriioorr RReesseeaarrcchh As early as 1960 the first technological steps were made by IBM [Hensch-05] in order to find ways of processing and displaying Japanese characters, with the problem that actually three different alphabets were in use: Hiragana and Katakana (phonetic sets with 87 characters each), while Kanji exhibits an indefinable number that reaches into the tens of thousands. Initially the prime concern was an ade-quate representation of national characters. The actual translation was done by trained translators having the target language as mother tongue. As long as the software products were essentially ’back-office applications’, i.e. book keeping, financial evaluations, ware house inventories etc. operated by specialists, no additional effort was needed. Gradu-ally with the expansion of world commerce the issue of globalization was recognized, leading to consid-erations of cultural proficiency [Lindsay-03].

Especially within IBM the necessity to address the needs of different nationalities was of concern. Under the title of ’National Language Support’ prob-lems of character sets and the associated ques-tions of locale were addressed. Higher layers of localization (see Figure 8-2.) were not approached

Page 65: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Human-Social Approach����

SEFBIS Journal 2009 No. 4 65

systematically but were left to translations centers. Many of these issues can be found in [Esselink-00]. Some more details (and examples) can be found in [Chroust-07d, Chroust-08b, Chroust-09c]. Two se-minal publications on that to- pic are [Hampden 00], summarized in [ChangingM-06], and [Hofstede-05], summarized in [Hofstede-05b] discussed inten-sively the fundamental cultural differences between nations (section 3.7) based on detailed surveys mainly by IBM in the 1970s.

LLaayyeerrss ooff LLooccaalliizzaattiioonn Localization has to be performed on different levels of increased comprehensiveness and cultural de-pendence (Figure 8-2). Higher layers usually rely on lower layers of localization for support. Figure 8-2 indicates that the sensibility of people to cultural mismatches increases with the height of the layer, while possibilities of technical support diminish.

Figure 8-2. Layers of Localization

TTeecchhnnoollooggiiccaall IInnffrraassttrruuccttuurree The basis for localization is technical and organ-izational provisions. They are mostly invisible to the user, mostly providing internationalization, i.e. mak-ing a product ready to be localized. Necessary provisions are well understood and will only be sketched below [Barbour-96, Chroust-00g].

– Separation of text and code Executable code and text are provided in separate modules to allow replacement of the text parts.

– Storage size for texts →→→→ English is one of the shortest languages. For German 30% more storage space must be provided

– Code pages/Unicode →→→→ Code pages translate between characters of a language and the cor-responding bit-patterns in the computer. The multitude of languages requires different code-pages to cater for all specific characters of dif-ferent languages

– Two-byte languages →→→→ Asian languages (Chinese, Japanese, ...) have so many different characters that a coding via 1 byte is not suffi-cient, 2 bytes are needed

– Writing and reading direction →→→→ Some languages are written left-to-right, others right-to-left, mixing the languages in text needs complicated changes of writing direction (fig. 3).

– Paper sizes They differ in different countries. As a consequence texts have to be reformatted, causing changing page breaks, difficulties with placing pictures and often ruining an initially at-tractive layout.

Figure 8-3. Left-to-right and right-to-left languages

GGrraapphhiiccaall aanndd SSyymmbboolliicc LLaayyeerr – symbols and icons: Symbols differ in different

cultures and will not necessarily understood in another culture →The American mailbox used as icon by Microsoft Windows is not typical for Europe

– animal connotations: One of the highest com-pliments in the ancient Egypt was to tell a woman that she had eyes like a cow ....

– colours: Typically in China the colour of death is white - a restaurant with white tiles will not be a success there!

Page 66: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� Software like an Understanding Friend

66 SEFBIS Journal 2009. No.4.

– sounds: he sound of the bells of an Christian church will not be universally under- stood

– body language and gestures: One of the most difficult chapters in communication is body lan-guage - the same gesture can have a totally dif-ferent meaning in different languages [Morris-94c].

GGrraammmmaattiiccaall LLaayyeerr When (automatically) translating or generating text, grammatical idiosyncracies of languages have to be taken into account. Text translation is almost as old as writing itself. Additional considerations are needed for the translation of computer supported texts. They mostly result from the fact that the computer requires more formalism than a human reader when inter-preting and presenting texts. Also the generic com-position of texts (a necessity in user interfaces) is unknown in classical translation situations. – locale: Locale is a subset of a user’s environment

that defines conventions for representations in a specified culture. They include date, currency, time, etc. to be chosen by the user [He-02, Her-den-06, Kubota-03, Trager-06]. The necessary translations can usual- ly be done automatically, problems arise if such data are used as part of identifiers or numbering.

– word order: In order to generate of con-text-dependent messages text fragments must be inserted into predefined message skeletons. A problem arises from the fact that the word order is different in different languages, causing code changes. →→→→ English "Red Cross" versus French "Croix Rouge".

– ligatures: For aesthetic purposes Latin-type fonts use ligatures (like "ffi" or "oe"). These are usually ignored in computer printout without loss of readability. In Arabic texts ligatures are an essential part of the appearance and semantics of a text, but it is practically impossible to cor-rectly generate all of them mechanically be-cause of their high context and semantic de-pendency [Mankai-95].

SSeemmaannttiicc LLaayyeerr When trying to transfer the meaning of a text into another language, numerous problems arise. Trans-lators of literature learn and are trained to effectively transfer the meaning of a text into other languages. With respect to the issues of localization of texts in software products some additional problems arise. The technical correctness might be more important than the aesthetics of the expression. While in the literature the textual translation should still convey the original cultural flair of a literary work, in software products (especially in e-commerce) we do not want to retain the original cultural aspects. Several key problems are: – technical versus common language it is nec-

essary to distinguish whether a word is used as a well-defined technical term out of the context of the software product or in its common, even col-loquial meaning.

– missing variation of terms in a language: In technical work often essentially synonymous words are used with different semantics causing problems if the target language does not provide this variability. → In the German version of IBM’s software engineering environment ADPS [Chroust 88g] the German words ’Aktivität’ and ’Tätigkeit’ were used with different semantics, but unfortunately both map to the same single Eng-lish word ’activity’.

– expressiveness of languages: The expressive-ness of languages is different → It is not without reason that German has been the favourite lan-guage of philosophers, French the favourite of diplomats and English the favourite for commerce and science.

– abbreviations: Effective abbreviations (especi-ally for keys and hot-keys) have to provide a certain intuitive association to the word or object they stand for. Translations sometimes cannot accomplish this due to similarities in the target language. → In German one can abbreviate ’on’ and ’off ’ by ’E’ and ’A’ (Ein and Aus). For English two characters or some other scheme has to be used.

Page 67: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Human-Social Approach����

SEFBIS Journal 2009 No. 4 67

BBuussiinneessss CCoonnvveennttiioonnss –– PPrraaccttiicceess LLaayyeerr Business practices show dramatic differences, aptly described by [Hampden-00] and [Hofstede-05] causing misunderstanding, friction, and alienation [Krishna-04]. Especially animations, but even texts, could contain cultural blunders.

– leadership approach: Leadership approach var-ies in different countries and within organizations (democratic, authoritarian, participative). Software for Management support tools has to conform in their interfaces and processing to local habits.

– organizational structure: Depending on whether the society is rather egalitarian or hier-archical, both the structure of interfaces, web-sites - and obviously pictorial representa-tions must conform to local habits [Hofstede-05].

– navigation in web-sites: Many of the national preferences (e.g. low- versus high context cul-tures [Hall-76], specificity versus diffusion) have to reflect themselves in the design of web pages. → Access to certain pages has to reflect this aspect. Highly hierarchical cultures may view a site positively if it is ’member only’ access, whereas an egalitarian culture may find it dis-agreeable.

– dates and deadlines: Commitment to dates and deadlines vary considerably in different cultures, as described by [Hampden-00] via sequential vs. synchronous time. Vague deadlines must be catered for in project management tools

– performance measures: Performance meas-ures vary according to cultural divergence, espe-cially with respect to individualism-communita-rianism/collectivism and inner direction-outer di-rection [Hampden-00, Hofstede-05], → In the USA an award usually goes to an individual, in Japan usually to the team in total.

SSoocciiaall aanndd CCoommmmuunniiccaattiioonn LLaayyeerr In face-to-face communications (but also in tele-phone-communications) humans expect certain be-haviour of their partners. They also tend to ascribe human qualities to complex sophisticated computer interfaces and thus expect an adequate reaction which - according to cultural differences - has to be

adapted to the specific culture. As a result they "expect good behaviour, observation of etiquette and politeness, subservience, helpfulness, and the sensitivity of an intuitive, courteous butler" [Miller-04]. The more realistic the human/computer interface becomes (from simple text-based display to animated interactive screens with soft- ware agents) the more the computer interface has to obey social conventions.

– addressing and greeting the user: Rules for addressing and greetings persons vary greatly both with respect to the chosen phrases (use of family name, title ...) and the accompanying ges-tures [Herden-06]. Especially expressing various degrees of familiarity is very subtle. Pictures and animation must conform to these conventions. → In Austria the title (’Dr.’, ’Director’ etc.) must be used.

– saying ’no’ to a user: A ’polite’ system is ex-pected to conform to the ways of saying ’no’ in a culturally compatible manner. In many Asian countries a ’no’ is avoided in favour of not an-swering at all [Herden-06].

– context dependency: High-context cultures with their reliance on the context and the nonverbal aspects expect different contents on screens than low-context cultures which depend more on ex-plicit, verbally expressed forms of communication [Hall-76, Schneider-01]. → The United States of America being a low-context culture generally re-lies heavily on information communicated explic-itly by words. Asian and Hispanic cultures, by contrast being high-context audiences generally accept communications which are less specific in their wording and more supported by information other than spoken or written messages.

– social classes: Social class affiliation may play a dominant role in choosing the language [Soh-00, Davidson-02, Hampden-00, Hofstede-05,]. Dif-ferentiation must be made depending on the us-ers and their individual subculture (class), in-cludeing difference with respect to age, education [Payne-06b, Marsh-89].

Page 68: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� Software like an Understanding Friend

68 SEFBIS Journal 2009. No.4.

– overtime: The acceptable amount of unpaid overtime work varies and has to be reflected in attendance recording and payroll programs.

FFuunnddaammeennttaall CCuullttuurraall LLaayyeerr All layers discussed so far are based on one or the other aspect of culture. They are all, in various degrees, inborn/stringent for a person from this cultural environment. The higher in the hierarchy (fig. 2) , the more intuitive, subconsciously they affect a person’s behaviour, be- lieves and expectations. And the more difficult it is to change them and the more problematic it is when a situation contradicts them. On the highest layer we enter questions of ’Weltanschauung’ (world view) comprising ele- ments of how a persons thinks the world is and should be, what is right or wrong, etc. Welt- an-schauung is considered one of the key elements of understanding in Soft Systems Methodology [Check-land-00]. These opinions and believes are not easily unlearnt and very often emotionally laden.

Figure 8-4. Cultural Differences (Hofstede &

Hofstede) [Hofstede-05]

Although they explicitly can only be recognized in the highest three layers of localization, they obvi-ously impact all layers. Language being a part of the expressive tool kit of humans reflects them. → If women are not allowed into certain professions then also the language (the grammatical and the seman-tic layers) will not provide adequate words or variants of words for e.g. male and female professionals, etc. A practical classification of fundamental cultural dif-ferences is given by [Hofstede-05] (see Figure 8-4). A

similar one see in [Hampden-00]. The definitions of the dimensions are [Hofstede-05; 05b]:

– Power Difference Index (PDI): This is the ex-tent to which the less powerful members of or-ganizations and institutions (like the family) ac-cept and expect that power is distributed un-equally. The inequality is endorsed by the follow-ers as much as by the leaders.

– Individualism Index (IDV): This is an indication of how loose the ties between individuals are as compared to (collectivistic) societies where indi-viduals from birth onwards are integrated into strong, cohesive in-groups, often extended fami-lies which continue protecting them in exchange for unquestioning loyalty.

– Masculinity (MAS): This characterizes how big the gap between men’s values and women’s values is. It states to what degree mens’ values are asser-tiveness and competitiveness, while womens’ val-ues are modesty, care, consolation, etc.).

– Uncertainty Avoidance Index (UAI): This deals with a society’s tolerance for uncertainty and ambiguity, how uncomfortable one feels in un-structured situations which are no- vel, unknown, surprising, or different from usual. Uncertainty avoiding cultures try to minimize the possibility of such situations by strict laws and rules, safety and security measures, and on the philosophical and religious level by a belief in absolute Truth.

– Long-Time Orientation Index (LTO): Values associated with LTO are thrift and perseverance; values associated with Short Term Orientation are respect for tradition, fulfilling social obliga-tions, and protecting one’s ’face’.

These cultural dimensions translate into some of the following aspects.

– social position, age: The importance and re-spect for age and the resulting social position varies in different countries. Hampden-Turner & Trompenaars (2000) speak of ascribed versus achieved status. → In China seniority is ex-pected to go hand in hand with higher positions in management (ascribed status), in contrast to Western management in which hierarchies rely on achieved status [Payne-06b, Marsh-89].

Page 69: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Human-Social Approach����

SEFBIS Journal 2009 No. 4 69

– social position – gender: The social position of women varies in different cultures. In western societies it is politically correct to show women in leadership positions. This is not expected in some Arabian countries.

– taboos: Taboos are ancient ’good practices’ which have changed into religious or social interdiction, often void of meaning today. They are highly culturally dependent, highly sensitive and often not explicitly talked about.

– metaphors, puns, jargon: Metaphors and puns are especially prone to cultural divergence. Jar-gon is usually only used in certain subgroups. Their use easily causes misunder- standings and ineffective communications. Typically sport metaphors may not come across if the sport is not played in certain countries [Lang-06].

– humour: Humour very rarely carries over to an-other culture, being the result of the interplay of representation, meaning and context [Bourges Waldegg-98]. Especially the context-information will often be lost during localization.

CCoonncclluussiioonn The ubiquity of computers and the global network-ing in many areas of our life, especially ecommerce, electronic world wide dictionaries and globally used support software has to reflect the issues related to the design and adaptation software products, es-pecially of those cases, where the computer pres-ence is not obvious to the users ("softwareintensive systems"). Obviously, this area grows in importance. Lack of proficiency there can have much unpleasant and detrimental effect. A first step to improving this situation is obviously awareness.

With respect to the presented fundamental cul-tural differences, we have to admit that many of the assumptions (especially with respect to the higher layers of localization) will change due to the glob-ality of information and offerings. Global television etc. will level some of the cultural differences ex-isting before. It is claimed that nowadays the young people in different geographical areas resemble more to one another than they resemble their parents in their own county. Thus, we have to expect that many of the statements made about cultural

differences will have to be revised to some extent in the future.

Nevertheless – we have to accept the necessity of Localization, – we must admit that cultural differences play an

enormous role in the creation of acceptable software products with interfaces "like an un-derstanding friend". These differences affect all layers of localization. The higher up in the hi-erarchical order, the more basic and essential they become, but in many cases they localization efforts only seem to touch the tip of the iceberg of cultural differences.

– It must be accepted that localization is an abso-lute necessity in the global economy, and

– it is a fact that localization does not come cheap, but the extra expenses are usual- ly compen-sated by increased usability of the product and thus by larger marketing revenue.

RReeffeerreenncceess [1] [Barbour-96] BARBOUR, R. H. , A. YEO Bi-

lingual/Multi-Lingual Business Software: the Spreadsheet in: Proc. 1996 Information Systems Conf. of New Zealand (ISCNZ’96), pp.63–71.

[2] [Bourges-Waldegg-98] BOURGES-WALDEGG, P., S. SCRIVENER Meaning, the central issue in cross-cultural HCI design Interaction with Com-puters vol. 9 (1998), pp. 287–309.

[3] [ChngingM-06] CHANGING MINDS (ED .) Trompenaars’ and Hampden-Turner’s cultural fac-tors 2005-10-27

[4] [Checkland-00] CHECKLAND, P. Soft Systems methodology: A Thirty Year Retrospective Systems Research and Behavioral Science vol. 17 (2000) no. S1 (Nov. 2000), pp. S11–58.

[5] [Chroust-00g] CHROUST, G. Internationalization is more than Language Translation! in: Hofer, S., Beneder, M. (eds.): IDIMT-2000, 8th Interdisciplinary Information Management Talks, Verlag Trauner, Linz

[6] [Chroust-04u] CHROUST, G. , C. HOYER Bridging Gaps in Cooperative Environments in: Hofer, C. and Chroust, G.: IDIMT-2004, 12th Inter-disciplinary Information Management Talks, Sept, 2004, Budweis, Verlag Trauner Linz,2004, Linz

[7] [Chroust-07d] CHROUST, G. Software like a courteous butler - Issues of Localization under Cultural Diversity in: ISSS 2007. The 51th Annual meeting and Conference for the System Sciences.

Page 70: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� Software like an Understanding Friend

70 SEFBIS Journal 2009. No.4.

Tokyo, Japan, August 5-10, 2007 Curran Associ-ates, Inc. ( Mar 2008 ).

[8] [Chroust-08b] CHROUST, G. Localization, Culture and Global Communication in: Goran D. Putnik and Maria Manuela Cunha: Encyclopedia of Networked and Virtual Organizations, vol II, In-formation Science ref., Hershey, USA, 2008.

[9] [Chroust-09c] CHROUST, G. Requirements Definition and Outsourcing in View of Cultural Dif-ferences International Journal of Systemics, Cy-bernetics and Informatics (IJSCI), to be published.

[10] [Chroust-88g] CHROUST, G., O. GSCHWANDTNER , D. MUTSCHM ANN-SANCHEZ Das Entwicklungssystem ADPS der IBM Gutzwiller T., Österle H. (eds.): Anleitung zu einer praxisorientierten Software-Entwicklungsumgebung, Band 2 AIT Verlag München, pp. 123–148.

[11] [Davidson-02] DAVIDSON , R. Cultural Compli-cations of ERP Comm. ACM vol. 45 (2002) no.7

[12] [Esselink-00] ESSELINK, B. A Practical Guide to Localization John Benjamins Publishing Comp., Amsterdam / Philadelphia 2000.

[13] [GSSI-00] GSSI Software Localization SSI - WWW, http://www.g11n.com/apps.htm, [April 2000].

[14] [Hall-76] HALL, E.T. Beyond Culture Doubleday Anchor Books, Garden City, NY, 1976.

[15] [Hampden-00] HAMPDEN-TURNER, C. F. TROMPENAARS: Building Cross-CulturalCompetence - How to Create Wealth from Conflicting Values Yale Univ. Press 2000.

[16] [He-02] HE, Z., D. W. BUSTARD , X. LIU Software internationalisation and localisation: prac-tice and evolution in: PPPJ ’02: Proceedings of the inaugural conference on the Principles and Practice of programming, 2002, pp. 89–94, Maynooth, County Kildare, Ireland National Univ

[17] [Hensch-05] HENSCH , K. IBM History of Far Eastern Languages in Computing, Part 1: Re- quirements and Initial Phonetic Product Solutions in the 1960s, Part 2: Initial Efforts for Full Kanji Solu-tions, Early 1970, IBM Japan Taking the Lead, Ac-complishments through the 1990s IEEE Annuals

[18] [Herden-06] HERDEN, J.Experiences from the KDE localization process in Cambodia KDE Cross Cultural 2006:

[19] [Hofstede-05] HOFSTEDE, G. , G. J. HOFSTEDE Cultures and Organsizations – Software of the Mind McGraw-Hill, NY 2005.

[20] [Hofstede-05b] HOFSTEDE, G. Cultural Dispo-sitions http://www.geert-hofstede.com [May 2007].

[21] [Ishida-05] ISHIDA, R., S.MILLERLocalization

vs. Internationalization http://www.w3.org/ Interna-tional/ questions/qa-i18n; [Jan 2005].

[22] [Kossiakoff-03] KOSSIAKOFF, A. , W. SEET Systems Engineering - Principles and Practice Wiley Series in Systems Engineering and Man-agement, Wiley Interscience.

[23] [Krishna-04] KRISHNA, S., S. SAHAY , G. WALSHAM Managing cross-cultural issues in global software outsourcing Comm. ACM, 47(4)

[24] [Kubota-03] KUBOTA, T. Introduction to i18n http://www.debian.org/doc/manuals/intro- i18n/, [Feb. 2003].

[25] [Lang-06] LANG, Y..Marketing: Communica-tions,Culture,and Localization http://www.translate. com/technlogy/multilingual_standard/ marke- ting_communications_culture.html [Oct. 2006].

[26] [Lindsay-03] LINDSEY, R. B., K. N. ROBINS , R. D. TERRELL Cultural Proficiency: A Manual for School Leaders Corwin Press 2003.

[27] [Mankai-95] MANKAI, C. Machine Translation from Arabic to English and French Information Sciences, no. 3, pp. 91–109.

[28] [Marsh-89] MARSH, P., D. MORRIS Die Horde Mensch - Individuum und Gruppenverhalten Kre-mayr and Scheriau Wien.

[29] [Miller-04] MILLER, C.A, (ed.) Human-Computer Etiquette: Managing Expectations with

[30] Intentional Agents Comm. ACM vol. 47, No. 4. [31] [Morris-94c] MORRIS, D. Bodytalk: - A World

Guide to Gestures Jonathan Cape Ltd. 1994. [32] [Payne-06b] PAYNE,N. Web Site Localization and

Culture http://www.sideroad.com/Cross_Cultural_ Communication/website-localization.html [Oct. 2006].

[33] [Schneider-01] SCHNEIDER, U. Innovation in der Wechselwirkung der Kulturen It’s Time vol. 2001, no. 1, pp. 69–72.

[34] [Soh-00] SOH, C., S. KIEN , J. TAY-YAP Cultural Fits and Misfits: Is ERP a universal solution? Comm. ACM vol. 43 (2000), no. 4, pp. pp 47–51.

[35] [Trager-06] TRAGER, E.H. International Text Layout and Typography The Big And Future Pic-tureGnome Live, Boston, October 2006 - Text Layout Summit, http://www.unifont.org/textlayout/ TheBigPicture.pdf [Oct. 2006].

[36] [Weizenbaum-66] WEIZENBAUM, J. ELIZA–A Computer Program For the Study of Natural Langu-age Communication Between Man and Machine Communications of the ACM, vol. 9 (1966), no. 1,

[37] [Wimmer-05] WIMMER, M., (ed.) Proceedings E-Government 2005: Knowledge Transfer and Status OCG Schriftenreihe, Wien 2005.

Page 71: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Human-Social Approach����

SEFBIS Journal 2009 No. 4 71

Gerhard CHROUST joined the IBM Laboratory Vienna in 1966, were he worked on the Formal Definition of PL/I (1967/68), on compiler construction, on a PL/I Compiler for the IBM 8100. 1983-90 he was member of the development team for ADPS (Application Development Project Support), responsible for defining the Process Model. From 1992 to 2007 he was full Professor of Systems Engineering at the Kepler University Linz, Austria, initially at the Institute for Systems Sciences and then head of the Institute of Systems Engineering and Automation. Since 2007 he is professor emeritus. He is Secretary General of the International Federation of Systems Research (IFSR), a former president of the Austrian Society of Informatics (ÖGI) and vice-president of the Austrian Society for Cybernetic Studies. Current research and teaching interests are focussed on

description, implementation and certification of socio-technical systems and on the enactment and support of the necessary development processes. Further research is devoted to cultural differences and human factors in system development, to system research and to component bases software development.

9. Human Resources in ICT HHuummaann RReessoouurrcceess iinn IICCTT –– TThhee CCzzeecchh RReeppuubblliicc AAnnaallyyssiiss

1PETR DOUCEK – 2OTA NOVOTNY – 3Jiri VOŘÍŠEK

1,2University of Economics, Faculty of Informatics and Statistics, 3Department of Information Technologies, Prague University, Czech Republic

eMail: [email protected], [email protected]

This contribution deals with real results of survey realized during years 2006 - 2007 in the Czech Republic by Faculty of Informatics and Statistics of the University of Economics, Prague and it offers short overview of Czech perspectives in requirements on ICT experts and of ICT formal tertiary education system and its results in ICT experts education for Czech local labour market.

IInnttrroodduuccttiioonn Massive investments into Information Systems, In-formation and Communications Technologies in last twenty years started economic growth. But not all of them were successful – for example the dot com boom in 90s and its intensive reduction on begin of the 21 century. There are different opinions in the world literature, how IS/ICT influence nominates real economic growth and how to measure their contributions to it (Banker, Kauffmann, 1988; Delina, Vajda, 2005). IS/ICT of specific properties are very similar to utilities (Carr, 2004). But the most impor-tant and crucial factor of IS/ICT improvement is human resources actually available and applicable on the market. How does look the labour market with ICT experts in the Czech Republic was the topics of our survey. It was supported by the Czech Science Foundation GACR research project 402/09

/0385, Human Capital in IS/ICT Operations and Development: Competitiveness of Czech Tertiary Education Graduates.

PPrroobblleemm FFoorrmmuullaattiioonn The aim of this survey was to motivate universities and to formulate recommendations for further devel-opment of the Czech tertiary education in the area of ICT. Requirements for skills and knowledge of ICT graduates are permanently changing. Building up and to passing the accreditation process of a new study program takes in minimum one year, of course, only under conditions that the school or university has enough experts in required areas.

Page 72: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� Human Resources in ICT

72 SEFBIS Journal 2009. No.4.

SSuurrvveeyy DDeessccrriippttiioonn As a reaction to the low flexibility of the Czech Re-public formal education system in the area ICT skills and also to the potential threat from non-ICT univer-sity study programs, the Faculty of Informatics and Statistics decided to initiate a research project in order to map:

– ICT education offered in the Czech Republic. – Demand for ICT skills in the Czech Republic. The aim of this project was to motivate universities and to formulate recommendations for further de-velopment of the Czech university education to top management of universities in the area of ICT. The main goal of the project was to: – Identify at all universities and technical specialist

schools, which are involved in ICT education, topics of their education process, number of credits devoted to different IT subjects.

– Identify the actual number of students, expected number of graduates in the actual school year (2005-2006) and the actual number of new stu-dents in the first year.

The second goal was to perform a survey of the ICT graduates skill requirements in the Czech market (Vorisek at al, 2007). This survey started in Sept-ember 2006 and in April 2007 we have got the first preliminary results, final results were published in 2008 for the first time. Part of this project was de-voted to the analysis of current IT workforce age and skill structure.

MMeetthhooddoollooggyy

RRoolleess iinn IICCTT –– GGeenneerraall CCoonncceepptt Our survey prefers classification of specific roles in ICT (rather then particular professions which are in this context too detailed) underlining the competitive ability of graduates based on their knowledge po-tential. ICT specialist in this context is educated and qualified to use his/her knowledge potential mainly in the design, implementation and operation of ICT and their practical application. We can describe his/her competencies in – designing and developing applications.

– implementing, customizing and integrating ICT applications within enterprise or other economic subject, thus changing and modifying working procedures and effectiveness of staff (Sudzina, Kmec, 2006),

– implementing and managing ICT operation in-cluding user application support,

– managing ICT projects, information services and knowledge provision,

– providing and purchasing ICT services and prod-ucts using professional skills regarding detailed knowledge and effective methods of their use.

End users of ICT are not (for the purpose of this survey) considered as ICT specialists, even though most of the current university graduates (medical doctors, financiers, architects) are by definition ac-tive in data processing and computer aided opera-tions. We decided to exclude this category because it does not require specific ICT education. For ex-ample, a user of SAP is according to our classifica-tion not an ICT specialist, but the methodology de-signer responsible for the overall SAP architecture is covered by our role definitions. (Doucek at al, 2007)

Due to fast developments and relatively high specialization in the area of ICT we have decided to define specialists at two levels – the first level con-sists of core ICT roles with corresponding key knowledge and activities. This level is relevant for our research because it concentrates on the core competencies and procedures rather then on the detailed technical knowledge which universities could not provide in up to date manner. Second level lists ICT professions included in the core roles (Business Process Analyst/Designer, IS/ICT De-velopment and Operation Manager, Business Per-son in ICT Products and Services, Developer/IS Architect, Administrator of Applications and of ICT Infrastructure). Furthermore are some obligatory skills that are required for all ICT roles in each economy: – high level of creativity, – team work ability, – communication competence, – fluent spoken and written foreign language in

majority English or German, Spanish, Russian or other required language.

Page 73: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Human-Social Approach����

SEFBIS Journal 2009 No. 4 73

SSkkiillll CCaatteeggoorriieess We have been concentrating on the 18 skill catego-ries (based, but not limited to the respected IT cur-ricula: Strawman curricula (Strawman, 2004)) and their weight in the university graduate or employee profile. We have identified following skills categories: Process Modelling, Application Functionality, ICT Service Definition and Operation, Architecture Analysis and Design, Software Engineering, Data Engineering, ICT Infrastructure, Operational Ex-cellence, Communication and Presentation Skills, Team Leadership Skills, ICT Market Knowledge, Organizational Management Methods, Enterprise Finance and Economics, Sales and Marketing, Statistics, Law, Business Sectors and Other – fur-ther not specified skills.

KKnnoowwlleeddggee LLeevveellss In order to compare the “amount” of knowledge devoted to each skill category by university program or by business requirements we have defined non-linear scale as following:

Level 0 No knowledge. Level 1 Overview (relevant to 1-3 credits or inten-

sive training days). Level 2 Basic orientation and terminology (relevant

to 4-8 credits or intensive training days). Level 3 Good orientation and basic practical skills

(rel. to 9-32 credits or intensive training). Level 4 Good orientation and good practical skills

(relevant to 33-64 credits or intensive training days).

Level 5 Highest knowledge quality and advanced practical skills (relevant to 65 and more credits or intensive training days).

After long discussions with universities and busi-ness we have decided to compare (and express) one credit of university study program by one in-tensive training day, because not all the businesses were familiar with the university credit scheme.

KKnnoowwlleeddggee PPrrooffiilleess –– DDiissttaanncceess Set of knowledge levels for each of the skill cate-gories is in our research defined as “knowledge profile” and is used to compare the requirements of business with the supply of universities.

We have analyzed the distance between the knowledge profiles in our research. Distance be-tween university knowledge profile A and business knowledge profile B is expressed by the number of additional intensive training days required for the graduate with knowledge profile A in order to fulfill the minimal requirements of profile B. The smaller the distance is, the “cheaper” is the graduate of university for the relevant ICT role in business.

GGeenneerraall SScchheemmee ooff tthhee SSuurrvveeyy Survey and data collection were preformed in two main streams – the first one were HEIs (Higher Education Institutions) and the second one were business units in the Czech Republic.

SSuurrvveeyy aammoonngg UUnniivveerrssiittiieess––HHEEIIss

TThhee SSuurrvveeyyeedd PPooppuullaattiioonn All faculties and HEIs providing IT related study pro-grams based on evidence of the Czech Ministry of Education. There were 54 faculties and 19 HEIs iden-tified in that evidence on 2006/03/01. A questionnaire was sent out to all these subjects. They were asked to fill this questionnaire for each IT related study program they provide. Response rate was 81% for faculties and 42% for HEIs. We have collected the data about 203 IT related study programs.

MMeetthhoodd ooff SSaammpplliinngg ffrroomm tthhee PPooppuullaattiioonn Therefore we have surveyed the whole population no sampling method had to be used. Missing quantitative data (number of enrolled, number of students, number of graduates) from non response have been reconstructed from the official resources of the Czech Ministry of Education. Missing quali-tative data (number of credits devoted to each skill category) were not reconstructed and these facul-ties and HEIs institutions were included into final results as "not classified" segment.

Variables – Number of students, number of enrolled (new

entrants to the study program each year) number of graduates in the school years 2000 to 2006 and expected numbers for some following years.

– Number of credits devoted to each of 18 skill categories defined.

Page 74: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� Human Resources in ICT

74 SEFBIS Journal 2009. No.4.

– Classification variable: level of study program – HEI, bachelor, master (2 year), master (5 year; these are the "pre Bologna" programs ending in 2006 or 2007 school years)

SSuurrvveeyy aammoonngg BBuussiinneessss SSeeccttoorr

TThhee SSuurrvveeyyeedd PPooppuullaattiioonn All active economic subjects in the Czech Republic on 2005/12/31 (the survey was held in 2006). Ac-cording to data of the Czech Statistical Office, there were 1 266 336 subjects of various size and main economic activity (see Table 9-1). – Size of entity: According to the number of em-

ployees, 6 categories were used: 0,1 – 9,10 – 49, 50 – 249, 250 – 999, 1000 and more.

– Sector of main economic activity: There are 17 main sectors in Industrial Classification of Eco-nomic Activities of the Czech Statistical Office. According to the requirements on information technologies, these sectors were coded into 3 categories: sectors with the lowest requirements

(MIT), sectors with the middle requirements (SIT) and sectors with the highest requirements (VIT).

MMeetthhoodd ooff SSaammpplliinngg ffrroomm tthhee PPooppuullaattiioonn According to the size of subject and to the category of its economic activity, the population was grouped into 18 subpopulations. Then, stratified sampling was applied. Proportionate allocation when the sampling fraction in each of the strata is proportional to that of the total population was not useful here. There are no homogenous subgroups in the population. As we can see in Table 9-1, their size varies much. Because of number of employees the variation of number of IT workers in subject certainly is very heterogeneous, too. Optimum allocation requires knowledge of this variability (it was un-known). So, we took this het-erogeneity into account at least in the following way: the sampling fraction was higher in strata with more employees and in sectors with the higher require-ments on information technologies. The interviewing methods used were CAWI and CATI. Realized sample size was 1002 (see Table 9-2).

Table 9-1. All Active Economic Entities in the Czech Republic on 2005/12/31

0 1 - 9 10 – 49 50 – 249 250 – 999 1000 + Total

MIT 263 289 49 914 14 270 4 317 369 87 332 246

SIT 697 380 138 555 28 014 6 217 1 164 182 871 512

VIT 49 851 9 590 2 216 710 170 41 62 578

Total 1 010 520 198 059 44 500 11 244 1 703 310 1 266 336

Table 9-2. Structure of the Observed Sample

0 1 – 9 10 – 49 50 – 249 250 - 999 1000+ Total

MIT 56 28 28 28 37 16 193

SIT 56 56 56 56 71 36 331 VIT 56 110 160 122 26 4 478

Total 168 194 244 206 134 56 1 002

Variables

– Number of IT employees in 2006 in the following structure: business analyst, IT manager, IT sales-man, architect of information networks, adminis-trator, advanced user. Expected number of IT workers for some following years.

– Knowledge requirements on particular profes-sional positions: there were 18 skill categories defined (thus, 18 ordinal variables with values 0 – “no knowledge (0 training days)” 5 – “highest knowledge (more than 65 training days)”.

Page 75: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Human-Social Approach����

SEFBIS Journal 2009 No. 4 75

– Classification variables: number of employees, sector of main economic activity, requirements of the sector on information technologies, IT supplier or customer, national or exterior owner.

Number of IT employees Sample distributions in the particular strata are highly right skewed (duly incidentally) and they include outliers (the box plots were used to make the explanatory data analysis). Therefore, to char-acterize their location and variation, and for esti-mates of total number of IT employees in Czech economy, medians and median absolute deviations were used. In the stratum “entities without em-ployees”, the proportion of “IT entities” in that stra-tum in population was estimated.

Knowledge requirements: With respect to nature of variables, medians were used again. To compare different professional posi-tions and different skill categories, box plots (for sampling distributions) and scatter plots (for medi-ans) were used.

RReessuullttss OOvveerrvviieeww We present, due to its limited scope, only the gen-eral results of the survey – analysis of the Czech Republic ICT education market and basic results from business survey in this paper. The most im-portant part of this research is the characteristics of

the study program segments (clusters) which are showing very interesting results.

BBaacchheelloorr LLeevveell EEdduuccaattiioonn The Figure 9-1 shows the four segments of the bachelor level of the education system.

Segment A indicates characteristics with very low level of ICT education (work hypothesis is that ICT education is “additional” to other ones). This low level could be investigated in two dimensions. The first dimension is the variety of the ICT courses, which are focused mainly on software engineering, data engineering and ICT infrastructure without any other knowledge for students. This selected parts of ICT gives to graduate students only briefly overview of the whole problem and general information. The second dimension is the depth of the education in selected course. Level three disposes of very low variety of courses. The level is below the average of the whole ICT education level through all investi-gated segments.

Segment B offers harmonic education Education is focused on ICT area presentation with added value of the statistics, marketing and enterprise finance and economics. This specialization gives perspective to a graduate either to be a lower ICT manager to go to further master study level.

Figure 9-1. Bachelor Studies Segmentation (With Number of Students, Graduates and Enrolled)

Page 76: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� Human Resources in ICT

76 SEFBIS Journal 2009. No.4.

Segment C gives common education in classic ICT. This kind of education represents knowledge in areas of ICT services, software engineering, data engineering and ICT infrastructure, operational excellence, communications and team leadership. Additional is taught statistics: part of “exact science”. These graduates have potential for being suc-cessful ICT managers especially the top ICT man-agers on the CIO level.

Segment D the most complex knowledge with emphasis not only to ICT education, but it re-leases also general education in economics, or-ganization and enterprise knowledge. The D seg-ment with whole scope of taught knowledge offers potential for future graduates to enter into the level of upper management and perhaps to the top management level. Knowledge here presented must be, of course, supported by very strong mo-tivation, further education in master level (perhaps in doctor stage) and hard work in business.

MMaasstteerr LLeevveell EEdduuccaattiioonn On the Figure 9-2 we can see the segments of the master level of the education system.

The Segment A is the ICT Additional (ICT over-view) that gives only general partial knowledge level in the ICT area. The ICT level is only additional to other non informatics education and it is question

why are these master programs taught in the community of ICT specializations. Graduates are expected to continue in ICT education. Working hypothesis is that these persons could participate in ICT business in following roles Business Person in ICT products and services (ICT Sales Person, ICT Relationship Manager).

Segment B offers comprehensive basic education in ICT. For graduates is working hypothesis that they have opportunity to, of course after further business, non university education, enter suc-cessful into ICT business in all specified roles.

Segment C prepares graduates with accent to Ar-chitecture Analysis and Design, Software Engi-neering and management skills – Communication and Presentation, Organizational Management Methods. Working hypothesis is that graduates are ideal for leading positions in ICT branch. It could be the large spectrum of professions starting from project managers to the CIO. This expectation corresponds to the role IS/ICT development and operation manager (ICT Manager).

Segment D gives more detail knowledge in areas of Process Modelling, ICT Infrastructure and Software engineering. Work hypothesis is that graduates in this segment are oriented towards following roles Business Process Analyst. -Designer or Developer, IS Architect.

Figure 9-2. Master Studies Segmentation (With Number of Students, Graduates and Enrolled)

Page 77: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

Human-Social Approach����

SEFBIS Journal 2009 No. 4 77

BBuussiinneessss SSeeccttoorr In previous chapters, we have described how we have been analyzing the distance between the knowledge profiles of university programs and business requirements for the particular business role. Let us discuss the example of such analysis for the Business Process Analyst/Designer ICT role. Requirements for this role are described at the Figure 9-3. Note: numbers 0-5 on each axis repre-sent knowledge level scale values. Interpretation is in

this case that e.g. business requires knowledge level 4 (Good orientation and good practical skills) in MS01 Process modeling skill category for new em-ployees in the Business Process Analyst-Designer ICT role. Distance (expressed in the number of ad-ditionally required intensive training days) among the master level programs and business requirements for the Business Process Analyst/Designer ICT role (see Figure 9-3) is depicted in the Table 9-4.

0

1

2

3

4

5

MS01 Process modelling

MS02 Application functionality and

implementation

MS03 ICT Service definition and operation

MS04 IS Architecture analysis and design

MS05 Software engineering

MS06 Data engineering

MS07 ICT Infrastructure

MS08 Operational excellence

MS09 Communication and presentation skillsMS10 Team leadership skills

MS11 ICT market knowledge

MS12 Organizational management methods

MS13 Enterprise finace and economics

MS14 Sales and Marketing

MS15 Statistics

MS16 Law

MS17 Business sectors (utilities, banks ...)

Figure 9-3. Knowledge Profile of the Business Requirements for the Business Process Analyst/Designer ICT

Role (Doucek, Novotny, 2007)

Table 9-3. Distance Among the Bachelor Level Programs and Business Requirements for the Business Process Analyst/Designer ICT Role (see Figure 9-1 and Figure 9-3)

Bachelor level programs seg-ment name

Distance (in number of required addi-

tional training days)

Number of Stu-dents in school

year 2005/6

Number of En-rolled in school

year 2005/6

Number of Graduates in school year

2005/6 BcVos - Segment A 146 5027 1861 714 BcVos – Segment B 109 2280 1121 188 BcVos - Segment C 114 2720 1178 343 BcVos – Segment D 68 3084 1526 237 BcVOS not classified – Others 3848 2211 726 Total 16959 7897 2208

Page 78: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� Human Resources in ICT

78 SEFBIS Journal 2009. No.4.

Table 9-4. Distance Among the Master Level Programs and Business Requirements for the Business Process Analyst/Designer ICT Role (see Figure 9-2 and Figure 9-3)

Master level programs segment name

Distance (in number of required addi-

tional training days)

Number of Stu-dents in school

year 2005/6

Number of En-rolled in school

year 2005/6

Number of Gradu-ates in school year

2005/6 Mgr5 – Segment A 155 1610 378 483 Mgr5 – Segment B 59 1601 202 196 Mgr5 – Segment C 40 1027 339 175 Mgr5 – Segment D 42 749 216 68 Mgr5 not classified - Others 852 376 351 Total 5839 1511 1273

CCoonncclluussiioonnss General results of our survey are to:

– build up of facilities for regularly (annually or each second year) investigation and monitoring for:

• ICT oriented study programs and courses, • business requirements for knowledge of ICT

graduates (bachelor and master),

– forecast needs in new study programs and courses in the area of ICT.

After analyzing results in the way as presented in Table 9-1 and Table 9-2 for all ICT roles defined in this project, we came to the following interesting conclusions.

– ICT oriented study programs significantly differ in the level of knowledge provided in comparison with the business requirements. Even though all the surveyed study programs were defined and presented as IT related, there is a big difference among them. E.g. graduate of BcVos A segment study program requires 78 extra training days in comparison to graduate of BcVos D segment to start in Business Process Analyst/Designer ICT Role. In total graduate of BcVos A segment (32% of all graduates) requires 146 extra train-ing days which makes him/her absolutely un-competitive at the IT labor market.

– There is no direct relationship between the spe-cific study program and specific ICT role. Some study programs form excellent background for any of the defined ITC roles, others are not useful for any of the defined roles.

– Graduate bachelors in the Czech Republic do not have in majority of cases (at about 85%) appropriate knowledge profile to enter business as qualified employees (especially in Business Process Analyst/Designer, Developer/IS Archi-tect, IS/ICT development and operation man-ager) without additional training. They are too “expensive” in terms of further education in companies. Bachelor programs are nowadays in fact formulated not as standalone, but rather as prerequisites of the Master studies. Related conclusions we have found in South Africa con-ditions (Scott at al, 2002).

– Situation is better for graduates of Master stud-ies where "only" at about 40% is not competitive and not able to enter the IT market without ex-tensive training.

– It is time to start restructuring of higher education system especially in ICT education in the Czech Republic. It must be realized by opening of new study programs in ICT, which have to offer multi-, trans- and interdisciplinary presentation of knowl-edge.

RReeffeerreenncceess [1] Banker, R., D., Kauffmann, R., J. (1988) Strategic

contributions of Information Technology: an em-pirical study of ATM networks. Proceedings of the Ninth International Conference on Information Systems, 141-150.

[2] Carr, N., G. (2004) Does IT Matter? Information Technology and the Corrosion of Competitive Ad-vantage, Harvard Business School Press, ISBN 1-59139-444-9

Page 79: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

����

SEFBIS Journal 2009 No. 4 79

[3] Delina, R., Lavrin, A. Mihok, P. (2006) European IST Projects With Impact on E- commerce, In: IDIMT-2006, New Platform for Co-operation. Linz, Universität Linz, 2008, ISBN 3-85487-049-9.

[4] Doucek, P., Novotný, O., Pecáková, I., Vorisek, J. (2007) Lidské zdroje v ICT – Analýza nabídky a poptávky po IT odbornících v ČR. 1. vyd. Praha : PROFESSIONAL PUBLISHING, 202 s. ISBN 978-80-86946-51-1 (In Czech)

[5] Doucek, P., Novotný, O. (2007) ICT Education and Requirements for ICT Graduates in the Czech Re-public. Mauritius 16.11.2007 – 18.11.2007. In: CSITEd 2007 [CD-ROM]. Mauritius : ISI, s.

[6] ICT Skills Monitoring Group (2002), Final Report – Synthesis Report E-Business and ICT Skills in Europe, ec.europa.eu/enterprise/ict/policy-/ict-skills/wshop/synthesis-report-v1.pdf

[7] Scott, E., Alager, R., Pequeno, S., Session, N.

(2002) The Skills Gap as Observed between IS Graduates and the Systems Development Indus-try–A South African Experience, Proceedings of the Informing Science & IT Education, www.informingscience.org

[8] Strawman, J. (2004) Computing Curricula 2004 Overview Report including A Guide to Undergradu-ate Degree Programmes in Computing, Strawman Draft, ACM/AIS/IEEE, 1, http://www.acm.org/education/curricula.html

[9] Sudzina, F. Kmec, P. (2006) The technological paradox and evaluation of the benefits of informa-tization, In: Ekonomický časopis, Vol.: 54, Issue: 3, Pages: 281-293, Slovak Academic Press, Brati-slava, ISSN: 0013-3035 (In Slovak)

[10] Voříšek, J., Doucek, P., Novotný, O. (2007) Konk-urenceschopnost absolventů IT oborů VŠ a VOŠ. Inside, 2007, č. 8, ISSN 1214-1305. (In Czech)

Jiri VOŘÍŠEK dr. is a Professor and Head of the Department of Information Technologies at the University of Economics, Prague (Czech Republic). He is founder and the President of the Czech Association for Systems Integration, and CEO of consulting company ITG Ltd. He received his PhD in management information systems from the University of Economics, Prague. He specialises in strategic management of information systems, systems integra-tion, outsourcing and methodologies of IS design and implementation. He is author or co-author of eight books and tens of textbooks, articles and conference papers. He is founder of the Systems Integration international conferences.

Petr DOUCEK is the head of the Department of System Analysis, Faculty of Informatics and Statistics, University of Economics in Prague, member of the scientific board of this faculty. He graduated in 1984 in specialization “Mathematical Modeling of Economics Processes”. He is actually working at the Department of System Analysis since 1990. In 2007, he was appointed professor in Informatics. He is author of 7 monographs and more then one hundred papers in conference proceeding books or in scientific journals. He took part at more then thirty international projects for international and Czech corporations. He is member of several international program committees of conferences in Europe and in the USA as well.

Ota NOVOTNY works as an Associate Professor at the Department of Information Tech-nologies, University of Economics, Prague, Czech Republic. He received his PhD in measurement of information systems from the University of Economics, Prague. His main research field concentrates on IS/ICT services management and measurement, per-formance management systems and human resources in IS/ICT. He has been repre-senting Czech Republic in ISO/IEC JTC1 SC7 Subcommittee for Software and System Engineering (responsible for elaboration of ISO/IEC Information Technology standards) since 2002. He has been also working as an independent consultant in a number of pro-jects connected with his research field since. He is a co-author of four books, author and co-author of several textbooks, conference papers and journal articles.

Page 80: Foreword 1. Foreword Editorial Foreword to the …gikof.njszt.hu/sefbis/SEFBIS_Journal_4evf4szam_2009...nies, second to ERP systems (Gartner, 2008), sup-ports these findings. In a

���� SEFBIS Board’s Decisions

80 SEFBIS Journal 2009. No.4.

SEFBIS Board’s Decisions

10. SEFBIS Board’s Decisions SSEEFFBBIISS BBooaarrdd’’ss AApppprroovveedd aanndd PPeerrffoorrmmeedd DDeecciissiioonnss iinn 22000088

DDeecciissiioonn NNoo.. 3333//22000088..

It is important to strengthen the effective coopera-tion between the professionals being active in the different fields of the society. The SEFBIS Board takes every possible effort to get the academicians closer to the real space of IT professionalism.

Responsible: Gábor HOMONNAY

DDeecciissiioonn NNoo.. 3344//22000088..

The SEFBIS Board and the Editors of SEFBIS Journal make efforts to win more IT professionals and academicians over supporting the publications, and to obtain sponsors for publishing the Journal.

Responsible: Péter DOBAY

DDeecciissiioonn NNoo.. 3355//22000088..

After some years of the Higher Educational Reform and introducing the two-level system, the members of SEFBIS take the responsibility of maintaining all the educational recourses: curriculum, books, lecture notes, sharing the knowledge, experience and en-ergy of professors, teachers, technicians, and help the parties on both sides to co-operate and gain benefit from the cooperation.

Responsible: Mária RAFFAI, András GÁBOR

DDeecciissiioonn NNoo.. 3366//22000088..

Strengthen the relation between the academicians and business in order to plan curriculums that the society needs and satisfy the user requirements laying claim IT professionals.

Responsible: Gábor HOMONNAY

DDeecciissiioonn NNoo.. 3377//22000088..

Hosting the 40th IFIP TC 8 Information Systems Technical Committee annual meeting in Budapest on 31 October-1 November 2009. Beginning the preparation work.

Responsible: Mária RAFFAI, SEFBIS Board members

DDeecciissiioonn NNoo.. 3388//22000088..

Active participation in organizing International Con-ferences (IDIMT, SM) to take easier widely known the scientific and development results of the Hun-garian professionals.

Responsible: Mária RAFFAI, Péter DOBAY

DDeecciissiioonn NNoo.. 3399//22000088..

Special attention to the supporting the young sci-entists and doctorates in publishing their scientific results in different forms (conferences, scholar-ships, awarding, publishing in professional Jour-nals). Organizing “Conference for Young Scientists” and with awarding the best ones.

Responsible: Mária RAFFAI

DDeecciissiioonn NNoo.. 4400//22000088..

Applying to WG 8.9 and IFIP for hosting the 3rd

CONFENIS Conference in Győr. Beginning the preparation and organization work. Co-organizers: John von Neumann Computer Society, Széchenyi István University, SEFBIS Professional Community specialized in Business Information Science and the County Community of John von Neumann CS.

Responsible: Mária RAFFAI, Péter DOBAY