• Leading in the Age of Super-Transparency

    This is an MIT Sloan Management Review article. When Martha Payne, a 9-year-old student in Argyll, Scotland, started a blog in April 2012 to photograph and rate her school lunches, she had no idea of the stir she would cause. The blog logged 2 million hits in its first six weeks. When the local area council asked her to stop, an online firestorm ensued and the council reversed its decision. It's a familiar story -every day, images or events with the potential to incite passions get captured digitally, posted to the Web, and "go viral."With social media, people share their experiences with friends or followers, who share with more people. Seemingly insignificant occurrences can strike a nerve with a nascent virtual community, and unsuspecting parties must respond to a dicey new problem. The capacity to generate causes and controversies almost instantly may be the most salient aspect of what authors Robert D. Austin and David M. Upton call the "super-transparent society." Historically, the authors explain, people in a particular community were the only ones who paid attention to the local goings-on. When information moved outside of that environment, it was due to deliberate action: some identifiable person or organization moving it. If you wanted to guard information, you built a barrier. Many things have changed, particularly the volume of information. The article suggests several steps that can help managers meet the new expectations for transparency, including the following: Examine your assumptions about how you can keep information contained. Review your strategy for dealing with vulnerability to unintended transparency. Review operations for issues that might be problematic if revealed. Assume that others will put out information about your organization for their own reasons and that you won't be able to prevent it. Recognize that new information flows change what people consider to be fair.
    詳細資料
  • Cybersecurity's Human Factor: Lessons from the Pentagon

    With cyberattacks soaring, corporations must step up efforts to protect their IT networks. Most firms could learn from the U.S. military, which has been tightening its cyberdefenses for the past six years. In the past year alone, it adroitly repelled more than 30 million intrusions. A focus on reducing human error is core to the military's heightened security. As is true in the private sector, mistakes by administrators and users open the door to the vast majority of successful attacks. To address this, the Defense Department has been borrowing from the "high reliability" practices of the U.S. Navy's nuclear program, which hasn't had a single accident in its six decades of existence. In this article the former vice chairman of the Joint Chiefs of Staff, a special assistant to the Joint Chiefs' chairman, and a management professor describe the military's approach and how business leaders can apply it in their firms. It involves six cultural principles: integrity, which leads people to adhere fully to protocol and own up immediately to mistakes; depth of knowledge, which is ensured by rigorous and continual training and testing; procedural compliance, which is enforced by extensive inspections; forceful backup, to prevent problems that could be introduced by workers acting alone; a questioning attitude, which induces people to investigate anomalies quickly; and formality, which prevents miscommunication. By taking charge, making everyone accountable, and instituting tough standards for IT training and operation, CEOs can embed these principles in their organizations and close critical gaps in security.
    詳細資料
  • The Danger from Within

    The 2013 cyberattack on Target is just one recent example of a growing phenomenon: attacks involving connected companies or direct employees. According to various estimates, at least 80 million of these attacks occur in the United States each year--but the number may be much higher, because they often go unreported. Upton and Creese head an international research project whose goal is to aid organizations in detecting and neutralizing threats from insiders. Their team includes computer security specialists, management educators, psychologists, and criminologists, and their findings challenge conventional views and practices. "The doors that leave organizations vulnerable to insider attacks," they write, "are mundane and ubiquitous." In this article they discuss the causes of growth in the number of insider cyberattacks, the reasons behind them, and five ways to tackle the problem: Adopt a robust insider policy at every level of the organization; raise awareness of phishing and other ploys; screen new hires thoroughly; employ rigorous subcontracting processes; and monitor employees, letting them know that you will observe their cyberactivity to the extent permitted by law.
    詳細資料
  • Lean Knowledge Work

    Many manufacturing companies and some service firms have reaped considerable benefits by applying variations of the Toyota Production System, a method for making operations "lean" through relentless efforts to increase quality and efficiency and eliminate waste. But conventional wisdom holds that lean principles don't lend themselves to knowledge work, which involves judgment and expertise, not the sorts of repetitive, easily specified tasks found on an assembly line. The authors' research, including multiyear studies of some 1,800 projects at the Indian IT services giant Wipro, challenges this thinking. Knowledge work can be made lean, Staats and Upton argue, if managers draw on six principles: 1) Continuously root out all waste; 2) Strive to make tacit knowledge explicit; 3) Specify how workers should communicate; 4) Use the scientific method to solve problems quickly; 5) Recognize that a lean system will always be a work in progress; and 6) Have leaders blaze the trail. Applying these principles demands sustained investment and a grassroots reinvention of how work is performed. But the benefits are considerable: ever-increasing productivity and job satisfaction, and a system that will be hard for competitors to replicate.
    詳細資料
  • Tegan c.c.c.

    Examines a struggling IT outsourcing project from the perspective of the customer--Tegan. It should be used in conjunction with Hrad Technika (9-609-039), which illustrates the supplier's point of view. When Tegan, a Welsh toy distributor, outsources the development of a new accounts payable system to Hrad Technika, a growing outsourcing firm from the Czech Republic, Tegan believes they are getting a problem off their hands. Unfortunately the project goes poorly, and Tegan is left with the decision of how to prevent a failure in accounts payable from halting the entire company's operations. The case allows the examination of how to manage an outsourcing project and permits a general discussion about IT outsourcing.
    詳細資料
  • Hrad Technika

    Examines a struggling IT outsourcing project from the perspective of the IT services provider--Hrad Technika. When used in conjunction with Tegan c.c.c. (9-609-038), it provides an opportunity to see both sides of the issue. When Hrad enters into a contract to create a new accounts payable system for Welsh toy distributor, Tegan, the outsourcing firm from the Czech Republic views the project as another step in its progression towards delivering higher value services. Unfortunately the project goes poorly, and Hrad is left with the decision of how to rescue the relationship and avoid a similar problem in the future. The case allows the examination of how to manage an outsourcing project and permits a general discussion about IT outsourcing.
    詳細資料
  • Daewoo Shipbuilding and Marine Engineering

    Explores the journey of aggressive learning and capability building in the operations of a major Korean Shipbuilder. While DSHM had once used its superior learning capability to topple its Japanese competition, it now faced the potential for a similar attack from new Chinese competitors. Without outsourcing some of its work to China, DSHM would become uncompetitive. However, in outsourcing the work, some skills would necessarily have to be transferred, potentially teaching the future competition and providing them with a platform to attack DSHM's core markets.
    詳細資料
  • TCS: The MCA 21 Project

    Tata Consultancy Services (TCS), a leading outsourced software services provider based in India, must decide whether to bid on a high-profile government project within India. The project, if completed successfully, would mark another step in TCS' progression from a provider of low-cost technical resources to their goal of becoming an end-to-end technology enabled services provider. However, the project was not only complex but also presented considerable hazards to the firm. The case permits the exploration of how and when companies in developing countries can leverage their domestic markets to build capabilities to serve global customers, by using their home market as a base for learning. The case is also designed to examine strategies (more generally) for such organizations to climb the value chain, and access higher-margin businesses with powerful incumbents.
    詳細資料
  • Radically Simple IT

    Many managers think that developing and rolling out a major IT system is like putting up a warehouse: You build it and you're done. But that does not work for IT anymore. Taking that approach results in rigid, costly systems that are outdated from the day they are turned on. What's needed for today's businesses is IT that serves not only as a platform for existing operations but also as a launchpad for new functions and businesses. In this article, the authors present a path-based approach that addresses the primary challenges of IT: the difficulty and expense of mapping out all requirements before a project starts because people often cannot specify everything that they need beforehand; the other unanticipated needs that almost always arise once a system is in operation; and the tricky task of persuading people to use and "own" it. Japan's Shinsei Bank emerged during the authors' research as a standout among the companies applying the path-based method. The firm designed, built, and rolled out its system by forging together, not just aligning, business and IT strategies; employing the simplest possible technology; making the system truly modular; letting it sell itself to users; and ensuring that users influence future improvements. Some of the principles are variations on old themes, while others turn the conventional wisdom on its head.
    詳細資料
  • Akshaya Patra: Feeding India's Schoolchildren

    Describes a highly successful effort by an Indian Charity to feed poor schoolchildren at lunchtime. This provides two significant benefits. It improves nutrition for the children, and helps keep them in school since the provided meal is occasionally the only meal they will have in the day. The organization has had great success in an urban environment, but now seeks a wholly different operations strategy as it stretches out to rural India.
    詳細資料
  • Codelco Copper Mines

    Codelco was a Chilean copper-mining company, widely considered to be one of the most professionally managed firms in South America in spite of the fact that it was 100% government-owned. A $10.5 billion company in 2005, Codelco faced the challenge of incorporating information technology into its production processes, which had historically been very manual in nature. CEO Juan Villarzu's initial turnaround attempts introduced a customer-centric corporate culture to his ranks, but he was still challenged by how to create an outsourcing strategy given his location and the traditionally low IT-to-total-spending ratio in the mining industry. Villarzu envisioned moving to a robust IT architecture, enhancing the solutions that were available, identifying further needs in the company and deciding how to fix them, and working together with Codelco's business processes to assess, plan, and build new IT projects.
    詳細資料
  • Information Technology and Innovation at Shinsei Bank

    Shinsei Bank was rebuilt from the ashes of a failed predecessor, and pioneered new levels of customer service in retail banking in Japan. The bank's information technology, however, was vestigial at best and not well suited to the new service models Shinsei was offering. The bank's charismatic CIO, experienced in technological change, developed a modular, flexible infrastructure based on simplicity and parity. Describes the formation of Shinsei's new IT system, and raises questions as to Shinsei's potential in selling the IT design further down the road.
    詳細資料
  • Lean at Wipro Technologies

    Wipro Technologies, a rapidly growing software services firm based in India, decided to use principles from the Toyota Production System (also known as lean) to fundamentally change their operating model. Looks at why Wipro chose to use lean and how they went about implementing it in a novel context such as this. Provides detail of Wipro's internal and external environment, which was necessitating the change (shift from delivering a low-cost product to providing a business solution). Also, explores whether this new approach can lead to a substantial competitive advantage.
    詳細資料
  • Lean at Wipro Technologies, Spreadsheet Supplement

    Spreadsheet supplement for case 607032.
    詳細資料
  • Wipro Technologies: The Factory Model

    Based in Bangalore, Wipro Technologies is a rapidly growing software services company. Wipro is experimenting with a new software service delivery model that draws on the principles of the Toyota production system and "lean" manufacturing. Addresses the advantages and disadvantages of software outsourcing and how to mitigate the effects of, for example, lock-in and hijacking. Explores how Wipro has helped its customers deal with these issues and looks at the changing competitive role of Indian outsourcers (from low-cost, to high-quality/rapid turnaround). Specifically explores Wipro's experimental use of lean principles as a source of new competitive advantage in software services. Also addresses the issue of standardization in information technology, examining why companies progressively develop so many standards and how companies like Wipro can help them standardize, thus limiting one of the primary drivers of companies' IT costs.
    詳細資料
  • Foremostco, Inc. (B)

    Supplements the (A) case.
    詳細資料
  • ITC eChoupal Initiative

    Soybean farmers in India have traditionally sold their product through ineffective and frequently dishonest physical marketplaces (mandi). Farmers are generally poor and often illiterate and are forced to be "price-takers" after an arduous journey to the mandi. They also have very limited access to information and education on farming techniques. Describes the use of Internet technologies to reach these farmers and, in particular, examines a new system called the eChoupal, developed by the Indian conglomerate ITC. The eChoupal has reengineered the antiquated soybean export supply chain using digital technology in rural farm villages. Based on a clever understanding of technology, sociology, and the incentives of the various players involved, the eChoupal provides farmers with effective methods of price discovery, honest trading, and information sharing to the benefit of all in the channel. Discusses the achievement, opportunities, and challenges of the managers of the new supply chain.
    詳細資料
  • Foremostco, Inc. (A)

    Describes the rocky transition from an outdated, nonintegrated information system to a new customized system built by programmers in a small, IT-dependent foliage company that distributes plant material. The old system has increasingly become a "burning platform," but the project to build the new system is plagued by delays, the idiosyncrasies of the business, and lack of IT knowledge on the part of senior managers. The transition threatens to put the company out of business, and the crisis forces the COO to take charge of the project personally. After the new system goes live, however, it proves to be buggy and unreliable. The company comes even closer to collapse, and COO Penny Roberts must rally the team around an unpopular project whose success no one can guarantee. Teaching points include IT systems transition, IT management in small companies, and how to deal with an IT-based, business-interrupting disaster.
    詳細資料
  • McDonald's Corp. (Abridged)

    McDonald's has over many years built an operating strategy based on consistency and quality through a limited product range. Competitive forces have drawn the company into a much wider variety of foods and services to maintain growth. Now, new competitors threaten to beat McDonald's at its own, original game.
    詳細資料
  • Operations-Based Strategy

    Although most companies confine their operations organizations to restricted, tactical roles, in some of the most successful firms operations has served as the foundation for--indeed, the driver behind--successful strategic attacks and defenses. This is most clearly seen in cases where small companies--although lacking the advantages of size, market position, and proprietary technology--take on big companies and in a relatively short time push their way to industry dominance. In such cases, the key to success often is an operations-based advantage. The peculiar nature of this advantage provides insight into the reasons many former industry leaders did not react more promptly and vigorously to such attacks, and why others, in contrast, were able to defend themselves successfully.
    詳細資料