Information Technology and the World

The name of this blog, Information Technology and the World, may seem grandiose. It probably is, but then my plans for it are also grandiose. I want us – you and me – to explore three issues: (1)the impact of information technology on business and society; (2) the impact of society on information technology; and (3) the lessons that each domain can teach the other, including both the possibilities and the limits of what technology and society can accomplish.

Name:
Location: Chicago, Illinois, United States

I have worked in construction, petroleum, software and consumer electronics. Professionally, I am a physicist, and engineer, and an IT professional.

Wednesday, February 28, 2007

Save Money the Easy Way – Stop Doing Useless Things

Most organizations spend a lot of time and money doing things that are totally useless, and they don’t even know it. If you eliminate these things, you can save a lot of money, with little up-front expense. It is not hard to identify these opportunities, but it takes some effort and a lot of courage to eliminate them.

In the days of mainframe computing, one of the biggest tasks at the computer center was printing and distributing reports. Large companies had multiple high speed line printers (24,000 lines per minute was a standard speed) and platoons of messengers with carts to distribute them.

Everybody knew that most of these reports went unread, (there weren't a lot of 24,000 lines per minute readers) but most users were unwilling to give them up just in case they were needed. So some CIOs (then known as data processing managers) developed the tactic of simply not printing some arbitrarily chosen set of reports for a month or two. If no one complained, he permanently deleted the reports and proceeded to the next set. This continued until the complaints started. The computer operations departments saved a lot of money and the businesses got along just fine.

This particular problem ultimately went away as online systems and desktop displays made most printed reports obsolete. But there are a lot of other activities that are equally useless and are carried on because no one has had any incentive to curtail them. Here is one example.

I did some business process consulting a few years for a company that had headquarters in the United States and did business in about twenty-five companies around the world. In the course of our analysis we found that all sales contracts above $10,000 from one of the overseas offices were routinely sent to headquarters for approval. Our analysis showed that if the local approval limit were raised to $50,000, about 90% of the headquarters work would disappear, yielding substantial savings in time and money with very little added risk.

We recommended this change to management and were told that the local approval limit already was $50,000 and had been for a number of years. Further investigation showed that on one occasion, five years before our study, a contract approved locally had gone bad and local management had been blamed by headquarters. Local management took the understandable position of “never again”, and routinely sent everything above $10,000 to headquarters just to play it safe. Locals were protected, but the company spent a lot of money on useless work, and customer service suffered in the bargain.

This a common situation. A one-time problem arises and a business process “fix” is installed. The fix becomes permanent and continues long after the original problem has disappeared. The first task is to identify these things and kill them.

The standard way to go about this is business process redesign. (We don’t call it reengineering any more because that has become a four letter word.) But that is an extensive and expensive process. The trick is to pick a place to begin where you can see some immediate benefits, benefits that you can get without spending much time or money.

Here is one way to start. Ask each of your workers to identify the three most useless things they do. Use the results to decide where to start. Then pick the low-hanging fruit – the easy wins. When you have completed that process, you will know enough and have saved enough money start a real business process design project.

Or not. In many companies your can find enough low-hanging fruit to keep increasing your profits for a long time without ever going through the pain and disruption of a major business process redesign.
<><><><><>

Ethics and the Information Technology Professional

The current epidemic of corporate scandal and wrongdoing has involved mostly senior executives and their cohorts, as well auditors and investment bankers. There has been a lot of unarguably criminal behavior. When bad things that seem happen to be in a gray area of the law, we hear about ethics. “Maybe it wasn’t against the law, but it was unethical.”

All of this hue and cry caused me to wonder where IT fits into this picture, if anywhere. I am happy to say that so far I have seen no mention of IT in the press in connection with this wave of corporate corruption. However, for the future, it is worth asking: Is there something special about IT that creates special ethical problems for the IT professional? The answer, as we shall see is, "Yes, IT is different, but not very."

There are, it seems to me, three broad areas of concern, beyond actions that are clearly illegal.

    IT professionals are the designers and the custodians of the information systems that run the enterprise.
    IT professionals are the custodians of the information that these systems generate as well as the data that surrounds the systems. (Auditors and controllers might think that this is a usurpation of one of their roles, but clearly, IT has a big part to play here.)
    IT professionals have obligations as professionals, obligations that that they share with members of other professions.

Information systems have a lot of influence over the business processes that run the company. Theory says that IT designs systems that do what the users specify. The dirty little secret is that no matter how carefully and how well the users do their part in system design, there remains a myriad of details that the designers and programmers implement without user input as they go about their business.

Ethical issues for the designer/analyst abound.

    How far should the IT people go in imposing their ideas about how to conduct business processes when they design a new system?

    What should the designer/analyst do if the user does not properly specify parts of the system that do not directly affect the user’s own operation? This happens most often because of misguided efforts to save money and decrease implementation time. Things like security, audit trails and disaster recovery are also often neglected or ignored.

    In selecting the technology platform for a new system, does the analyst strike a reasonable balance among the needs of the user, the overall needs of the enterprise, and his personal preference to use a new and exciting technology?

The custodian of data and information faces a different set of problems.

    Personal privacy is at the forefront of our consciousness at the moment. How should the database manager respond if she is asked to deliver personal data about customers to an outside company? To a corporate affiliate?

    Personal privacy is an issue within a company as well. The supervisor of HR systems has access to a lot of information about employees, including in many instances health information. What should be disclosed? What should be held back? What should not be collected at all?

    Information about new systems is often exchanged by IT professionals from different organizations in order to keep up to date. When may this be done?

IT professionals, because they are prfessionals, have ethical obligations similar to those of other professionals, e. g., physicians, lawyers, accountants. These include

    The obligation to be competent at their professional tasks, and not to claim expertise that they do not have.

    The obligation not to use their status as professionals to deceive or bully others into doing things against their interests.

    The obligation not to use their status as professionals as a cloak for other agendas.

    Ironically, the professional obligation group (the last set listed above) are the most straightforward (although not necessarily the easiest.) Professional societies take these responsibilities seriously and offer extensive standards and guidelines.

    The data custodians must be guided by policies set by senior management and enforced rigorously. The stakes are too high these days to be cavalier about enforcing privacy policies. There are, of course, many technical tools and techniques to guard the privacy of data, but in the end human beings decide what should be shared and what should not.

    The ethical requirements on the analysts and designers of information systems are harder to define and enforce. They always in the mode of balancing competing interests: getting the current job done as quickly and inexpensively as possible versus making sure that the current work fits into the future plans of the enterprise; serving the interests of the immediate user versus not degrading service to the user of another system; balancing the capabilities of new technology with the lower costs and higher reliability of older technology.

    Each of these choices has both technical and business dimensions. The project management system must assure that all of these tradeoffs are considered by both business staff and technical staff, and require all decisions to be in the long term interests of the company.

    Those are the problems. What are the solutions? Philosophers and theologians have been trying to answer this question for millennia, with only modest success. So what can you do? The best overall guidelines I can think of come from the theologians of 2000 years ago. Jesus said, “Do others as you would have them do unto you.” Hillel (a rabbi who was roughly Jesus’ contemporary) phrased it slightly differently: “Do not do unto others that which you would find hateful if done to you.” These sound like retty good guidelines to me.


    <><><><><>

      Labels: ,