Professional Documents
Culture Documents
Redesigning Business Processes - SAGE Knowledge
Redesigning Business Processes - SAGE Knowledge
com/adam/em/click/662599/cat=75551/uhook=CB4B0AD602E0/criterias=32_0_34_7_43_4_103_21_104_12_111_9_116_14_118_1_280_28_282_0_283_0_3563_9_)
The above remarks may sound a little bit counterintuitive to many people, who would probably argue that in most business situations it is important to meet face-to-face (and thus synchronously) to clarify business issues. This is probably true regarding communication aimed at clarification of issues, but it should also be noted that issue clarification more often than not involves the exchange of knowledge, not only information. That is, what is being argued here in connection with asynchronous communication applies chiefly to information, not knowledge. If one needs to exchange knowledge with someone else, to explain why an activity in a business process needs to be conducted in a particular way, for example, then by all means, walk over to that person and talk face-to-face or pick up the telephone and chat with her synchronously. It can be rather annoying and inefficient to have to explain something to somebody (e.g., why we ask customers to sign the same insurance policy twice) via e-mail. And previous research has shown that, when complex issues are being discussed, it can be as much as 10 times more time-consuming to discuss them electronically (often because we have to be so careful in our writing to avoid misunderstandings). So, if Mary needs to explain to John why the temperature of a chemical process should be kept at a particular level, then Mary will be better off setting up a meeting with John and explaining that to him face-to-face than e-mailing him. But if Mary needs only to tell John what the temperature level in question is, because John already possesses the necessary knowledge about the process to use that piece of information effectively, then Mary will be better off e-mailing John than meeting with him face-to-face. There are two other situations in which synchronous communication is more desirable than its asynchronous counterpart (all business process redesign guidelines have their exceptions and should never be used blindly). The first is when personal information needs to be provided to someone, particularly information that carries a high emotional content. Sending that type of information asynchronously, which typically involves the use of electronic communication media, often gives the recipient the impression that we don't care much about him or her. The second is when the information is of an ethically or legally sensitive nature, which generally means that it can be used in a lawsuit (or as a basis for filing criminal charges) against the person providing it. Here, asynchronous methods of communication are undesirable because, by definition, asynchronous communication requires the use of some kind of data repository (e.g., an e-mail box), which means that a record of the communication is generated. And it is not absurd to imagine that prosecutors and attorneys may use records in legal proceedings, sometimes in a twisted way, to make a legal point against those who generated the records. For example, in 1998, the U.S. Department of Justice, together with 19 states, filed an antitrust legal action against Microsoft Corporation, alleging that Microsoft engaged in anticompetitive practices over a period of time against developers of competing Internet browsers, most notably Netscape Communications. In that legal action, some of the key evidence used against Microsoft came in the form of e-mails exchanged among its executive officers (including Microsoft's top executive at the time, founder Bill Gates). Nevertheless, when information is what is being exchanged and it is not of a personal or ethically/legally sensitive nature, asynchronous communication is generally a better choice. There are many losses associated with synchronous communication, which make asynchronous communication a desirable alternative. For example, synchronous communication over the phone often leads to time being wasted in communication interaction setup activities (i.e., activities involved in getting the two people on the phone at the same time), since the individual starting the communication interaction has to wait for the other person to be found. Synchronous phone communication can also lead to other time losses, like those associated with having to play telephone tag (as colleagues make themselves unavailable for telephone calls to avoid being disrupted all the time). Also, communication tends to be less objective when it takes place face-to-
face or over the phone, as the immediate social presence of another real human being will prompt many people to discuss other issues (e.g., gossip) that are unrelated to the specific information that needs to be conveyed. Asynchronous communication can be implemented with simple artifacts such as in- and outboxes, fax trays, billboards, and e-mail boxes (see Figure 8.2). These artifacts work as dynamic, as opposed to static, information repositoriesthe difference here is that dynamic repositories (e.g., a student information entry form) store information on a much less permanent basis than static repositories (e.g., a student information file). An example of dynamic information repository is an e-mail box used by a college professor to store exam answers sent to him by students who took an exam online (and didn't cheat, of course). Another would be a wooden tray where waiters and waitresses leave for kitchen employees those little forms with information about what customers ordered for dinner, so that those employees can prepare the dishes exactly like the customers ordered them (and never send out medium-cooked steak, for example, when customers ask for it to be well-done). Figure 8.2 Information Repositories as Enablers of Asynchronous Communication
problems, the automaker's purchasing division tried to keep its old manual and paper-based process running in parallel with the computerized system (just to be on the safe side). The result was that two large static data repositories were being duplicated. The duplication was causing a considerable number of purchasing problems, and also a substantial amount of money to be lost by both the automaker and the suppliers. For example, since both the computerized and manual systems were in place, some purchasing division employees felt that they could use either system. That led to inconsistencies in the computerized and manual data repositories, which in turn caused orders for parts to sometimes be placed twice, once using the computerized system and then again using the manual system. Since the automaker's factory had been designed based on lean manufacturing principles, it had limited warehousing space. Thus, the duplicated orders often led to the additional unused parts being stored in inappropriate places, and, in consequence, becoming defective prior to going into the assembly line. Sometimes the automaker put up with the costs of those defects, while other times the suppliers were made to pay for them; even though it was not their fault, the suppliers would not risk losing their business with the automaker over a dispute in connection with defective parts. This situation persisted for a while, until the automaker's purchasing division was convinced by a group of consultants that they should have had only one supplier management system in place: the computerized one. What about the problems with the computerized system? Well, it turned out that those problems were relatively easy and inexpensive to solve. The solution essentially involved creating storage redundancy by employing a technical solution that later became widely known as disk mirroring using a redundant array of independent disks (RAID-1). Through this technical solution, information is stored concurrently into more than one hard disk at a time. This means that, in the case of two disks being used in a RAID-1 configuration, both would have to fail at the same time for information to be lost, which is statistically improbable. When one looks at the technical literature, it seems that most problems that can lead to duplication of information in different static repositories are easily resolved with technical solutions. It is important to stress that what is called here information duplication in static repositories actually refers to operational duplication, where the same type of information is entered by people and retrieved separately to and from different static repositories. Those repositories may be computer based or notit doesn't matter. The notion of operational duplication does not apply to two types of database technologies that may appear to involve duplication, namely backup and synchronization. When a computer-based information repository is backed up, a copy of it, often compressed, is created on a data storage medium. That copy, or backup, is not used for information entry and retrieval in connection with any business process, with the exception of a data recovery process. Or, in other words, the backup data is only used in special circumstances, such as when the original data are accidentally lost. While the notion of data synchronization is similar to that of data backup, synchronization usually serves different purposes. One type of common synchronization is that carried out regularly by owners of personal digital assistants (PDAs), which usually involves synchronizing a set of PDA files (e.g., calendar, address book) with their mirror files sitting on the hard disk of a personal computer. Another type of synchronization, sometimes called remote synchronization (see Figure 8.3), involves replicating changes made to a computer-based database to another, remotely located database. For example, let us assume that the sales department of an industrial scale manufacturer is located in Portland, Oregon, and that its engineering department is located in Philadelphia, Pennsylvania. Both departments enter information into, as well as retrieve information from, a product database, which stores details about the company's many products, including their technical specifications and prices. As soon as new information is entered into the database in one location (e.g., Portland), a synchronization software application updates the database in the other location (e.g., Philadelphia), and vice versa. Figure 8.3 Reducing Information Duplication in Static Repositories
In both types of synchronization discussed, a synchronization software application works in the background to ensure that only one logical data repository is maintained, even though physically different copies of the data repository exist in different locations. That is, from the users' perspective, only one version of the data repository is maintained, and thus there is essentially no duplication of information in different static repositories. The same is true for backups. In fact, synchronization and backup technologies often solve many of the problems that could lead to information duplication in different static repositories.
at preventing fraud. The bottom line is that the total amount spent in inspections, in this example, is $2.5 million per year, whereas the total amount lost due to fraud, if there were no inspections, would be about $1.9 million. That is, not only is the company wasting about $625,000 a year, it is also annoying those customers who are unlikely to cheat (the vast majority, or 95 percent) with unnecessary inspections. Or, in other words, if the company performed no inspections for those customers, they would be more satisfied, and the cost for the company would in the end be lower. But let's go back to the issue of unnecessary information flow and its elimination. Excessive information flow is often caused by information being perceived as an important component of processes, which it indeed is. The problem is that this perception drives some people to an unhealthy information hunger. This causes information overload and the creation of unnecessary information processing functions within organizations, such as middle managers, whose main responsibility is to relay information from the top of the organization to the bottom and vice versa, without adding anything to it. Some of these folks even think that what they do gives them some measure of job security, because, they think, information is power. The problem with that line of thinking is that what those middle managers do is relatively easy to automate, which is why they are often the first to lose their jobs as a result of business process reengineering. Information overload leads to stress and, often, the creation of information filtering roles, in addition to the information buffer roles mentioned. These roles are normally those of aides or, again, middle managers, who are responsible for filtering in the important bit from the information coming from the bottom of and from outside the organization. Conversely, excessive information flowing topdown forces those middle managers to become filter-messengers, to the damage of more important rolessuch as making good hiring decisions and motivating their employees. A former colleague is a good illustration of that (let us call him Mario, which is not his real name). Mario was the lead consultant in an information technology-enabled restructuring project that involved an entire organization. Mario's main job seemed to be to talk with the company's chief executive officer and inform his team about the chief executive officer's most relevant decisions. That was done in such a way that was clearly a big waste of time, especially because Mario always kept the consulting team somewhat in the dark. He would usually come to the team, often late in the afternoon, make the team members stop what they were doing, and tell them something like this: I talked with the chief executive officer today again. I can't tell you everything about what we discussed, but I can say this. What usually followed was some piecemeal information on the status of our project, whether there would be a follow-up project (many consulting firms try to secure follow-up projects as a way of increasing their revenues), and so on. Some months later, the team members found out that Mario had been fired. Apparently, the consulting firm's brass did not see Mario's information-filtering role as a value-adding one and decided to replace him with someone who could actually do something other than what they perceived as simply schmoozing with the chief executive officer. Selecting the information flows that appear to be important in business processes and eliminating the rest can be a simple yet effective approach to reduce information flow. Since much information flows through organizational forms, whether those forms are paper based or electronic, reducing information flows often becomes an exercise of streamlining and, in many cases, downright elimination of forms. Sometimes, reducing the number of contact points in a business process (a guideline that is discussed in the next section) also will go a long way in terms of eliminating unnecessary information flow in the process. As for the roles played by information buffers and filters (see Figure 8.4), those can more often than not be easily eliminated by effectively employing commercially available systems, such as electronic collaboration and decision support systems. For example, information that is supposed to flow top-down in a life insurance company, from the executive officers to all of the employees, no longer has to be passed down by middle management employees through each of the successive hierarchical levels of the company. It can simply be broadcast by the executive officers to the entire company via e-mail. Conversely, information about operations (e.g., number of phone calls taken in different geographic areas, percentage of phone calls that led to a signed policy) can be automatically and directly summarized to senior managers by decision support systems (sometimes referred to as online analytical processing systems) running on those managers' personal computers, building on data stored in operations data management systems. Figure 8.4 Information Buffers and Filters
reduced to a minimum (see Figure 8.5). In a self-service buffet restaurant, for example, the customers come in, eat whatever they want, and then pay a set amount at the cashier when they leave. However, as with all of the business process guidelines discussed in this book, one cannot slash contact points blindly. Still using the restaurant industry as an example, turning a serviceoriented French restaurant in New York, where customers go specifically for the elaborate service (e.g., to impress their guests), into a self-service buffet is likely going to push it into bankruptcy. Figure 8.5 Reducing the Number of Contact Points in a Process
analogy to emphasize this point. The right time for the members of a soccer team to learn about a particular game strategy to be used against a tough opponent is before, not during, the championship final.
unnecessary information flow, reduce the number of contact points in a process, minimize knowledge transfer in operational processes, and maximize knowledge transfer in organizational learning processes. The chapter also shows that one key type of organizational learning process is the business process redesign process (or meta-process) itself. The techniques discussed in this chapter are only a subset of all the techniques that could be discussed based on the communication flow optimization paradigm adopted by this book. Nevertheless, it is reasonable to believe that such a subset of techniques can lead to significant levels of quality and productivity improvement in most business processes, even those that do not seem to be terribly communication intensive at first glance. Obviously, it is important to note that, since the techniques discussed in this book are aimed at improving the flow of information and storage of knowledge in business processes, those processes that involve no flow of information and storage of knowledge cannot benefit from them, and those processes that involve little of those elements cannot greatly benefit from the techniques. This caveat, however, likely applies to a very small number of business processes. Rarely does one come across processes that cannot be substantially improved from an information and/or knowledge perspective.
Review Questions
1. Asynchronous communication is: (a). Preferable when what is being communicated is mostly knowledge. (b). Not indicated when communicating primarily information. (c). Usually more efficient than synchronous communication for business interactions in general. (d). Illustrated by a telephone conversation. 2. To implement asynchronous communication of information, we need: (a). To always spend a great deal of effort. (b). To convince people to talk over the phone more often. (c). To develop, as professionally as possible, at least three normalized databases. (d). To create information repositories, if they don't yet exist. 3. Static information repositories do not differ from dynamic information repositories in that: (a). Both store information. (b). They store information over different lengths of time. (c). They are usually implemented in different ways. (d). Dynamic repositories often store information in a temporary way. 4. Which of the following describes a problem that has been created chiefly by the duplication of information in static repositories? (a). Two sales teams at Alpha Corp. engage in predatory competition against each other, which negatively affects both of their sales performances. (b). Carl misplaces chemical materials, which have a short lifetime, in the storage warehouse of his factory, which leads to the loss of those items. (c). John and Mary order the same batch of parts twice, because John uses a computerized inventory control system and Mary uses a paper-based one. (d). Mark forgets that he invoices one of his customers, and then invoices that customer again, which leads to several complaints and, ultimately, the loss of the customer to a competitor. 5. Which of the following describes what clearly seems to be a negative business consequence of excessive information flow? (a). Half of the middle managers at a large insurance company spend most of their time summarizing operations information to support senior management decision making. (b). Too many parts are used in a new car model, making it overpriced in comparison with competing models. (c). When forecasting sales for the coming year, a sales department manager uses information that has been produced by a decision support system. (d). The chief information officer of a company is fired after refusing to abandon a project that is obviously going to fail. 6. It is correct to say that a contact point is always: (a). A point at which food changes hands in a restaurant. (b). A communication interaction between a waiter and one of his customers. (c). An e-mail interaction between any two individuals.
(d). A point where there is interaction between two or more people. 7. Contact points have not: (a). Been called moments of truth by a former chief executive officer. (b). Been hailed as the solution to all business problems. (c). Been reduced in buffet restaurants, when compared with traditional restaurants. (d). Led to increased customer satisfaction with service speed in certain industries. 8. Regarding knowledge transfer in business processes, we can safely say that: (a). It should be minimized during the execution of operational business processes. (b). It should be maximized during the execution of operational business processes. (c). It leads to decreased outcome quality in business processes in general. (d). It always increases the need for information transfer in organizational learning processes. 9. Which of the following statements is not true? (a). Management should foster knowledge sharing in nonoperational processes, such as organizational learning processes. (b). Organizational learning processes can improve business productivity by fostering knowledge transfer among business process team members. (c). New employee orientations are not the absolutely best alternative to encourage knowledge transfer among members of a business process team. (d). New employee orientations are not at all conducive to knowledge transfer. 10. It is correct to say that: (a). Knowledge transfer should take place always after the routine execution of operational processes. (b). Since business process redesign is also conducted through a set of interrelated activities, it can thus be seen as a business process as well. (c). Prior research has shown that individuals participating in groups carrying out operational processes tend to engage in more than twice as many knowledgebearing exchanges as individuals conducting activities in business process redesign efforts. (d). Minimization of knowledge transfer in operational processes never occurs naturally over time as a result of learning-while-doing interactions.
Discussion Questions
1. Consider the following scenario. You have just been hired as general manager of a home improvement store that sells a variety of tools and parts. Let's call this store United Hardware. This is a store like Home Depot and Lowe's, but, unlike those, it is not part of a chain of stores. The store makes a lot of money selling big items such as lawnmowers, scales, and electronic home security equipment, which are items that have a large profit margin. However, there is one big problem: The store is losing money on the sale of small items such as nuts, nails, and screws. How would you deal with this problem? How does your solution relate to the issues discussed in this chapter? 2. What other techniques could be used to redesign business processes, beyond the ones discussed in this chapter? Illustrate your answer through the development of a detailed business scenario. 3. Develop a business scenario where a number of problems exist that can be addressed through business process redesign. The scenario developed by you should be as realistic as possible. Develop a business process representation associated with the scenario you created. Then carry out the two following steps: (a) Apply the business process redesign techniques discussed in this chapter, and develop a representation of the new redesigned business process; and (b) then apply the new techniques you developed in response to the previous discussion question, and develop a representation of the resulting business process. Is there a big change between the representations generated in Steps (a) and (b)? Why? 4. Can the techniques discussed in this chapter be used in both continuous (e.g., total quality management-like) and radical (reengineering-like) business process improvement projects? Illustrate your answer through the development of two business scenarios, one for each type of business process improvement project (i.e., continuous and radical). 5. Among the techniques discussed in this chapter, are there a few that would be particularly useful for organizations where the main service provided to external customers is knowledge transfer (e.g., universities)? Why? http://dx.doi.org.ezp01.library.qut.edu.au/10.4135/9781452224794.n8
(http://dx.doi.org.ezp01.library.qut.edu.au/10.4135/9781452224794.n8)