Saturday, January 25, 2020

Plain, Honest Men: The Making of the Constitution Analysis

Plain, Honest Men: The Making of the Constitution Analysis Plain, Honest Men: The Making of the Constitution. By Richard Beeman (New York: Random House) 2009. xxviii + 514 pp. Hardcover, $30.00. ISBN 9781400065707. Richard Beemans book, Plain, Honest Men is a chronological narrative about the day-to-day interactions of the men who made up the Constitutional Convention in 1787. Beeman takes special care in developing the characteristics and personalities of the delegates and explores how their moods, their personal interests, and the hot weather helped to shape the lively debates over the creation of the Constitution. He explores the personal relationships, marriages, and the physical and intellectual idiosyncrasies of the Founding Fathers. Beeman depicts the Framers in a variety of ways. Some of the men were savvy, while others were inept. Some smart and others just mediocre. Some individuals were sophisticated while others were just plain vulgar. Many were quite generous, but others were intensely narcissistic. Beeman characterizes James Madison as being an indispensable but reticent thinker who was incapable of any great oratory or sustained relationships. The author focuses on the issues such as the presidency, slavery, and the necessary and proper clause. On the issue of slavery, Beeman states that for the delegates, it was not the central issue at stake in the making of the American Constitution.[1] The author depicts the angry arguments over representation and its connection to slavery, which Beeman refers to as Bernard DeVotos paradox at the nations core.[2] According to the author, many delegates expressed aversion to slavery, but it was beyond them to conclude a way to abolish slavery without catastrophic consequences to the delicate union. Beeman reconstructs the relationships between Washington and Madison and their intelligent and influential female friends such as Elizabeth Powell, who was the wife of Philadelphias mayor, and also had strong political opinions of her own. Beeman describes George Washington as towering above other men and being reserved in nature. Benjamin Franklin is characterized as being jovial and James Madison as being diminutive. The author portrays Madison as arriving from Virginia with a detailed plan of government that entailed completely scrapping the Articles of Confederation and starting from scratch. William Paterson of New Jersey was balding and of an angry disposition, and yet he spoke his way to distinction as the spokesman of the small states and was resolute to challenge his neighbors in the larger states like New York and Pennsylvania. Roger Sherman was a former shoemaker from Connecticut who overcame his bashful rural persona to become the voice of compromise which soon gained the respect of all convention attendees. Sherman was instrumental in creating the compromise that relinquished some states rights by apportioning the House of Representatives on the basis of population and allowing for equal representation among states in the Senate. Gouverneur Morris, formerly of New York but currently resided in Pennsylvania, had a peg leg and whose arrogance and often careless rhetoric often alienated the other delegates, was a hypnotic speaker. In creating these personalities, he is aware of the confines of his source material. The records of this period were kept by men who most assuredly had partisan agendas and male-controlled receptivity. The book begins with the final days of the Revolution. Congress is bankrupt, the army has turned mutinous because of lack of pay, and the thirteen states do not get along. Daniel Shays, a discontented former army captain, leads his own rebellion in western Massachusetts. Representatives from both the north and the south believe the Articles of Confederation are not working and need to undergo some revisions; therefore, they agree to meet in Philadelphia the summer of 1787. This book is written for general audiences as well as supplemental reading for classroom teachers. In an effort to ensure the reader does not fall into boredom while reading the narrative, Beeman has added peripheral information to keep the readers attention. For example, he adds such trivia as the fact that the State House yard privy had sixteen seats and was divided into four compartments[3], a Philadelphia prostitute charged two dollars[4], and the delegates had beer, bread, and butter for breakfast[5]. The author makes use of both primary and secondary sources. He uses Madisons notes and the papers kept by Hamilton, Madison, and George Washington. Beeman also includes information collected by the Independence National Historic Park to assemble an accurate and authoritative account of the participants of the Constitutional Convention. The books title comes from a remark made by delegate and financier Roger Morris, who viewed the results of the Constitutional Convention as the work of plain, honest men. His important message is that our Founding Fathers could be both realists and idealists. The debates over slavery were the results of the limitations of educated men, who possessed a vision of what effective governance might bear a resemblance to but could not imagine extending the same rights to slaves as citizens. In writing Plain, Honest Men, Beeman avoids controversial issues such as the economic motives of the Founding Fathers and provides readers with an understanding of the fra gility of the consensus emerging from Philadelphia. Richard Beeman is considered by scholars to be an authority on the United States Constitution. He played a leading role in the creation of the National Constitution Center in Philadelphia and has served as vice-chair of its Distinguished Scholars Panel. Beeman has a vast knowledge of the era and is a noted historian of the late 18th century. [1] Plain, Honest Men: The Making of the Constitution. By Richard Beeman, xii. [2] Ibid, xii. [3] Ibid, 63. [4] Ibid, 74. [5] Ibid, 78.

Friday, January 17, 2020

Personal Academic Goals

The National Center for Education Statistics did a study on pay comparison between graduate and non-graduate workers. The study indicates that college graduates get paid an average of 38% more compare to those non-graduates. Therefore, finishing college is as important and should be a goal for most individuals if not everyone. My three personal academic goals that hope to achieve as a student here at the university are to earn a degree in management, learn how it affects roductivity in the workplace and also to improve written and oral communication skills.Understanding that going to college and graduate from it is no simple task. It involves numerous moving parts and those parts need to work together in harmony to achieve personal academic goals. Some of those moving parts that need enhancing are personnel responsibility, time management, written, and oral In my 24 years of military service, I did not take advantage of communications. acquiring a formal education even though the mil itary provides the opportunities and environment to take college courses and get a degree.When I was in the military, my priorities were more focus on getting the Job done making sure that military personnel get their personal records corrected and updated, get paid correctly and on time, provide briefs, submit reports, and conduct different types of trainings. After retiring from the military, my priority changes and academic success is in the front of it. By using my military educational benefits (GI bill) entitlement to jump start my desire to pursue higher learning and hoping to acquire a degree in management here at the university.The Association of American Colleges and Universities (AAC&U) researchers at the University of Michigan Center for the Study of Higher and Postsecondary Education (Eric Dey, 2008) that in categories they surveyed; students and professionals strongly agree that personal responsibility should be a major focus of a college education. The same study also demonstrates that 40% of college students acquire or develop personal responsibility while in college pursuing a degree.To me, personal responsibility is to admit and accept that no one is perfect, will make mistakes, take ownership of my actions, seek assistance when eeded, learn from it, and correct it. Time management is also important to students' academic goals, personal life, and career success. Setting short-term and long-term goals are an integral part of time management. In the book â€Å"Becoming a Master Student† (Dave Ellis, 2011, p. 61), emphasizes that students have enough time for the things they want to accomplish.It takes thinking about possibilities and making conscious choices (p. 61). Students know that there are 24 hours in a day and 168 hours in a week, â€Å"no more no less. † By making conscious effort to write down hould help meet deadline and task. As a student, I need to recognize that procrastination is the enemy of time management; fight it , destroy it, and stop it now! Managing and following time management diligently with no hesitation is a model for success for students to follow.Another key element to personal academic success is the importance of improving one's written and oral communication skills are vital in the workplace. The utilization of computers has been the greatest force for change in the environment and activities of an organization (Uhlig, 1977). Electronic evices, such as computers have been increasingly used as a medium in written and oral communications in the world of business today. To succeed, I have to learn the foundations of basic writing, grammar, and speaking in front of people.I must also understand that communications skills are a necessity and important in the business world not only in todays environment but also in the future, In conclusion, there are no shortcuts to academic success and that graduating from college are extremely difficult and time consuming. By improving, mastering, and applying acquired skills n personal responsibility, time management, oral, and written communications can prepare me to succeed in academic settings.Investing time, attention, patience, and perseverance must be the focal point of emphasis in achieving my academic goals. It is time to learn, conquer fear, fght procrastination, and enjoy every moment of it.

Thursday, January 9, 2020

IT Literature Review - Free Essay Example

Sample details Pages: 23 Words: 6913 Downloads: 2 Date added: 2017/06/26 Category IT Essay Type Research paper Did you like this example? CHAPTER II LITERATURE REVIEW This chapter -literature review- will consider many view points from the wide range of information and literature available regarding change management models, theories and approaches relevant to the generic business perspective and also those that have direct reference to the implementation of IT outsourcing process. Throughout this section, the research centres on change management, the different types of change models and theories, and the key change management factors affecting the outcome of an IT outsourcing implementation. Following the objectives introduced in chapter 1, the literature critically reviewed in this chapter will be used as a basis to compile the necessary questions to be able to analyse how the various components, such as top management support, user involvement, open communication with employee and Human Resources aspects (i.e., employee resistance, job insecurity, kill moral, lack of trust and turnover) that affects the outcome. Don’t waste time! Our writers will create an original "IT Literature Review" essay for you Create order Therefore, this literature review will begin with a short brief of historical overview on IT outsourcing, which will answers the three comprehensive and basic questions that an organization need to answer when outsourcing IT functions; those being Why, What and How. Consequently, answering the first question an organisation which is thinking of outsourcing its IT should ask is why, this likely to raise other questions marks of outsourcing aspects which are, what is the aim and goal of the outsourcing arrangement and which are the benefits(i.e. financial, strategic and technical factors)and risks(i.e. relationships, transition, strategic and vendor/technical risks )involved. Followed by discussing the crucial capabilities involved when using IT outsourcing. Then, will begin with a short exploration into the development of change management before moving onto analysing the use of change models, identifying their effectiveness within IT outsourcing implementation. 2.1 IT Outsourcing IT Outsourcing as a phenomenon is not a new occurrence. Actually it entered the IS/computer industry when it was still in an early stage. For example, the company Electronic Data Systems handled the data processing services for other businesses as early as 1963 (Lacity Hirschheim, 1994). In this early stage of outsourcing, computer service companies were mainly used to run programs within areas of financial and operational support, for example payroll and administration (McFarlan et al., 1995). The concept of IT outsourcing got its real breakthrough when Eastman Kodak in 1989 signed under to outsource its total IT operations to the three outsourcing vendors; IBM, DEC and Businessland. (McFarlan et al., 1995; Lacity Hirschheim 1993:1994) Until this point, outsourcing for medium to big companies had primarily been a sideshow and most common amongst smaller companies with problematic IT departments (McFarlan et al., 1995). Never before had such a big and well-known organizatio n, with IT as part of the strategic weapon, outsourced its IT operations. This became an outsourcing success and was the start of a tremendous interest and growth in the business. The Kodak deal sent the message that IT had matured into a commodity and therefore suitable to be managed by an external vendor. Company executives from all industries open their eyes for the outsourcing possibility and a bandwagon effect could be observed, and many big organizations like Xerox, Sears, British Aerospace, Continental bank followed. (Lacity et al., 1998; Lacity Hirschheim 1994) Explaining the enormous interest in IT outsourcing could, according to Lacity Willcocks (2000), be seen as a consequence of a shift in overall business strategy. During the 1990s many companies changed directions and abandon their diversification strategy to instead focus on their core capabilities. Many business leaders came to the conclusion that the only sustainable competitive advantage a company could hav e was to concentrate on what it does best. As a result of this new focus on core competence, the internal IT function became questioned as a competitive tool and was regarded as a commodity, thereby becoming a subject for outsourcing. IT outsourcing can in many cases be a strategy in itself and seen as a reactive move, part of bigger and more long-term changes of the organisation and its management (Willcocks Lacity, 1998). The last driver explaining the growth of the IT outsourcing market is the uncertainty of the value delivered by IT. The term money sink explains how many managers viewed and still view IT, experiencing problems with seeing the immediate benefits and not being able to measure e.g. increased revenue from IT investments. The desire to get rid of a troublesome IT function that is hard to asses and has problems with demonstrating its business value made the IT function and its services a hot target for cost reduction initiatives, often leading to outsourcing. ( Lacity Willcocks, 2000) Todays IT outsourcing industry has come a long way from the start in the early 60s. Some of the main differences are: 1. The size of the companies that are outsourcing today large companies outsource to a greater extent. 2. The industry has matured, now offering a wide range of services and in great number of alternative ways. 3. Outsourcing vendors are generally accepting to take on more of the risk and responsibility of the arrangement. 4. The relationship between the client and the vendor is increasingly seen as a partnership. 5. The complexity and technological intensity has increased, giving more companies the option of outsourcing in a competitive provider market. (Lacity Willcocks, 1998) 2.2 Why should organisations outsource? The first question an organisation which is thinking about outsourcing its IT should ask is why. Answering this question is likely to raise other question marks; what is the aim and goal of the outsourcing arrangement and which are the benefits and risks involved? 2.2.1 The aim and goal with the outsourcing To ensure a positive end result it is important in an early stage to manifest clear goals with the outsourcing arrangement and a well-defined objective. This is necessary to give the organisation guidelines to work with during the outsourcing process. The goal and aim of the IT outsourcing arrangement should be aligned with the overall business strategic requirements to get the best results (Capgemini European CIO survey, 2006) 2.2.2 Benefits Behind an outsourcing decision there can (as discussed in the previous chapter) be numerous incentives and factors. In general, IT outsourcing arrangements can be said to deliver one or more of the three following capabilities: infrastructure services and data centre operations, application development and maintenance, and business processes. Extensive research has been conducted on the subject of the benefits of IT outsourcing, presenting a number of potential benefits for organisations that let external vendors provide some or all of the IT related capabilities needed. (McFarlan Nolan, 1995; Ross Westerman, 2004) When evaluating the option to outsource different stakeholders perceptions and interests tend to bring a mix of financial, strategic and technical factors into play (Willcocks Lacity, 1998). In the section below some of the most important benefits are presented. These are not ranked in any particular order and the reader should keep in mind that the relative import ance of the benefits will vary for each organisation and are dependent on its specific situation. 2.2.2.1 Financial factors Cost reductions have for a long time, and still is, the most important driver for outsourcing. (Lacity Hirschheim, 94; Capgemini European CIO survey, 2006) An external vendor can primarily save money to its client by its ability to control economics of scale but also, since frequently managing similar projects, provide the scope to manage it effectively. Substantial cost savings can especially be made by offshore IT vendors, using low cost labor found in for example India. (McFarlan et al., 1995; Ross Westerman, 2004) Another financial aspect, motivating the use of outsourcing is increased control over the IT costs. Since IT costs are split with a rough allocation key in many organizations it is hard to get a clear overview of the cost drivers, which consequences can be excessive demand and consumption. Hence, the transaction costs theory (TCT) aroused by (Lacity and Hirschheim, 1993) to assume that organizations make outsourcing decisions based on an economic rationale. TCT is o bviously relevant as IT specifically addresses outsourcing decisions in regards to producing a good or service internally or externally (Williamson, 1975) and as proposed by Williamson that managers need to consider both production and transaction co-ordination costs. By using an external vendor organizations can also increase the financial flexibility by replacing the fixed IT costs with a price model that allows costs to vary with usage, thus containing costs and increasing control by having a system that more directly link costs to usage. (Lacity Hirschheim, 1994). TCT logic and conclusion rest on the assumption that efficiency is the dominant criterion for organizational success (Amundson, 1998). = = = article no.1 /p 3 2.2.2.2 Strategic factors Since the 1990s there has been a general trend towards specialization in most of the business world. Companies have abandoned the once so popular diversification strategy in order to focus on the business core competences (Lacity Hirschheim, 1994). By outsourcing IT processes that falls outside the core business vendors can free up resources in the organization to focus on more value adding activities within its core competencies (Ross Westerman, 2004; Erber Sayed-Ahmed, 2005). Moreover, Core competencies theory suggests activities should be performed either in house of by suppliers. Activities, which are not core competences, should be considered for outsourcing with best-in-the-world suppliers. Some non-core activities may have to be retained in house as they are part of a defensive posture to protect competitive advantage. (Gottschalk Solli-Sather, 2005). Due to extreme competition, organizations are forced to reconsider their resources to where they make the greatest positi ve impact, i.e. the organizations core functions. Thus, the complexity of IT, and its core nature, may make the contracting out of IT a particularly challenging exercise. In addition to the above, other strategy issues which encourage the consideration of outsourcing are restructuring, rapid organisational growth, changing technology, and the need for greater flexibility to manage demand swings (Eisele, 1994; Iyer and Kusnierz, 1996) = = article 2 /p 3. However, outsourcing of non-core competencies will continue to be important, as such arrangements place responsibilities, e.g. for IT, logistics or production functions, in the hands of the constituent most capable of performing these successfully. (Chandra and Kumar, 2000). 2.2.2.3 Technical factors Since outsourcing vendors, unlike their clients, have IT as their core competence they can build and leverage best practice in IT management. So by using the expertise provided by an outsourcing vendor it does not only enable the client to focus on its special core activities but also allows the firm to get access to cutting edge technology. By taking advantage of the experience the vendor has collected by managing several similar projects, the external vendor can provide technical skills which are hard to build and manage in-house and can thereby help the organization to create important business advantages. (Lacity Hirschheim, 1993) In some cases the main reasons for outsourcing can be to find crucial competencies that are lacking within the internal IT organization. The organization may feel that it is too expensive to build these internally, both time- and money wise (Willcocks Lacity, 1998). Technical considerations are captured by resource-based theory, such theory are more concerned with internal analysis of a firm in terms of resources and capabilities (Barney, 1991) = = article 1 /p5. Follows, in order to generate sustainable competitive advantage, the resource-based theory of the firm must provide economic value and must be presently scarce, difficult to emulate and non-substitutable. (Priem and Butler, 2001) = = Article 3/p3 According to Pettus (2001) = = article 3/p2 , outsourcing for this specific purpose, demands careful considerations when choosing the vendor. For the arrangement to be efficient it is important to realize that the external supplier not only has the required expertise but also a compatible company culture. 2.2.3 Risks When an organisation is evaluating whether to outsource or not, it is important not to forget the risks associated with outsourcing arrangements. When outsourcing IT services or capabilities the company will hand over a substantial part of its control. Ross and Westerman (2004) divide the risks with outsourcing into four major types: relationships risks, transition risks, strategic risks and finally vendor/technical risks. 2.2.3.1 Relationship risks Going into an outsourcing relationship with an external vendor both parties should realize that the situation for the client today could be quite different in the end of the contractual period, and not only when dealing with long term contracts. As the market changes and new technologies create new opportunities and challenges for the client, the needs can also change dramatically. Since these changes and their impact are very hard to foresee the client always takes a risk when signing a contract with a vendor that later might not meet future needs. This risk should be taken seriously, particularly when signing long time contracts. (Ross Westerman, 2004; Lacity et al., 1995) 2.2.3.2 Transition risks All IT outsourcing arrangements includes a transition phase where the organisation, the processes and the staff need to adjust to the new situation. This phase often involves great technical challenges; e.g. linking outsourced applications together with internal applications or transferring technical staff to the vendor. Other challenges are related to dealing with organisational changes, which are likely to appear as the vendor makes changes to the old IT processes. (Ross Westerman, 2004) It is important not to underestimated the time and money needed during the transition phase. If not calculated correctly these additional costs can easily turn the positive margin of the outsourcing deal into negative. According to the Ross and Westerman (2004) it can particularly become an issue when handling new technologies since the vendor are probably selling undeveloped competencies. Dealing with new technologies can hence be particularly hard for the parties involved. 2.2.3.3 Strategic risks As concluded earlier, organisations in general want to outsource what they consider to be non-strategic activities (Ross Westerman, 2004). But using this approach only when deciding upon which part of the IT-function to outsource can lead to problems. The risk lies in simplifying the complexity of IT and the uncertainties surrounding it. Since IT often is a highly integrated part of the business it can be hard to identify so called nonstrategic activities. The rapid technical advances in this area together with the complexity and unpredictability of the global market make it possible for the commodity of today turn into a strategic advantage tomorrow. (Lacity et al., 1995) 2.2.3.4 Vendor Client risks When signing an outsourcing contract the client loses some of its control over the IT function and processes, becoming dependent on the external vendor for delivering the capability needed in the way and the quality agreed upon in the contract. Therefore, the client should always be aware of the risk that the supplier goes out of business or for other reasons not be able to deliver the agreed upon service level. (Ross Westerman, 2004) Thus it is important to choose the vendor with care in order to minimize the risk of this occurring. Another issue concerning the vendor selection is the occurrence of a so called bidding war over attractive outsourcing contracts between different vendors. This situation, which at first can seem positive, will in worst case result in vendors making unrealistic bid offers. Sometimes the vendor already knows or discovers by hand that they are unable to recover their business results and operational costs for the near future. This situation is called the Winners curse and can lead to additional costs, poor service or considerable switching costs for the client. (Kern et al., 2002) It can particularly become an issue when handling new technologies since the vendor are selling capabilities they may not be fully developed. When dealing with new technology it is hard for both parties to weigh the potential benefits against the technical and organisational difficulties that might arise. (Ross Westerman, 2004) 2.3 What should organisations outsource? One question all managers need to answer when structuring the IT function of the organization is what parts should be performed internally and what should be managed by an external vendor? (Willcocks Lacity, 1998) Since every organisation looks different and faces different challenges it is impossible to give a simple answer. IT is today a highly important and integrated part of most businesses and can therefore be said to affect and shape most processes within an organisation. This contributes to making IT outsourcing far more complex than most other forms of outsourcing. (Kern Willcocks, 2002) In a study by Lacity and Hirschheim (1994) it was concluded that the activities that require extensive knowledge of business needs, IT planning and strategy, IT architecture are unwise to outsource. In an article published by Jane Linder (2004) a change in attitude was reported when looking at areas to be considered for outsourcing. Instead of outsourcing IT processes regarded as nonco re, the author believe that outsourcing is increasingly becoming a mean to address more fundamental needs, for example addition of new capabilities and facilitate strategic and structural changes. This emerging outsourcing practice will introduce the Centralization vs. Decentralization Model within companies that have outsourced parts of their IT function were, several decisions are pushed outside the company. At the same time, many of the decisions in this situation will be taken on a central level. 2.3.1 Outsourcing effects on centralization vs. decentralization: Earl et al. (1996) state that outsourcing of operations and development may lead to downsizing of the IT function but it does not necessarily alter the centralization versus decentralization axis. Thus, the internal IT function has the option and also the responsibility to define where the decisions are to be taken, centrally or decentralized as stated below: 2.3.1.1 Small vs. large IT functions: The very size of the IT function will also affect how it is set up and operates. Taking two extremes, in large IT functions (e.g. more than 800 employees) it is possible to have dedicated resources to strategic functions, e.g. strategic planning, company architecture, technology research and vendor management. In small IT functions (e.g. less than 60 employees) these roles will typically be shared or even not required and the IT function will focus more on day-to-day activities. In the first situation there is risk that the IT function will be forced into complex structures and also become more bureaucratic and isolated from their clients. Realizing expected synergies can then be tough. Although, having dedicated resources means that the IT function can apply more sophisticated management techniques and also influence the companys management team to a great extent. In the latter example the advantage is that small IT functions could change direction and respond to customers needs m uch easier. The disadvantage is that the IT manager will have to manage more and lead less since managers below the CIO is less mature than within larger IT functions. (Forrester, 2005: b) 2.3.1.2 Capabilities crucial when using outsourcing In the view of Feeny et al. (1995), companies, after decided upon what parts of their services they should outsource will need to appoint a team to function as contract administrators and system/service integrators. The main tasks for the members of this group should be to; ensure that vendors provide the agreed upon services, that the users (reasonable) needs are being satisfied, address disputes over contractual issues and asses penalties. This team should also decide when the service level is too low but also when its too high. For example do many users not take advantage of the agreed upon training or companies insist on extraordinary service levels, which can become extremely costly. To have a successful contract-management team require people with extensive knowledge of the vendors, the users and different contracts. Therefore these teams call for a mix of competencies; contract management skills, technical skills of what is required from the IT-service, a systems integrator for the externally provided systems and those already in-house. Feeny et al. (1995) believes that these three different roles should be found in-house for the best result to be achieved. Companies who outsource but who lack these competencies are likely to run into system gaps which makes the information sharing in the organization difficult. This can in turn lead to a negative attitude toward the outsourcing situation (and the vendor), which often leads to building on own solutions in parallel, creating a mess of ad hoc systems. The result can be increased costs which is often the opposite of the aim with the initiative. 2.3.1.3 IT function key stakeholders IT involves many stakeholders, which all have different kind of demands depending on the companys specific situation. If the management is to ensure that the exploitation of IT meets its needs, the stakeholders must be managed. (Earl, 1989; Rau, 2004) Increasingly as IT is used as a strategic weapon, businesses are linked up with their suppliers by networking. A supplier could in this case also be interpreted as a service provider or a vendor, executing parts of the organizations value chain and processes. The demands on the IT function have increased a lot during past decades and systems delivery now also includes procurement and integration (Rockart et al., 1996). Firms are increasingly recognizing that they do not have the time, money and expertise to develop large integrated systems. They are instead purchasing software and sub-contracting development to third parties who have access to the latest tools and techniques. (Ibid) Other important stakeholders are business and manage ment, which have to have good communication with the IT people in order to ensure that both business and technology perspectives are involved in understanding business opportunities. Employees are another stakeholder as they are the users of the technology and they need to be involved when designing systems and changing work routines. (Earl, 1989) 2.3.1.4 Business capabilities According to Rockart et al. (1996) IT leaders often find that their staff is lacking in business knowledge and skills. If the necessary relation between the business and IT are to be built, the IT personnels competence will need to change. Funding of internal education programs and creating partnerships with outside companies are example of initiatives to meet this demand. Outsourcing some IT responsibilities to computing services firms can compensate for skill shortages. However, making outsourcing work is a different proposition than deciding to outsource. The IT managers must be informed buyers, good negotiators and as skilled as the vendor in each area. 2.3.1.5 IT capabilities Willcocks et al. (1997) suggests that to determine what the core of IT is you should answer the question; which IT capabilities are core to the businesss future capacity to exploit IT successfully. Following this line of thought, the authors divide the core of IT capability into four different categories; Understanding of IT capability Business and IT vision Delivery of IT services Design of IT architecture The challenge of understanding IT capability is not just about keeping track of different technologies. Their usage is defined by the consumer rather than the producers. Therefore it has more to do with understanding the functional characteristics of the applications and how they are being deployed. The second category, business and IT vision, concerns the alignment of business and IT strategy where the systems should meet the business demands, and, as we have discussed earlier, IT may enable new and superior business strategies. The third capability mentioned was the challenge of delivering IT services, with low-cost and high quality. This area is transforming as the market for external providers of competence has grown vastly during past decades. The effect of this change is that sourcing skills have become more important for the IT managers. The last capability needed has to do with designing the IT architecture. The capability required in this case is twofold, partly a deep technical knowledge concerning systems, standards and technical trends, but also an understanding of the business and its needs. (Willcocks et al., 1997). 2.4 How should organizations outsource? After answering the questions why and what, the organisation must find a way to realise their goals and anticipation with the IT outsourcing. Outsourcing of IT can vary a great deal, both in form and degree of outsourcing. As the industry has grown so have the different options available. Today there are numerous of different outsourcing models to choose from, designed to suit a ray of different organisations and all with various benefits and risks. In this section we will start of by explaining different IT outsourcing alternatives based on two criteria; the amount of an organisations IT function that is outsourced and under what forms. The degree of outsourcing is a quantitative measure of categorizing different outsourcing options. Lacity et al (1997) present an outsourcing model where the different types are separated in terms of their shares of the total IT resources Total outsourcing: Meaning that at least 80 % of the IT budget is outsourced. Total in-sourcing: At least 80% of IT budget is kept in-house after outsourcing alternatives has been evaluated. Selective outsourcing: A mix of outsourced and in-sourced functions, neither reaching 80 % of IT total budget. De facto in-sourcing: The internal IT department is used without any evaluation of external alternatives. In general, large scaled outsourcing deals (total outsourcing) is often a part of a bigger and more lasting change involving the way in which the organization need to be structured, focused and managed. (Willcocks Lacity, 1998) Applying total outsourcing while using one or a few vendors can put the client at risk since it tends to increase costs and decrease flexibility over time. An alternative to total outsourcing is to use selective outsourcing. This approach assigns specific functions or services to the different vendors best suited for the job. According to Lacity et al. (1997) selective outsourcing can be a successful form of outsourcing since it incorporates the fact that the information technology span includes a variety of activities different in terms of business contribution, integration with existing processes and level of technical maturity. Typically there is no one supplier or internal IT department that possesses the experience and economies of scale to perform all IT activities effectively. By using selective outsourcing the organisation should be able to increase its flexibility and control and also minimize risks by spreading it onto different vendors and time horizons. This approach also takes into consideration that IT activities, depending on their characteristics, require different amount of management attention, security and consideration to be successful IT outsourcing objects (Lacity Willcocks, 2000). The authors also stress that selective sourcing works most effectively within the context of business strategic concerns and an overall IT-sourcing strategy that retains both flexibility and control. From this point, the implementation of an IT outsourcing involves often structural as well as cultural changes in a company. Significant change, however, is a disruption in our expectations of the future which is viewed as a loss of control (Marshall Conner, 1996). People are not likely to change the way they have been (successfully) working, especially when it is not clear what the goal of the whole operation is and who will benefit from the changes (Doppler and Lauterburg, 2000). Fear of the unknown and uncertainty is often the source of resistance and reduce productivity (Stark, 1999). Therefore, changing a culture, structures and processes is risky and can even produce negative results which is proved by many studies. Moreover, if change has been carefully planned and the change process is managed and overviewed properly a positive result will be achieved. In the next section, the importance of change management in the implementation of IT outsourcing is introduced. 2.5 Change Management: 2.5.1 What is Change Management? Smith (2004) describes change as interventions ranging from small staged improvements to major changes resulting in extreme restructuring of the organisation. Moreover, the roots of Change Management found in soft science of psychology where Change Management is applied to help people deal with hurtful emotional issues like death in the family or knowledge of ones own impending death (anon., 1996). In addition, organisational Change Management has proved as a useful tool to facilitate successful cultural transformations by helping people dealing with unknown territory and Mitchell (2000) put it, the neutral zone to ensure that the outcome of the change initiative is positive. There are many models and theories that can be generically termed change management although there is not one strategy that will suit every situation. The approach chosen to manage the change process should be the most appropriate for the particular change being implemented (Markus and Benjamin, 1996). Some experts propose that the key is to concentrate on components such as information dissemination, employee involvement (Baronas and Louis, 1988), while others focus on the role that the change manager plays and the competencies required (Kotter, 1996; Markus and Benjamin, 1996; Miller, 2002). In contrast, some reflect on the social psychology aspects to change management (Kanter, 1996). One common fact is that change at some stages will inevitably be a needed. Whether it is a case of responding to changes in the macro or micro environment or within the organisations market niche, striving for competitive advantage or responding to government legislation, organisations often have to respond by implementing either new working practices or more often than not, new technologies. One thing is for sure that no sooner one change initiative is complete the organisation tends to be forced to move to another. The beginnings of change management, and therefore the development of models an d theories, could arguable be attributed to Kurt Lewin. Lewin is most noted for models such as the three-step approach of unfreeze-change-refreeze, which emerged during the 1950s, and later the action research model. It is evident that the early development of change management focused on a rather mechanistic approach to the analysis and implementation stages of change although it has now become apparent that the human relation aspect are now clearly adopted within all theories. Many organisations accurately predict the changes the organisation needs to make, however, they often get the management of the change process wrong. Organisations waste vast amounts of resources and time and in extreme cases go bust due to their failure in the management of the change process. There are some staggering statistics relating to change initiatives that many contribute to poor change management skills. 2.5.2 Approaches of Change Management? Through the vast quantity of literature available on the subject of change management a common subject that has surfaced is that there are two approaches to the theory; the planned approach and the emergent approach. Although, all these are internally focused, and they attempt to provide solutions to help management obtain commitment to change and improve productivity with lease resistance. In the next sections the approaches to change management will be discussed; the planned and emergent approaches as well as their importance to IT Outsourcing Process. 2.5.2.1 Planned approaches to Change Management: The planned approach focuses on change that the organisation decides to implement. It considers taking the organisation, or the change subject, from one fixed state to the next state using a series of pre planned stages which are analysed with various tools. Although many theories and models could be attributed to operate within this type of context the most notable are those developed by Kurt Lewin, which emerged during the 1950s, such as the three-step model of unfreeze-change-refreeze, and the Organizational Development (OD) model. To provide a basic overview of Lewins three step model, the first stage is unfreezing the existing situation; unlearning the old system and way of doing things. The change is then introduced and the new behaviours are enforced by the third stage of refreezing. Then, the unfreezing stage involves gaining the peoples buy-in, or support, of the change initiative that differs from simply informing them of the reason and focuses on what would make pe ople want to change. The issue of safety is also key as people affected are more likely to be receptive of the change if they perceive safety. Once the people are in the desired conducive stage the change is implemented and the new behaviour is adopted by refreezing the new situation (Schein, 1996). Lewins planned approach has been further developed and utilised by advocates of organisation development (OD). The concept of OD is increasingly popular as organisations become more adaptable and responsive to change and attempt to develop structures and systems that nurture innovation (Peters and Waterman, 1982; Kanter, 1989; Senge, 1990). By many practitioners the OD model is defined as planned approach, medium to long term change strategy with the aim of improving the effectiveness of the organisation and its workforce by means of systematic change programmes, often inter-related, based on behavioural sciences of psychology, sociology and politics. Central to the OD process is t he use of a change agent as an expert who facilitates and guides the change process. Although this person can be internal to the organisation more often than not they are external consultants. (French and Bell, 1995; Burke, 2000; Cummings and Worley, 1997). Although opinions on where OD should start varies from top-down, middle-out, bottom up, the consensus seems to be that OD should begin at the top and filter down to lower the levels of the organisation (French and Bell, 1990; Cummings et al, 1997; Burges, 2000), which clearly places it in the camp of the planned approach. Both the earlier models of the planned approach, the three-step and the more recent evolution of organisational development are human relations approaches to change management based in social psychology, where they clearly focus on the individuals involved rather than solely the outcomes desired. However, these models, and the planned approach in general, do have their critics. Major criticisms are that th e planned approach, which assumes the organisation operates in a stable state, has a one-dimensional approach that is only likely to generate short-term outcomes and in fact is more likely to increase instability than reduce it (Dawson, 1994). It is further criticised as it is considered to ignore organisational power and politics (Burnes, 2004) and tends to lend itself to change being forced onto employees by senior management due to the nature of the top down approach (Clarke, 1994). 2.5.2.2 Emergent approaches to Change Management: As the environments in which organisations currently operate in can no longer be considered stable there has become a constant need for the organisations to scan the environment in order to adapt which as a result the planned approach is not best suited but instead the relatively new emergent approach is deemed more applicable. The emergent approach can be described as a bottom-up approach to change which claims to achieve a broader understanding of the complexity issues involved in the change process. The reasoning behind the bottom-up approach is that as the pace of change is often so rapid it is not possible for senior management to plan and develop every action but instead, as the name implies, it simply self emerges (Kanter, 1992). It is best suited to small incremental changes, which over time can lead to major restructuring of the organisation. The role of the manager is not to plan or implement the change but rather to create a suitable structure and culture that it i s more likely to be receptive to the desired change, which is achieved through the encouragement of learning, innovation, and experimentation. Unlike the planned approach it does not overlook the fact that change is often a political process where individuals, and often groups, operate as resistors to change in order to protect their interests (Kanter, 1992; Dawson, 1994, Burnes et al, 2000). The change manager needs to be aware of a number of key factors that either promote or obstruct the change success; structures, cultures, organisational learning, management leadership behaviour, plus power and politics (Burnes et al 2000). The culture of an organisation, or group, can often be one of the main inhibitors to the change process. If change is to be successful it needs to be embedded into the culture of the organisation (Kotter and Schlesinger, 1979). The literature suggests that it can not be overestimated how important leadership, and management behaviour, is to the suc cess of any change management initiative (Kotter Schlesinger, 1979; Kanter 1983; Kotter 1996; Clarke, 1994; Kanter 1998). Kotter (1996) explains that effective leadership is important to the change process because it can define and effectively communicate how the organisation will appear after the change inspiring personnel to make it happen. Power and politics, and the power struggles produced when change is inevitable, can often be closely linked the outcome of a change implementation (Wilson, 1992; Kanter, 1995). In order to deal with resistance the change manager will often need to work politically to build support amongst employees at all levels; the change recipients, fellow managers, and senior executives. In summary therefore, those organisations that are able to respond best to change will remain successful and in many instance will be market leaders. Those organisation which are inflexible, unable to adapt to change quickly will stagnate, will lose their market shar e and will quite often go out of business. Therefore the importance of change and the change process is essential for survival in todays global economy where competition is fierce. It is also important that organisations develop a capacity to change without disrupting their ongoing business operations. 2.6 Employee Resistance in an IT outsourcing change process: Any change process will undoubtedly experience problems along the way; some over run their planned timescale, some kill morale, some cost a great deal of management time therefore it is important to concentrate on reasons behind employee resistance and ways of dealing with it as it is encountered (Kotter and Schlesinger, 1979; Bocij et al, 2003; Johnson et al, 2005). Baron and Louis (1988) state that resistance can often arise from the stress of the implementation where this feeling can produce such reactions as unwillingness of individuals to learn the new system, often reverting back to old systems of working. Some may resist change through sabotage, many feel that the computer will take away their decision making responsibilities, while some feel insecure and are therefore resistant due to their fear power or job loss (Markus, 1979; Ainsworth 1977; Argyris 1971: Dickson et al., 1967, cited in Baronas Louis, 1988). Kotter and Schlesinger (1979) propose four most common rea sons why employees resist change; firstly, A desire not to lose something of value, for example, their power, their job etc., which often produces political behaviour resulting from the individual placing their personal interests and goals before those of the organisation (Kotter and Schlesinger, 1979). Secondly, Misunderstanding and lack of trust between employees and their managers often lead to misunderstandings occurring which unless quickly rectified can result in resistance. Thirdly, Different assessments are another cause of resistance where individuals interpret the costs and benefits of the change implementation differently. Lastly, tolerance to change differs between individuals as all human beings are limited in their ability to change. Resistance can occur even if they know the change to be beneficial. This can result from the persons perception that they are unable to develop necessary skills to cope or even from peer pressure not to comply. However, the change ag ent needs to be aware that participation is time consuming and therefore may not be available when the change is required immediately. As participation and communication have been discussed as being key to reduce resistance for the proposed change implementation, it is also apparent that communication and involvement needs to continue right up to implementation and beyond to which many experts recommend devising an appropriate training programme. Although, rather than simply attributing success to the use of an appropriate program, through their studies, Markus and Benjamin (1996) expand upon this by stating that to increase the probability of success, training must be carried out in-house by the Facility Management (FM) department. 2.7 Chapter II Summary: In the prior theory sections we have aimed at providing two different aspects of our field of research. Concerning the theories around outsourcing you can conclude that it is and has been an evolving topic, influenced not only by heavy research and studies, but also by large macro economic factors and trends. In sum, the theories underline the many reasons for outsourcing and the many risks connected to such initiatives. In every given business situation the rational manager will try to reduce the risk as much as possible while maintaining the benefits. Based on the theory, this is also an approach that could be valid when deciding on the scale and number of vendors to use. Using many different vendors will imply more access to expertise and specialist, and using one or a few vendors will imply higher volume and hence larger scale effects that both parties benefit from. Thus there is a balance between cost and competence in this aspect which needs to be assessed against the risk un dertaken. The section also brings up the questions of what to actually outsource. Since IT today is an integrated part of most businesses there is a challenge in choosing the right processes to outsource so that the rest of the business avoids negative impact. The challenge lies in defining and isolating the processes, and in many times the people, which can be moved to an outside vendor. The IT functions mission is to execute the IT strategy in such a way that the overall business strategy is supported. In this sense, the usage of outsourcing should be an act in line with the IT and business strategy. The high level effect of outsourcing on the IT function is that some parts of the supply chain is taken over by an outside player, who then delivers services/value to the companys chain of value adding activities. The organizations structure, its principles of governance, capabilities and stakeholders are dimensions of the IT function which could be affected when using outsourcing. Coming back to the alignment of IT strategy and business strategy, the IT manager (or CIO) needs to secure that these dimensions will continue to support the overall target in situations when outsourcing is introduced and implemented in the operating model.

Wednesday, January 1, 2020

Biography of Numa Pompilius, Roman King

Numa Pompilius (c. 753–673 BCE) was the second king of Rome. He is credited with establishing a number of notable institutions, including the temple of Janus. Numas predecessor was Romulus, the legendary founder of Rome. Fast Facts: Numa Pompilius Known For: According to legend, Numa was the second king of Rome.Born: c. 753 BCEDied: c. 673 BCE Early Life According to ancient scholars, Numa Pompilius was born on the very day that Rome was founded—April 21, 753 BCE. Little else is known about his early life. Some 37 years after the founding of Rome, Romulus—the kingdoms first ruler—disappeared in a thunderstorm. The patricians, the Roman nobility, were suspected of having murdered him until Julius Proculus informed the people that he had had a vision of Romulus, who said that he had been taken up to join the gods and was to be worshiped under the name Quirinus. Rise to Power There was considerable unrest between the original Romans and the Sabines—who had joined them after the city was founded—over who would be the next king. For the time being, it was arranged that the senators should each rule with the kings powers for a period of 12 hours until some more permanent solution could be found. Eventually, they decided that the Romans and Sabines should each elect a king from the other group, i.e., the Romans would elect a Sabine and the Sabines a Roman. The Romans were to choose first, and their choice was the Sabine Numa Pompilius. The Sabines agreed to accept Numa as the king without bothering to elect anyone else, and a deputation from both Romans and Sabines went off to tell Numa of his election. Numa did not even live in Rome; he resided in a nearby town called Cures. He was the son-in-law of Tatius, a Sabine who had ruled Rome as joint king with Romulus for a period of five years. After Numas wife died, he had become something of a recluse and was believed to have been taken by a nymph or nature spirit as a lover. When the delegation from Rome came, Numa refused the position of king at first but was later talked into accepting it by his father and Marcius, a relative, and some of the local people from Cures. They argued that left to themselves the Romans would continue to be just as warlike as they had been under Romulus and it would be better if the Romans had a more peace-loving king who could moderate their bellicosity or, if that proved to be impossible, at least direct it away from Cures and the other Sabine communities. Kingship Having agreed to accept the position, Numa left for Rome, where his election as king was confirmed by the people. Before he finally accepted, however, he insisted on watching the sky for a sign in the flight of birds that his kingship would be acceptable to the gods. Numas first act as king was to dismiss the guards Romulus had always kept around. To achieve his aim of making the Romans less bellicose, he diverted the peoples attention by leading religious spetacles—processions and sacrifices—and by terrifying them with accounts of strange sights and sounds, which were supposedly signs from the gods. Numa instituted priests (flamines) of Mars, of Jupiter, and of Romulus under his heavenly name of Quirinus. He also added other orders of priests: the pontifices, the salii, and the fetiales, and the vestals. The pontifices were responsible for public sacrifices and funerals. The salii were responsible for the safety of a shield which had allegedly fallen from the sky and was paraded around the city each year accompanied by the salii dancing in armor. The fetiales were peacemakers. Until they agreed that it was a just war, no war could be declared. Originally Numa instituted two vestals, but he later increased the number to four. The main duty of the vestals, or vestal virgins, was to keep the sacred flame alight and to prepare the mixture of grain and salt used in public sacrifices. Reforms Numa distributed the land conquered by Romulus to poor citizens, hoping that an agricultural way of life would make the Romans more peaceful. He would inspect the farms himself, promoting those whose farms looked well cared for and admonishing those whose farms showed signs of laziness. People still thought of themselves first as original Romans or Sabines, rather than citizens of Rome. To overcome this division, Numa organized the people into guilds based on the occupations of their members. In Romulus time, the calendar had been fixed at 360 days to the year, but the number of days in a month greatly varied. Numa estimated the solar year at 365 days and the lunar year at 354 days. He doubled the difference of eleven days and instituted a leap month of 22 days to come between February and March (which was originally the first month of the year). Numa made January the first month, and he may have added the months of January and February to the calendar as well. The month of January is associated with the god Janus, the doors of whose temple were left open in times of war and closed in times of peace. In Numas reign of 43 years, the doors remained closed, a record for Rome. Death When Numa died at over the age of 80 he left a daughter, Pompilia, who was married to Marcius, the son of the Marcius who had persuaded Numa to accept the throne. Their son, Ancus Marcius, was 5 years old when Numa died, and he later became the fourth king of Rome. Numa was buried under the Janiculum together with his religious books. In 181 BCE, his grave was uncovered in a flood but his coffin was found to be empty. Only the books, which had been buried in a second coffin, remained. They were burnt on the recommendation of the praetor. Legacy Much of the story of Numas life is pure legend. Still, it seems likely that there was a monarchical period in early Rome, with the kings coming from different groups: Romans, Sabines, and Etruscans. It is rather less likely that there were seven kings who reigned in a monarchical period of approximately 250 years. One of the kings may have been a Sabine called Numa Pompilius, though we may doubt that he instituted so many features of the Roman religion and calendar or that his reign was a golden age free from strife and warfare. But that the Romans believed that it was so is a historical fact. The story of Numa was part of the founding myth of Rome. Sources Grandazzi, Alexandre.  The Foundation of Rome: Myth and History. Cornell University Press, 1997.Macgregor, Mary.  The Story of Rome, from the Earliest Times to the Death of Augustus. T. Nelson, 1967.