Beruflich Dokumente
Kultur Dokumente
A catalog record for this book is available from the U.S. Library of Congress.
ISBN 978-0-9995347-0-0
Although every precaution has been taken in the preparation of this book, the
publisher and author assume no responsibility for errors or omissions. Neither is any
liability assumed for damages resulting from the use of this information contained herein.
Ordering information:
For all ordering inquiries, please visit www.ldpress.com, email sales@ldpress.com or
call toll free at 855-855-9868. Special discounts are available on bulk purchases by
academic institutions, associations, corporations, and others.
Today there are clear signs of intense, continuous and unprecedented waves
new firms and, more significant, the emergence of new industries offering novel ways
of fulfilling customer needs and desires. Firms that were household names at the
turn of the century (Walmart, Sears, Cisco, and Dell) are now replaced with new firms
Since 1983, Fortune magazine has published an annual ranking of the most
admired companies. Though methodology and criteria have varied somewhat over
the years, the overall process has remained remarkably consistent. For the 2016
list, these criteria involved assessments of a candidate firm’s: ability to attract and
Table 1-1 provides a ranking of the top-ranked most admired companies from
1983 to 2016. In compiling this listing, three-year intervals and companies’ average
rank in the annual top-ten of most admired companies were used. Note two key
1
Google is actually one of the business units within Alphabet, a multinational holding
company formed in 2015 by Google’s founders. The more familiar name of Google is used
throughout this book.
2
For more information, see: http://www.kornferry.com/institute/fortune-worlds-
most-admired-companies#sthash.TqIusyvP.dpuf
2
their firms’ competitive situations, formulate effective business strategies, and
successfully implement these strategies. Not surprisingly, the stocks of these most-
are two points of major discontinuity in the table: the first appearing in the latter-
years of the 1990s, and the second in the latter-years of the 2000s. These two
Table 1-1
Most Admired Companies: 1983-2016
Rank
Years
1 2 3 4 5
2014-2016 Apple Google Amazon Berkshire Hathawaya Walt Disney
2011-2013 Apple Google Amazon Coca Cola Berkshire Hathaway
2008-2010 Apple Google Berkshire Hathaway Toyota Motors Johnson & Johnson
2005-2007 General Electric Starbucks Southwest Airlines FedEx Berkshire Hathaway
2002-2004 Walmart Southwest Airlines General Electric Berkshire Hathaway Microsoft
Cisco Systems
1999-2001 General Electric Microsoft Walmart Dell
Southwest Airlines
1996-1998 Coca Cola Microsoft Intel Merck Johnson & Johnson
3M
1993-1995 Rubbermaid Coca Cola Home Depot
Microsoft
1990-1992 Merck Rubbermaid Walmart Proctor & Gamble PepsiCo
Boeing
1987-1989 Merck Rubbermaid Liz Claiborne 3M
Phillip Morris
1983-1986 IBM Dow Jones HP Merck Coca Cola
aBerkshire Hathaway is a multinational conglomerate that wholly owns a number of companies (e.g., GEICO, BNSF, Fruit of
the Loom, Helzberg Diamonds, Duracell, and McLain Trucking, among others) and enjoys substantial holdngs of other
companies (e.g., Johnson and Johnson, Coca Cola, IBM, and American Express, among others).
one or more challengers whose business models offer far greater value to customers
than the incumbents’ business models and these incumbents are unable to effectively
respond to the ensuing competitive threat. A key element in this definition is that of
revenue and profitability gains) for the innovating firm, and long-term benefits (i.e.,
competitive challenges, and (2) entirely new industries (e.g., Internet sales channel,
Internet search) were created. Two forces explain much of this digital disruption:
sets of ones and zeroes) form. Through hardware and software innovations
to cost. Popularly referred to as Moore’s Law, the capability per dollar of digital
new functionalities (e.g., Amazon’s 1-Click ordering process), and so on. It is the
4
confluence of such streams of innovative functionalities that periodically drive truly
substantive business disruptions. Today, five technologies represent the tip of the
spear of digital disruption – social, mobile, analytics, cloud, and the Internet of
Things.
characterized by vast streams of data (and information) endlessly moving around the
themselves in order to: leverage global capabilities, present a common face to global
customers, and compete with digital startups. Prime examples of such globalized
firms are those providing logistics services (UPS and DHL) and technology services
refocuses on local communities, new competitive spaces arise – such as firms focused
Feefo), temporary asset use (Airbnb and Zipcar), and personalized services (Uber
and TaskRabbit).
disruption. Consider, for example, the fintech revolution – the disruptions currently
5
affecting financial services.4,5 The business models of retail banks have traditionally
sought to meet all of their customers’ financial needs. Here, low-cost checking
accounts serve as ‘loss leaders’ to earn attractive margins in other areas (e.g., home
weakening and dismantling the relationships that retail banks have developed over
the years with their customers. Typically, these challengers (startups, established
digital banks, and established firms holding strong, broad-based digital capabilities)
target the more-profitable segments of retail banking, making it clear that they have
little interest (at least for now) in handling all of a person’s banking needs. The
people most attracted to these fintech challengers are millennials, small businesses,
costs and to the enhanced consumer experience provided through digital transaction
channels.
The first wave of the fintech revolution focused on payment transactions (e.g.,
PayPal and Square), which represents about six percent of global banking
transactions. The next waves seem to be converging on retail lending (roughly twelve
percent of global banking transactions, e.g., Affirm and SoFi) and retail
4
G. Bacso, M. Dietz and M. Radnai, “Decoding Financial-Technology Innovation,”
McKinsey Quarterly, Number 2, 2015, pp. 26-27).
5
M. Dietz, P. Härle and S. Khanna, “A Digital Crack in Banking’s Business Model,”
McKinsey Quarterly, Number 2, 2016, pp. 50-53.
6
disruptive business innovations improve on how incumbent retail banks do business
and are ripe for imitation. Taken together, these financial services innovations are
Most of today’s fintechs, which number in the thousands globally, remain under
the regulatory radar but are quickly attracting attention as they reach meaningful
scale. Why all this entrepreneurial activity? Simply put, the potential rewards are
enormous. Capturing just a tiny slice of the $1 trillion global retail banking market
exception. Digital competitors are entering all industries, creating a need for
strategic responses by established businesses and by the early new entrants. At the
The objective of this book is to depict how today’s exemplar organizations set
and evolve their digitally-enabled business strategies, or stated more directly – their
key notions:
Markets and firms are historically regarded as significant mechanisms for the
and control structures. Discrete market exchanges can occur between two people
consumer). Successful markets bring two parties together such that each party is
confident that the exchange will be evenhanded; that is, one party, the consumer,
receives a sought value-unit at a fair price and the other party, the producer, receives
One or both parties hold incomplete information about the market, e.g.,
existence of alternative buyers/sellers, knowledge of the other party and this
party’s history of performance, goods/services quality, production costs,
availability of substitute goods/services, etc.
One or both parties are exposed to excessive risk, i.e., trust mechanisms are
lacking or are of inferior quality.
One of the parties holds undue influence, e.g., monopoly power or huge
size, and dictates the parameters of the exchange to the detriment of the
8
other party.
When one or more of these conditions are present, the likelihood of market
as a result of the first (specialized machinery and economies of scale) and second
organizational structure. Each operating unit itself has managers and workers
engaged in specialized economic activities. And, the firm as a whole interacts with
Today, the distinctions between markets and firms are blurred via the
With the pipeline ecosystem (the dominant ecosystem over the last century;
one or more consumer segments and fashions a linear value stream involving
materials are assembled first into components and then into finished value-units
9
(information, a good or a service) that are delivered to consumers, either through a
integrated.
Figure 1-1
The Pipeline Ecosystem
Material &
Component Intermediaries Producer Intermediaries Consumers
Suppliers
Markets
Markets
Full authority for determining the targeted consumers and the nature of the
value-units being offered to these consumers.
Full authority for fashioning and overseeing the linear value stream.
10
The primary market defining a pipeline ecosystem is that between the producer and
raw materials, for component parts, for products to stock a retail store, etc.) are
With the network ecosystem (an ecosystem that has become increasingly
visible over the last decade; depicted as Figure 1-2), a network of value-unit
manages the market environment and the transaction environment within which
determines the nature of the value-units being exchanged nor owns any of the assets
11
Figure 1-2
The Network Ecosystem
Markets Markets
Market
store with a finely curated stock of products) within which producers and consumers
Walmart determines which specific products are stocked in each retail store,
takes ownership of these products once they have left the manufacturer, has
fashioned very sophisticated linear value streams to bring these products to
their stores, and owns many of the logistical assets used in these value
streams.
eBay does not determine the nature of the products to be sold by the
producers using eBay’s market environment, never takes ownership of these
products, and has no responsibility for nor owns any of the assets deployed
to produce these products or to transfer ownership of the products from
producers to consumers.
12
Digital disruption is having profound effects on the roles that humans serve in
Digital technologies and humans differ markedly in the types of work tasks each best
handles, and Table 1-2 suggests the probability of different types of work tasks being
Table 1-2
Probability of Work Tasks Being Performed Digitally
Type
Definition Probability
of Work
Acquiring new knowledge by interpreting & Lower
Learning
integrating captured data and experiences
Situational
Interpreting environmental & situational cues
Awareness
Numerical
Performing complex algorithmic operations
Analysis
Digital solutions are especially good for executing pre-specified rules, but not
filter out bad ideas, but recognize and enhance the good ideas. It is hard to conceive
that a digital solution could outperform a human with such a work task. Still, the
relentless advances in digital technologies are making significant headway with the
understanding and prediction. Perhaps the best that can be said for now is that the
13
roles served by digital technologies and by humans in innovative business models
Figure 1-3 presents timelines for three eras of digital disruption. These eras
sensed and captured data into binary form, storing and transmitting these binary
data, manipulating these data, and storing/transmitting the outcomes of these data
of applying digitization within organizations and within the social and economic
contexts within which organizations are embedded – thence producing changes (often
Figure 1-3
Three Eras of Digital Disruption
Era 1
Era 2
Era 3
14
The start date for each of the three eras is, at best, an approximation. While
it is fairly easy to identify when a specific digital technology first appeared, it is very
regularly among the first to apply new forms of digitalization. It takes time for early-
adopters to learn about and expose the usefulness of new forms of digitalization and
for these exposed uses to take root across organizations, industries and societies.
While some early-adopters may experience huge competitive gains from their
innovative actions, a greater number experience little gain or suffer losses because
It is important to note that the lapse in time between the start of an era and
value for adopters shortened considerably between the first and second eras, and is
expected to shorten even further between the second and third eras. There are a
number of possible explanations as to why this is the case, and these will be raised
throughout this book. One of these reasons is that the forms of digitalization
emerging in one era, e.g., Era 1, become pervasively adopted over time and are
Eras 2 and 3.
(i.e., automation, control, empowerment and interaction), and applied within three
15
digital technologies effect changes within organizations and their broader
Table 1-3
Four Engines of Digitalization
Digitalization
Definition Examples of Realized Benefits
Engine
Simplifying & digitalizing complex tasks
•Cost reduction.
& task-sequences, eliminating unneeded
•Transaction cycle-time improvement.
Automation tasks, and, as appropriate, performing
•Responsiveness improvement.
tasks via digitalization rather than via
•Productivity improvement.
humans.
Embedding digitalized rules to identify
•Real-time event/situation monitoring.
out-of-control events/situations, such
•Real-time event/situation visibility.
Control that out-of-control events/situations
•Minimizing the occurrence of inferior decisions
either do not occur or, if they do occur,
& inferior actions.
are quickly addressed.
Providing humans facing decisions with
•Broad distribution of and access to data,
timely, accurate & comprehensive
information & knowledge.
Empowerment information and with easy-to-use,
•Broad availability of & access to decision aids &
relevant decision aids & business
business intelligence tools.
intelligence tools.
•Complex & non-routine business activities
Enabling humans, digitalized solutions or
handled quicker & better .
both to engage in timely, meaningful
Interaction dialogues (overcoming barriers of space
•Problems & opportunities handled quicker &
better.
and time).
•Innovative activities handled quicker & better.
digitalization initiative might target, within a specific entity (i.e., one or more of an
organizations, etc.): a single domain, two of the three domains or all three of the
16
domains. Definitions of and examples of the benefits to be obtained within each
Table 1-4
Three Domains of Digitalization
Digitalization
Definition Examples of Realized Benefits
Domains
Organizational activities involved in
•Enhanced task effectiveness
getting tasks done. The entities
(accuracy, comprehensiveness,
engaged in task-related activities could
timeliness, convenience, etc.)
Operational include digitalized solutions, humans,
•Enhanced task efficiency
teams, organizational subunits,
(productivity, cost, error, rework,
organizations and/or sets of
etc.)
collaborating organizations.
Organizational activities involved in •Enhanced decision effectiveness
improving understandings of what (accuracy, comprehensiveness,
things should be done, what things timeliness, convenience, etc.)
Analytical
need to be done, what things can be •Enhanced decision efficiency
done, how things are done, and how (productivity, cost, error, rework,
what has been done is assessed. etc.)
Organizational activities involved in
enabling digitalized solutions, humans •Enhanced task effectiveness
and/or organizational entities to share •Enhanced task efficiency
Collaborative
data, information & knowledge and to •Enhanced decision effectiveness
cooperate in making decisions and in •Enhanced decision efficiency
getting things done.
Table 1-5 presents an overview of the key features of each of the three eras
of digital disruption. A few aspects of this table would benefit from a brief introduction
design framework specified to (1) maintain established policies, e.g., all digitalized
component interoperability, e.g., all business applications should operate through the
solutions are interoperable, these solutions are able to seamlessly exchange data
and able to apply these exchanged data. Second, digital technologies can be
by its developer, while an open technology is available for use (and for modification)
17
by anyone (though some form of payment may be required to gain access to the
technology). Third, the lower part of the table illustrates the relative extent to which
each era exploited the four engines of digitalization. As can be seen below, while
Table 1-5
An Overview of the Three Eras of Digital Disruption
efficiency. During this era, most typically, digitization was centralized, connectivity
digitalization focused on the handling of transactional data and the use of these data
in supporting operational decisions and actions. Table 1-6 provides a brief glimpse
18
of innovative initiatives introduced by two Era 1 disruptors: American Airlines and
Merrill Lynch.
Table 1-6
Era 1: Innovative Digitalization Initiatives
emphasizing automation and control, but also made significant headway with
empowerment (via Enterprise Resource Planning systems and business analytics) and
interaction (via the open connectivity offered by the technologies that underlay the
World Wide Web), further boosting growth and profitability by tightly coordinating
decisions and actions. Typically, digitalization was distributed across centralized and
decisions and actions both within and across organizations’ boundaries. Table 1-7
19
provides a brief glimpse of innovative initiatives introduced by two Era 2 disruptors:
Table 1-7
Era 2: Innovative Digitalization Initiatives
advanced analytics made possible through Big Data (streams of digital data created
via the real-time capture of messages and events). Along with new efficiency and
optimization opportunities, growth and profitability are being spurred through the
Table 1-8
Era 3: Innovative Digitalization Initiatives
LEGO Airbnb
LEGO Ideas Community Center
Digitalization Realized Benefits Digitalization Realized Benefits
Thousands of fresh and
A digitally-enabled A digitally-enabled
innovative ideas are
open community community of Airbnb
proposed for new LEGO
where LEGO fans: hosts where ideas & A relatively low cost
sets.
propose ideas for advice are exchanged, mechanism for:
new LEGO sets thus easing the effort• Educating & supporting
LEGO sets obtaining 10,000
(using existing taken by participants new hosts.
or more votes are likely to
LEGO bricks), in learning how to • Establishing & evolving
be market successes.
review proposed succeed as a host. a desired culture across
ideas, and vote on the host community.
Since 2014, nine new LEGO
proposed ideas. Topics are • Building enthusiasm &
sets have evolved from the
personalized to a comradery across the
LEGO Ideas program.
Ideas receiving host’s language and host community.
10,000 votes country, hot topics • Mobilizing local host-
The interactions occurring
within a year are are promoted, and top communities’ face-to-
across the fan community
moved into LEGO’s contributors are face sharing and
(as ideas are reviewed &
product listed. political action.
actively supported)
development
provides essentially free
process.
promotion for LEGO.
Table 1-9 revisits our synthesis of Fortune’s annual listing of the most admired
O. El Sawy, H. Amsinck, P. Kraemmergaard and A.L. Vinther, “How LEGO Built the
6
Foundations and Enterprise Capabilities for Digital Leadership,” MIS Quarterly Executive, June
2016, pp. 141-166.
21
Orange – Era 2 organizations listed multiple times
Two key insights about successful digital strategizing can be gleaned from this table.
Table 1-9
Revisiting Fortune’s Most Admired Companies
Rank
Years
1 2 3 4 5
2014-2016 Apple Google Amazon Berkshire Hathaway Walt Disney
2011-2013 Apple Google Amazon Coca Cola Berkshire Hathaway
Berkshire
2008-2010 Apple Google Toyota Motors Johnson & Johnson
Hathaway
General
2005-2007 Starbucks Southwest Airlines FedEx Berkshire Hathaway
Electric
Southwest
2002-2004 Walmart General Electric Berkshire Hathaway Microsoft
Airlines
Cisco Systems
General Dell
1999-2001 Microsoft Walmart
Electric
Southwest Airlines
1996-1998 Coca Cola Microsoft Intel Merck Johnson & Johnson
3M
1993-1995 Rubbermaid Coca Cola Home Depot
Microsoft
1990-1992 Merck Rubbermaid Walmart Proctor & Gamble PepsiCo
Boeing
1987-1989 Merck Rubbermaid Liz Claiborne 3M
Phillip Morris
1983-1986 IBM Dow Jones HP Merck Coca Cola
organization, i.e., Google, and two blended organizations, i.e., Apple and Amazon.
organizations:
producing firms and technology-using firms. Era 3, however, lacks pure technology-
producing firms. Instead, Apple, Google and Amazon are both producing (alone and
Southwest Airlines and Walmart, were noted for their large and superb technology
groups that, alone and with strategic partners, introduced streams of digitalization
(nimble digital startups, established companies with strong market positions and
23
sectors. N. Venkatraman8 provides a framework for understanding the industry
forces now at play by identifying the three sets of influential competitors that are
Digital Giants: These firms have mastered digitalization and are able to
harness their business models and digitalization expertise to disrupt a wide
range of industries. Well-known digital giants include Google (Alphabet),
Facebook, Amazon, Apple, and Microsoft, each of whom has demonstrated a
sustained prowess in digital disruption across multiple industries.
Industry strategic landscapes today must be seen as being populated by not only
must weave together the interests and capabilities held by incumbents, digital giants
Conventional notions about competitive strategy are being challenged with the
N. Venkatraman, The Digital Matrix: New Rules for Business Transformation through
8
heat, it is imperative that fresh ways of thinking are surfaced about the nature of
competition and about what is needed to achieve competitive success. The next
chapter provides insights regarding these fundamental ideas that underlay effective
digital strategies.
25
Chapter 2. Digital Strategy Fundamentals
How should firms master the challenges and opportunities of digital innovation
and disruption? What types of models and mindsets will help managers effectively
lead their organizations in today’s digital economy? The following three sets of
described via the concept of agility. Agility is a firm’s ability to detect potentially
disruptive threats and opportunities and, then, to marshal the resources and
and, achieving dynamism, i.e., the ability to innovate, transform and disrupt by
26
This duality is reflected in the need for competitively-successful organizations to
exhibit two forms of agility. Adaptive agility refers to the ability to aggressively
business models.
Adaptive and entrepreneurial agilities are important because the only sure
thing that can be said about today’s market ecosystems is that they are highly
To paraphrase Project Runway’s Heidi Klum: one day you’re in and the next day
actions are most likely to occur opportunistically or reactively, but in accordance with
are formulated and implemented – without dampening the flexibility and autonomy
27
necessary and adaptive/entrepreneurial agilities. A broadly-communicated strategic
influence on the formulation of competitive moves (see Figure 2-1). Even though
organizations’ strategic intents do evolve, they serve the critically important role of
consistent fashion across time – increasing the likelihood that new investments
Figure 2-1
The Influence of Strategic Intents on Competitive Moves
Competitive Moves
Digital Strategists’
Strategic Knowledge,
Intent Perspectives & Business Model
Insights Enhancement,
Replication &
Innovation
Competitive Outcomes
the core capabilities that underlie the value propositions expected to most appeal to
consumers and the extent to which their organization has digitalized these
28
The Grammar of Digital Strategy: Business Models
about how value is created and how profitability is realized. As shown in Figure 2-2,
Figures 2-3 and 2-4, respectively illustrate each of these elements via portraits of
agile business models reflective of Apple’s participation in the consumer smart device
29
Figure 2-2
Elements of an Agile Business Model
Value Profit
Proposition Model
Core Dynamic
Capabilities Capabilities
What are the resources & activities What are the resources & activities
critical to providing consumers critical to ensuring that well-founded
with a value-unit they value and to business model enhancements,
do so in a profitable manner? replications & innovations are
undertaken to maintain competitive
positions within the markets we
participate and the new markets we
enter?
Figure 2-3
Apple’s Business Model for the Consumer Smart Device Market
Value
Proposition Profit Model
Core Dynamic
Capabilities Capabilities
• Brand management • Knowledge of new digital technologies
• Technology patents • Knowledge of evolving desires of first-
• Product design & product architecture design adopter consumers
• Tightly-directed sales & marketing • Knowledge of new digital media and of new
• Tightly-controlled manufacturing & logistics, means for accessing digital media
performed by third-parties • Knowledge of product designers & architects
• Relationships with content providers and • Knowledge of content management
with manufacturing & logistics partners architects
30
Figure 2-4
Walmart’s Business Model for the Retail Market
Core Dynamic
Capabilities Capabilities
• Store site selection & store layout design • Knowledge of new digital technologies
• Tailor local inventory to local market • Knowledge of evolving shopping-experience
• Shelf-space optimization (merchandizing & desires of mass-market consumers
replenishment) • Knowledge of digitalization trends &
• Logistics optimization innovations in retail-store operations and in
• Supplier relationships logistics
• Logistics designers & technologists
• Retail store designers & technologists
the value propositions with the expectations of their consumers.9 Some types of
consumers seek low prices, quality and convenience; organizations pursuing this
consumer adopt the operational excellence value discipline. Other consumers are
more concerned with having their needs and preferences met fully and are willing to
pay a premium for this to occur; organizations pursuing this consumer adopt a
customer intimacy value discipline. Finally, some consumers seek the state-of-
the-art, the trendy and/or the stylish and are willing to pay a premium for this to
9
M. Treacy and F. Wiersema, “Customer Intimacy and other Value Disciplines,”
Harvard Business Review, January-February 1993, pp. 84-93.
31
discipline. Table 2-1 summarizes the value propositions and core capabilities
Table 2-1
The Three Value Disciplines
Value
Value Proposition Core Capabilities Examples
Discipline
Amazon
• Micro-segmentation
Tailored value-unit Google
Customer • Consumer relationship management
Tailored delivery Harrah’s
Intimacy process
• Advertising & marketing
Kraft Foods
• Campaign management
Ritz Carlton
State-of-the-art, trendy
and/or stylish value- 3M
Research & development
units Apple
Product Rapid commercialization
Intel
Leadership State-of-the-art, trendy
Quality assurance
Merck
After-sales support
and/or stylish delivery Johnson & Johnson
process
discipline in the 1980s by introducing the Direct Connect initiative to become a low-
cost, hassle-free supplier to appliance dealers. Historically, the company fully loaded
its dealers – that is, it expected dealers to stock full inventories of appliances by
incentivizing them to purchase full truckloads. This strategy lost favor when the
10
As part of their Industrial Internet business strategy, GE sold their appliance
business to Qingdao Haier in 2016.
32
With the Direct Connect initiative, dealers were no longer required to maintain
their own inventories of major appliances. Instead, they could rely on GE’s virtual
customers, provide these customers with delivery information, and have the
appliances shipped directly to the customers from GE distribution centers. The Direct
Connect initiative not only reduced the inventory carried by dealers, but provided the
dealers’ customers with access to the full breadth of GE’s appliance product lines. GE
now links this dealer-order processing system to its forecasting and demand planning
inventories.
initiative called the Industrial Internet. Essentially, GE has embraced the Internet of
Things and the world of Big Data by embedding sophisticated digitized sensors to its
machines and connecting the ensuing data streams to operational and analytical
platforms. While GE has long embedded sensors in its machines, the data from these
sensors was primarily accessed and used on-site by repair and maintenance
technicians. Today, the huge volumes of data being captured are transmitted to
processes.
built around the product leadership value discipline. Noticing that some of its engines
33
for every jet engine in use across the globe. Through this analysis, the GE engineers
were able to identify the problem: engines operated in harsh conditions (e.g., heat,
humidity, dust, smog, etc.) tended to clog, heat up and function inefficiently. By
thoroughly cleaning the engines used on such routes more frequently, engines
operated more efficiently, required less maintenance and exhibited longer peak
lifetimes – saving airlines millions of dollars annually in fuel costs. But, designing,
All of this has dramatically transformed the business model of GE’s jet engine
business. The value proposition involves two value disciplines requiring a broad
range of core and dynamic capabilities; and, the profit model has shifted from being
based solely on revenues from sales transactions to one based on revenues from
sales transactions and from a contracted portion of airlines’ savings from better
performing engines (engine operating and maintenance costs, aircraft miles flown
between a shopper and a retailer. For producers like Kraft Foods, the immediate
merchandizing and logistics relationships with retail stores (or clusters of stores
associated with the same retail chain), Kraft was among the first firms to apply
analytics in reaching out through retail stores to the stores’ consumers to benefit
34
Kraft decentralized much of its marketing to sales teams holding relationships
with retail stores (or store clusters) and built a marketing analytic capability that
combined data from three sources: digitized sales transactions from the retail stores,
categories and brands vary by store, retailer, geographic area, customer segment,
time-of-the-year, etc., and how these sales are influenced by taken-actions, e.g.,
then consults with the decentralized sales teams as the teams plan for subsequent
programs.
ways. First, as Kraft now reaches shoppers through B2C sales channels (pure-play
online retailers such as Amazon and mixed-play retailers such as Target and
Walmart), Kraft’s retail analytics and retailer relationship programs have had to
account for the nuances of e-commerce. Second, while not selling directly to
shoppers, Kraft is building online shopper communities, e.g., social media channels,
www.kraftrecipes.com and the iFood Assistant app, that are used to build awareness
about and promote Kraft products and brands and to interact with shoppers. Third,
the streams of data gathered from these online communities have been incorporated
within Kraft’s analytics platforms – enabling marketing and brand specialists to tap
into the fuzzy front-ends of shopper wants and needs (e.g., flavor trends, absent-
35
but-desired products, in-store or online shopping likes/dislikes, promotions
likes/dislikes, brand perceptions, etc.). Insights such as these, when combined with
across media.
Following Steve Jobs’ leadership, Apple has very successfully pursued the
product leadership value discipline. Because Apple’s products are perceived by its
purchaser with peer-group panache - Apple is able to command premium prices for
their products. The firm has accomplished this by maintaining tight control of product
design and development and by reinforcing the Apple brand through stylistic
Apple’s approach to product leadership is not to tap into the leading edge of
consumer trends, but rather to inspire these trends. It is not enough to understand
your customer’s desires - Apple’s objective is to create these desires. Clear examples
of this are the iPod, the iPhone, the iPad and, most recently, the Apple Watch. The
Apple Watch, for example, is not intended to be a smaller, wearable version of the
iPhone. Instead, the Apple Watch is envisioned as a lifestyle accessory that brings
the digital content most meaningful to a person in real-time at the turn of the wrist.
Was this something that the consumer needed before it was released? Not likely.
But, it is Apple’s expectation that, after becoming aware of the usefulness of the
36
Apple Watch, its targeted consumer segments will perceive not only that this need is
In order for Apple’s market success to continue into the future, two factors
are crucial: releasing a steady stream of exciting products, and growing its extremely
loyal (some might say insanely loyal) customer base. The first of these factors is
captured with the product leadership value discipline, and the second with the
customer intimacy value discipline. Apple’s more recent focus on customer intimacy
is perhaps best represented by the opening, growth and market success of the Apple
Store. As conceived by Apple, its retail stores are more than just stores. Instead,
people are exposed to a variety of enriching experiences: trying out new products,
learning how to do neat things with a product, overcoming product usage problems,
being exposed to new ideas (about technology, art, music, culture, entrepreneurial
startups, etc.), interacting with others on topics of mutual interest, and, most simply,
being entertained. The objective, thus, is to fashion and reinforce stronger consumer
As a final point, the digital strategy for a given organization often involves
multiple business models. Multiple business models arise because most organizations
two overarching business models: one associated with the consumer smart device
pipeline ecosystem, and the other with the iTunes business model that operates as a
network ecosystem. Further, while the digital strategy for a holding company such
37
as Berkshire Hathaway is framed around a single dominant business model, each
model(s).
learn about potential innovations and disruptions and then adapt their business
models for strategic success. In his recent book, Venkatraman11 describes three
types of competitive moves that collectively represent the logic of digital strategy:
new digital business models that have the potential to cause dramatic disruptions
N. Venkatraman, The Digital Matrix: New Rules for Business Transformation through
11
and the people transportation industry (2011), Tesla and the automobile industry
(2014), etc. All firms must direct their managers’ attentions and their resources
that might possibly affect their industry. Consider the many ongoing experiments
occurring today with Bitcoin. Though its implications and business trajectory are not
clear today, no financial services firms can afford to ignore experiments around this
experimentation at the edge of their industries or ignore them at their own peril.
manufacturers still be making cars or are they in the business of mobility solutions?
The smart money would be on the latter and this would have significant implications
for the business models and ecosystems of today’s automobile industry. Apple’s Car
systems are all examples of novel solutions that are likely to affect, in yet
undetermined ways, the core of today’s automotive industry. Every car manufacturer
is reexamining its business models, ecosystems, and offerings to develop the needed
adaptive and entrepreneurial agilities. The jury is out on how we will view cars and
mobility solutions ten years from now and what will be the ownership and
clear that during the past three years, the industry’s business models are undergoing
39
significant transformations. Savvy firms participating in automobile-related
It seems we continue to hear, almost daily, about the demise of the traditional
retail industry and the emergence and dramatic growth not just of Amazon, but of
other digital retail firms. The fundamental business models of retailing have been
reinvented and the industry is witnessing a shakeout, with many of the traditional
incumbents on the verge of disappearing. But, some incumbents are doing fine with
Macy’s, Marks & Spenser, IKEA, Nordstrom, among others). Invariably, these
the core competitive moves, and introduce radical changes to their business models
digitalization capabilities.
Figure 2-5 depicts the central role served by competitive moves in the process
of digital strategy formulation and evolution – a process that begins and evolves
40
through the knowledge, perspectives and insights held by digital strategists. Four
Markets adjacent to those within which the current business models are
executing. Increasingly, the genesis of radical business model enhancement
and business model innovation is derived not only from analyzing the
outcomes of competitive moves within a targeted market, but also from
observing the outcomes of other organizations’ competitive moves in
adjacent markets – especially when an adjacent market involves
complementary or substitute value-units, similar customer segments, similar
value-stream activities, similar strategic partners, etc.
Table 2-2 provides overviews of these four domains. Importantly, the key to
fabricating and evolving effective competitive moves is not necessarily the nature of
the specific planning processes applied (many differing planning processes can lead
to successful outcomes), but rather to ensure that these planning processes actively
specialists, etc.) whom collectively hold and/or have ready access to these four
41
Figure 2-5
The Digital Strategy Formulation and Evolution Process
Competitive Moves
Experimentation at the Edge
Collision at the Core
Reinvention at the Root
Digital
Strategists’ Business Model
Knowledge, Enhancement,
Perspectives Replication &
& Insights Innovation
Competitive Outcomes
Targeted Market
Adjacent Markets
Table 2-2
Key Knowledge-Perspectives-Insights Domains
42
A Recap and Look Ahead
This chapter has introduced fresh ideas regarding three key elements
organization’s digital strategy. Successful digital-age firms excel with both adaptive
and entrepreneurial agilities. Second, business model design represents the new
threats and opportunities. Third, the logic of digital strategy formulation and
evolution is based on taking and learning from three types of competitive moves:
experimentation at the edge, collision at the core, and reinvention at the root.
Bolstered by these ideas, we are now ready to examine how digitalization can be
applied to confront digital disruption in, first, pipeline ecosystems and, then,
network ecosystems.
43
Chapter 3. Digitalized Business Models for Pipeline Ecosystems
Over the last century, pipeline ecosystems have been the dominant organizing
paradigm. In just about all established economic arenas, e.g., automotive, packaged
services, healthcare services, big box retailers, etc., value-units are delivered to
Figure 3-1 depicts a simplified industry value stream for companies - like Ben
and Jerry’s, Häagen-Dazs, and Baskin Robbins - that produce ice cream (through a
mix of upstream channels) and then market finished products to consumers (through
producer determines which ice cream raw materials, flavors and delivery channels
are likely to be most favored by consumers and fashions a value stream to produce
and deliver ice cream products to these consumers. However, if one or more of the
or if the ice cream producer does a poor job anticipating the consumers’ expectations
or coordinating value stream work flows, then the consumers’ expectations will not
work flows, the producer could choose to perform all of the activities involved with
44
the value stream, i.e., be fully vertically integrated. However, as explained below, it
usually is neither economically nor operationally desirable for the producer to do so.
Three concepts explain why this is the case: economies of scale and scope,
Figure 3-1
Ice Cream Industry Value Stream
Ice
Cream Distributors
Production
Ice Cream
Storage &
Ice Cream Shipping
Production
Ice
Cream Retailers
Ingredient
Suppliers
Retail
Store
Packaging
Suppliers
eCommerce
Paper
Suppliers
Economies of scale refers to the advantages that arise with increased volume
of output, and economies of scope refers to the advantages that arise when a
family of related goods are produced rather than a single good. Viewed most
simplistically: by covering fixed costs with larger activity volume, the cost to execute
the activity drops; by specializing in an activity, the activity’s variable costs can be
activities, the fixed and variable costs of each activity can be reduced. It is the
45
existence of economies of scale and scope that are at the basis of the consideration
given by most producers to using the services of other organizations to carry out
Transaction Costs
(individual) decide to make an item or perform an activity itself (herself) rather than
another company (person) make the item or perform the activity? Answering this
question is intuitively simple: compare the total cost of doing it yourself against the
sum of associated production and transaction costs. Production costs are the direct
costs to produce an item or perform an activity; transaction costs are the additional
costs involved when an item or activity is acquired from someone else. Table 3-1
46
Table 3-1
Common Transaction Costs
Types of
Transaction Description
Costs
Locating suppliers willing & able to provide goods & services.
Search
Locating buyers willing & able to purchase good & services.
Assessing bids.
Bid Selection Assessing suppliers/buyers.
Selecting a supplier/buyer.
Contract Determining mutually agreeable contract provisions.
Negotiation Renegotiating contract provisions.
Insuring against failure to deliver/purchase.
Bonding
Insuring against substandard performance.
Legal Insuring against inadequate contract provisions.
Monitoring ongoing supplier/customer performance.
Monitoring
Deciding to terminate or renegotiate contract.
costs (refer back to Table 3-1). The key question, thus, becomes: “Overall, is it less
expensive to do it myself or to have the specialist do it for me?” Often, the answer
Intermediation
Say, for example, that you would like a dish of ice cream made by a specific ice cream
producer. You could buy a pint directly from a retail store operated by the producer
or from a nearby grocery store (who buys the ice cream directly from the producer
or, more likely, from a distributor or wholesaler). Unless you live close to a producer
47
retail outlet, the transaction costs (e.g., search, travel, etc.) you would experience
are likely to be quite high. As a result, you would not buy a pint of ice cream directly
from the ice cream producer; instead, you would buy a pint from a nearby grocery
Table 3-2
Common Intermediary Activities
Types of Activities
Performed by Description
Intermediaries
Locate & procure products/services/information.
Search Efficiency
Locate suppliers.
Gather orders from multiple consumers and negotiate
prices & contracts with producers.
Demand Aggregation
Gather products/services/information from multiple
suppliers and negotiate prices & contracts with producers.
Buy in bulk and reassemble into packages that meet the
Create Packages
needs of specific consumers or producers.
Handle complex transactions.
Guarantee Transactions
Insure payments & shipments.
additional costs, as each intermediary naturally wishes to make a profit from their
involvement in the value stream. However, as these additional profits are spread
across the large number of value-units moving through the value stream, it often
proves to be the case that both producers and consumers ultimately benefit from the
48
Digitalizing Pipeline Ecosystems
three eras of digital disruption, particularly with regard to the value-units delivered
to consumers, the enabling digitization and digitalization, and the payment and trust
systems employed. Table 3-3 provides an overview of the major changes that have
occurred. The most significant of these changes for pipeline ecosystems are
described below. Each one of the three eras of digital disruption within pipeline
ecosystems is now described, with this section ending with a discussion of how these
changes have resulted in the value streams associated with pipeline ecosystems
transformation.
Table 3-3
Evolution of Pipeline Ecosystems
Exchange Trust
Era Value-Units Digitization & Digitalization
Currency Systems
Data/document standards Government & third-
Banking
Point-to-point connectivity party institutions
Digital system
1 Intra- and inter-organizational Contracts
complements Credit/debit
(managerial & operational) Brand
card systems
business process efficiencies Social capital
Internet
One-to-many connectivity Third-party digital
Data, process, analytic & Digitalized trust seals
Digital
2 collaboration platforms payment Consumer
value-units
Social media systems monitoring (product
Omni-channel producer- & producer reviews)
consumer interaction
Many-to-many connectivity
Community
Smart devices Reputation
Social monitoring
3 Big data platforms Social capital
complements Peer-regulation
Big data analytic platforms Bitcoins
Self-regulation
Social messaging platforms
49
Era 1
expect their operations, staff and managerial employees to be looking for ways to
enhance value-units, cut costs, improve market responsiveness, and accelerate the
to customers, and support processes refer to work activities that provide direction,
resources and oversight for the primary processes. All too often, however, these
work activities are hindered by constraints – both real (e.g., time, space, resource
Advantage: Creating and Sustaining Superior Performance, New York: Free Press, 1998.
50
Figure 3-2
A Pipeline Organization’s Managerial and Operational Processes
Order
Manufacturing
Direct Fulfillment
Processes
Finished- Sales
and Supplies Process Support
Goods
Procurement Inventory Marketing
Inventory Reverse
Inbound Quality Merchandising Logistics
Outbound
Logistics Control
Logistics
and used by value stream participants. For example, many industry groups
might be expected, EDI made it possible for value stream participants to interconnect
and across a value stream’s participants, two things occur. First, the performance of
the entire value stream improves – to the benefit of all participants, but especially
51
for consumers. Second, as intermediaries are specialized to a greater extent than
shares of the value being created. However, such gains in the influence of
lower their cost structures and to attach digital complements (e.g., better and more
the value-units being delivered to, thereby enhancing the producer’s value-
proposition and strengthening both the producer’s market position and relative
For the most part, Era 1 pipeline ecosystems made use of well-established
payment and trust systems. The only true innovation that occurred was the
systems.
Era 2
The digital technology that ushered in Era 2 was the development and wide-
spread adoption of the World Wide Web. At its core, the WWW (World Wide Web)
individuals) to store data and documents in an online space such that these data and
documents can easily and inexpensively be accessed and used by other organizations
(and individuals). The WWW (along with its enabling technologies) led to three
52
Purely-Digital Value-Units
vacuum but require a vast enabling-ecosystem. For example, consider a very familiar
physical product – the automobile. In order for you to buy a car directly off of the
sales lot and drive it, a huge number and variety of things must exist: automobile
lights and signage, traffic laws and regulations, etc. Most important, a
correspondingly huge number of standards need to have been established and need
as digital books, mp3 audio tracks, navigation maps, and digital coupons. Devices
must exist through which a purchased value-unit can be accessed and used, retailers
must exist to offer the value-unit to a consumer and then deliver a purchased copy
to the consumer’s device, and payment systems must exist so that the exchange can
take place between the retailer and the consumer. As with physical goods, many
standards must be established and followed for the ecosystem to operate seamlessly.
the markets for physical and digital value-units differ in two major ways. First, the
initial costs (e.g., design, testing and marketing) and moderate-to-high variable
production costs (e.g., labor and materials). Let us compare the costs between
53
manufacturing a car and developing a digital book. Car manufacturers incur high
fixed costs (e.g., large plants, sophisticated manufacturing and design technologies,
etc.) and high variable costs (e.g., parts and assembled components, labor). In
contrast, while a digital book may have high initial costs (the labor costs involved in
authoring, editing and formatting the book), a digital book has very low variable
production costs - often approaching zero. This is because the costs of replicating
digital goods are minimal, unlike most physical goods. For example, the 100th car
coming off of an assembly line will cost essentially the same to produce as the first
car off of said assembly line. However, the 100th digital copy of a text book costs
only a minute fraction of the expense involved in producing the first digital version.
The production costs associated with digital goods are dominated by the cost of
producing a first copy, with few constraints limiting growth in demand. Simply put,
digital goods have far more opportunities for large-scale growth than do physical
goods.
units being offered because of the costs of holding inventory. Generally, firms strive
to offer the 20% of value-units that generate 80% of sales. It simply is not
economical to cater to the remaining 80%. Consider a hardcopy book that was a
bestseller a year ago, but has since been displaced by more recent bestsellers. Even
though a small demand for this hardcopy book is likely to persist over time, most
hardcopy retailers will keep few, if any, copies of the book on hand due to acquisition
costs and physical storage space constraints. Similarly, consider a book on hiking in
54
the Andes mountain ranges written by an authoritative expert. While there might be
a sizeable demand for such a book among hiking enthusiasts (especially those
planning a near-term hiking expedition in the Andes), the book is unlikely to have
the broad popularity needed to merit space on most hardcopy retailer’s bookshelves
On the other hand, digital retailers are finding it profitable to service the needs
of customers whose tastes represent the more specialized products populating the
long-tail of the demand spectrum. For example, an MIT study from the early 2000s
found that nearly 30-40% of Amazon’s book sales represent products in this long-
tail.13 This ability of digital markets to service the long-tail of demand can be
Value streams in pipeline ecosystems become longer and wider each time
coordinating data, information and material flows between value stream participants
increase as well.
Consider the value stream shown in Figure 3-3. Note that numerous
data/information flows and material flows are involved, and that all of these flows
from data and information provided by only the most adjacent participants. Without
access to consolidated data from all participants in a value stream, these forecasts
tend to be error-prone, erratic and worsen over time. Participants experiencing high
Figure 3-3
Conventional Value Stream
Tiered
Suppliers
Contract
Manufacturers
Producer
Material Flows
Distributors
Retailers
Consumers
56
Value stream participants developed tactics to deal with demand uncertainty,
the two most common being vertical integration and stock holding. With vertical
shortening and narrowing its value stream. But, in doing so, the advantages gained
organization builds up various kinds of inventories, thus providing buffers that soften
the effects of poor demand forecasts. But, in doing so, higher inventory costs arise
that can lead to higher prices (stressing consumer demand) and/or lower profit
margins.
Era 2 digitalization provided a much better way to cope with the challenges of
long and wide industry value streams. Figure 3-4 depicts a platform-enabled value
stream. In general terms, a platform uses digital technologies to host digital and
resources are likely to include: digitized data and documents, digitalized managerial
and operational processes that operate on these data/documents, tools for analyzing
data, and tools enabling employees from participating organizations to interact and
collaborate. By using the resources available through value stream platforms, value
stream participants can: better plan their own work activities; better plan and then
coordinate the data, information and material flows that permeate a value stream;
57
Figure 3-4
Platform-Enabled Value Stream
Tiered
Suppliers
Contract
Manufacturers
Material Flows
Consumers
Many successful value stream platforms have been built, owned and
platform for executing its build-to-order business model (see Figure 3-5) and
Enterprise Rent-A-Car’s platform for executing its repair rental car business model
(see Figure 3-6). Considerable efforts have been taken by industry consortiums,
etc.), to define and implement platforms to be used across the varied value streams
58
Figure 3-5
Dell’s Value Stream Platform
Contracted Outbound
Component (Downstream)
Assembler
Suppliers & Logistics
Contract Provider
Manufacturers
Dell’s Value
Inbound Stream Platform
(Upstream)
Logistics
Providers
Dell Consumer
Figure 3-6
Enterprise Rent-A-Car’s Value Stream Platform
Insurance
Companies
Enterprise’s
Enterprise
Value Stream Consumer
Rent-A-Car
Platform
Auto
Repair
Shops
the functionality, ease-of-use and availability of value stream platforms. One of the
key targets of platform enhancement involves the variety of channels used for
59
promotion, ordering and delivery activities (see Table 3-4). As a consequence, value
flows between:
Two (or more) individual consumers (e.g., two consumers interact through a
producer’s online customer forum).
Table 3-4
Value Stream Participant Interaction Channels
60
Payment and Trust Systems
payment systems and trust systems. Purely-digital alternatives, such as PayPal and
about fake reviews and a tendency for contributed reviews to possess a socially-
Era 3
analyze and act on environmental signals. Table 3-5 describes some familiar but, in
consumers to engage with the value-unit’s producer and/or retailer and with other
S. Aral, “The Problem with Online Ratings,” Sloan Management Review, Winter 2014,
14
pp. 47-52.
61
ecosystem where collections of smart devices across the ecosystem are
interactions contribute (e.g., sensed data, novel ideas, reviews, etc.) significantly to
business model value propositions. How are individuals (typically, employees and/or
mechanisms - reputation and social capital - are proving to be equally, if not more,
effective.
Table 3-5
Some Familiar Smart Devices
adjacent value streams; to capture data about these events; and, to apply statistical
62
and mathematical models to these data in developing deeper understandings of the
Table 3-6
Big Data Analytics Examples
Analyzed messages to prioritize pump features and to App captures data about potholes encountered
identify the weaknesses of the producer’s pump vis-a-vis (location, estimated depth/size, etc.) and transmits
competitors’ pumps: less durable, hose harder to use, these data to a City of Boston data server.
and contained a costly but low-ranked built-in gauge.
Captured data cleansed (e.g., non-pothole bumps
Tearing down competitors’ products revealed higher- filtered out) & analyzed to prepare listings of
quality components and less bulky packaging. potential potholes to be filled.
Outcomes
Potholes fixed before they become major road
Removed pressure gauge and reduced packaging.
hazards and while repair costs are relatively low.
Applied cost savings to use higher-quality components.
Recurrent potholes can signal serious road
management problems.
Source
D. Fedewa, G. L. Velarde and B. O’Neill, “Using Buzz D. O’Leary, “Exploiting Big Data from Mobile Device
Analytics to Gain a Product and Marketing Edge,” Sensor-Based Apps: Challenges and Benefits,” MIS
McKinsey Quarterly, Number 2, 2016, pp. 14-15. Quarterly Executive, December 2013, pp. 179-187.
related data has made viable a new trust mechanism: self-regulation. With self-
transactions, monitors these data for problems, reacts responsively and responsibly
63
The Promise of Car Data15
let us take a not-so-futuristic look at how Big Data analytics is changing automotive-
During the coming decade, technology entrepreneurs and digital giants are
expected surge in the availability of car data and to introduce innovative car-related
features and services for which consumers are expected to be very willing to pay.
What exactly is car data? A short list would include data about: the road and
battery, tires, etc.) and systems (e.g., power, steering, safety, etc.), vehicle usage
history (e.g., speed, direction, location, past and current trips, etc.),
driver/passenger personal data and preferences, and direct communications from the
vehicle (e.g., phone, text, email, calendar, social media, etc.). At present, a key
unknown is: “Will most people be willing to share this information for free?” Most
observers feel the answer will be Yes given the immediate benefits to be derived by
a vehicle’s driver and passengers (see Table 3-7). What do you think?
15
This section is based on material from: D. Mohr, G. Camplone, D. Wee, T. Moller
and M. Bertoncello, “Car data: Paving the Way to Value-Creating Mobility”, McKinsey
Quarterly, March 2016: https://www.mckinsey.de/files/mckinsey_car_data_march_2016.pdf
64
Table 3-7
Immediate Driver/Passenger Benefits from Sharing Car Data
Safety Time
Real-time emergency calls Reduced travel time through
Early on-scene accident reporting optimized routing, navigation &
Information to support rescue traffic management systems
services Reduced time to locate parking
Real-time road hazard warning through connections with parking
services
Convenience Cost
Reduced breakdown risk and vehicle Reduced insurance cost through
downtime through predictive pay-as-you-drive insurance
maintenance and connections with schemes
repair & spare parts service Reduced toll/road tax rates
providers through an automated payment
Concierge services (refueling, infrastructure
carwash, in-trunk delivery)
Overall, a more-connected lifestyle
in both sides of the profit model component of a business model: generating revenue
and reducing cost. New sources of revenues include: selling or leasing new products
and services to car owners, leveraging car data with other sources of data to push
data to third-parties. New means of cutting costs involve creative uses of car data
and car connectivity to reduce the R&D, production, delivery and marketing costs
connected-car is increasingly being seen as the first step into the store and, when
combined with autonomous driving, as a prime space for retail where producers and
Over the last two decades, digital disruption has introduced seemingly constant
65
think Borders, Blockbuster and Circuit City. Simultaneously, scores of new, highly-
digitalized entrants are participating in these same markets (as well as discovering
the three eras of digital disruption have seeded and continue to see radical structural
integrates, thus becoming a producer. Table 3-8 describes these structural change-
events for the upstream and downstream segments of pipeline ecosystems. Below,
66
Table 3-8
Value Stream Structural Change-Events
Downstream
Producer bypasses intermediaries to directly engage in market exchanges with
Disintermediation
consumers.
Entry of digitalized retailer, whom facilitates market exchanges between producers &
consumers.
Reintermediation
Entry of digitalized infomediary (an intermediary dealing solely with data & information),
whom identifies sought value-units and/or producers to consumers.
Intermediary Intermediary integrates backwards to become a producer creating & delivering value-
Transformation units to consumers.
Upstream
Producer bypasses intermediaries to directly engage in market exchanges with raw
material suppliers, component suppliers and/or service providers.
Disintermediation
Supplier bypasses intermediaries to directly engage in market exchanges with producers
and/or bypasses producers to directly engage in market exchanges with consumers.
Entry of digitalized distributor facilitating market exchanges between producers & raw
material suppliers, component suppliers and/or service providers.
Reintermediation
Entry of digitalized infomediary identifying sought raw materials, components & services,
as well as suppliers/providers, to producers.
Intermediary Intermediary integrates backwards to become a producer, creating and delivering value-
Transformation units to suppliers, intermediaries, producers and/or consumers.
varying extents, their downstream ecosystem via a B2C sales channel. B2C channels
provide many benefits – most are obvious, but some are not-so-obvious - to
directly touch and interact with consumers, building loyalty and engagement; and,
new and overstocked products; the ability to express feelings of satisfaction and
67
dissatisfaction directly to a producer; opportunities to engage with the producer and
with other consumers in learning about a product and product-related activities; and,
Clearly, the intermediaries, i.e., distributors and retailers, who have been partially or
fully disintermediated.
with downstream ecosystems: the entry of a digitalized intermediary and the entry
content from across the WWW, curates the content and provides access to this
curated content. Amazon’s foray into the retail marketplace for books is the iconic
a disruptive infomediary.
ecosystem for film and television video not once, but twice: first as a partially-
streaming video provider. Now, Netflix is producing and delivering its own content,
recognized both as one of the industry’s more powerful and innovative players.
Amazon, on the other hand, has followed two very different paths in becoming a
68
ecosystem that creates and delivers books to consumers and (2) strong digital
has become a successful publisher of digital books through its Kindle Direct Publishing
executing its massive B2C and B2B business models, Amazon has also become a
storage, content management, etc.) through its Amazon Web Services operation.
This chapter has both explained the economic foundations that have enabled
pipeline ecosystems to dominate most industries over the past century and the
organizations and pipeline ecosystems over the three eras of digital disruption. Given
this understanding of pipeline ecosystems, the next chapter examines digital strategy
69
Chapter 4. Digital Strategy Formulation for Pipeline Organizations
Today, most of the data and documents that move between and within value
digitized data and documents can be quickly accessed, absorbed and shared,
reassembled for new uses, and analyzed to produce specific answers, fresh insights
This chapter builds upon the earlier ideas provided on digital strategy
Platform Design
through a collective mindset and capabilities for execution. Today, many of the
70
needed capabilities are provided through the technical services being hosted on
digital platforms and through the operational and managerial business processes
empowerment and interaction) can enhance business processes associated with each
of the three value disciplines. Two significant trends regarding digital strategies are
Table 4-1
Enhancing the Value Disciplines via Digitalization
demonstrate these agilities, the pace at which organizations must implement and
competitive parity are increasingly available from technology providers in the form
acquire a business platform, integrate the acquired platform within its installed
assemblage of digital platforms and business platforms, and competitively exploit this
innovation.16 However, such practices only serve to further speed up the pace of
Platform Design
evolve their business models and execute competitive actions in a timely manner.
platform exhibits an appropriate balance in (1) the stability and agility of the hosted
functionality and (2) the costs of building, enhancing and extending platforms across
16
O. Shenkar, Copycats: How Smart Companies Use Imitation to Gain a Strategic
Edge, Boston: Harvard Business School Publishing, 2010.
72
Modularity
that the data, messages and/or documents being exchanged are consistently
interpreted across both platforms. Because the required modifications require both
time and effort, tight-coupling can be very intrusive for one or both of the platforms.
The functions being executed on each of the platforms conform to the same
set of data/message/document standards (often established by an industry
association or by a consortium of powerful industry players). While time and
effort are initially required to negotiate standards and conformance policies,
platforms hosting ‘standards-compliant’ functions are relatively easy to
interconnect.
Both of the loose-coupling tactics are far less intrusive than tight-coupling.
tight-coupling can provide for greater stability (being seamless and using less
73
complex technology, it is easier to harden and secure) and loose-coupling can provide
for greater agility (both the platform and its connections to other platforms are easier
to modify). In terms of cost, initial connection costs are greater with loose-coupling,
Figure 4-1
Tight-Coupling and Loose-Coupling
• Interconnection Artifact
Loosely Module A Module B
Coupled • Agreed-to Standards
74
Figure 4-2
Contrasting Tight-Coupling and Loose-Coupling
• Seamless
• Less Complex Technologies
Tightly-Coupled
Loosely-Coupled
• More Intrusive
• Best for a One-to-One connection
• Interceded
• More Complex Technologies
• Less Intrusive
• Best for a One-to-Many Connection
The term global, as used throughout this book, refers to a digital solution that
term often used to connote a global digital solution is enterprise-wide). A local digital
work units.
Figure 4-3 summarizes the advantages of global and local platforms. Global
platforms are more cost-effective to build, support and modify because associated
costs are spread across a large base of users. Additionally, the digital solutions that
effort is required to negotiate the design of and to implement global platforms (as
75
infeasible to use global platform functionalities to meet a work unit’s needs (e.g., a
and implementing a local platform is more effective and timely. That said, an over-
dependence on local platforms can quickly lead to excessive costs: work units
already been built by other work units; and, when reuse tactics are followed,
Figure 4-3
Contrasting Global and Local Platforms
• Tailored Solutions
• Innovative Solutions
Global Platform
• Timely Solutions
Local Platform
• More-Easily Implemented Solutions
• Lower-Cost Solutions
• Leveraged Solutions
• More-Easily Supported & Modified
Solutions
76
platforms being tightly/loosely coupled and being implemented as a global/local
platforms, most organizations are in the midst of extensive (and expensive) journeys
Achieving an optimal balance in the use of global and local platforms is an ongoing
endeavor for most organizations. However, most organizations have a bias toward
Digitalized functionalities expected to serve a single work unit (or a few work
units) should be implemented as local platforms.
out day-to-day work activities and undertake competitive actions. This section
77
describes how digital platforms and business platforms have transformed
visibility and channel multiplicity. Event visibility refers to making key events (an
inventory situation, etc.) known to the individuals and the digitalized solutions taking
are insufficiently incentivized to work together, it can be difficult to get all employees
to dance to the same song. Sales personnel, for example, tend to be rewarded for
and quality control. As a result, manufacturing personnel may decide not to let sales
personnel know about a spike in defect rates – information that the sales unit needs
when interacting with customers. Such issues only intensify with information flows
that cross organizational boundaries. Should a manufacturer let a supplier know the
nuances that underlie customers’ purchasing behaviors? How about if the supplier
delay future component shipments? Does your answer change if the manufacturer-
78
Channel multiplicity refers to ensuring that a sufficient mix of
interconnection channels are available to handle the data, messages and documents
flowing to and from individuals and digital solutions so that a preferred channel is
available for use. Channel multiplicity is particularly important when connecting with
humans, as people tend to develop strong preferences for using specific channels for
you communicate most with others who use the same communication channels (e.g.,
email, texting, phone, etc.) that you prefer? Do you tend to use specific
texting for good news, but speaking face-to-face for bad news, or vice versa)?
Figure 4-4 depicts a generic operational platform. Note that the platform hosts
an organization’s primary and support processes, as well as the data captured and
used by these processes. Further, these processes extend externally to connect with
channels that key events occurring inside and outside an organization are made
79
Figure 4-4
A Generic Operational Platform
Channel Multiplicity
Global
Channel Multiplicity
Operational
Upstream Database Downstream
Intermediaries Intermediaries
Support
Channel Multiplicity
Processes
Channel Multiplicity
Material &
Component Primary Consumers
Suppliers Processes
Delta Airlines.17 Consumers are very concerned with safety, with on-time departures
and arrivals, and with having their in-flight needs met. Not surprisingly, all airlines
pursue the operational excellence value discipline. Figure 4-5 provides a high-level
mix of aircraft, routes and airports is like choreographing and directing the largest
ballet ever conceived. Unless all employees and all executing digitalized solutions
17
This discussion of Delta’s operational platform is adapted from material in: J.W.
Ross, P. Weill and D.C. Robertson, Enterprise Architecture as Strategy, Boston: Harvard
University Press, 2006.
80
Figure 4-5
Delta Airline’s Digitalized Operational Platform
Allocate resources
Prepare for flight departure
Load aircraft
Flight departure & closeout Primary
Monitor flight Processes
Flight arrival & closeout
Unload aircraft
Clean & service aircraft
of these same analytic capabilities are provided to employees of other value stream
team, etc.).
data across multiple spheres of work; e.g., marketing, logistics and manufacturing)
81
or a more focused data mart (a smaller archive of organized data focused on a
archives are populated from operational databases, from other internal sources, and
governmental agencies, etc.). Furthermore, these data are most often analyzed to
achieve one or more of the following four purposes: description, diagnosis, prediction
or prescription. The most common analytical tools used in achieving these purposes
Figure 4-6
A Generic Analytical Platform
External
Data Data Ad Hoc Queries
Sources Warehouse
and/or
Data Marts
Predefined Queries
Global
Operational
Database
Diagnosis
Description Statistical Analyses
Failure
Events
Other Success
Objects
Internal Event
Situations
Data Sources occurrences
Math. Modeling
Analytic Purpose
Prediction
Events Prescription Data Mining
Outcomes Optimal actions
Machine Learning
82
Table 4-2
Common Analytical Tools
provide subscribers with a customized, fresh experience each time they access the
Netflix content catalog. Figure 4-7 provides a high-level view of Netflix’s digitalized
analytical platform. Netflix has fashioned a huge data archive from three major
(largely put together by Netflix staff), and real-time data streams capturing very-
83
Figure 4-7
Netflix’s Digitalized Analytical Platform
Subscriber Content
Subscriber Profiles Attributes
Real-Time (genre tags, Core Data
Viewing Subscriber technical data,
Behaviors Content artist data, etc.)
Ratings
interaction platforms through which people are brought together virtually, rather
84
Table 4-3
Value Stream Collaboration Opportunities
Collaboration
Description
Opportunity
Employees from manufacturers, distributors & retailers collaborate to
Downstream better understand consumer demand patterns, to develop joint
Processes strategies & tactics for marketing & fulfillment, and to detect & resolve
downstream supply-demand imbalances.
Employees from manufacturers, raw material & component suppliers,
Upstream and upstream intermediaries collaborate to better understand
Processes procurement & production patterns & costs, and to detect & resolve
upstream supply-demand imbalances.
Employees from manufacturers, suppliers, subcontractors, distributors,
Upstream & retailers & logistics providers collaborate to better understand
Downstream transportation demand patterns & costs, to develop joint strategies &
Logistics tactics regarding transportation solutions, and to detect & resolve
upstream/downstream logistics problems.
Employees from manufacturers, suppliers & engineering design firms
Product & collaborate to better understand the nature, timeframes & costs of new
Process Design product/process designs, to develop joint strategies & tactics for
enhancing design processes, and to detect & resolve design problems.
There are two basic types of collaboration arrangements. The first involves
recurrent collaborations where the (more or less) same people work on an ongoing
task (e.g., a marketing group consulting with sales teams, a weekly meeting of a
access to their own digital resources in addition to the resources provided via the
collaboration platform. The platform contains a data archive that holds data and
that are created as participants interact within the various work spaces provisioned
85
through the platform. Figure 4-8 identifies four such work spaces: messaging and
Figure 4-8
A Generic Collaboration Platform
Data
Person Archive
Person
Idea Processing
Messaging & Generation
Conferencing Curation
Refinement
Collaboration
oint Spaces
Person
Joint-Work
Designing Decision Making
Problem Solving
Authoring
Person
product leadership value discipline, as new product development often requires the
bringing together of dispersed expertise. A nice example of this can be seen with the
rocket engine.18,19 The project team consisted of eight individuals (a project team
18
A. Malhotra, A. Majchrzak, R. Carman and V. Lott, “Radical Innovation without
Collocation: A Case Study at Boeing-Rocketdyne,” MIS Quarterly, June 2001, pp. 229-249.
19
In 2005, Boeing sold the Rocketdyne Division to United Technologies Corporation,
which sold the Division to GenCorp in 2013, which merged with Aerojet to form Aerojet
Rocketdyne.
86
manufacturability engineer, a CAD (computer-aided design) specialist, and a stress
The project lasted for ten months with participants devoting less than 15% of
their work time to the project. Participants met physically only twice: six of the
eight participants were able to get together for a project kick-off meeting (that also
included training on the collaboration tools) and all eight members were able to
collaboration tools made available to the project team. The engine design that was
produced far exceeded expectations, e.g., the rocket’s thrust chamber had only six
parts (compared to the typical 1,200 parts) and a first-unit production cost of
Table 4-4
Next-Generation Rocket Engine Project Collaboration Tools
87
Digital Strategy Formulation
cope with digital disruption. The first of these strategic challenges addresses how to
segments exist and if each segment varies significantly in how it relates to value-
units and associated value propositions, then each segment is likely to require its
own business model. While some of these business models might be expected to
single business model, with this business model targeting either a homogeneous
community. Most often, digital strategists are involved with formulating and evolving
88
Table 4-5
Pipeline Organization Strategic Challenges
deliberations as they deal with the remaining four strategic challenges listed in Table
89
Figure 4-9
Factors Driving Business Model Enhancement, Replication & Innovation
Competitors’ actions
Adjacent market business
model innovations
Socioeconomic trends
Cultural trends
Consumers’ needs & desires
Strategic Intent
Installed platforms
Held digitization capabilities
New digital technologies
Others’ digitalization innovations
Strategic Intent
become?”; and, a good mission statement answers the question: “What must we
do to achieve this vision?” Table 4-6 provides vision and mission statements for
20
Apple’s mission and vision statements obtained from: http://panmore.com/apple-
mission-statement-vision-statement
21
Walmart’s mission and vision statements obtained from:
http://panmore.com/walmart-vision-mission-statement-intensive-generic-strategies
90
Table 4-6
Vision & Mission Statements for Apple and Walmart
To be the best retailer in the hearts and minds of Saving people money so they
Walmart
consumers and employees. can live better.
and now to achieve our vision and mission?” In doing so, a strategic intent provides
destiny. Invariably, as indicated earlier in Figure 4-9, a strategic intent likely involves
positions in new markets. By far, most formulated competitive moves are taken to
competitive pursuits:
91
Business Model Enhancement: incremental changes are made to one or
more of the four elements of business models.
tend to be observed.
Table 4-7
Business Model Adaptations
For the most part, the profit model adaptations are quite straightforward. The
one profit model adaptation that might not be readily apparent is that involving
92
stream participant captures its share of the value being created by the value stream.
A variety of value-capture mechanisms exist, with the most common defined in Table
Table 4-8
Different Value-Capture Mechanisms
Pricing
Price determined as/by …
Mechanism
Cost-Plus A percentage on top of cost of producing and delivering a value-unit.
Competitor-Based Calibrating against competitors’ prices for the same or similar value-unit.
The number & sophistication of the features provided in a value-unit
Multi-Tiered
variant.
Freemium A multi-tiered mechanism where the base (first-level) tier is free.
Bundling The nature of value-unit aggregations provided to consumers.
Segmented The producer for specific customer segments.
Pay-What-You-Want The consumer.
Fenced The consumer selecting a price-segment and the producer after fencing
Pay-What-You-Want the consumer into this segment.
Demand The real-time demand for a value-unit.
Auction An auctioning mechanism.
The joint cost of an installed-base (e.g., the razor) and the use of this
Installed-Base
installed-base over time (e.g., the razor blade).
Futures Contracting The predicted demand (at a future point-in-time) for a value-unit.
collective awareness of the need for and nature of business model adaptations and
the effort (time, complexity and cost) associated with digital strategists’ individual
Table 4-9
Business Model Adaptations: Finnair & UPS Supply Chain Solutions
94
Finnair22
Finnair is the world’s oldest, midsize airline with a unionized labor force. Like
However, the company’s high fixed-costs and the influx of low-cost short-haul
competitors had seriously eroded its competitive position – particularly within short-
haul markets.
Exploiting the airline’s geographic advantage (the Helsinki hub provides one of
the fastest routes between Europe and Asia), Finnair’s leadership team had chosen
in 2009 to focus the airline on long-haul Asian routes – a market niche within which
taken to strengthen the airline’s position in the long-haul Asian market, with a key
target area being the creation of innovative services to enrich the airline’s value
Finnair’s use of social media technology (SMT) has played a key role in
engaging the consumer community in co-creating these new services - and in the
process enhancing the airline’s image with this consumer community. Heavy usage
has occurred around blogging, Facebook and Twitter, with special attention given to
consumers) SMT tactics have been applied. The outcome? Since 2009, around 300
22
This material is adapted from: S.L. Jarvenpaa and V.K. Tuunainen, “How Finnair
Socialized Customers for Service Co-Creation with Social Media,” MIS Quarterly Executive,
September 2013, pp. 125-136.
95
meaningful ideas for new services have been generated, two of which were
UPS-SCS23,24
UPS is the parent company of UPS-SCS. It was formed in the early 1990s, is
positioned in a mature market for transportation solutions, and has a strong culture
rooted in the operations excellence value discipline. UPS-SCS, on the other hand,
variety of specialty services and offering its B2B consumers customized, complex and
In the early 2000s, the UPS-SCS leadership team realized that its growth was
about to hit a brick wall. Two factors explained this portending crisis. First, low-cost
competitors had entered the UPS-SCS competitive space and were eating away at
objectives:
23
M. Lewis, A. Rai, D. Forquer and D. Quinter, “UPS and HP: Value Creation through
Supply Chain Partnership,” Case 9B07D002, Ivey Management Services, 2007.
24
A. Rai, V. Venkatesh, H. Bala and M. Lewis, “Transitioning to a Modular Enterprise
Architecture: Drivers, Constraints and Actions,” MIS Quarterly Executive, June 2010, pp. 83-
94.
96
Operational B2B readiness – provide the capability to quickly integrate UPS-
SCS services into a customized solution and to seamlessly interconnect this
solution with a customer’s business platforms.
solutions; analytical platforms that organized and enabled easy access to information
solution designers, sales staff and customers to jointly configure and implement
solutions.
the organization ideally desires to sustain the gained competitive advantage for as
long as possible (the fifth strategic challenge listed earlier in Table 4-5). For example,
sales revenues are likely to be realized. However, if competitors are able to quickly
imitate the loyalty program, then these initial gains are likely to dissipate as
competitive advantage. As many, if not most, of the digital platforms and business
responders can learn from the innovator’s actions, these responses are often better
penetrable these erected barriers are, the longer the competitive advantage can be
sustained. Piccoli and Ives categorize these barriers into four types (see Table 4-
and preemption.
Table 4-10
Barriers to Competitive Retaliation
organization has developed unique capabilities to build, operate and secure value
25
G. Piccoli and B. Ives, “IT-dependent Strategic Initiatives and Sustained Competitive
Advantage: A Review and Synthesis of the Literature,” MIS Quarterly, December 2005, pp.
747-776.
98
stream upstream/downstream platforms and if a gained competitive advantage is
dependent on such a capability, then it would likely take a rival a prolonged period
of time to put in place similar platforms. Just such a barrier was invoked when
provided Procter and Gamble with the ability to access Walmart point-of-sale data in
real-time so that Procter and Gamble could monitor Walmart’s store-level inventories
Harrah’s, for example, has been a pioneer in using analytics to build and exploit
are owned by the corporation rather than by a specific casino, and where employees
are expected (and rewarded for doing so) to make decisions on the basis of customer-
related analytics.
needed project management capabilities. For example, when Amazon launched its
B2C retail bookstore, a large number of complex activities needed to be carried out
99
well and in a highly-coordinated fashion: building the needed digital and business
platforms; putting in place a powerful and reliable technical infrastructure to host its
online store; establishing efficient, effective and reliable physical operational and
customer service, processes, etc.); and, negotiating relationships with value stream
undertake retaliatory action. One such barrier involves customer switching costs,
and/or services: learning a new set of product/service interface actions and rules,
costs exist, the competitor must not only induce consumers to switch, but also
compensate the consumer for borne switching costs. For example, while eBay has
faced stiff competition from other auction sites, a key switching cost that works in its
favor is that reputations built on eBay are lost. A second type of preemption barrier
involves the anticipated effort required to identify and attract new value stream
platforms. For example, Dell’s success in negotiating the participation of other firms
barrier.
How effective are these barriers to competitive retaliation in the face of digital
disruption? With competitors reacting faster and faster and with markets increasingly
100
susceptible to new entrants, about the only things that can be said with confidence
are that the length of time any competitive gain can be sustained is growing shorter
and that the best defense is to take the offense; that is, take a second competitive
one critically important topic was not discussed – today’s reality that many, if not
most, of the digitization and digitalization capabilities being applied by both pipeline
Explanations of why this is the case and of the strategic implications of this
101
Chapter 5. Digital Strategy and the External Sourcing of Capabilities
strategic partners and consumers. While this has always been the case, the two
Legerity Digital Press (LDP). Owned, managed and operated by five individuals
(contributing intangible assets but little else), LDP has no employees and few assets
other than the digital books that have been published. The vast majority of the
resources applied across LDP’s value stream are provided by external parties: the
digital platform hosting LDP’s website, the digitalized platform hosting LDP’s B2C
storefront, the digitalized platforms hosting payment and banking processes, the
digitalized platforms producing hard copies and course packs, the digitalized
platforms providing sales channels to university books stores and to libraries, and a
While the experiences of entrepreneurial startups like LDP are clearly different
capabilities enabling organizations’ business models have been (or are being)
externalized – that is, handled (in full or in part) by other organizations. The
102
transferring ownership and decision rights regarding a capability, the assets used in
executing the capability, and/or the management of the capability from inside an
more effectively, more efficiently and/or less costly. By making measured decisions
chapter describes how external sourcing is brought into digital strategy formulation
It is useful to recognize that this broad array of capabilities can be categorized into
described in Table 5-1, drive distinct operational and managerial processes, benefit
from distinct orientations, and have distinct underlying economics. Because of these
26
M. Treacy and F. Wiersema, “Customer Intimacy and Other Value Disciplines,”
Harvard Business Review, January-February 1993, pp. 84-93.
27
J. Hagel, III, Out of the Box, Boston: Harvard Business School Press, 2002.
103
differences, it can be challenging for any organization to execute all three capability-
separate units (each focused on a specific value discipline) that are coordinated so
incentive systems and control systems bump into and work against one another.
Table 5-1
Three Distinct Capability Sets
unbundle – that is, fully or partially externalize - one or two of these capability-sets
so that their enterprise has a singular strategic/operational focus? Or, should they
maintain all three units within their organization’s boundaries in order to avoid the
104
Table 5-2
Benefits from the External Sourcing of a Capability
country than the client, and an onshore provider is located in the same country as
the client. Offshore providers can provide appealing rate structures (attributed to
low labor rates, tax incentives, etc.), as well as access to scarce skill-sets, and often
organizations that aggressively pursue globalization are often able to leverage their
The benefits from externalizing capabilities do not come without risk (see Table
5-3), and these risks only intensify when offshore providers are used. Why do these
risks intensify? Note, in particular, the first two risks listed in Table 5-3. First,
105
because an off-shore provider’s employees can exhibit linguistic and cultural
problems. Second, over time and all too often, a client externalizing a capability can
is lost (because internal staff is transferred to the provider, assigned other internal
roles or let go). As a consequence, the client’s capabilities to govern the provider’s
a provider also exacerbate the remaining risks listed in Table 5-3. Of course, many
other factors (e.g., technical, contractual, legal, political, etc.) also contribute to
Table 5-3
Potential Risks Arising from the External Sourcing of Capabilities
106
Tactics for Lessening Clients’ Dependence on Sourcing Providers
Among these, the maintenance of internal expertise is most important because it’s
absence precludes the other two practices. Today, the two tactics most commonly
used to enlarge the set of providers are multisourcing and crowdsourcing, and they
are described in the remainder of this section. Tactics relating to governance are
Multisourcing
single provider. Initially, this tactic involved a client separating the capabilities to be
externalized into relatively independent sets, and then using different providers for
These steps are derived from: B.A. Aubert, C. Saunders, C. Wiener, R. Denk and T.
28
Wolfermann, “How Adidas Realized Benefits from a Contrary IT Multisourcing Strategy, MIS
Quarterly Executive, September 2016, pp. 175-194.
107
capability-set or of other capability-sets) with which it might interact.
While such practices do introduce increased managerial overhead, the benefits are
many: reduced operational and strategic risks, greater likelihood of finding the best-
fitting provider for a module (or set of modules), and sustained competition among
smaller contracts with other suppliers.” 29 This long-tail aspect thus embraces and
fosters a flow of new providers offering new capabilities to drive the client’s adaptive
Crowdsourcing
individual agents, more popularly referred to as the wisdom of the crowd. The
N. Su, N. Levina and J.W. Ross, “The Long Tail Strategy for IT Outsourcing,” Sloan
29
them personal knowledge and social information, i.e., information formed through
groupthink. For this reason, crowdsourcing tends to produce the highest quality
outcomes when the interacting contributors hold diverse sets of personal perspectives
and knowledge.
outcome. Usually, the community collectively generates ideas, selects the most
promising of these ideas, and refines these selected ideas into the single task
109
then collectively engaging the community to evaluate the individually-submitted
solutions and to refine the best of these into a final task outcome.
have applied crowdsourcing to generate innovative ideas. Most often, this arena finds
an organization (for example: Dell, Finnair, LEGO, Nestle and Starbucks) engaging a
consumer community through social media to generate ideas for enhancing a value
well. For example, Zara, the Spanish clothing retailer, targets its internal community
of retail store staff to generate a constant stream of ideas regarding fashion trends -
ideas gleamed from the staff members observing customer behaviors and talking
with customers.
Table 5-4
Three Crowdsourcing Arenas
Arena Description
Generate Engage a community to generate innovative ideas
Innovative for improving current value propositions and/or
Ideas developing new value-units and markets.
Engage a scientific/analytic community to (1) solve
Solve a Problem
a problem or accomplish a task or (2) handle
or Accomplish a
problems/tasks that otherwise would be assigned to
Task
internal staff.
Engage a broad, diverse community to contribute
their personal judgments regarding an issue.
Contributors both state their opinions and convey
Prediction
the strength of the sentiments underlying these
Market
opinions, and then receive almost instantaneous
feedback on how their opinions compare & contrast
with others’ opinions.
110
International Space Station. Many examples of the later objective exist, especially
election campaigns and sports contests, business organizations (such as Google, Ford
and Best Buy) are realizing considerable value from prediction markets in areas as
filtering the ideas about to enter a new product development process, designing and
Participants convey their opinions along with the strength of the sentiments
underlying these opinions (e.g., “Yes, and here is what I am willing to pay
for that stock.”).
Table 5-5 describes the challenges that are confronted in the design of the
governance systems used with externalized capabilities. Two key insights should be
gleamed from this table. First, the pragmatic purpose in externalizing a capability is
to externalize the work activities (that is, the operational and managerial processes)
enabled by the capability. As work activities are far more tangible than are
these challenges underscore the importance of building and then maintaining internal
exist that these employees would be able to negotiate an effective contract with a
provider and to nurture a meaningful trust between themselves and the provider’s
Table 5-5
Challenges in Governing an Externalized Capability
Challenge Description
Codifying the Specifying what is to be done, how it is to be
Understanding Work Activity done and expected performance outcomes
of a
Work Activity Monitoring the Observing what is being done, how it is being
Enabled by Work Activity done and performance outcomes
Externalized Devising Metrics
Capabilities Measuring what is being done, how it is being
of Work Activity
done and performance outcomes
Performance
Client employees and provider employees:
understand what is expected of one
another
Developing Trust between are confident that each will perform their
Client Employees & respective work tasks in an ethical,
Provider Employees competent & timely manner
are confident that each will adapt to
unexpected situations in a manner
consistent with relationship objectives.
recognize that all external-sourcing engagements focus on one, two or three goals:
What varies across arrangements – hence, what varies in the governance systems
being applied - is the relative importance (and presence) of these three goals.
112
Governance system designs for externalized capabilities can be placed on a
is important, as the design used affects the goals realized through an engagement:
tight-governance works best for cost and quality goals, while loose-governance works
best for quality and innovation goals. Of course, engagements rarely strive to
work activities, and more-nuanced governance designs are applied to yet other work
activities).
Figure 5-1
Tight-Governance and Loose-Governance Designs
Tight-Governance Loose-Governance
Lengthy Contract
Short
Detailed Broad
Administrative Costs
High Low
People Costs
Low High
detailed and deep visibility into how a work activity is being carried out and the extent
113
client and the provider have digitalized their operational business processes, such a
governance-related costs that are recovered through a lowered risk exposure. With
both the client and the provider. As indicated in the bottom half of Figure 5-1, the
natures of the costs borne with tight-governance and loose-governance are quite
distinct.
Table 5-6
Attributes of Tight-Governance and Loose-Governance Designs
Detailed specifications of
Aggregate specifications of
Metrics the tasks and outcomes to
work-related outcomes and risks
be monitored and reported
Specific transactions and
Visibility Rights Work-related outcomes
events
Access Rights Data Knowledge
114
advantageous competitive positions?
Are providers available who are likely to execute and enhance these
capabilities better than we can?
Is handling all of these capabilities ourselves the best way to utilize our
(limited) internal resources?
models.
may arise where an organization’s internal capabilities are recognized as being world
class and become the basis of a new business model. If a manufacturing organization
has developed a world-class inventory management capability, why not take over its
115
Digital strategists today find themselves regularly considering whether or not
capabilities should be brought back inside the organization, and whether or not
flux – a state of flux incessantly driven by the continued advances occurring with
influences digital strategists’ deliberations. The key element introduced in this Figure
Strategic core capabilities are seldom considered for external sourcing – and only
when a trusted world-class provider exists that is able to outperform the organization
now and into the future. Peripheral core capabilities should always be candidates for
116
Figure 5-2
Influence of External Sourcing of Capabilities on Digital Strategizing
Strategic Intent
Business Model Deliberations
Beliefs regarding Business Model
Value proposition
capabilities Enhancement,
Profit model
Strategic core Replication &
Core capabilities
Peripheral core Innovation
Dynamic capabilities
Commodity
Internally-sourced capabilities
Externally-sourced capabilities
New providers
Innovative provider business
models
Existing markets and business models evolve over time and eventually
disappear, while new markets and new business models regularly emerge.
117
Business Model Adaptations
Table 5-7 lists the main pathways through which the external sourcing of
adaptations are quite straightforward and, hence, are not discussed. However, the
Table 5-7
Business Model Adaptations Associated with External Sourcing
First, consumers are heard to voice a bias against the external sourcing of
embrace the customer intimacy value discipline and/or if most competitors have
culturally - with consumers and with ecosystem participants are simply far better
able to identify, incorporate and act upon significant events and trends. As a
externalized.
sourcing of capabilities – that is, easily shifting capabilities from being internally
sourced to being externally sourced (or vice versa), and shifting the handling of a
environments. But, is agility with external sourcing feasible and cost-effective? The
technologies (in regard to both spending and innovation). The banking sector is
30
This section has been adapted from: D. Schlagwein, A. Thorogood and L.P. Willcocks,
“How Commonwealth Bank of Australia Gained Benefits Using a Standards-Based, Multi-
Provider Cloud Model,” MIS Quarterly Executive, December 2014, pp. 209-222.
119
trust based largely in consumer perceptions regarding the security, reliability and
CBA has taken three different approaches to external sourcing over the past
twenty years:
enabled services such that these services can, on demand, be accessed and applied
by clients via the Internet. Cloud computing solutions provide individuals and
organizations with suites of capabilities in either private or public clouds, where these
clouds may be located close to or very distant from the client. The economics of
cloud computing are based on the sharing of a pool of resources across many uses
and many users, such that significant economies of scale and scope are realized.
120
CBA’s multi-provider, cloud-based model has three layers (see Figure 5-3).
The top layer consists of the business platforms that execute CBA’s operational and
managerial processes. The bottom layer includes internal (designed and operated by
CBA’s technology group), private external and public clouds – all of which comply
with CBA’s cloud standards. CBA collaborated with several cloud providers and other
strategic partners to develop and mandate these cloud standards. The middle layer,
(within which data processing and storage actually occurs). The primary purpose of
should execute an application and to assign this application to that cloud. This cloud
management system is located inside CBA’s firewall, and CBA manages and controls
the system. Actual computing could take place on either side of the firewall according
Figure 5-3
CBA’s Multi-Provider, Cloud-Based External Sourcing Model
Business Platforms
121
The cloud management system executes operational and managerial
processes on-the-go, depending on current cloud workloads, the prices and service
level agreements negotiated with providers, and general requirements for security,
reliability and availability. In addition, the structure shown in Figure 5-3 makes it
this structure is not limited by the number of connected cloud-providers, and it allows
for the rapid connection of newly-contracted providers and the rapid disconnection of
terminated providers.
able to quickly and competently apply numerous digitized and digitalized capabilities,
many of which are quite sophisticated and some of which have only recently emerged.
It would be simply impossible for any organization to accomplish this on their own
today. This chapter has explained why and how organizations externally source
many, if not most, of the capabilities being applied, and then described how the
strategy formulation.
business platforms in the launch and evolution of their business models. The next
122
Chapter 6. Digitalized Business Models for Network Ecosystems
Today, when you use your smartphone or tablet to post content on Facebook
statuses, to tweet, exchange photos, or search for information on the Internet, you
WhatsApp, Google, etc.) offer these free services? The not-so-subtle answer is quite
But, how does this occur? Most often, it occurs through the creation of a
network (market-focused) ecosystem, with the core transaction of the market being
organized collection of digital and business platforms that hosts the content and
functionalities that establish, operate and govern the ecosystem’s market. In order
to better grasp the nature of a network ecosystem, let’s take a closer look at Google
and Facebook. Also, for the ease of understanding, we will refer to the networks
content (some unit of information) believed to exist on one or more producer websites
123
(see Figure 6-1). Note especially the third community involved with Google’s
innovative auction scheme for selling advertising associated with specified search
outcomes, Google has built a business model that profitably monetizes Internet
considerable overlap does exist across the three communities interacting through
(that is, act as consumers), website producers do advertise, and advertisers do place
content on websites.
Figure 6-1
Google’s Network Ecosystem
• Relevant, useful
Consumers
information
Seeking
• Ease of use
Information
• Access from anywhere
Advertisers Producers
of Websites
Google’s
Market
Platform
producer community and the friends wishing to see the posted content are members
124
of a consumer community. Somewhat unique to social media sites, these consumer
and producer communities essentially overlap their memberships (aside from pure
lurkers within the consumer community). Note also that Facebook’s ecosystem
Facebook generates revenue streams from these advertisers and App producers.
Figure 6-2
Facebook’s Network Ecosystem
Facebook’s Producers
Advertisers Market of Content
Platform
• Global audience of
• Increased traffic
potential buyers
• Revenue opportunities
• Measurable ROI on ads
• Access to network of
• Precise campaign control:
advertisers
pay for clicks
and about the digital and business platforms used to orchestrate the market spaces
Crowd-Based Capitalism
Blended Organizations
125
Why Network Ecosystems Exist
the example of a simplified hypothetical social media ecosystem (see Figure 6-3).
Here, community members take on the roles of producers and consumers in order to
share content. By sharing content – and, hence, gaining exposure to each other’s
with each other. What is the value proposition that drives a person to join,
already exists or of sharing content with individuals with whom no (or, at best, a
casual) personal relationship currently exists, but with whom a richer personal
relationship is desired.
Figure 6-3
Simplified Social Media Ecosystem
Social Media
Community
Producers Consumers
of Content Seeking
Content
Social
Media
Platform
126
This social media ecosystem value proposition is driven by what economists
refer to as network effects. Stated simply, as the social community grows linearly,
rule, are more valuable to participants; thus, network effects give network
ecosystems with the largest participant communities an advantage that is hard for
ecosystem.
Network Effects
for a particular social media ecosystem, e.g., apps that make it easier to manipulate
and share content across the ecosystem. Would you be more inclined to join a social
media ecosystem that had more or fewer of your current friends as participants?
And, is this more likely for larger or smaller social media ecosystems? Now, given
two social media ecosystems comparable regarding the likelihood of you being able
to share content with your friends, would you prefer the ecosystem with more or
127
fewer valued complements (e.g., an image manipulation app)? And, would app
producers be more inclined to create apps for larger or smaller social media
How can firms capture the opportunities available through positive network
satisfied with – better yet, enthused about – the value-unit being offered. Much of
Apple’s surge in product success (iPod, iPhone, iPad, iTunes, iMusic, etc.) is a direct
The competition between HD DVD and Blu-ray as the standard for DVD players
are sending us a message. I can’t ignore what I’m seeing. Blockbuster has been
renting both Blu-ray and HD DVD titles in 250 stores since late last year and found
that consumers were choosing Blu-ray titles more than 70 percent of the time.”
network effect for Blu-ray titles, subsequent growth in the number of Blu-ray titles
offered for sale or rent relative to the number of HD titles, and Blu-ray ultimately
31
R. Harris, “Blu-ray vs. HD DVD: Game Over,”
http://blogs.zdnet.com/storage/?p=149.
128
Another tactic for capturing network effects with network ecosystems is to carefully
promote these standards such that the standards become dominant in the network
ecosystem market space. Winning standards wars is critical as this increases the
software applications compatible with the Windows operating system. This reinforces
the dominance of Windows in the market for PC operating systems. Firms become
successful in standards wars either by leveraging their brand and existing market
Two-Sided Markets
A key notion for understanding the nature of network ecosystems involves the
one side of the market as a means of attracting participants to the other side of the
market. The two sides of the network ecosystem are perhaps best thought of as a
32
T. Eisenmann, G. Parker and M. Van Alstyne, “Strategies for Two-Sided Markets,”
Harvard Business Review, October 2006, pp. 92-101.
129
the rules, functionalities and resources to attract participants and to facilitate value-
the money-side, from which revenues are generated. The basic idea, thus, is to grow
the subsidized community to the point that its size becomes sufficient to attractive
participants.
etc. The subsidy-side is the community of individuals looking for a job. By heavily
large pool of job candidates is built. If this pool of job applicants is large and of high
quality (e.g., broad ranges of skills and experiences), a high likelihood exists that a
sizable pool of recruiters will be attracted despite the participation fees being charged
to these recruiters (typically, a recruiter might be charged a modest fee to post a job
opportunity, a slightly larger fee for each match that occurs, and a much larger fee
130
Figure 6-4
Generic Job Recruiting Network Ecosystem
Recruiters Applicants
Market Platform
its Adobe Reader and Adobe Acrobat software (see Figure 6-5). Before Adobe Reader
and Acrobat were released, the established standard for sharing and printing
documents was a tool called PostScript. In order to make inroads into the lucrative
document creation software market, Adobe made its document reader software freely
to share information about Adobe Reader and how to obtain it. With positive word-
of-mouth by a large number of Adobe Reader adopters, Adobe Reader became the
de facto standard for document reading and sharing. Once Adobe Reader became
the dominant document reader for viewing any type of document, Adobe was able to
publishers, law firms, authors, etc. While Adobe continues to give Adobe Reader
131
away for free, it generates sizeable revenues through its Acrobat software (now
Figure 6-5
Adobe’s Two-Sided Market Business Strategy
Producers of Consumers of
Digital Documents Digital Documents
Market Platform
What is important about Adobe’s strategy? Adobe could have enjoyed the
benefits of network effects by only offering Adobe Reader - by standardizing their use
documents and read them on any type of device. However, would this positive
network effect benefit Adobe to the same extent it benefited Adobe’s customers? In
other words, would Adobe have been able to eventually sell Adobe Reader at a price
sufficient to generate a lucrative profit? What price could it charge without hurting
its ability to build a critical mass of document reader users? Adobe recognized that
rather severe limits existed regarding what people would be willing to pay for a
document reader. But, Adobe also recognized that it could generate substantial
132
revenue from document-creation software given that it could achieve a large,
Figure 6-6 provides a more nuanced depiction of the logic underlying a two-
sided market. Note that two types of positive network effects are in play. The first
is called the same-side effect and refers to the possibility of network effects with
each side of the market. In the case of Adobe, as more people adopt Adobe Reader
for viewing documents, each is presented with more opportunities to easily share
documents. This represents a positive, same-side network effect for the adopters of
Acrobat Reader. Potential same-side network effects exist, as well, for document
producers. As more producers adopt Adobe Acrobat for document creation, more
bundled offerings.
Figure 6-6
Same-Side and Cross-Side Network Effects
Side #2
Side #1
Same-side effect
Market
Platform Cross-side effect
133
The second type of positive network effect is called a cross-side effect. This
refers to the potential value that one side derives when there are more participants
on the other side. Again, using the Adobe example, adopters of Adobe Reader benefit
as more producers adopt the Adobe Acrobat document creation software (because of
documents through the use of Acrobat Reader (a larger consumer market for
So far, our discussion has been based on the assumption that same-side and
cross-side network effects are always positive. This is not the case, as these network
effects could be negative. Refer back to the job recruiting network ecosystem
portrayed earlier as Figure 6-4. Are the same-side network effects positive or
negative? Does a growing pool of job applicants benefit each applicant participating
in the ecosystem? Does a growing list of recruiters benefit each recruiter participating
in the ecosystem? Possibly not, as this may translate into greater competition among
applicants for the best jobs, as well as greater competition among recruiters for the
best candidates. Even though each side benefits from positive, cross-side network
effects, the potential for negative, same-side network effects could limit the number
33
The way job recruiting network systems typically deal with negative, cross-side
network effects is to segment the pools of available jobs and applicants into ‘sub-markets’
that become more-level playing fields for both recruiters and applicants.
134
Multi-Sided Markets
rather than as two-sided markets. A multi-sided market involves more than two
three-sided market (the Google search network ecosystem) and a four-sided market
generate additional revenue streams. Facebook, for example, receives revenue from
advertisers and from app producers. But, this potential for increased revenue is
Winner-Take-All Markets
Increasingly, the payoff gap between being the best competitor in a market
and the second-best is widening into a canyon. This applies to labor markets (e.g.,
product/service.
135
As positive network effects drive more consumers to adopt a product or
service, the product/service can gain a critical mass of adopters and become
dominant in its market space. This same phenomenon occurs with network
reversed by the entry into the market space of an appealing new network ecosystem,
regardless of how appealing this new ecosystem’s value-units might be. Think of the
market dominance held by Microsoft Windows and Office, by Google’s Android and
Gmail, and by Blu-ray DVD players and movies. In each of these cases, the
respective markets are said to have tipped over with the winner crowding out rival
the potential exists that a critical mass of consumers will adopt one producer’s
products/services.
Nintendo’s entry into the home video gaming market nicely demonstrates how
firm in the video game market. By Christmas 1986, the Nintendo Entertainment
System (NES) had emerged as a very popular product, creating positive network
effects with both customers and, importantly, game developers, in turn attracting
even more customers. At some point, the market tipped over to Nintendo as the
dominant competitor. Once this occurred, game developers were willing to produce
their software exclusively for Nintendo for a two-year period – indicating the
business strategies with its operating systems and its Office software suite reflect
136
Network ecosystems are particularly susceptible to winner-take-all markets.
dynamics. Consider the market space for daily deals, e.g., Groupon and
LivingSocial.34 Many early investors believed that strong cross-side network effects
would produce high stock valuations for Groupon and for LivingSocial. However, as
switching costs, little allegiance was shown to any one market platform with
consumers instead skipping through multiple platforms looking for the most attractive
deals. As one might expect, the high valuations have yet to materialize.
34
A. Haigu, “Strategic Decisions for Multi-Sided Platforms,” Sloan Management
Review, Winter 2014, pp. 71-80.
137
Participants are reluctant to move to a competing ecosystem.
fierce. More profitable competitors, because they are more profitable, are able to
invest more in R&D and to provide greater incentives to participants - enabling their
participating communities to grow even faster. This intense competition often results
in winner-take-all market spaces being dominated by just a few firms (two or three,
at most).
Crowd-Based Capitalism
The past decade has witnessed a reemergence of bartering, the earliest type
one community possessing an under-used asset or skill (the value-unit) and the other
possessing a short-term need for such an asset or skill. This new bartering ecosystem
The medium for the short-term sharing of the value-unit is money. In other
words, the person that owns the shared value-unit gets paid by the person
being granted short-term use of the value-unit.
138
This form of market-focused ecosystem is the basis for what is popularly referred to
interconnected smart devices, social media, payment systems, trust systems, etc.)
are extending peoples’ options for obtaining goods and services beyond family,
entrepreneurs.
Table 6-1 lists some of the crowd-based network ecosystems that have
emerged over the last decade. As you look over this listing, notice the attributes of
Low-use implies unused capacity (of an asset) or idle time (of a skill-provider); high-
35
A. Sundararajan, The Sharing Economy: The End of Employment and the Rise of
Crowd-Based Capitalism, MIT Press, Cambridge, MA, 2016.
139
Table 6-1
Examples of Crowd-Based Network Ecosystems
Crowd-Based
Value-Unit Examples
Network Ecosystem
Educational Services Idle Skill Capacity SkillShare,TradeSchool, Udemy
Amazon Mechanical Turk,
Freelance Work Idle Expertise Capacity
InnoCentive, TopCoder, Upwork
AngelList, FundiingCircle,
Fundraising Idle Capital
Kickstarter
Handyman Chores Idle Labor Capacity Handy, TaskRabbit, TimesFree
Designer24, Rendevoux, Rent My
High-End Fashion Unused Clothes Wardrobe, Rent the Runway,
StyleLand
Lodging Unused Housing Capacity Airbnb, CouchSurfing
Lux, Postmate, Shyp, Washio,
Personal Services Idle Labor Capacity
Wag
Philanthropy Idle Capital DonorsChoose, Kiva
Unused Automobile BlaBlaCar, Getaround, Lyft, Turo,
Transportation
Capacity Uber, Zipcar
example, three pervasive pre-digital network ecosystems were those involving (as
travel agencies. In these network ecosystems, the network orchestrator (via the
With digitalized network ecosystems, the vast majority of work processes are carried
out through a market platform (i.e., a collection of digital platforms and business
140
platforms). The digitization and digitalization reflective of the three eras of digital
disruption (see Table 6-2) have produced two types of effects on network
their markets. Second, scores of new network ecosystems have emerged and
Figure 6-7
A Network Orchestrator’s Managerial and Operational Processes
Growing a Facilitating
Producer Producer Retaining
Matching Transaction
Value-Unit Exchange Producer
Processes
Community Consumer
Primary
141
Table 6-2
Evolution of Network Ecosystems
Exchange Trust
Era Value-Units Digitization & Digitalization
Currency Systems
Data/document standards Government &
Point-to-point connectivity Banking 3rd- party
Digital Intra- and inter- system institutions
1
complements organizational (managerial Credit/debit Contracts
and operational) process card systems Brand
efficiencies Social capital
Internet
3rd-party digital
One-to-many connectivity
trust seals
Data, process, analytic and Digitalized
Digital value- Consumer
2 collaboration platforms payment
units monitoring
Social media systems
(product &
Omni-channel producer-
producer reviews)
consumer interaction
Many-to-many connectivity
Community
Smart devices Reputation
Social monitoring
3 Big Data platforms Social capital
complements Peer-regulation
Big Data analytic platforms Bitcoins
Self-regulation
Social messaging platforms
Table 6-3
Examples of Network Ecosystems
142
Era 1
Two types of network ecosystems emerged during Era 1. The first of these
digitalized services. Perhaps the most familiar example is that of credit card
services platform, merchants were able to offer a convenient, safe payment channel
and licensing a product architecture that tips over a market, the architecture’s creator
is able to sustain high-margin sales for a lengthy period of time. Perhaps the most
familiar example of this is that of personal computer (PC) operating systems, such
as Microsoft OS (and then Windows). The Intel PC operating system market tipped
that software producers would gain large revenue streams and that consumers
Era 2
143
B2B marketplaces generally operate in the upstream portions of industry value
with the promise of a more efficient market. The value-propositions of these B2B
collaboration enablement.
again with the promise of a more efficient market. Notice in Table 6-3 (shown earlier)
that the example given for an Era 2 B2C network ecosystem is Amazon Marketplace
Two examples of C2C marketplaces, eBay and Craigslist, are used to illustrate the
variety that exists. For example, eBay utilizes an auction pricing mechanism and
services, while Craigslist utilizes fixed prices and offers little in the way of
Era 3
The digital technologies associated with the third era of digital disruption –
most notably many-to-many connectivity, smart devices, social messaging and peer
144
enabling and exploiting individuals’ desires to maintain anytime, anywhere
connections with the people, institutions and opportunities that are most important
to them. As listed earlier in Table 6-3, the dominant types of Era 3 network
ecosystems involve digital services (e.g., search, photo sharing, music sharing, etc.),
involve participants and activities outside of the purview of established markets and
emerged. For example, there are limited regulations at present to assure consumers
has implemented two trust mechanisms: the capturing and reporting of consumers’
lodging reviews, and host identity verification systems that combine the digitized
consumers.
Blended Organizations
of both pipeline ecosystems and network ecosystems, and in the process becoming
145
The organization that best illustrates the first approach of operating both
initial business model was that of a pipeline ecosystem retailer: interacting physically
with suppliers to stock product inventories, then interacting digitally with customers
to sell these products, and then interacting physically and digitally with third-party
and-mortar distribution centers. Over time, Amazon has expanded its portfolio of
A pipeline ecosystem retailer that stocks, sells and delivers digital products
and smart devices.
While Amazon’s various business models are targeted at distinct markets, they all
make extensive use of Amazon’s world-class capabilities to design, build, operate and
durable appliances, electronic products, etc.) a few of the raw materials used in
manufacturing organization. Note that value stream participants engage with two
146
component suppliers, and Market 2 involves these component suppliers and the
market inefficiencies to the manufacturer in the form of higher prices and logistical
delays in Market 2. Part B of Figure 6-8 introduces the notion of a supply hub as a
of the traditional pipeline value stream.36 Here, the manufacturer creates a pseudo-
market (Market 3) within the established market for raw materials. After aggregating
raw material requirements and production plans across all component suppliers, a
demand (volumes and timings) in negotiating prices with raw material suppliers on
36
A. Agrawal, A. De Meyer and L.N. Van Wassenhove, “Managing Value in Supply
Chains: Case Studies on the Sourcing Hub Concept,” California Management Review, Winter
2014, pp. 23-54.
147
Figure 6-8
Introducing a Supply Hub into a Pipeline Ecosystem Value Stream
1 2
Markets
Markets
a private network ecosystem solely inside their boundaries. The platforms used with
Zimride, the ride-sharing platform that Lyft’s founders licensed to universities and
in the form of a convenient and safe mechanism for solving employees’ commuting-
traditional sales channels. When carefully conceived and executed, the network
effects engendered can be exploited to enrich a brand and grow the consumer base
Table 6-4
Introducing a C2C Marketplace into a Pipeline Ecosystem Value Stream
Pipeline
Network Ecosystem Strategic Value
Organization
Supports Ikea’s eco-friendly
Ikea Family loyalty program
ethos.
Ikea Group community: members post &
Opens up room in members’
sell used Ikea items.
homes for new Ikea items.
Supports Patagonia’s eco-friendly
Partnership with eBay: ethos.
Patagonia consumers easily sell used Increases the visibility of the
Patagonia clothing items. Patagonia brand both online and
on the street.
Generates new consumers in the
targeted demographic.
DM Sponsors & arranges clothing Enriches brand by leveraging the
(German swap events, at which green spirit of sharing rather than
Drugstore makeup/styling products & buying.
Chain) techniques are demonstrated. Gains brand visibility as these
events are featured on social
media and by fashion bloggers.
markets and industries are being transformed and new markets and industries are
being formed. The next chapter examines the digital strategy formulation process
149
Chapter 7. Digital Strategy Formulation for Network Organizations
value-units.
will be in the form of general concepts and frameworks – that are then grounded
through two different network organizations (see Figure 7-1 and Table 7-1):
38
H. Tajedin and D. Nevo, “Value-Adding Intermediaries in Software Crowdsourcing,”
47th Hawaii International Conference on System Sciences, IEEE, January 2014, pp. 1396-
1405.
39
H. Tajedin, D. Nevo and R.W. Zmud, “Beyond Matching: Intermediaries’ Market
Design and Market Development Roles in Software Development Crowd Markets,” working
paper, Rensselaer Polytechnic Institute, January 2017.
40
The Metropia material has been gathered by one of this book’s authors through
interviews with two members of Metropia’s leadership team, including the founder/CEO.
150
Figure 7-1
The Communities Participating in TopCoder and Metropia
TopCoder Metropia
Mobility
Commuters Service
Clients Developers Providers
Merchants Government
Agency
Market Market
Platform Platform
Table 7-1
Describing and Contrasting TopCoder and Metropia
TopCoder Metropia
Delivering a solution (software Provide an optimal mobility
code) that satisfactorily meets solution for moving the
Core Transaction
a client’s specification (a commuter from point A to
software project) point B
Clients Commuters
Community 1
(money-side) (money-side)
Developers Mobility Providers
Community 2
(subsidy-side) (subsidy-side)
Merchants
Community 3
(subsidy-side)
Government Agencies
Community 4
(money-side)
Market Geographic
Global Local
Scope
Maturity Established Young
151
700,000 developers, of which nearly 20% were active. Metropia was founded in 2010
At the time this case material was collected, Metropia was in five urban areas (Austin,
El Paso, Houston, New York City and Tucson) and was in various stages of rolling out
The chapter introduces intuitive ways of thinking about the digital strategies
Business models for network organizations (see Figure 7-2) differ from those
The existence of a unique value proposition and a unique profit model for
each of the interacting communities.
Typically, two of these interacting communities are directly associated with the core
transaction: the producer and the consumer of the value-unit(s) being exchanged via
the constituted market. Other interacting communities are then attracted by the
Figure 7-2
Business Models for Network Organizations
Community Community
Value Profit Models
Propositions
Number of
Communities
Core Dynamic
Capabilities Capabilities
value propositions and profit models through sets of core capabilities and dynamic
interests.
while the developer community is the subsidy-side. Client software projects are
solutions selected for each contest. The client accepts one of these winning solutions
as the overall winner and the project-related work then moves on to the next contest.
The core transaction is contest design and fulfillment – the delivery of a satisfactory
Table 7-2
TopCoder’s Business Model
Business Model
Description
Element
Client Community Obtain quality code (e.g., tested against specifications, secure,
Value Proposition etc.) within agreed-on schedule and budget.
Clients pay subscription fee.
Client Community
Clients provide contest incentives (payments to winning
Profit Model
developers).
Developer Community Earn income, acquire new skills, demonstrate skills and interact
Value Proposition with forward-looking technologists.
Developer Community No associated revenue stream (the developer community is the
Profit Model subsidy-side of this network ecosystem).
Software development & software development management.
Translating software development projects into contests.
Core Capabilities Contest design & fulfillment.
Acquiring, developing and retaining community participants.
Creating a sense of community for participants.
Sensing & identifying software development trends &
Dynamic Capabilities innovations.
Sensing & identifying new participant sources.
ride-hailing, various mass transportation modes, etc. The mobility service portfolios
vary across the local market platforms, and the offered solutions are produced
historical and streaming traffic-related data. The commuter earns reward points for
selecting solutions that contribute to the common good, and these reward points are
154
exchanged for goods/services at participating merchants. Each local platform is
Table 7-3
Metropia’s Business Model
capabilities necessary for implementing these and future competitive actions are
and evolve a dominant consumer value proposition – and, hence, the capabilities that
enable the value disciplines (i.e., operational excellence, customer intimacy and/or
product leadership) that underlie this value proposition. Given the multiplicity of
155
strategic intents tend to be considerably broader than those of their pipeline
a more complex and more dynamic competitive space than do pipeline organizations’
digital strategists - think about not only juggling more balls, but balls that are
Table 7-4 illustrates the primary value propositions offered by TopCoder and
Metropia. As suggested, all three value disciplines are critical to the competitive
Table 7-4
TopCoder’s and Metropia’s Value Propositions
Value Disciplines
Community Value Proposition Operational Customer Product
Excellence Intimacy Leadership
TopCoder
Obtain software code that meets
Clients specifications within agreed-on schedule &
budget.
Earn income, develop skills, demonstrate
Developers skills and interact with forward-looking
community.
Metropia
Obtain optimized mobility solutions &
Commuters
reward points.
Gain exposure to and services revenue from
Providers
the commuter community.
Build reputation within the commuter
Merchants
community.
Enhance the transportation common good,
Government access a new source of traffic data, and
enhance Big Data analytic capabilities.
or moves aimed at enhancing the efficiency of the constituted market; and, market
156
in order to enhance community participants’ satisfaction with offered value
propositions. Table 7-5 describes each of these design levels by providing the
primary attributes serving as each level’s focus and offering examples of competitive
moves addressing these attributes. While moves taken at either of these design
levels can affect both market efficiency and participants’ satisfaction, distinguishing
competitive moves in this manner can ease the cognitive and communication efforts
Over time, the operational and managerial processes associated with competitive
moves handled initially by humans are typically digitalized as the processes are
institutionalized.
Table 7-5
Market Design and Platform Design
157
Market Design
efficient market operation. Three such conditions are suggested as being most
important:41,42
Market safety: ensuring that market transactions are sufficiently safe such
that producers and consumers are willing to reveal or act on confidential
information and are willing to keep the transactions inside the market.
Let’s now look more closely at each of these market design attributes.
cards. What do you, as a consumer, value in a credit card? While things like reward
programs and interest rates are obviously important, you would not even consider a
credit card unless it was accepted by most of the merchants you patronize. What
leads a merchant to decide to accept a specific credit card? While setup costs and
transaction fees are clearly important, a merchant would hesitate to invest in a card
that was not held by a sizeable portion of the merchant’s customers. Invariably, the
A.E. Roth, “What Have We Learned from Market Design?,” The Economic Journal,
41
Your first thoughts when hearing the term congestion is likely to bring up
challenges can certainly deter market platform use and hinder market efficiency,
market congestion tends to be most problematic when the demand for available
value-units is highly skewed, resulting in too few participants being able to satisfy
interact and carry out transactional exchanges via a market platform, such as:
159
If potential market participants develop safety-related concerns, one of two things is
most likely to occur. First, many of these potential participants will simply decide not
to participate. Second, many of the participants who do decide to participate will end
Many of the competitive moves taken by TopCoder and by Metropia have been
aimed at enriching market design, with associated market platform functionality put
in place to enable or support the taken moves. Tables 7-6 and 7-7 illustrate these
Table 7-6
TopCoder’s Market Design Competitive Moves
Market
Primary
Design Competitive Moves
Processes
Attribute
Grow Developer Talent teams engage in on-campus campaigns.
Thickness
Community Talent teams run algorithm challenges (competitions).
Grow Client
Thickness Sales teams target, market to and interact with potential clients.
Community
Enrich Developer Account teams induce clients to offer projects requiring hot skills.
Congestion
Skills Internal R&D offers projects requiring hot skills.
Enrich Client Account teams broaden clients’ views of what can be done via software
Congestion
Demand development crowdsourcing and on the crowds’ capabilities.
Match Developers Account teams work with clients to break projects into contests.
Congestion
with Contests Account teams modify contests not attracting sufficient developers.
Staff managers and developer co-pilots monitor projects & contests.
Enrich Solution
Safety Staff & developer-crowd assess solution completeness/trustworthiness.
Fulfillment Safety
Contest appeals process for non-winning developers.
Contest reviews & project management increasingly outsourced to the
Retain Developers Thickness developer community.
Enrich the developer community through events & developer forums.
Long-term contracts, strong client relationships, and the provision of
Retain Clients Thickness
rich metrics regarding contest, project & client success.
160
Table 7-7
Metropia’s Market Design Competitive Moves
Market Design
Primary Processes Competitive Moves
Attribute
Partner with government agency in promoting
platform.
Grow Commuter Community Thickness
Partner with an organization sponsoring a
traffic-congesting event to promote platform.
Leverage government agency (permitting &
Add a Provider Thickness
regulatory) relationships with providers.
Grow Government &
Thickness Establish program managers/teams.
Merchant Communities
Enrich Commuter Programs directed at broadening commuters’
Congestion
Perspectives understandings of mobility alternatives.
Enhance Data/ Algorithms Congestion Continual improvement
Reengineer reward points schemes, processes
& algorithms to detect and to prevent fraud.
Enhance Platform Safety Safety
Commuter data shared only in aggregate
forms.
Retain Commuters Thickness Threat of losing accumulated reward points.
Retain Government Agencies Thickness Threat of losing data/analytic capabilities.
you, but one may not: ancillary transactions. As explained earlier, the core
transaction refers to the market exchanges that bring a producer community and a
associated with the value propositions that bring communities other than producers
and consumers to the platform. Perhaps the most familiar example of this distinction
can be seen with Google. Google’s core transaction involves finding satisfactory
matches between consumers’ search cues and producers’ website content. Google’s
ancillary transactions involve the placing of and clicking on the advertisements that
161
Table 7-8
Operational Purposes of Network Organizations’ Market Platforms
Platform
Associated Activities
Purpose
Community Adding a new community.
Hosting Removing an existing community.
Adding a new community participant.
Community
Providing functionality & content through which participants can
Member
develop & promote their needs & capabilities.
Hosting
Removing an existing community participant.
Providing functionality & content enabling participants to identify
Matching
matches aligned with sought value propositions.
Facilitation
Providing functionality enabling participants to select a match.
Providing functionality & content to negotiate & execute
Core
transactions.
Transaction
Providing functionality & content to verify completed
Facilitation
transactions.
Providing functionality & content to negotiate & execute
Ancillary
transactions.
Transaction
Providing functionality & content to verify completed
Facilitation
transactions.
and the loose-coupling of modules delivering local (i.e., used by a single community)
162
Market Platform Design: Digitalizing the Analytical Domain
The nature of network ecosystems – that is, communities with large numbers
huge amounts of data. These data can then be stored and organized for a variety of
Learning about the core transaction and, if they exist, ancillary transactions
in order to better understand, improve and predict fulfillment success in
order to enhance value propositions and to enhance profit models.
network organization staff and by participants. Figures 7-3 and 7-4, respectively,
illustrate some of the ways in which TopCoder and Metropia are digitalizing the
analytical domain.
163
Figure 7-3
Digitalizing the Analytical Domain at TopCoder
Project
Client Data
Profiles Primary Process
Performance Example
Developer Contest Data Core Data
Profiles Data
Figure 7-4
Digitalizing the Analytical Domain at Metropia
Mobility Streaming
Provider Transportation Commuter Trip,
Commuter
Profiles Data Common Good,
Profiles Example
Provider &
Merchant Historical Commuter Merchant Core Data
Profiles Transportation Services Outcomes
Data Usage Data
exchanges enable participants to learn about offered value propositions and to decide
whether or not to participate further (and, ultimately, take advantage of offered value
propositions).
165
Table 7-9
Digitalizing the Collaborative Domain at TopCoder
Collaboration
Examples
Environment
Peer-to-peer messaging: client/developer, staff/client,
Messaging & staff/developer, staff/staff, and developer/developer
Conferencing Forums: client/developer, staff/client, and
staff/developer.
Ideas Processing Identifying hot technology trends & skills.
Project & contest monitoring.
Project design (contests, deliverables).
Joint-Work Contest software design (specifications, architecture).
Space Contest software coding/testing.
Assessing contest solution completeness &
trustworthiness.
Setting contest incentives.
Decision-Making
Modifying contests & contest incentives.
Processes
Ranking contest solutions (selecting winners).
Table 7-10
Digitalizing the Collaborative Domain at Metropia
Collaboration
Examples
Environment
Peer-to-peer messaging: commuter/commuter,
Messaging & staff/commuter, staff/government, staff/provider, and
Conferencing staff/merchant.
Forums: staff/commuters and staff/government.
Social Network Commuters.
Real-time resolution of traffic congestion hot spots.
Improving algorithm accuracy & reliability.
Joint-Work
Big Data analytics: staff/staff and staff/government.
Space
Market platform functionality development.
Promotional campaigns.
Reengineering of reward schemes.
Decision-Making
Product launch.
Processes
New market platform (urban area) launch.
addition to having to confront many of the same strategic challenges as those facing
have to design and build a market ecosystem from scratch and motivate participants
166
to engage in value-unit exchanges through the market platform. The heightened
begin this section by discussing these five strategic challenges. Then, we describe
Table 7-11
Network Organization Strategic Challenges
When a network organization first launches its market platform, the first hurdle
to overcome is the chicken & egg problem: producers only wish to participate in a
market with a large pool of potential consumers, and consumers only wish to
summarizes a selection of tactics that can be used to resolve this chicken & egg
167
problem.43 And, in certain situations, growth can be accelerated by promoting side-
existing consumers become producers (e.g., with Airbnb, short-term renters often
Table 7-12
Tactics for Overcoming the Chicken & Egg Problem
Tactic Description
Build a producer community by incenting members to create
Follow-the-Rabbit
value-units, which in turn will attract a consumer community.
Connect with members of an existing community - either a
Piggy-Back producer community to gain access to value-units or a
consumer community (if value-units already exist).
Attract an ancillary community by first growing the producer
Seeding and/or consumer community to which the ancillary community
is attracted.
Provide incentives to attract highly-visible and influential
Marquee participants (producers or consumers), whose presence attracts
other participants.
Begin as a pipeline organization to build a targeted producer or
Pipeline consumer community; then, attract other communities desiring
to interact with this first community.
Big-Bang Invest heavily in traditional push marketing strategies to
Marketing attract the communities critical to the in-play business model.
Begin by targeting a niche market whose producer & consumer
Micromarketing
communities are already interacting.
However, if one side grows too fast, negative network effects are felt: too
How can the threat of negative same-side network effects be managed? Three
common tactics are (1) invest in growing an undersized community, (2) impose rules
43
G.G. Parker, M.W. Van Alstyne and S.P. Choudhury, Platform Revolution: How
Networked Markets are Transforming the Economy – And How to Make Them Work for You,
2016, New York: W. W. Norton.
168
that constrain the behaviors of members of the oversized community (e.g., limit the
number of allowed transactions), and (3) segment the market so as to increase the
market platform for one of two reasons: to serve as a revenue source (a money-
side), and to attract other communities that can serve as revenue sources (a subsidy-
side). Determining an appropriate profit model for each community is critical because
Charging (or charging too much) for access will limit or reduce community
size.
Charging (or charging too much) for feature use will inhibit participants’
engagement with the business platform.
Charging (or charging too much) for value-units will reduce demand.
Charging (or charging too much) for production will reduce supply.
these members are able to use the market platform to extract value from the
members of another community. The greater the value being appropriated, the
providing a revenue stream from the subsidy-side. This can occur if the value
proposition is highly-attractive and unique (i.e., not available elsewhere), and if these
charges. That said, it is wise to never charge any participant for services he/she has
become accustomed to receiving for free. Instead, add new features to the value
169
proposition, attach the charges to these new features, and continue to make the
deliberations about new features are quite straightforward: add any new feature
whose acquisition and implementation costs are less than the value being created.
However, if the new feature being considered is not viewed as a benefit by all
communities or, even worse, if the new feature portends to bring some participants
in conflict with other participants, this decision can become quite challenging. In
difficult to navigate, especially prior to the new feature’s actual implementation. For
assess the likely impacts of new platform features. With a strategic experiment, a
new feature is implemented – but only for a limited set of participants and a limited
determining the positive and negative impacts of the feature. Further, digital
strategists need to recognize that short-term revenue gains (from one community)
and that it is not always best to favor the community that brings in the largest share
of current revenues, as this community may not be the most important source of
future revenues.
170
Should Transactions and Participant Behaviors Be Regulated?
These regulations are most often imposed to force a trade-off of quality over
the number and the quality of the market exchanges taking place. If, over time, a
low quality, the positive cross-side effect will attenuate – eventually becoming a
market platform are often very appealing to digital strategists. The addition of a new
community raises the promise of additional positive cross-side network effects, the
outcomes. If not mindfully thought out and carefully timed, a new community can
produce: negative cross-side network effects (when the new community’s value
171
proposition conflicts with aspects of the value propositions of one or more existing
enhancement.
models via competitive moves targeting market design, market platform design, or
both. Figure 7-5 overviews the factors typically considered in fashioning specific
competitive moves.
Figure 7-5
Factors Driving Business Model Evolution
Beliefs about:
Communities’ needs & Business Model Deliberations
desires Number of communities
The core transaction & Value propositions Business Model
adjacent transactions Profit models Evolution
Same-side & cross-side Core capabilities
network effects Dynamic capabilities
Core capabilities
Dominant value
discipline(s)
Installed platforms
Held digitization capabilities
New digital technologies
Others’ digitalization innovations
172
A taken competitive move typically affects multiple elements of a business
The above examples illustrate that a taken action targeted at one purpose often spills
over to affect other purposes. It is important to remember that such spillovers are
not always positive. Clearly, fashioning successful competitive moves for network
173
Table 7-13
Examples of TopCoder’s Competitive Moves
Business Model
Business Model Evolution
Element
Communities None observed.
Platform R&D carried out as contests.
Transferring software development management tasks (contest-
co-pilot, solution assessment, solution appeals process, etc.) to
the crowd.
Value Propositions Incentives to ensure winners of a project’s completed contests
are available to interact with participants in the project’s
subsequent contests.
Crowd-engaged appeals process regarding winning solutions.
Imposing a 30-day time period for vetting winning solutions.
Profit Models Incentives provided for non-winning developers.
Contest success prediction.
Contest fulfillment.
Core Capabilities Client capability development.
Crowd skill development.
Develop crowd into a community.
Dynamic Capabilities None observed.
specific business model elements. Which of these are likely to spillover to other
Table 7-14
Examples of Metropia’s Competitive Moves
Business Model
Element
Business Model Evolution
Host private mobility service markets (e.g., car-pooling, ride-sharing,
Communities
etc.) for use by a specific organization’s employees.
No platform subscription fees for commuters at initial launch.
Develop a personalized mobility health checkup functionality that
uses data on a commuter’s commuting behavior to broaden the
Value commuter’s mobility perspectives and to offer the commuter
Propositions customized trip solutions.
Customized consulting services for government agencies.
Customized performance reports provided to participating
commuters, providers, merchants & government agencies.
Commuter subscription fees added as a local platform matures, the
Profit Models platform’s portfolio of mobility services broadens, and commuter
platform interactions are personalized.
Big Data transportation analytics consulting services.
Core Capabilities
Commuter & government agency capability development.
Dynamic
None observed.
Capabilities
174
Sustaining a Network Organization’s Competitive Position
dynamics apply:
Our focus here is on sustaining a strong market position in the face of the constant
Perhaps this most important insight for digital strategists is the realization that
a focus on just amplifying positive cross-side network effects cannot guarantee the
barriers to entry that protect a firm from existing competitors and from new entrants.
Drive down market platform costs (the average costs to host communities,
to facilitate participant interactions, and to execute transactions), thus
making it cost-prohibitive for new entrants to enter the market space.
175
Network ecosystems are powerful and hard-to-replicate because of their inherent
position is difficult, requiring high levels of both strategic vigilance and creativity.
nations’ economies is spurring much of the digital innovation (and digital disruption)
being observed today. This chapter has described how digitalization is applied within
competitive success for both pipeline organizations and network organizations, the
pervasive digitalization that results can raise serious threats for organizations’
leadership teams. The next chapter examines these threats, and the tactics being
176
Chapter 8. Grappling with the Risks of Digitalization
The enabling nature of digital disruption might best be captured by three ideas:
goods, services and currencies) and it is precisely these type of activities that are
also pose significant strategic risks. If digitalization risks are not appropriately
addressed by organizations’ leadership teams, the competitive wins that are realized
are likely to be short-lived, at best. Consider what happened in January 2003 when
a small (376 bytes) data virus infected a single processing device with the Slammer
worm.44 After launching itself onto the Internet, it infected close to 100,000 large
computer systems worldwide in just 30 minutes. The impact was chilling: air and rail
transport were delayed, electrical and pipeline utilities were interrupted, ATMs were
disabled, call centers were shut down, etc. In today’s highly digitized, connected and
mobile world, a single person’s lapse can quickly spread across the platforms to which
than the paradox surrounding the capture and use of personal data. Data privacy
44T. Goles, G. White and G. Dietriech, “Dark Screen: An Exercise in Cyber Security,”
MIS Quarterly Executive, June 2005, pp. 303-318.
177
concerns exist wherever personally-identifiable or other sensitive information is
captured, collected, stored and used. That said, tomorrow’s waves of digitalization
transactions, where these transactions require the collection and use of vast
histories, etc. People can be motivated – through the expectation that the value of
the goods and services obtained will outweigh potential liabilities – to allow the
capture and collection of these data, but only if trust is established and maintained
that any collected personal data will be protected and will not be used in the absence
of permission to do so.
digitalization risk. Supporting evidence for the value of managing digitalization risk
6%.45 Effective digitalization risk management, however, involves much more than
effective balance in stability (as evidenced by efficient, secure, reliable and available
45L. Gordon, M. Loeb and T. Sohail, “Market Value of Voluntary Disclosures Concerning
Information Security,” MIS Quarterly, September 2010, pp. 567-594.
178
Managing digitalization risks in a manner that balances stability and agility is
members. With the aim of providing a mindset and a foundation conducive for
effectively managing digitalization risk, this chapter covers the following topics:
performance and/or competitive position. What are these negative impacts? A useful
way of thinking about these negative effects is the following loss categories:
179
These negative impacts can be huge. Consider, for example, the losses suffered by
the TJX Companies after a security breach46 (reported in late 2006) that enabled
hackers to obtain data from over 45 million customer payment cards.47 Access into
the TJX Companies’ s business platform was gained by digitally eavesdropping on the
POS transactions associated with the in-store customer return process. It has been
estimated that the direct costs (the largest portion of which involved contacting and
offering assistance to affected customers) to the TJX Companies for the breach might
have been as high as $1.6 billion.48 Other of these direct costs involved obtaining
legal advice, internal investigations, public relations and regulatory fines. However,
these direct costs do not include the very sizeable revenue and stock valuation losses
digitalization risk context. Here, three entities are brought together: a set of threats,
a set of targets, and the actors most significantly associated with the occurrence of
digitalization-risk incidents. Table 8-1 lists the loss categories typically associated
46
A security breach refers to an incident that results in the confirmed disclosure of
data to an unauthorized third-party.
47
W. Xu, G. Grant, H. Nguyen and X. Dai, “Security Breach: The Case of TJX
Companies, Inc.,” Communications of the Association of Information Systems, Vol. 23,
November 2008, pp. 575-590.
48
C.R. Speechlys, “The Real Cost of a Data Breach,” Lexology, November 12, 2012:
http://www.lexology.com/library/detail.aspx?g=2aaa771a-2523-4e60-a0bc-306db8323d0e
180
Figure 8-1
Framing the Digitalization Risk Context
Threats
Malicious Natural Legal & New Digital Actions of a External Inability to
Intrusion Disaster Regulatory Technology Competitor Sourcing Respond
Outsiders
Cybercriminals
Terrorists
Hacktavists
Digitalization Risks
Actors
Ecosystem Participants
Insiders
Employees
Senior Executives
Table 8-1
Losses Typically Associated with Digitalization-Risk Threats and Targets
Loss Categories
Threats
Malicious Intrusion Financial, Revenue, Intellectual Property, Reputation
Natural Disasters Financial, Revenue, Intellectual Property, Reputation
Legal & Regulatory Financial, Revenue, Reputation
New Digital Technology Revenue, Reputation
Actions of a Competitor Revenue, Reputation
External Sourcing Financial, Revenue, Intellectual Property, Reputation
Inability to Respond Revenue, Intellectual Property, Reputation
Targets
Business Platform Operations Revenue, Reputation
Digital Assets Financial, Revenue, Intellectual Property, Reputation
Internal Controls Financial, Reputation
Platform Architectures Financial, Revenue, Reputation
Digitalization Capabilities Financial, Revenue, Reputation
Let’s take a look at the actors (described in Table 8-2). Actors are associated
with threat incidents in two ways. Most often, actors are thought of as the
Table 8-2
Actors Associated with Digitalization-Risk Incidents
Actor Description
Outsider
Uses hacking techniques & tools in order to take illegal actions for financial
Cybercriminal gain or to take over digital assets in order to launch a series of illegal
actions.
Uses hacking techniques & tools for the purpose of causing harm & havoc
Terrorist
within an established geo-political order.
Uses hacking techniques & tools for the purpose of bringing attention to a
Hactavist
social or political issue.
Pipeline ecosystem participants (suppliers, upstream intermediaries,
downstream intermediaries, consumers) and network ecosystem
Ecosystem
participants (members of interacting communities), who connect to
Participant organizations’ business/market platforms to facilitate ecosystem
transactions.
Insider
Operational, staff & managerial employees, who connect to the
Employee
organization’s business platform to carry out their work roles.
Members of the leadership team, whom are collectively responsible for:
seeding & overseeing digital strategy formulation & implementation, setting
Senior Executive
policies for digitalization, and allocating the resources necessary for
effective digitalization.
Just as serious, though typically overlooked, are the acts of omission traced
some, if not most, of their managerial and fiduciary responsibilities regarding seeding
and overseeing digital strategy formulation and implementation, setting policies for
182
digitalization, and for allocating the resources necessary for effective digitalization.49
Figure 8-2 illustrates the relationships between threats and targets. Acts of
commission, i.e., malicious intrusion, are most often directed at two threat targets:
processes that are hosted on business platforms (and on market platforms); and,
digital assets refer to the digital technologies (hardware and software), digitized
and business platforms. The most common incidents directed at business platform
the processing being performed on a platform (hence, shutting down the platform or
producing processing faults that result in the platform being shut down for repair).
The most common incidents directed at digital assets involve theft of digital content,
Acts of omission play out across all five threat targets as needed digitalization-
related investments and policies are either not pursued or pursued ineffectively and
internal controls refer to the processing logic and rules embedded within digitalized
malicious intrusions and the organization – along with its CEO and CFO – are subject
are not designed and maintained so as to remain aligned with these organizations’
184
achieved. Finally, organizations lacking the digitalization capabilities to quickly
Malicious Intrusions
work procedures aimed at identifying and authenticating all physical and digitized
Successful intrusion usually begins via either phishing or through a POS device, but
these perpetrators and the hacking tools and techniques they use get better and
better, the time it takes to compromise a victim just gets shorter and shorter.
Today’s public and private digital infrastructures are becoming so large and so
complex that they are beyond the control of any one organization. As a result, no
malicious intrusion. The objective should not be to prevent all malicious intrusions,
185
Natural Disasters
nuclear emergencies, collapsed dams, broken gas or water pipes, etc.), are worst-
natural disaster, most organizations are likely to suffer some disruption to their
such events, all organizations need to be prepared to act to minimize the effects of
and quickly recover from any operational disruptions. The implications of critical
disaster do not immediately shut down, but instead gradually slow down, allowing
complete shutdown. Both graceful degradation and quick recovery are typically
achieved by designing multiple redundancies into operational sites and activities. For
example, the physical sites housing digitalization operations are outfitted with backup
power systems, have all platform content (data and software) backed up on a regular
basis (say, every two hours) at a distant recovery site, and might even have all
186
Legal and Regulatory Requirements
preventing harm to others. Included among these regulations, that originate from
federal, state and local governmental agencies, are those aimed at:
requirements can suffer legal and civil penalties, as well as significant reputation
losses.
complex is that the nature of regulations (statutory versus voluntary, breadth and
depth of coverage, sanctions for noncompliance, etc.) varies considerably across geo-
political boundaries (e.g., cities, states, nations, the EU, etc.). Table 8-3 describes a
organizations.
187
Table 8-3
Examples of U.S. Digitalization-Related Regulations
Regulation Description
Educational agencies & institutions receiving funding from the U. S.
Department of Education are required to provide students with
Family Educational Rights
access to their education records, an opportunity to seek to have the
& Privacy Act of 1974
records amended, and some control over the disclosure of
information from the records.
Health care providers, insurance providers and employers are
Health Insurance Portability
required to safeguard the security & privacy of patients’ health
& Accountability Act of 1996
records and personal data.
Gramm-Leach-Bliley Financial institutions are required to protect the security & privacy of
Act of 1999 the financial information that they collect, hold and process.
Publicly traded companies are required to provide assurance of the
Sarbanes-Oxley Act of 2002
security, accuracy & reliability of their financial reporting systems.
State Security Breach 50 States have enacted Security Breach Notification laws requiring
Notification Law (First enacted businesses to make notifications regarding security breaches.
by California in 2002) While no similar Federal law exists, bills have been introduced.
Created by the Payment Card Industry Security Standards Council,
Payment Card Industry this standard applies to all institutions that hold, process or
Data Security Standard exchange cardholder information. The standard strives to prevent
(Initially released in 2004) credit card fraud through increased controls around data and its
exposure to compromise.
digitalized solutions from both established and new vendors. While all new
technologies are largely untested when first released, those organizations able and
experimentation stand to gain the most from adopting that technology. Likewise,
those organizations that delay their assessing of what turns out to be a game-
changing technology are likely to have dug themselves into a deep competitive hole.
Actions of Competitors
organizations and startups pose a constant threat to any organization. While this has
188
always been the case, what is new today is the rapidity with which competitively-
meaningful actions appear and the fact that the organizations taking action
increasingly lie beyond the boundaries of the primary market ecosystems within
What is perhaps most insidious are the rapid inroads that a new competitor
can achieve regarding market share. This can be especially damaging when an
External Sourcing
platform and accessed by the client via public or private Internet connections. When
operational and strategic benefits. But, along with these benefits comes a heightened
exposure to digitalization risk. Table 8-4 lists the digitalization risks, organized by
189
Table 8-4
Digitalization Risks Associated with External Sourcing
Inability to Respond
The most debilitating digitization risk – though the risk that perhaps receives
the least attention – is the inability to respond to competitors’ actions. Given the
and all communities in network ecosystems), organizations must act effectively and
suffer some erosion in market position – an erosion that will only spiral in the face of
increases when more than one of these factors apply to the situation-at-hand.
organizational life. While we can perfectly predict how an engineered system will
employees, consultants, etc.) will perform. And, even if you could predict human
behavior by limiting the available choices, would you want to? Investments
promising high returns are generally riskier than investments promising low returns
191
well. By limiting the choices available to humans, you also limit the potential for
and nature of a risk domain; and, putting in place risk management policies,
procedures and programs to ensure that the critical risks in the domain are
objectives, risk management involves three activities: risk planning, risk assessment
Risk Planning
activities are carried out. Risk planning begins by identifying and categorizing the
areas of risk most likely to affect an organization. Next, each risk area is assigned
and to actively manage associated risks. Then, overall risk management policies
need to be developed that provide a context within which risk owners can implement
of such high-level objectives might include:50 “Protecting the integrity and security
50
Adapted from: H.A. Smith and J. McKeen, “Developments in Practice XXXIII: A
Holistic Approach to Managing IT-based Risk,” Communications of the AIS, December 2009,
p. 525.
192
“We need to embed an attention to digitalization risk management into all work
Risk Assessment
During risk assessment, each risk owner, usually with the support of in-
house experts and external consultants, estimates the risk exposure associated
with each of the risk areas for which the owner is responsible. Usually, some variant
estimates of risk probabilities and expected losses. Just remember that these generic
estimates are only starting points that need to be tailored to the nuances of a given
organization and that expected losses should include both tangible and intangible
Once a risk area has been assessed, the owner must decide (again, with input
from others) how risks are to be addressed. Three actions are possible, alone or in
combination:
Risk assumption: Accepting that losses are likely to arise if and when an
incident occurs in a risk area, covering these losses through internal funds
and third-party insurance.
Risk deterrence: Taking action to reduce the likelihood that an incident will
occur in a risk area.
Ongoing risk control: Monitoring a risk area such that the incident
193
occurrences are detected and resolved before excessive losses occur.
The risk assessment matrix shown as Figure 8-3 provides general guidance on
selecting an appropriate strategy for a risk area. Risk areas with low incident
probabilities and low expected losses can reasonably be assumed without taking
further action, while risk areas with high incident probabilities and high expected
Figure 8-3
Risk Assessment Matrix
Ongoing risk control involves monitoring for risk incidents, detecting that an
incident is about to occur (ideally) or has occurred (more likely), and taking action to
mitigate any losses arising from the incident. Risk mitigation involves tempering
(as much as possible) the consequences of a risk incident by taking corrective actions.
Prior to implementing ongoing control procedures, the risk owner needs to determine
194
the level of cost and effort to put into the procedures. Figure 8-4 illustrates the
complexity of this decision. The rational risk owner desires to neither under-invest
or over-invest in ongoing risk control. Here, again, heavy use is made of others’
Figure 8-4
Determining the Cost of Ongoing Risk Control
Cost of Risk
Cost Deterrence/Mitigation
Sweet
Spot
Expected loss in the
Absence of Risk
Deterrence/Mitigation
Risk
Coors owns the business processes that engage distributors and retailers in ordering
these POS display items. To motivate POS display orders, Coors provides each
51
This hypothetical exercise (used for illustrative purposes only) was developed by the
authors based on material from: J. Buffington and D.J. McCubbery, “Coors Brewing Company
Point of Sales Application Suite: Winning Mindshare with Customers, Retailers, and
Distributors,” Communications of the AIS, Volume 13, 2004, pp. 81-96.
195
wholesaler and retailer with a budget that can only be used to order POS display
items. Coors anticipates that at least some of the wholesalers and retailers will find
the display materials valuable in their efforts to increase sales and, in turn, that they
Coors’ solution for digitalizing the business processes enabling distributors and
functionalities:
increasing sales of Coors products, having distributor and retailer staffs performing
much of the work autonomously, and building stronger relationships with the
Now, consider a risk assessment that might have been performed by the risk
owner for this digitalized business platform. Table 8-5 summarizes this risk
digitalization risk management strategy put forward by the risk owner would involve:
196
Deterring and mitigating malicious intrusions, through the local business
platform, into Coors’ global digital platforms and business platforms.
Ensuring that any future decision process to externalize any of the digital
platforms enabling the local business platform carefully examine the
providers’ capabilities to secure their platforms against malicious intrusions.
Table 8-5
Risk Assessment for Coors’ POS Display Business Platform
Incident Expected
Threat Situational Assessment
Probability Losses
• Coors is a prominent firm selling a product (alcohol)
that could be considered controversial.
Malicious • Internet exposure & distributor/retailer Low (local)
High
Intrusion connectivity. High (global)
• Low loss exposure with the local business platform.
• High loss exposure with global platforms.
Natural • Favorable geographic location (Colorado front
Very Low Moderate
Disasters range).
Legal & • Limited access to financial systems.
Low Low
Regulatory • Limited privacy concerns.
New Digital • Analytics technologies.
Moderate High
Technology • Collaboration technologies.
Actions of a • Retail floor & shelf spaces are highly competitive
High High
Competitor commodities.
External • Business platform unlikely to be externalized.
Moderate Moderate
Sourcing • Digital platform likely to be externalized.
Inability to • Analytic capabilities focused on optimizing the use of
Moderate High
Respond retail store shelf space.
programs) cover a very broad range of complex and ever-moving topics – topics for
what organizations are doing, this section describes a few of the current practices
regarding one threat area: that of malicious intrusions. This threat area was selected
for two reasons. First, since significant cyber-security breaches are reported on by
197
news media on a regular basis today, most people are well aware of the topic.
Second, cyber-security breaches can result in huge financial losses, the size of which
is increasing annually. Data from 2010, for example, indicated that the average cost
malicious intrusions are described, note that a mix of technical and social mechanisms
are required. All too often, it seems, much more attention is given to the technical
underfunded.
intrusions. That said, all organizations need to understand the intrusion risk
exposures of their digital and business platforms and take commiserate steps to both
harden these platforms and detect (and mitigate) any intrusions that occur.
physical impediments that increase the effort required by a perpetrator, such that all
but the most determined perpetrators either bypass the platform (moving on to
easier targets) or are so hindered that they quickly give up. Detection involves
putting in place software and manual scanning processes that identify problematic
52
R. Appan and D. Becic, “Impact of Information Technology (IT) Security Information
Sharing among Competing IT Firms on Firm’s Financial Performance: An Empirical
Investigation,” Communications of the Association of Information Systems, Vol. 39, 2016, pp.
214-241.
198
Perhaps the most recognized hardening tactics involve the use of firewalls,
(“Who are you?”), authenticate (“Can you prove your identity?”) and authorize
(“What are you allowed to do?”) attempts, legitimate and illegitimate, to access
methods are moving away from examining what you know (e.g., a password) to
examining something you have (e.g., biometrics such as the use of fingerprints, iris
The most familiar detection tools are those directed at viruses (i.e., malicious
software code), that have eluded the barriers erected in hardening a platform. Less
visible are the huge investments organizations make in (1) capturing and then
digitalized platforms, and (2) embedding processing logic into the software handling
demonstrate wide variance in: their awareness of, knowledge of and sensitivity to
compliance with security breach policies and procedures; and, their abilities to act
199
Because of these variances, many organizations are including comprehensive
Awareness Training: All employees are made aware of the basics of cyber-
security risk management (both work-related and home-computer use) and,
specific to each employee, those risks most likely to arise as employees
carry out their day-to-day work activities.
Specialized Training: All technology professionals and all risk owners are
provided with advanced education to develop the capabilities needed for
them to carry out their assigned responsibilities.
were reluctant to report on security breach incidents because of the expectation that
securities analysts, etc.) would react negatively, at least in the short-term. However,
200
the consequences of reported security breaches, while still negative, have been
risk management, their capabilities to combat malicious intrusions will only improve.
Rather than feeling as if they are working alone against an increasingly hostile world,
organizations’ risk specialists and risk owners will increasingly find themselves
coordinating with and collaborating with their peers in other organizations, including
53
L. Gordon, M. Loeb and L. Zhou (2011), “The Impact of Information Security
Breaches: Has There Been a Downward Shift in Costs?”, Journal of Computer Security, Vol.
19, No. 1, 2011, pp. 33–56.
54
S. Goel and H.A. Shawky, "The Impact of Federal and State Notification Laws on
Security Breach Announcements," Communications of the Association for Information
Systems: Vol. 34, January 2014, pp. 37-50.
201
digitalization risk management capabilities? With a public firm, it is the firm’s Board
of Directors.
practices:
Board members are not actively recruited for their digitalization expertise.
Few executives of organizations recognized as digitalization leaders are
members of Boards of Directors.
members believing that their organization’s leadership team has a solid handle on
this general depiction can be observed in recent trends regarding Boards of Directors
and digitalization.
Three Board responsibilities are most important. The Board of Directors must assure
that their organization is not overly exposed to digitalization risks that threaten
these responsibilities to be met, Boards of Directors need to adopt best practices such
as:58,59
layers of complexity onto their efforts to enhance existing business models and to
innovate with new business models, and by requiring that the requisite capabilities
are in place to enable both business model formulation and business model
implementation. Table 8-6 describes how each of the four elements of business
203
Table 8-6
How Business Models Are Affected by Digitalization Risks
quid pro quo is inadequate, the individual is unlikely to engage, partially or fully, in
trust in the platforms enabling a value proposition would be expected to refrain from
platform interactions.
The long-term expectation from aggregating the profit models associated with
a business model is that the business model will prove profitable. However, if a
capabilities, and if the investment and operating costs associated with these
capabilities are not fully accounted for in the business model’s aggregated profit
models, then what might appear initially to be a very successful business model is
204
If nothing else, this chapter’s content should have driven home the point that
core capability for all organizations and a strategic capability for some (e.g., financial
senior leadership teams, as well as within the Board of Directors of private firms,
then it becomes unlikely that a strong digitalization risk management capability will
be developed.
members? In the next chapter, six actions aimed at just such an objective are
described.
205
Chapter 9. Executive Mandates: Digital Strategy
inordinate amount of time examining the opportunities and thr eats pervasive
the products and services being exchanged within these ecosystems, and the core
Doing nothing at all, hoping that the attack will dissipate quickly with
minimal effect.
206
If anything, arriving at an effective competitive response can prove to be a greater
by a competitor.
So, how should organizations’ leadership teams position themselves and their
organizations for incessant digital disruption? The first step is to acknowledge that,
while digital technologies are the basis of digital disruption, digital technologies are
not the basis of effective digital strategy. Instead, what is critical is the adoption of
organization, and the infusion of key notions into the thought-processes of digital
strategists. The following six mandates are offered to senior executives desiring to
The dominant mindset held by many, if not most, senior executives today is
business model. But, digitalization shakes up the competitive space in many ways:
207
giants, technology entrepreneurs, etc.) regularly emerge; and, suppliers,
with which organizations to interact and with which markets to participate, as each
seeks out the value propositions that best meet their ever-evolving desires and
requirements.
sharing and value co-creation by market participants, and high rates of participant
leadership teams: looking outward first, and then inward; and, developing
strategic partners.
The primary intent driving the digitalized ecosystem mindset is to become the
Two organizations whose leadership teams are noted for having demonstrated
208
Recognizing that it needed to transform itself into a modern digital business,
the emerging, highly-digitalized market ecosystems within which it was already and
officer (CDO), with these CDOs reporting to the business unit CEOs. Importantly,
After having verged on defaulting on its debt in the early 2000s, LEGO has
again become a thriving business once its leadership team adopted a digitalized
ecosystem mindset in which there was no longer a separate digital strategy that was
aligned with business strategy, but rather a corporate business strategy executed
business strategy involved: product innovation and the product ecosystem; digital
marketing; and, a transition toward global, rather than local, platforms. Key
initiatives put in place to enable this overarching strategy included: distributing much
of the corporate information technology function into business units; appointing CDOs
60
T. Catlin, L. Harrison, C.L. Plotkin and J.r Stanley, “How B2B Digital Leaders Drive
Five Times More Revenue Growth than Their Peers,” McKinsey Quarterly, October 2016,
http://www.mckinsey.com/business-functions/marketing-and-sales/our-insights/how-b2b-
digital-leaders-drive-five-times-more-revenue-growth-than-their-peers
61
O.A. El Sawy, P. Kraemmergaard, H. Amsinck and A.L. Vinther., “How LEGO Built
the Foundations and Enterprise Capabilities for Digital Leadership,” MIS Quarterly Executive,
June 2016, pp. 53-64.
209
within business units for the purpose of orchestrating digitalized innovation;
nurturing an experiment, learn and iterate capability across the firm, leveraging the
implementing flexible and open engagement platforms, while reducing complexity and
maintaining security in enterprise platforms; and, hiring flexible, dynamic and adaptable
employees able to cope with task and position changes and to work on digitalization
leaders. Being a first-mover (or, an early adopter) with a new digital technology or
a new digitally-enabled functionality is fraught with risk. Will the technology work as
innovation to gain some of the innovation’s anticipated benefits while still learning
210
to constant innovation.62 If anything, the number of these experiments is increasing
over time – as can be observed from an April 2014 letter to Amazon shareholders
that reported the number of these experiments growing from 546 in 2011 to 1,092
about innovation in two key ways. First, digitally-savvy talent must be deeply
involved with innovative initiatives at every stage: creating the idea, improving the
the innovation as a standard way of doing business. Second, at their start, successful
digitally-enabled innovations are almost always kept separate from the standard way
the initiatives, and the innovative initiatives are less likely to be impeded by
standard way of doing business?” The ultimate goal for any established organization
Consequently, most leadership teams will want to eventually integrate the digital
innovation with the rest of the organization. Doing so creates a seamless digital-
physical experience, enables greater efficiency via economies of scale and scope,
62
P. Bell, “Sustaining an Analytics Advantage,” Sloan Management Review, Spring
2015, pp. 21-23.
211
permits better coordination, avoids duplicated effort, and facilitates timely
might be best to keep separate the innovative business models and the established
business models, letting these compete for market share until only one is left.
involves applying analytic models to the vast quantities of data permeating digitalized
possess the capabilities to recognize the value potential of data streams that are both
fleeting and voluminous, and to capture, organize, analyze and apply these data in
tools and talent needed to position an organization such that it is able to quickly and
immediate answer to this question involves being able to combine data and analytic
models by using:
212
Less obvious, however, are data monetization opportunities. Data monetization
refers to the bundling together of well-defined sets of data and analytic models such
that the intangible value of data is transformed into something of tangible value. Two
operations are captured, cleaned and repackaged (via analytics) such that the data
become valuable to other organizations. Think of the vast amounts of data a big box
customer/geographic data. Or, think about the vast amounts of data collected by
auto insurance companies on the devices installed by car owners to monitor driving
behavior. Or, consider that one oil rig with 30,000 sensors may examine only one
percent of the data collected because it uses these data to detect and control
anomalies63 – ignoring the value of the data in supporting drilling optimization and
oil/gas prediction activities, when combined with similar data from hundreds of other
rigs. Such data products can be sold directly to organizations desiring to use the
that can then be applied to data collected on a new client engagement, enabling
superior services to be provided to this new client at a price-point below that of many,
63
J. Deichmann, K. Heineke, T. Reinbacher and D. Wee, “Creating a Successful
Internet of Things Data Marketplace, McKinsey Quarterly, October 2016,
http://www.mckinsey.com/business-functions/digital-mckinsey/our-insights/creating-a-
successful-internet-of-things-data-marketplace
213
Consider, for example, ExcelShore, a digitalized tool developed by Cybage, an
Cybage’s internal resources, ExcelShore analyzes collected client data (e.g., the
client’s business history, current operations, prospective projects and resources; data
about the client’s industry; etc.) to generate solution recommendations for the client,
engagement. With ExcelShore, Cybage is able to offer fee structures (to its clients)
that are generally 20-25 percent lower than the fee structures offered by its larger-
employment and labor law practice, in unbundling many of the tasks involved in
digitalized products with automation and analytics capabilities, depending on the level
of sophistication involved.65 Now, instead of billing clients for the hours its attorneys
spend on claims, Littler uses a fixed-fee pricing model based on productivity (per
grievance or complaint) for certain of its legal services. This change has resulted in
lower legal costs for clients (figures ranging from 10-35 percent), enabling Littler to
64
A. Kathuria and B. Yen, “The Art of Winning an Unfair Game: Cybage & India’s IT
Industry,” Communications of the Association for Information Systems, Vol. 37, 2016, pp.
753-766.
65
M. Sawhney, “Putting Products into Services,” Harvard Business Review, September
2016, pp. 83-89.
214
Evolve Processes and Platforms at Multiple Speeds
numerous and to move at a much faster pace than projects aimed at enhancing the
an organization running and compliant with regulators. This in itself is not a problem.
What is a problem is that sooner or later – actually, mostly sooner – the process or
platform that evolves at a fast pace must be interconnected to and synchronized with
processes or platforms that evolve at a slower pace; and, it is with these efforts
Actually, the challenge is more severe than might be inferred from the above
mélange of digital platforms and business platforms. Depending on the nature of the
215
anywhere in between.
Think of a juggler having to keep a set of balls moving despite the fact that each ball
is also moving in a unique orbit around a central orbital point. So, ideally, these
processes and platforms are not evolving at two rates of speed or at three rates of
speed, but at many rates of speed. Process owners and platform owners across the
and, over time, are likely to have to adjust these rates of speed.
So, again, what can an organization’s leadership team do? An easy, quick,
one-size-fits-all solution just does not exist. Instead, a leadership team needs to
fashion, over time, a new and consistent set of organization, platform and governance
models:
While organizations’ leadership teams may not possess the expertise involved in
carrying out these activities, it is critical that leadership teams provide direction and
precisely those that can produce severe intra- and inter-unit conflicts – conflicts that
216
Track and Evaluate Intangible Digital Assets
routers, messaging services, Internet standards and software, etc.) that serve as the
company books.
The second type of capital involves intangible digital assets, such as:
Market, product, services and platform designs that attract, engage and
retain large numbers of ecosystem participants.
Operational and analytical processes that capture, organize and exploit data
regarding market events, about operational and managerial activities, and
about participant beliefs, expectations, behaviors and perspectives.
rather than as a capital investment, thus creating an investment disincentive (at least
in the short-term).
track and attach financial value to intangible digital assets, many organizations’
organizations’ leadership teams have little solid evidence on which to assess their
217
organizations’ investment in digitalization over time or to compare these investments
against that of competitors. Both a retailer lacking rich data on consumers or a bank
unable to control the capture of customer data (because customers access banking
on Big Data, Big Data analytics and cloud services – are obviously crucial to
operating at multiple and variable speeds, and a preoccupation with intangible assets.
Organization culture is one of those terms that are intuitively understood but
that prove difficult to define simply. Suffice it to say that an organization culture
act and interact, and you will inevitably come away with an understanding of the
organization’s culture. The more time spent observing, the richer the understanding.
218
This same thing happens as new employees sense and adopt the particular culture
In stable environments, executives tend to rely on what has been learned from
past experiences to build the system of policies, directives, rules, routines and top-
current mindsets and capabilities often induce strategic inertia, where attention and
emphasized, environments beset with the constant threat of digital disruption are
anything but stable. As the drivers of this instability are strongest at the edges of
position their organization for digitalization success are advised to transition their
employees – working alone and in small groups – holding local knowledge and
What does this emerging digitalization culture look like? A good starting
point is to recognize how digitalization is enabling us, as we carry out our consumer
and employee roles, to achieve better outcomes from taken-actions:66 we are being
given more options, more information about these options, and more permission to
act as we think best. To grasp what is implied by – and gained from – a culture that
66
B. Libert, M. Beck and J. Wind, The Network Imperative: How to Survive and Grow
in the Age of Digital Business Models, Boston, MA: Harvard Business Review Press, 2016.
219
first and foremost relies on employees’ capabilities and judgement, consider the
Rather than attempting to define the elements that come together to form a
organization culture.68
distribution platform, known for products such as Steam and SourceForge. Valve’s
self-reported revenues per employee and profit per employee metrics exceed those
of Facebook and Google, signaling quite vividly that Valve is succeeding in a fast-
67
T. Catlin, L. Harrison, C.L. Plotkin and J. Stanley, “How B2B Digital Leaders Drive
Five Times More Revenue Growth Than Their Peers, McKinsey Quarterly, October 2016.
http://www.mckinsey.com/business-functions/marketing-and-sales/our-insights/how-b2b-
digital-leaders-drive-five-times-more-revenue-growth-than-their-peers
68
The discussion of the Valve Corporation has been adapted from materials in: T. Felin
and T.C Powell, “Designing Organizations for Dynamic Capabilities,” California Management
Review, Summer 2016, pp.78-96.
220
moving environment requiring constant agility, strategic innovation, and market
adaptation.
A key factor behind this success is Valve’s culture, which emphasizes the firm’s
Steer, without asking for approval, the firm toward opportunities and away
from risks.
demanding that competitive opportunities and threats are quickly sensed and
success is to ensure:
Employees are provided the motivation, time and resources to learn from,
share with, and collaborate with these other individuals.
Valve’s leadership team has gone beyond traditional decentralization toward radical
221
Nonetheless, it is important to recognize that radical decentralization has
authority to those who operate closest to the action – that is, to individuals, groups
and taken-actions are vetted by affected-others (individuals, groups and units) and,
if needed, adjusted. Allowing for such assurance, however, takes time. In an era of
digital disruption, it does not take much of a delay to significantly reduce the benefits
among individuals. As Valve’s leadership team sees it, a purposeful system of social
decentralization.
selection; that is, employees vote with their feet. They assess markets for new
opportunities, gather information about existing projects and teams, and decide by
not all the decisions made by employees are optimal, for the employee or for Valve.
However, experience at Valve suggests that, in the aggregate, the choices made by
222
While self-selection empowers the right people to make decisions, it does not
three. Learning from experience, Valve’s leadership team recognized that it was a
market opportunity. Under the rule of three, new projects are only considered for
approval when at least three individuals come together to propose a project. The
rule of three, thus, provides a light-touch intervention that allows Valve to stimulate
innovation and to limit the chaos that can otherwise debilitate radical
decentralization.
A Recap
It is important to recognize that the six mandates just described are neither
silver bullets nor readily implemented. The policies and practices put in place in one
organization may or may not work when applied within another organization.
needs to interpret the mandate through a lens that reflects the organization’s in-
place culture, human talent, digitalization history and competitive environment. Such
an assessment should suggest how the spirit of the mandate is best applied as well
these six mandates across their organization, a number of things should begin to
occur, including:
223
Existing policies and practices will increasingly be questioned.
Employees will increase the amount of time they spend interacting with
others outside their areas of immediate responsibility.
managers and executives (at least in the near term), it is precisely these type of
dialogues and debates that ultimately generate timely and successful digital
strategies.
224
GLOSSARY
Control – one of the four engines of digitalization; embedding rules within digital
solutions to identify out-of-control events/situations, such that out-of-control
events/situations do not occur or, if they do occur, are quickly corrected.
537
Digital disruption – when the innovative uses of digital technologies and
globalization are the primary factors leading to incumbents within existing industries
facing overwhelming competitive challenges and to entirely new industries being
created.
Digital giants – firms that have mastered digitalization and are able to harness their
business models and digitalization expertise to disrupt a wide range of industries.
Digitalization – applying digitization within organizations and within the social and
economic contexts within which organizations are embedded.
Digitization – the purely technical processes associated with converting sensed and
captured data into binary form, storing and transmitting these binary data,
manipulating these data, and storing/transmitting the outcomes of these data
manipulations.
Firm – one of the two primary mechanisms (along with the market) for organizing
economic activities; economic exchanges in a firm mainly occur through hierarchical
structures and control structures. Also referred to as an organization.
Incumbents – firms having operated in an industry for a long time and holding well-
established business models, organization structures and resource control structures.
538
Interaction – one of the four engines of digitalization; enabling entities (human or
digital) to engage in timely, meaningful dialogues with one another (overcoming
barriers of space and time).
Market – one of the two primary mechanisms (along with the firm) for organizing
economic activities; economic exchanges in a market mainly occur through pricing
mechanisms and contractual mechanisms.
Network orchestrator – creates and manages the market environment and the
transaction environment within which value-unit exchanges occur within a network
ecosystem.
Organization – one of the two primary mechanisms (along with the market) for
organizing economic activities; economic exchanges in an organization mainly occur
through hierarchical structures and control structures. Also referred to as a firm.
Open – a technology that is available for use (and modification) by anyone, though
some form of payment may be required to gain access to the technology.
Technology entrepreneurs – firms (often young and small) that bring specialized
digitalization expertise to innovate, transform or disrupt certain aspects of an
industry’s value stream or value-units.
539
Value-unit – the entities (information, a good or a service) being exchanged within
a market-focused ecosystem.
Agility – the ability of a firm, first, to detect potentially disruptive threats and
opportunities and, then, to marshal the resources and managerial insights required
to subdue threats and/or exploit opportunities.
Collision at the core – directing managerial attention and resources toward building
relationships with digitalization leaders in order to understand and recognize business
model innovations aimed at reinventing currently-executing business models.
Core capabilities – an element of a business model that describes the tangible and
intangible resources needed to successfully implement a business model’s value
proposition and profit model.
Cost model – describes the nature of the costs borne in producing revenue streams
from an executing business model and how these costs will be controlled to provide
requisite levels of profitability.
540
Experimentation at the edge – directing managerial attention and resources
toward understanding and recognizing business model innovations within adjacent
industries and within emerging industries.
Revenue model – an element of a profit model that describes where, when and how
sustainable revenue streams will materialize when executing a business model.
Big Data – high-volume streams of digitized data that are captured and organized
for use.
541
Big Data analytics – applying statistical and mathematical models to organized
collections of Big Data.
Data/document standards – policies and rules that allow data and documents to
be accessed and used by value stream participants.
Economies of scale – the advantages that arise with increased volume of output.
Economies of scope – the advantages that arise when a family of related goods are
produced rather than a single good.
Long-tail phenomenon – the ability of digital markets to offer a far broader variety
of value-units than could be offered in comparable physical markets.
542
responsibly if and when problems arise, and keeps regulators and value-stream
participants aware of these activities.
Stock holding – building up various kinds of inventories, thus providing buffers that
soften the effects of poor demand forecasts.
Support processes – work activities that provide direction, resources and oversight
for primary processes.
Value stream platform – a platform, hosting digitized data and documents as well
as digitalized managerial and operational processes, that can be accessed and used
by a value stream’s participants.
Business model innovation – radical changes are made to one or more of the four
elements of business models or a novel configuration of these elements is fashioned.
Event visibility - making key events (as well as key non-events) known to the
individuals and the digital solutions taking action so that actions can be taken.
Local – a digital solution designed and built to be used by one or only a few of an
organization’s work units.
544
Strategic vision – answers the question: “What kind of organization do we wish to
become?”.
545
Outsourcing a capability – transferring ownership and decision rights regarding a
capability, the assets used in executing the capability, and/or the management of the
capability from inside an organization’s boundary to outside this boundary.
Core transaction – the primary market exchange activity driving both producers
and consumers to an ecosystem’s market platform.
546
(the value-unit) and the other possessing a short-term need for such an asset or
skill.
Market platform – the organized collection of digital and business platforms that
hosts the content and functionalities that establish, operate and govern the
ecosystem’s market.
Market congestion – ensuring the ease by which producers and consumers are able
to consider a sufficient number of alternatives in arriving at a satisfactory match.
547
Market platform design – a network organization’s competitive moves aimed at
building market platform content/functionality in order to enhance community
participants’ satisfaction with offered value propositions.
Market safety – ensuring that market transactions are sufficiently safe such that
producers and consumers are willing to reveal or act on confidential information and
are willing to keep the transactions inside the market.
Spillover – when a taken action targeted at one purpose affects other purposes.
Cybercriminal – uses hacking techniques and tools in order to take illegal actions
for financial gain or to take over digital assets in order to launch a series of illegal
actions.
Detection – putting in place software and manual scanning processes that identify
problematic behaviors transpiring within digital platforms and business platforms.
Digital assets – digital technologies (hardware and software), digitized data, and
digitization/digitalization capabilities applied in configuring digital platforms and
business platforms.
Hactavist – uses hacking techniques and tools for the purpose of bringing attention
to a social or political issue.
Intellectual property loss – theft of digitized ideas, innovations and other forms
of creative expression (e.g., trade secrets; blueprints; digitalized processes;
proprietary digital content; the underpinnings of strategies and business models;
etc.).
Internal controls – the processing logic and rules embedded within digitalized
financial reporting systems to ensure the correct handling of financial transactions
and the accuracy of produced financial reports.
Ongoing risk control – monitoring a risk area such that the incident occurrences
are detected and resolved before excessive losses occur.
Risk assessment – estimating the risk exposure associated with a risk area.
Risk assumption – accepting that losses are likely to arise if and when an incident
occurs in a risk area, covering these losses through internal funds and third-party
insurance.
Risk deterrence – taking action to reduce the likelihood that an incident will occur
in a risk area.
549
Risk exposure – the probability of a risk occurring multiplied by the expected loss
to be borne if the risk occurs.
Risk planning – establishes the contexts within which risk management activities
are carried out.
Terrorist – uses hacking techniques and tools for the purpose of causing harm and
havoc within an established geo-political order.
Intangible digital assets – market, product, services and platform designs that
attract, engage and retain large numbers of ecosystem participants; operational and
analytical processes that capture, organize and exploit data regarding market events,
about operational and managerial activities, and about participant beliefs,
expectations, behaviors and perspectives; knowledge and skills held by an
organization’s employees as well as its partners’ employees; digitalization reputation
acquired by an organization; etc.
550
Social proof – a social influence mechanism aimed at producing coordinated
behavior among individuals.
551