Perbaikan Proses Bisnis Onboarding Pelanggan di PT SEVIMA Menggunakan Heuristic Redesign
Ribka Devina Margaretha, Mahendrawathi ER, Sugianto Halim
This study addresses challenges in PT SEVIMA's customer onboarding process, where Account Managers (AMs) were not always aligned with client needs. Using a Business Process Management (BPM) Lifecycle approach combined with heuristic principles (Resequencing, Specialize, Control Addition, and Empower), the research redesigns the existing workflow. The goal is to improve the matching of AMs to clients, thereby increasing onboarding efficiency and customer satisfaction.
Problem
PT SEVIMA, an IT startup for the education sector, struggled with an inefficient customer onboarding process. The primary issue was the frequent mismatch between the assigned Account Manager's skills and the specific, technical needs of the new client, leading to implementation delays and decreased satisfaction.
Outcome
- Recommends grouping Account Managers (AMs) based on specialization profiles built from post-project evaluations. - Suggests moving the initial client needs survey to occur before an AM is assigned to ensure a better match. - Proposes involving the technical migration team earlier in the process to align strategies from the start. - These improvements aim to enhance onboarding efficiency, reduce rework, and ultimately increase client satisfaction.
Host: Welcome to A.I.S. Insights — powered by Living Knowledge. I’m your host, Anna Ivy Summers. In today's fast-paced business world, how you welcome a new customer can make or break the entire relationship. Today, we're diving into a study that tackles this very challenge.
Host: It’s titled, "Perbaikan Proses Bisnis Onboarding Pelanggan di PT SEVIMA Menggunakan Heuristic Redesign". It explores how an IT startup, PT SEVIMA, redesigned their customer onboarding process to better match their account managers to client needs, boosting both efficiency and satisfaction. Here to break it all down for us is our expert analyst, Alex Ian Sutherland. Welcome, Alex.
Expert: Great to be here, Anna.
Host: Alex, let's start with the big picture. What was the core problem that PT SEVIMA was trying to solve?
Expert: It's a classic startup growing pain. PT SEVIMA provides software for the education sector. Their success hinges on getting new university clients set up smoothly. But they had a major bottleneck: they were assigning Account Managers, or AMs, to new clients without a deep understanding of the client's specific technical needs.
Host: So it was a mismatch of skills?
Expert: Exactly. You might have an AM who is brilliant with financial systems assigned to a client whose main challenge is student registration. The study's analysis, using tools like a fishbone diagram, showed this created a domino effect: implementation delays, frustrated clients, and a lot of rework for the internal teams. It was inefficient and hurting customer relationships right from the start.
Host: It sounds like a problem many companies could face. So, how did the researchers approach fixing this?
Expert: They used a structured method called Business Process Management, but combined it with something called heuristic principles. It sounds technical, but it's really about applying practical, proven rules of thumb to improve a workflow. Think of it as a toolkit of smart solutions.
Host: Can you give us an example of one of those "smart solutions"?
Expert: Absolutely. The four key principles they used were Resequencing, Specialization, Control Addition, and Empower. Resequencing, for instance, just means changing the order of steps. They found that one simple change could have a huge impact.
Host: I'm intrigued. What were the key findings or recommendations that came out of this approach?
Expert: There were three game-changers. First, using that Resequencing principle, they recommended moving the initial client needs survey to happen *before* an Account Manager is assigned. Get a deep understanding of the client's needs first, then pick the right person for the job.
Host: That seems so logical, yet it’s a step that's often overlooked. What was the second finding?
Expert: That was about Specialization. The study proposed grouping AMs into specialist profiles based on their skills and performance on past projects. After each project, AMs are evaluated on their expertise in areas like data management or academic systems. This creates a clear profile of who is good at what.
Host: So you’re not just assigning the next available person, you’re matching a specialist to a specific problem.
Expert: Precisely. And the third key recommendation was about Empowerment. They suggested involving the technical migration team much earlier in the process. Instead of the AM handing down instructions, the tech team is part of the initial strategy session, which helps them anticipate problems and align on the best approach from day one.
Host: This all sounds incredibly practical. Let's shift to the big question for our listeners: why does this matter for their businesses, even if they aren't in educational tech?
Expert: This is the most crucial part. These findings offer universal lessons for any business. First, it proves that customer onboarding is a strategic process, not just an administrative checklist. A smooth start builds trust and dramatically improves long-term retention.
Host: What's the second big takeaway?
Expert: Don't just assign people, *match* them. The idea of creating specialization profiles is powerful. Every manager should know their team's unique strengths and align them with the right tasks or clients. It reduces errors, builds employee confidence, and delivers better results for the customer.
Host: It’s about putting your players in the right positions on the field.
Expert: Exactly. And finally, front-load your discovery process. The study showed that the simple act of moving a survey to the beginning of the process prevents misunderstandings and costly rework. Take the time to understand your customer's reality deeply before you start building or implementing a solution. It’s about being proactive, not reactive.
Host: Fantastic insights, Alex. So, to recap for our listeners: a smarter onboarding process comes from matching the right expertise to the client, understanding their needs deeply before you begin, and empowering your technical teams by bringing them in early.
Host: Alex Ian Sutherland, thank you so much for translating this study into such clear, actionable advice.
Expert: My pleasure, Anna.
Host: And thanks to all of you for tuning in to A.I.S. Insights — powered by Living Knowledge. Join us next time as we uncover more valuable lessons from the world of business and technology research.
Business Process Redesign, Customer Onboarding, Knowledge-Intensive Process, Heuristics Method, Startup, BPM Lifecycle
MIS Quarterly Executive (2024)
Dealing Effectively with Shadow IT by Managing Both Cybersecurity and User Needs
Steffi Haag, Andreas Eckhardt
This study analyzes how companies can manage the use of unauthorized technology, known as Shadow IT. Through interviews with 44 employees across 34 companies, the research identifies four common approaches organizations take and provides 10 recommendations for IT leaders to effectively balance security risks with the needs of their employees.
Problem
Employees often use unapproved apps and services (Shadow IT) to be more productive, but this creates significant cybersecurity risks like data leaks and malware infections. Companies struggle to eliminate this practice without hindering employee efficiency. The challenge lies in finding a balance between enforcing security policies and meeting the legitimate technology needs of users.
Outcome
- Four distinct organizational archetypes for managing Shadow IT were identified, each resulting in different levels of unauthorized technology use (from very little to very frequent). - Shadow IT users are categorized into two types: tech-savvy 'Goal-Oriented Actors' (GOAs) who carefully manage risks, and less aware 'Followers' who pose a greater threat. - Effective management of Shadow IT is possible by aligning cybersecurity policies with user needs through transparent communication and responsive IT support. - The study offers 10 practical recommendations, including accepting the existence of Shadow IT, creating dedicated user experience teams, and managing different user types differently to harness benefits while minimizing risks.
Host: Welcome to A.I.S. Insights, the podcast at the intersection of business and technology, powered by Living Knowledge. I’m your host, Anna Ivy Summers. Host: Today, we’re diving into a challenge every modern business faces: unauthorized technology in the workplace. We’ll be exploring a fascinating study titled, "Dealing Effectively with Shadow IT by Managing Both Cybersecurity and User Needs." Host: With me is our expert analyst, Alex Ian Sutherland. Alex, thanks for joining us. Expert: It's great to be here, Anna. Host: So, this study analyzes how companies can manage the use of unauthorized technology, known as Shadow IT. It identifies common approaches organizations take and provides recommendations for IT leaders. To start, Alex, what exactly is this "Shadow IT" and why is it such a big problem? Expert: Absolutely. Shadow IT is any software, app, or service that employees use for work without official approval from their IT department. Think of teams using Trello for project management, WhatsApp for quick communication, or Dropbox for file sharing, all because it helps them work faster. Host: That sounds pretty harmless. Employees are just trying to be more productive, right? Expert: That's the motivation, but it's a double-edged sword. While it can boost efficiency, it creates massive cybersecurity risks. The study points out that this practice can lead to data leaks, regulatory breaches like GDPR violations, and malware infections. In fact, research cited in the study suggests incidents linked to Shadow IT can cost a company over 4.8 million dollars. Host: Wow, that’s a significant risk. So how did the researchers in this study get to the bottom of this dilemma? Expert: They took a very direct approach. Over a period of more than three years, they conducted in-depth interviews with 44 employees across 34 different companies in various industries. This allowed them to understand not just what companies were doing, but how employees perceived and reacted to those IT policies. Host: And what were the big 'aha' moments from all that research? What did they find? Expert: They discovered a few crucial things. First, there's no one-size-fits-all approach. They identified four distinct patterns, or "archetypes," for how companies manage Shadow IT. These ranged from a media company with very strict security but also highly responsive IT support, which resulted in almost no Shadow IT, to a large automotive supplier with confusing rules and unhelpful IT, where Shadow IT was rampant. Host: So the company's own actions can either encourage or discourage this behavior. What else stood out? Expert: The second major finding was that not all users of Shadow IT are the same. The study categorizes them into two types. First, you have the 'Goal-Oriented Actors', or GOAs. These are tech-savvy employees who understand the risks and use unapproved tools carefully to achieve specific goals. Host: And the second type? Expert: The second type are 'Followers'. These employees often mimic the Goal-Oriented Actors but lack a deep understanding of the technology or the security implications. They pose a much greater risk to the organization. Host: That’s a critical distinction. So this brings us to the most important question for our listeners. Based on these findings, what should a business leader actually do? What are the key takeaways? Expert: The study provides ten clear recommendations, but I'll highlight three that are most impactful. First, and this is fundamental: accept that Shadow IT exists. You can’t completely eliminate it, so the goal should be to manage it effectively, not just ban it. Host: Okay, so acceptance is step one. What's next? Expert: Second, manage those two user types differently. Instead of punishing your tech-savvy 'Goal-Oriented Actors', leaders should harness their expertise. View them as an extension of your IT team. They can help identify useful new tools and pinpoint outdated security policies. For the 'Followers', the focus should be on education and providing them with better, approved tools so they don't have to look elsewhere. Host: That’s a really smart way to turn a problem into an asset. What’s the final takeaway? Expert: The third takeaway is to listen to your users. The study showed that Shadow IT thrives when official IT is slow, bureaucratic, and unresponsive. The researchers recommend creating a dedicated User Experience team, or at least a formal feedback channel, that actively works to solve employee IT challenges. When you meet user needs, you reduce their incentive to go into the shadows. Host: So, to summarize: Shadow IT is a complex issue, but it’s manageable. Leaders need to accept its existence, work with their savvy employees instead of against them, and most importantly, ensure their official IT support is responsive to what people actually need to do their jobs. Host: Alex, this has been incredibly insightful. Thank you for breaking down this complex topic for us. Expert: My pleasure, Anna. It’s a crucial conversation for any modern organization to be having. Host: And thank you to our audience for tuning in to A.I.S. Insights, powered by Living Knowledge. Join us next time as we uncover more valuable insights from the world of business and technology.
Shadow IT, Cybersecurity, IT Governance, User Needs, Risk Management, Organizational Culture, IT Policy
MIS Quarterly Executive (2023)
The Importance of Board Member Actions for Cybersecurity Governance and Risk Management
Jeffrey G. Proudfoot, W. Alec Cram, Stuart Madnick, Michael Coden
This study investigates the challenges boards of directors face in providing effective cybersecurity oversight. Drawing on in-depth interviews with 35 board members and cybersecurity experts, the paper identifies four core challenges and proposes ten specific actions boards can take to improve their governance and risk management capabilities.
Problem
Corporate boards are increasingly held responsible for cybersecurity governance, yet they are often ill-equipped to handle this complex and rapidly evolving area. This gap between responsibility and expertise creates significant risk for organizations, as boards may struggle to ask the right questions, properly assess risk, and provide meaningful oversight.
Outcome
- The study identified four primary challenges for boards: 1) inconsistent attitudes and governance approaches, 2) ineffective interaction dynamics with executives like the CISO, 3) a lack of sufficient cybersecurity expertise, and 4) navigating expanding and complex regulations. - Boards must acknowledge that cybersecurity is an enterprise-wide operational risk, not just an IT issue, and gauge their organization's cybersecurity maturity against industry peers. - Board members should focus on the business implications of cyber threats rather than technical details and must demand clear, jargon-free communication from executives. - To address expertise gaps, boards should determine their need for expert advisors and actively seek training, such as tabletop cyberattack simulations. - Boards must understand that regulatory compliance does not guarantee sufficient security and should guide the organization to balance compliance with proactive risk mitigation.
Host: Welcome to A.I.S. Insights — powered by Living Knowledge. I’m your host, Anna Ivy Summers, and with me today is our expert analyst, Alex Ian Sutherland. Host: Alex, today we’re diving into a crucial topic for every modern business: cybersecurity at the board level. We're looking at a study titled "The Importance of Board Member Actions for Cybersecurity Governance and Risk Management." Host: In a nutshell, this study explores the huge challenges boards of directors face with cyber oversight and gives them a clear, actionable roadmap to improve. Expert: Exactly, Anna. It’s a critical conversation because the stakes have never been higher. Host: Let’s start there. What is the big, real-world problem this study addresses? Why is board-level cybersecurity such a hot-button issue right now? Expert: The core problem is a massive gap between responsibility and capability. Boards are legally and financially responsible for overseeing cybersecurity, but many directors are simply not equipped for the task. They don't come from tech backgrounds. Expert: The study found this creates significant risk. One board member was quoted saying, "Every board knows that cyber is a threat... How they manage it is still the wild west." Host: The wild west. That’s a powerful image. It suggests a lack of clear rules or understanding. Expert: It's true. Boards often don't know the right questions to ask, how to interpret the technical reports they're given, or how to provide meaningful guidance. This leaves their organizations incredibly vulnerable. Host: So how did the researchers get this inside look at the boardroom? What was their approach? Expert: They went straight to the source. The research is based on in-depth interviews with 35 people on the front lines—current board members, CISOs, CEOs, and other senior executives from a wide range of industries, including finance, healthcare, and technology. Host: So they captured real-world experience, not just theory. What were some of the key challenges they uncovered? Expert: The study pinpointed four primary challenges, but two really stood out. First, inconsistent attitudes and governance approaches. And second, ineffective interaction dynamics between the board and the company's security executives. Host: Let's unpack that. What does an 'inconsistent attitude' look like in practice? Expert: It can be complacency. Some boards see a dashboard report that’s mostly ‘green’ and assume everything is fine, creating a false sense of security. Others might think that because they haven't been hit by a major attack yet, they won't be. It's a dangerous mindset. Host: And what about the 'ineffective interaction' with executives like the Chief Information Security Officer, or CISO? Expert: This is crucial. The study highlights a major communication breakdown. You can have a brilliant CISO who can’t explain risk in simple business terms. They get lost in technical jargon, and the board tunes out. One board member said when that happens, "you get the blank stares and no follow-up questions." Host: That communication gap sounds like the biggest risk of all. So this brings us to the most important question, Alex. Why does this matter for business, and what are the key takeaways for leaders listening right now? Expert: The study provides ten clear actions, which we can group into a few key takeaways. First is a mindset shift. The board must acknowledge that cybersecurity is an enterprise-wide operational risk, not just an IT problem. It belongs in the same category as financial or legal risk. Host: It’s a core business function. What’s next? Expert: Better communication. Boards must demand clarity. They should tell their security leaders, "Don't get into the technical weeds, focus on the business implications." It's not the board's job to pick the technology, but it is their job to understand the strategic risk. Host: So, focus on the 'what' and 'why,' not the 'how'. What about the expertise gap you mentioned earlier? How do boards solve that? Expert: They need a plan to bridge that gap. This doesn't mean every director needs to become a coder. It means deciding if they need to bring in an expert advisor or add a director with a cyber background. And crucially, it means training. Host: What kind of training is most effective? Expert: The study strongly recommends tabletop cyberattack simulations. These are essentially practice drills where the board and executive team walk through a realistic cyber crisis scenario. Host: Like a fire drill for a data breach. Expert: Precisely. It makes the threat real and reveals the weak points in your response plan before you’re in an actual crisis. It moves the plan from paper to practice. Host: And what’s the final key takeaway for our audience? Expert: It’s simple: compliance is not security. Checking off boxes for regulators does not guarantee your organization is protected. Boards must push management to go beyond the minimum requirements and focus on proactive, genuine risk mitigation. Host: That’s a fantastic summary, Alex. So, to recap for our listeners: Boards must own cybersecurity as a core business risk, demand clear, business-focused communication, proactively address their own expertise gaps through training and simulations, and remember that just being compliant isn't enough. Host: Alex Ian Sutherland, thank you so much for breaking down this vital research for us. Expert: My pleasure, Anna. Host: And a big thank you to our audience for tuning in. This has been A.I.S. Insights — powered by Living Knowledge.
Successfully Organizing AI Innovation Through Collaboration with Startups
Jana Oehmichen, Alexander Schult, John Qi Dong
This study examines how established firms can successfully partner with Artificial Intelligence (AI) startups to foster innovation. Based on an in-depth analysis of six real-world AI implementation projects across two startups, the research identifies five key challenges and provides corresponding recommendations for navigating these collaborations effectively.
Problem
Established companies often lack the specialized expertise needed to leverage AI technologies, leading them to partner with startups. However, these collaborations introduce unique difficulties, such as assessing a startup's true capabilities, identifying high-impact AI applications, aligning commercial interests, and managing organizational change, which can derail innovation efforts.
Outcome
- Challenge 1: Finding the right AI startup. Firms should overcome the inscrutability of AI startups by assessing credible quality signals, such as investor backing, academic achievements of staff, and success in prior contests, rather than relying solely on product demos. - Challenge 2: Identifying the right AI use case. Instead of focusing on data availability, companies should collaborate with startups in workshops to identify use cases with the highest potential for value creation and business impact. - Challenge 3: Agreeing on commercial terms. To align incentives and reduce information asymmetry, contracts should include performance-based or usage-based compensation, linking the startup's payment to the value generated by the AI solution. - Challenge 4: Considering the impact on people. Firms must manage user acceptance by carefully selecting the degree of AI autonomy, involving employees in the design process, and clarifying the startup's role to mitigate fears of job displacement. - Challenge 5: Overcoming implementation roadblocks. Depending on the company's organizational maturity, it should either facilitate deep collaboration between the startup and all internal stakeholders or use the startup to build new systems that bypass internal roadblocks entirely.
Host: Welcome to A.I.S. Insights — powered by Living Knowledge. I’m your host, Anna Ivy Summers. Host: Today, we're diving into a study that’s crucial for any company looking to innovate: "Successfully Organizing AI Innovation Through Collaboration with Startups". Host: It examines how established firms can successfully partner with Artificial Intelligence startups, identifying key challenges and offering a roadmap for success. Host: With me is our expert analyst, Alex Ian Sutherland. Alex, welcome. Expert: Thanks for having me, Anna. Host: Alex, let's start with the big picture. Why is this a topic business leaders need to pay attention to right now? Expert: Well, most established companies know they need to leverage AI to stay competitive, but they often lack the highly specialized internal talent. So, they turn to agile, expert AI startups for help. Host: That sounds like a straightforward solution. But the study suggests it’s not that simple. Expert: Exactly. These collaborations are fraught with unique difficulties. How do you assess if a startup's flashy demo is backed by real capability? How do you pick a project that will actually create value and not just be an interesting experiment? These partnerships can easily derail if not managed correctly. Host: So how did the researchers get to the bottom of this? What was their approach? Expert: They took a very hands-on approach. The research team conducted an in-depth analysis of six real-world AI implementation projects. These projects involved two different AI startups working with large companies in sectors like telecommunications, insurance, and logistics. Expert: This allowed them to see the challenges and successes from both the startup's and the established company's perspective, right as they happened. Host: Let's get into those findings. The study outlines five major challenges. What’s the first hurdle companies face? Expert: The first is simply finding the right AI startup. The market is noisy, and AI has become a buzzword. The study found that you can't rely on product demos alone. Host: So what's the recommendation? Expert: Look for credible, external quality signals. Has the startup won competitive grants or contests? Is it backed by specialized, knowledgeable investors? What are the academic or prior career achievements of its key people? These are signals that other experts have already vetted their capabilities. Host: That’s great advice. It’s like checking references for the entire company. Once you've found a partner, what’s Challenge Number Two? Expert: Identifying the right AI use case. Many companies make the mistake of asking, "We have all this data, what can AI do with it?" This often leads to projects with low business impact. Host: So what's the better question to ask? Expert: The better question is, "What are our biggest business challenges, and how can AI help solve them?" The study recommends collaborative workshops where the startup can bring its outside-in perspective to help identify use cases with the highest potential for real value creation. Host: Focus on the problem, not just the data. That makes perfect sense. What about Challenge Three: getting the contract right? Expert: This is a big one. Because AI can be a "black box," it's hard for the client to know how much effort is required. This creates an information imbalance. The key is to align incentives. Expert: The study strongly recommends moving away from traditional flat fees and towards performance-based or usage-based compensation. For example, an insurance company in the study paid the startup based on the long-term financial impact of the AI model, like increased profit margins. This ensures both parties are working toward the same goal. Host: A true partnership model. Now, the last two challenges seem to focus on the human side of things: people and process. Expert: Yes, and they're often the toughest. Challenge Four is managing the impact on your employees. AI can spark fears of job displacement, leading to resistance. Expert: The recommendation here is to manage the degree of AI autonomy carefully. For instance, a telecom company in the study introduced an AI tool that initially just *suggested* answers to call center agents rather than handling chats on its own. It made the agents more efficient—doubling productivity—without making them feel replaced. Host: That builds trust and acceptance. And the final challenge? Expert: Overcoming internal implementation roadblocks. Getting an AI solution integrated requires buy-in from IT, data security, legal, and business units, all of whom have their own priorities. Expert: The study found two paths. If your organization has the maturity, you build a cross-functional team to collaborate deeply with the startup. But if your internal processes are too rigid, the more effective path can be to have the startup build a new, standalone system that bypasses those internal roadblocks entirely. Host: Alex, this is incredibly insightful. To wrap up, what is the single most important takeaway for a business leader listening to our conversation today? Expert: The key takeaway is that you cannot treat an AI startup collaboration as a simple vendor procurement. It is a deep, strategic partnership. Success requires a new mindset. Expert: You have to vet your partner strategically, focus relentlessly on business value, align financial incentives to create a win-win, and most importantly, proactively manage the human and organizational change. It’s as much about culture as it is about code. Host: From procurement to partnership. A powerful summary. Alex Ian Sutherland, thank you so much for breaking this down for us. Expert: My pleasure, Anna. Host: And thank you to our audience for tuning in to A.I.S. Insights — powered by Living Knowledge. Join us next time as we continue to explore the ideas shaping business and technology.
Artificial Intelligence, AI Innovation, Corporate-startup collaboration, Open Innovation, Digital Transformation, AI Startups
MIS Quarterly Executive (2023)
Managing Where Employees Work in a Post-Pandemic World
Molly Wasko, Alissa Dickey
This study examines how a large manufacturing company navigated the challenges of remote and hybrid work following the COVID-19 pandemic. Through an 18-month case study, the research explores the impacts on different employee groups (virtual, hybrid, and on-site) and provides recommendations for managing a blended workforce. The goal is to help organizations, particularly those with significant physical operations, balance new employee expectations with business needs.
Problem
The widespread shift to remote work during the pandemic created a major challenge for businesses deciding on their long-term workplace strategy. Companies are grappling with whether to mandate a full return to the office, go fully remote, or adopt a hybrid model. This problem is especially complex for industries like manufacturing that rely on physical operations and cannot fully digitize their entire workforce.
Outcome
- Employees successfully adapted information and communication technology (ICT) to perform many tasks remotely, effectively separating their work from a physical location. - Contrary to expectations, on-site workers who remained at the physical workplace throughout the pandemic reported feeling the most isolated, least valued, and dissatisfied. - Despite demonstrated high productivity and employee desire for flexibility, business leaders still strongly prefer having employees co-located in the office, believing it is crucial for building and maintaining the company's core values. - A 'Digital-Physical Intensity' framework was developed to help organizations classify jobs and make objective decisions about which roles are best suited for on-site, hybrid, or virtual work.
Host: Welcome to A.I.S. Insights, the podcast where we connect academic research to real-world business strategy. I’m your host, Anna Ivy Summers. Host: Today, we’re diving into a challenge every leader is facing: where should our employees work? We’re looking at a fascinating study from MIS Quarterly Executive titled, "Managing Where Employees Work in a Post-Pandemic World". Host: It’s an 18-month case study of a large manufacturing company, exploring the impacts of virtual, hybrid, and on-site work to help businesses balance new employee expectations with their operational needs. Host: To help us unpack this, we have our expert analyst, Alex Ian Sutherland. Alex, welcome back to the show. Expert: Great to be here, Anna. Host: Alex, let's start with the big picture. The study highlights a problem that I know keeps executives up at night. What’s the core tension they identified? Expert: The core tension is a fundamental disconnect. On one hand, employees have experienced the flexibility of remote work and productivity has remained high. They don't want to give that up. Expert: On the other hand, many business leaders are pushing for a full return to the office. They believe that having everyone physically together is essential for building and maintaining the company's culture and values. Expert: This is especially complicated for industries like manufacturing that the study focused on, because you have some roles that can be done from anywhere and others that absolutely require someone to be on a factory floor. Host: So how did the researchers get inside this problem to really understand it? Expert: They did a deep dive into a 100-year-old company they call "IMC," a global manufacturer of heavy-duty vehicles. Over 18 months, they surveyed and spoke with employees from every part of the business—from HR and accounting who went fully virtual, to engineers on a hybrid schedule, to the production staff who never left the facility. Expert: This gave them a 360-degree view of how technology was adopted and how each group experienced the shift. Host: That sounds incredibly thorough. Let's get to the findings. What was the most surprising thing they discovered? Expert: By far the most surprising finding was who felt the most disconnected. The company’s leadership was worried about the virtual workers feeling isolated at home. Expert: But the study found the exact opposite. It was the on-site workers—the ones who came in every day—who reported feeling the most isolated, the least valued, and the most dissatisfied. Host: Wow. That is completely counter-intuitive. Why was that? Expert: Think about their experience. They were coming into a workplace with constant, visible reminders of the risks—masks, safety protocols, social distancing. Their normal face-to-face interactions were severely limited. Expert: They would see empty offices and parking lots, a daily reminder that their colleagues in virtual roles had a flexibility and safety they didn't. One worker described it as feeling like they were "hit by a bulldozer mentally." They felt left behind. Host: That’s a powerful insight. And while this was happening, what did the study find about leadership's perspective? Expert: Despite seeing that productivity and customer satisfaction remained high, the leadership at IMC still had a strong preference for co-location. They felt that the company’s powerful culture was, in their words, "inextricably linked" to having people together in person. This created that disconnect we talked about. Host: This brings us to the most important question for our listeners: what do we do about it? How can businesses navigate this without alienating one group or another? Expert: This is the study's key contribution. They developed a practical tool called the 'Digital-Physical Intensity' framework. Expert: Instead of creating policies based on job titles or departments, this framework helps you classify work based on two simple questions: First, how much of the job involves processing digital information? And second, how much of it involves interacting with physical objects or locations? Host: So it's a more objective way to decide which roles are best suited for on-site, hybrid, or virtual work. Expert: Exactly. A role in HR or accounting is high in information intensity but low in physical intensity, making it a great candidate for virtual work. A role on the assembly line is the opposite. Engineering and design roles often fall in the middle, making them perfect for a hybrid model. Expert: Using a framework like this makes decisions transparent and justifiable, which reduces that feeling of unfairness that was so damaging to the on-site workers' morale. Host: So the first takeaway is to use an objective framework. What’s the second big takeaway for leaders? Expert: The second is to actively challenge the assumption that culture only happens in the office. This study suggests the bigger risk isn't losing culture with remote workers, it's demoralizing the essential employees who have to be on-site. Expert: Leaders need to find new ways to support them. That could mean repurposing empty office space to improve their facilities, offering more scheduling flexibility, or re-evaluating compensation to acknowledge the extra costs and risks they take on. Host: This has been incredibly enlightening, Alex. So, to summarize for our audience: Host: First, the feelings of inequity between employee groups are a huge risk, and contrary to popular belief, it's often your on-site teams who feel the most isolated. Host: Second, leaders must challenge their own deeply-held beliefs about the necessity of co-location for building a strong company culture. Host: And finally, using an objective tool like the Digital-Physical Intensity framework can help you create fair, transparent policies that build trust across your entire blended workforce. Host: Alex Ian Sutherland, thank you for making this research so clear and actionable for us. Expert: My pleasure, Anna. Host: And thank you for tuning into A.I.S. Insights — powered by Living Knowledge. Join us next time for more data-driven strategies for your business.
Managing IT Challenges When Scaling Digital Innovations
Sara Schiffer, Martin Mocker, Alexander Teubner
This paper presents a case study on 'freeyou,' the digital innovation spinoff of a major German insurance company. It examines how the company successfully transitioned its online-only car insurance product from an initial 'exploring' phase to a profitable 'scaling' phase. The study highlights the necessary shifts in IT approaches, organizational structure, and data analytics required to manage this transition.
Problem
Many digital innovations fail when they move from the idea validation stage to the scaling stage, where they need to become profitable and handle large volumes of users. This study addresses the common IT-related challenges that cause these failures and provides practical guidance for managers on how to navigate this critical transition successfully.
Outcome
- Prepare for a significant cultural shift: Management must explicitly communicate the change in focus from creative exploration and prototyping to efficient and profitable operations to align the team and manage expectations. - Rearchitect IT systems for scalability: Systems built for speed and flexibility in the exploration phase must be redesigned or replaced with robust, efficient, and reliable platforms capable of handling a large user base. - Adjust team composition and skills: The transition to scaling requires different expertise, shifting from IT generalists who explore new technologies to specialists focused on process automation, data analytics, and stable operations. Companies must be prepared to bring in new talent and restructure teams accordingly.
Host: Welcome to A.I.S. Insights — powered by Living Knowledge. I’m your host, Anna Ivy Summers. Today, we’re diving into a challenge that trips up so many companies: how to take a great digital idea and successfully scale it into a profitable business.
Host: We'll be exploring a study from the MIS Quarterly Executive titled, "Managing IT Challenges When Scaling Digital Innovations." It examines how a digital spinoff from a major insurance company navigated this exact transition, highlighting the crucial shifts in IT, organization, and data analytics that were required.
Host: Here to break it all down for us is our analyst, Alex Ian Sutherland. Alex, welcome.
Expert: Great to be here, Anna.
Host: So, Alex, let's start with the big problem. We hear about startups and innovation hubs all the time, but this study suggests that moving from a cool prototype to a real, large-scale business is where most of them fail. Why is that transition so difficult?
Expert: It’s a huge challenge, and the study points out that the skills, goals, and technology needed in the early 'exploring' phase are often the polar opposite of what's needed in the 'scaling' phase. In the beginning, it's all about speed, creativity, and testing ideas. But to scale, you suddenly need efficiency, reliability, and profitability. The study actually cites research showing that almost 80% of companies fail when trying to turn a validated idea into a real return on investment.
Host: That's a staggering number. So how did the researchers get an inside look at this problem? What was their approach?
Expert: They conducted a deep-dive case study into a company called 'freeyou,' which was spun off from the large German insurer DEVK to create an online-only car insurance product. The researchers spent hours interviewing key employees at both the spinoff and the parent company, giving them a detailed, real-world view of the journey from a creative experiment to a scaled-up, operational business.
Host: Let's get into what they found. What was the first major lesson from freeyou’s journey?
Expert: The first and perhaps most important finding was the need to prepare for a massive cultural shift. The team's mindset had to change completely. In the early days, they were celebrated for building quick prototypes and had what they called the "courage to leave things out." But when it was time to scale, that approach became risky. Profitability became the main goal, not just cool features.
Host: How do you manage a shift like that without demoralizing the creative team that got you there in the first place?
Expert: Communication from leadership is key. The study shows that freeyou’s CEO was very explicit about the change. He acknowledged the team's frustration but explained why the shift was necessary. He even reframed their identity, telling them, "We have become an IT company that sells insurance," to emphasize that their new focus was on building stable, automated, and efficient digital systems.
Host: That makes sense. It’s not just about mindset, I assume. The actual technology has to change as well.
Expert: Exactly. That’s the second key finding: you must rearchitect your IT systems for scalability. Freeyou started with a flexible, no-code, "one-stop-shop" platform that was perfect for rapid prototyping. But it was incredibly inefficient at handling a large volume of customers. As they grew, they had to gradually replace those initial modules with specialized, "best-of-breed" systems for things like claims and document management to ensure the platform was robust and reliable.
Host: And with new systems, I imagine you need new people, or at least new skills.
Expert: You've hit on the third major finding: adjusting team composition. The initial team was full of IT generalists who were great at experimenting. But the scaling phase required deep specialists—experts in process automation, data analytics, and stable operations. The company had to hire new talent and restructure its teams, moving from one big, collaborative group to specialized teams that could focus on refining specific components of the business.
Host: This is all incredibly insightful. For the business leaders and managers listening, what are the practical, take-home lessons here? What should they be doing differently?
Expert: I’d boil it down to three key actions. First, when you pivot from exploring to scaling, make it an official, well-communicated event. Announce the new goals—profitability, efficiency, reliability—so everyone is aligned and understands why their day-to-day work is changing.
Host: Okay, so be transparent about the shift. What’s next?
Expert: Second, plan your technology for this transition. The architecture that lets you build a quick prototype will almost certainly not support a million users. You have to budget the time and money to rearchitect your systems. Don't let the initial momentum prevent you from building a foundation that can actually handle success.
Host: And the final takeaway?
Expert: Be a strategic talent manager. Actively assess the skills you have versus the skills you’ll need for scaling. You will need to hire specialists. This might mean restructuring your teams or even acknowledging that some of your brilliant initial innovators may not be the right fit for the more structured, operational phase that follows.
Host: Fantastic advice. So, to recap: successfully scaling a digital innovation requires leaders to explicitly manage the cultural shift from exploration to efficiency, be prepared to rearchitect IT systems for stability, and proactively evolve the team's skills to meet the new demands of a scaled business.
Host: Alex, thank you so much for translating this study into such clear, actionable insights.
Expert: My pleasure, Anna.
Host: And thanks to all of you for tuning in to A.I.S. Insights, powered by Living Knowledge. We’ll see you next time.
digital innovation, scaling, IT management, organizational change, case study, insurtech, innovation lifecycle
MIS Quarterly Executive (2024)
Identifying and Filling Gaps in Operational Technology Cybersecurity
Abbatemarco Nico, Hans Brechbühl
This study identifies critical gaps in Operational Technology (OT) cybersecurity by drawing on insights from 36 leaders across 14 global corporations. It analyzes the organizational challenges that hinder the successful implementation of OT cybersecurity, going beyond purely technical issues. The research provides practical recommendations for managers to bridge these security gaps effectively.
Problem
As industrial companies embrace 'Industry 4.0', their operational technology (OT) systems, which control physical processes, are becoming increasingly connected to digital networks. This connectivity introduces significant cybersecurity risks that can halt production and cause substantial financial loss, yet many organizations struggle to implement robust security due to organizational, rather than technical, obstacles.
Outcome
- Cybersecurity in OT projects is often treated as an afterthought, bolted on at the end rather than integrated from the start. - Cybersecurity teams typically lack the authority, budget, and top management support needed to enforce security measures in OT environments. - There is a severe shortage of personnel with expertise in both OT and cybersecurity, and a cultural disconnect exists between IT and OT teams. - Priorities are often misaligned, with OT personnel focusing on uptime and productivity, viewing security measures as hindrances. - The tangible benefits of cybersecurity are difficult to recognize and quantify, making it hard to justify investments until a failure occurs.
Host: Welcome to A.I.S. Insights, powered by Living Knowledge. I’m your host, Anna Ivy Summers. Today, we're digging into a critical issue for any company with physical operations. We're looking at a new study from MIS Quarterly Executive titled "Identifying and Filling Gaps in Operational Technology Cybersecurity". In short, it explores the deep organizational challenges that stop businesses from properly securing the technology that runs their factories and industrial sites. Here to break it down for us is our analyst, Alex Ian Sutherland. Alex, welcome. Expert: Great to be here, Anna. Host: Alex, let's start with the basics. We all hear about IT, or Information Technology. What is OT, Operational Technology, and why is it suddenly such a big concern? Expert: Of course. Think of OT as the technology that controls the physical world. It’s the hardware and software running everything from robotic arms on an assembly line to the control systems in a power plant. Historically, these systems were isolated, completely disconnected from the internet. But now, with Industry 4.0, companies are connecting them to their IT networks to get data and improve efficiency. Host: And connecting them opens the door to cyberattacks. Expert: A very big door. The study highlights that this isn't a theoretical risk. It points to a 100-150% surge in cyberattacks against the manufacturing sector in recent years. And an attack on OT isn't about stealing customer data; it’s about shutting down production. The study found a successful breach can cost a company anywhere from 3 to 7 million dollars per incident and halt operations for an average of four days. Host: That’s a massive business disruption. So how did the researchers in this study get to the root of why this is so hard to solve? Expert: They focused on the people and the organization, not just the tech. They conducted a series of in-depth focus groups with 36 senior leaders—people like Chief Information Officers and Chief Information Security Officers—from 14 major global corporations in manufacturing, energy, and logistics. They wanted to understand the human and structural roadblocks. Host: And what did these leaders say? What are the key findings? Expert: They found a consistent set of organizational gaps. The first is that cybersecurity is often treated as an afterthought. One security leader used the phrase "bolted on afterwards," which perfectly captures the problem. They build a new system and then try to wrap security around it at the end. Host: Why does that happen? Is it a technical oversight? Expert: It’s more of a cultural problem, which is the second major finding. There’s a huge disconnect between the IT cybersecurity teams and the OT plant-floor teams. The OT engineers prioritize uptime and productivity above all else. To them, a security update that requires shutting down a machine, even for an hour, is a direct hit to production value. Host: So the two teams have completely different priorities. Expert: Exactly. One director in the study described a situation where his factory team saw the central security staff as people who were just "reading a policy sheet," without understanding "what's really going on" in the plant. This leads to the third finding: cybersecurity teams in these environments often lack real authority, budget, and support from top management to enforce security rules. Host: I can imagine it's difficult to get budget to prevent a problem that hasn't happened yet. Expert: That's the final key finding. The study participants said the tangible benefits of good cybersecurity are almost invisible. It’s a classic case of "you don't know it's working until it fails." This makes it incredibly hard to justify the investment compared to, say, a new machine that will clearly increase output. Host: This is a complex organizational puzzle. So, for the business leaders listening, what are the practical takeaways? Why does this matter for them, and what can they do? Expert: This is the most important part. The study offers three clear recommendations that I'd frame as key business takeaways. First: you have to bridge the cultural divide. This isn't about IT forcing rules on OT. It’s about creating mutual understanding through cross-training, and even creating new roles for people who can speak both languages—technology and operations. The goal should be "Security by Design," baked in from the start. Host: So, build bridges, not walls. What's the second takeaway? Expert: Empower your security leadership. A Chief Information Security Officer, or CISO, needs real authority that extends to the factory floor, with the budget and C-suite backing to make critical decisions. One executive in the study recounted how it took a cyberattack simulation that showed the board how an incident could "bring us to our knees" to finally get the necessary support and funding. Host: It sounds like leadership needs to feel the risk to truly act on it. What’s the final piece of advice? Expert: Find the win-win. Don't frame cybersecurity as just a cost or a blocker. The study found that collaboration can lead to unexpected benefits. For instance, one company installed security monitoring tools, which had the side effect of giving the engineering team incredible new visibility into their own processes, which they then used to optimize the entire factory. Security actually became a business enabler. Host: That’s a powerful shift in perspective. To summarize, then: the growing risk to our industrial systems is fundamentally an organizational problem, not a technical one. The solution involves bridging the cultural gap between operations and security teams, empowering security leaders with real authority, and actively looking for ways that good security can also drive business value. Alex, this has been incredibly insightful. Thank you for joining us. Expert: My pleasure, Anna. Host: And thank you to our listeners for tuning into A.I.S. Insights. Join us next time as we continue to explore the ideas shaping business and technology.
Operational Technology, OT Cybersecurity, Industry 4.0, Cybersecurity Gaps, Risk Management, Industrial Control Systems, Technochange
MIS Quarterly Executive (2023)
Identifying and Addressing Senior Executives' Different Perceptions of the Value of IT Investments
Alastair Tipple, Hameed Chughtai, Jonathan H. Klein
This study explores how Chief Information Officers (CIOs) can uncover and manage differing opinions among senior executives regarding the value of IT investments. Using a case study at a U.K. firm, the researchers applied a method based on Repertory (Rep) Grid analysis and heat maps to make these perception gaps visible and actionable.
Problem
The full benefits of IT investments are often not realized because senior leaders lack a shared understanding of their value and effectiveness. This misalignment can undermine project support and success, yet CIOs typically lack practical tools to objectively identify and resolve these hidden differences in perception within the management team.
Outcome
- Repertory (Rep) Grids combined with heat maps are a practical and effective technique for making executives' differing perceptions of IT value explicit and visible. - The method provides a structured, data-driven foundation for CIOs to have tailored, objective conversations with individual leaders to build consensus. - By creating a common set of criteria for evaluation, the process helps align the senior management team and fosters a shared understanding of IT's strategic contribution. - The visual nature of heat maps helps focus discussions on specific points of disagreement, reducing emotional conflict and accelerating the path to a common ground. - The approach allows CIOs to develop targeted action plans to address specific gaps in understanding, ultimately improving support for and the realization of value from IT investments.
Host: Welcome to A.I.S. Insights, powered by Living Knowledge. I'm your host, Anna Ivy Summers, and with me today is our expert analyst, Alex Ian Sutherland. Expert: Great to be here, Anna. Host: Today we're diving into a fascinating study from MIS Quarterly Executive titled, "Identifying and Addressing Senior Executives' Different Perceptions of the Value of IT Investments." Alex, what's the big picture here? Expert: This study tackles a problem many companies face: how to get the entire leadership team on the same page about the value of IT projects. It presents a practical method for CIOs to uncover, visualize, and manage differing opinions among senior executives to make sure these major investments succeed. Host: So let's talk about that, the big problem. Why is it so important for everyone to be perfectly aligned? Expert: Well, the study points out that the full benefits of IT investments often go unrealized precisely because leaders lack a shared understanding of their value. It’s less about the technology itself and more about the “human factors.” Host: You mean hidden disagreements behind boardroom smiles? Expert: Exactly. An executive might nod in a meeting but secretly believe a project is a waste of money or doesn't align with their department's goals. The CIO in the case study even said, “You might have people reaching consensus in the room, when underlying they’re actually going—I don’t really agree with that.” This silent misalignment undermines project support, but CIOs traditionally lack the tools to see it, let alone fix it. Host: So how did this study propose to make those hidden views visible? What was the approach? Expert: The researchers used a really clever method based on something called Repertory Grid analysis, or Rep Grids. Host: That sounds a bit technical for our audience. Can you simplify it? Expert: Absolutely. Think of it as a highly structured interview. The researchers sat down with each senior executive one-on-one. They asked them to compare various IT projects and, more importantly, to articulate the personal criteria they used to judge them. For example, one executive might value "Ambitious change" while another prioritizes "Low maintenance cost." Host: So it’s about understanding what each leader individually cares about. Expert: Precisely. They create a personal "grid" for each executive. Then, they consolidate all those unique criteria into a single, standard grid. Everyone then uses this shared scorecard to rate the same IT projects. This creates a common language for the entire team to evaluate IT value. Host: Once you have all that data, what were the key findings? How do you turn those ratings into something actionable? Expert: This is the most visual and impactful part. They compared each executive's ratings on that standard grid to the CIO's ratings and turned the differences into a heat map. Host: A heat map? You mean with colors showing hot spots? Expert: Yes. A green square means the executive and the CIO are in agreement. A bright red square, however, shows a major disagreement. You can see, instantly, that the CEO perceives the new cybersecurity project as having low "Tangible benefits," while the CIO thinks the opposite. Host: So you can literally see the perception gaps. That seems powerful. Expert: It’s incredibly powerful. The study found that making these differences visible and data-driven is the key. It removes emotion and politics from the discussion. Instead of a vague disagreement, the CIO can now point to a specific red square on the heat map and have a focused, objective conversation. Host: This is the crucial part for our listeners. Why does this matter for their business? What are the key takeaways? Expert: The biggest takeaway is that this provides a clear roadmap for building consensus. The CIO at the company in the study said the heat maps helped him "know where to focus my energies" and "where not to spend my time." Host: So it makes communication much more efficient and targeted. Expert: Exactly. The CIO can now have tailored conversations. He can go to the Chief Financial Officer and say, "I see we have very different views on how this project impacts our risk profile. Let's talk specifically about that." The conversation is grounded in criteria the CFO themselves helped create, which gives it immediate credibility. Host: And by resolving these specific points of friction, you build genuine alignment for the project? Expert: That's the goal. It fosters a shared understanding of IT's strategic contribution and reduces the kind of damaging, unspoken conflict that can derail projects. It aligns the team to ensure the company actually realizes the value it's paying for. Host: Let's summarize. The success of major IT investments is often threatened by hidden disagreements among senior leaders. Expert: Correct. A lack of shared understanding is a critical risk. Host: This study proposes a method using Repertory Grids to capture individual viewpoints and heat maps to visually pinpoint the exact areas of misalignment. Expert: Yes, it makes the invisible, visible. Host: And by using this data, CIOs can lead targeted, objective discussions to build true consensus, improve support for projects, and ultimately drive better business results. Host: Alex Ian Sutherland, thank you for sharing these insights with us. Expert: It was my pleasure, Anna. Host: And thank you for listening to A.I.S. Insights, powered by Living Knowledge.
IT investment value, senior management perception, Repertory Grid, heat maps, CIO, strategic alignment, social alignment
MIS Quarterly Executive (2023)
How WashTec Explored Digital Business Models
Christian Ritter, Anna Maria Oberländer, Bastian Stahl, Björn Häckel, Carsten Klees, Ralf Koeppe, and Maximilian Röglinger
This case study describes how WashTec, a global leader in the car wash industry, successfully explored and developed new digital business models. The paper outlines the company's structured four-phase exploration approach—Activation, Inspiration, Evaluation, and Monetization—which serves as a blueprint for digital innovation. This process offers a guide for other established, incumbent companies seeking to navigate their own digital transformation.
Problem
Many established companies excel at enhancing their existing business models but struggle to explore and develop entirely new digital ones. This creates a significant challenge for traditional, hardware-centric firms needing to adapt to a digital landscape. The study addresses how an incumbent company can overcome this inertia and systematically innovate to create new value propositions and maintain a competitive edge.
Outcome
- WashTec developed a structured four-phase approach (Activation, Inspiration, Evaluation, Monetization) that enabled the successful exploration of digital business models. - The process resulted in three distinct digital business models: Automated Chemical Supply, a Digital Wash Platform, and In-Car Washing Services. - The study offers five recommendations for other incumbent firms: set clear boundaries for exploration, utilize digital-savvy pioneers while involving the whole organization, anchor the process with strategic symbols, consider value beyond direct revenue, and integrate exploration objectives into the core business.
Host: Welcome to A.I.S. Insights, the podcast powered by Living Knowledge, where we translate complex research into actionable business strategy. I’m your host, Anna Ivy Summers. Host: Today, we’re looking at how established companies can innovate in the digital age. We're diving into a case study titled "How WashTec Explored Digital Business Models." It outlines how a global leader in the car wash industry successfully developed new digital services. Host: To help us unpack this is our analyst, Alex Ian Sutherland. Welcome, Alex. Expert: Thanks for having me, Anna. Host: Alex, let's start with the big picture. WashTec is a leader in a very physical industry—making car wash systems. What was the problem they were trying to solve? Expert: It's a classic challenge many established companies face. They're excellent at improving their existing products—what the study calls 'exploiting' their current model. But they struggle to explore and create entirely new digital business models. Host: So, it's the innovator's dilemma. You're so good at your core business that it's hard to think outside of it. Expert: Exactly. WashTec saw new, digitally native startups entering the market with app-based solutions, threatening to turn their hardware into a commodity. They knew they needed a systematic way to innovate beyond just making better washing machines. Host: How did they go about that? It sounds like a huge undertaking for a traditional, hardware-centric company. Expert: They developed a very structured, four-phase approach. It began with 'Activation,' where senior management created a clear digital vision—a "North Star" for the company to follow. Host: A North Star. I like that. What came next? Expert: The second phase was 'Inspiration.' They held workshops across the company, involving over 50 employees, and even brought in university students to generate a wide range of ideas—110 initial ideas, in fact. Host: And after they had all these ideas? Expert: That led to 'Evaluation.' They built prototypes, or what we'd call minimum viable products, for the most promising concepts to test assumptions about what customers actually wanted. The final phase was 'Monetization,' where they developed solid business cases for the validated ideas. Host: It sounds incredibly thorough. So, after all that, what were the results? What new business models did this process actually create? Expert: It resulted in three distinct digital business models. First, an 'Automated Chemical Supply' service. This is a subscription model that automatically reorders chemicals for car wash operators. It reduced customer churn by an incredible 50%. Host: That’s a powerful result. What else? Expert: Second, they created a 'Digital Wash Platform.' This is a consumer-facing app that connects drivers with car wash locations, allowing them to book and pay digitally. Operators on the platform saw a 10% increase in washes sold. Host: And the third one sounds quite futuristic. Expert: It is. It’s called 'In-Car Washing Services.' It enables drivers to find and pay for a car wash directly from their car's navigation or infotainment system. It's a strategic move, anticipating a future of connected, self-driving cars. Host: Fascinating. So this brings us to the most important question for our listeners: what are the key takeaways? What can other business leaders learn from WashTec's journey? Expert: The study highlights five key recommendations, but I think two are especially critical. First, set clear boundaries. Innovation needs focus. WashTec decided early on to stick to the car wash domain and not get distracted by, say, developing systems for washing trains. Host: That makes sense. Aimless exploration is a recipe for failure. What's the second key takeaway? Expert: Consider value beyond direct revenue. Not every digital initiative has to be a cash cow from day one. The automated chemical supply, for instance, delivered immense value through customer loyalty and operational efficiency, which are just as important as direct sales. Host: That’s a crucial mindset shift. Any other important lessons? Expert: Yes, they made their digital vision tangible by creating a 'digital target picture' that was displayed in offices. This visual symbol, their North Star, kept everyone aligned. They also made sure to involve a mix of digital-savvy pioneers and experts from the core business to ensure new ideas were both innovative and practical. Host: So to summarize, it seems the lesson is that for a traditional company to succeed in digital innovation, it needs a structured process, a clear vision, and a broad definition of value. Expert: That's a perfect summary, Anna. It’s a blueprint that almost any incumbent company can adapt for their own digital transformation journey. Host: Alex, this has been incredibly insightful. Thank you for breaking it down for us. Expert: My pleasure. Host: And thank you to our audience for tuning in to A.I.S. Insights. Join us next time as we continue to connect research with reality.
digital transformation, business model innovation, incumbent firms, case study, WashTec, digital strategy, exploration
MIS Quarterly Executive (2023)
How to Successfully Navigate Crisis-Driven Digital Transformations
Ralf Plattfaut, Vincent Borghoff
This study investigates how digital transformations initiated by a crisis, such as the COVID-19 pandemic, differ from transformations under normal circumstances. Through case studies of three German small and medium-sized organizations (the 'Mittelstand'), the research identifies challenges to established transformation 'logics' and provides recommendations for successfully managing these events.
Problem
While digital transformation is widely studied, there is little understanding of how the process works when driven by an external crisis rather than strategic planning. The COVID-19 pandemic created an urgent, unprecedented need for businesses to digitize their operations, but existing frameworks were ill-suited for this high-pressure, uncertain environment.
Outcome
- The trigger for digital transformation in a crisis is the external shock itself, not the emergence of new technology. - Decision-making shifts from slow, consensus-based strategic planning to rapid, top-down ad-hoc reactions to ensure survival. - Major organizational restructuring is deferred; instead, companies form small, agile steering groups to manage the transformation efforts. - Normal organizational barriers like inertia and resistance to change significantly decrease during the crisis due to the clear and urgent need for action. - After the crisis, companies must actively work to retain the agile practices learned and manage the potential re-emergence of resistance as urgency subsides.
Host: Welcome to A.I.S. Insights — powered by Living Knowledge. I’m your host, Anna Ivy Summers. Host: Today, we're diving into a fascinating study titled "How to Successfully Navigate Crisis-Driven Digital Transformations." Host: It explores how digital overhauls prompted by a crisis, like the recent pandemic, are fundamentally different from those planned in normal times. And here to break it all down for us is our expert analyst, Alex Ian Sutherland. Welcome, Alex. Expert: Great to be here, Anna. Host: Alex, let's start with the big picture. We all know digital transformation is a business buzzword, but this study focuses on a very specific scenario. What's the core problem it addresses? Expert: The problem is that most of our playbooks for digital transformation are designed for peacetime. They assume you have time for strategic planning and consensus-building. Expert: But what happens when a crisis hits, as COVID-19 did, and suddenly your entire business model is at risk? Existing frameworks just weren't built for that kind of high-pressure, high-stakes environment where you have to adapt overnight just to survive. Host: So how did the researchers get inside this chaotic process to understand it? Expert: They conducted in-depth case studies on three small and medium-sized German organizations—a bank, a regional development agency, and a manufacturing firm. This allowed them to see, up close, how these companies navigated the transformation from the very beginning of the crisis. Host: And what did they find? What makes a crisis-driven transformation so different? Expert: The biggest difference is the trigger. In normal times, a new technology appears and a company strategically decides how to use it. In a crisis, the trigger is the external shock itself. Survival becomes the only goal, and technology is just the tool you grab to make that happen. Host: It sounds like a shift from proactive strategy to pure reaction. How does that impact decision-making? Expert: It completely flips it. Long, careful, bottom-up planning is replaced by rapid, top-down, ad-hoc decisions. The study found that instead of forming large project teams, these companies created small, agile steering groups of senior leaders who could make 'good enough' decisions immediately. Host: What about the typical resistance to change we always hear about? Did that get in the way? Expert: That's one of the most interesting findings. Those normal barriers—organizational inertia, employee resistance—they largely disappeared. The study shows that when the threat is existential, the need for change becomes obvious to everyone. The urgency of the situation creates a powerful, shared purpose. Host: So, the crisis forces agility. But what happens when the immediate danger passes? Expert: That’s the catch. The study warns that once the urgency fades, resistance can re-emerge. Employees might feel 'digital oversaturation,' or old cultural habits can creep back in. The challenge then becomes how to hold on to the positive changes. Host: This is where it gets critical for our listeners. Alex, what are the practical takeaways for business leaders who might face the next crisis? Expert: The study offers some clear recommendations. First, in a crisis, suspend normal bottom-up decision-making. Use a small, top-down steering group to ensure speed and clarity. Host: So, command and control is key in the short term. What's next? Expert: Second, don't aim for the perfect solution. Aim for a 'satisfactory' one that can be implemented fast. You can optimize it later. As one manager in the study noted, they initially went for solutions that were simply "available and cost-effective in the short term." Host: That makes sense. Get the lifeboat in the water before you worry about what color to paint it. Expert: Exactly. Third, use the crisis as a catalyst for cultural change. Since the usual barriers are down, it's a unique opportunity to build a more agile, error-tolerant culture. Communicate that initial solutions are experiments, not permanent fixtures. Host: And the final takeaway? Expert: Don't just snap back to the old way of doing things. After the crisis, consciously evaluate the crisis-mode practices you adopted. Keep the agility, keep the speed, and embed them into your new normal. Don't let the lessons learned go to waste. Host: Fantastic insights. So, to recap: a crisis changes all the rules of digital transformation. The key for leaders is to embrace top-down speed, aim for 'good enough' solutions, use the moment to build a more resilient culture, and then be intentional about retaining those new capabilities. Host: Alex Ian Sutherland, thank you so much for shedding light on such a timely topic. Expert: My pleasure, Anna. Host: And thank you to our audience for tuning in to A.I.S. Insights — powered by Living Knowledge. Join us next time as we translate another key piece of research into actionable business intelligence.
Digital Transformation, Crisis Management, Organizational Change, German Mittelstand, SMEs, COVID-19, Business Resilience
MIS Quarterly Executive (2024)
How to Design a Better Cybersecurity Readiness Program
This study explores the common pitfalls of four types of cybersecurity training by interviewing employees at large accounting firms. It identifies four unintended negative consequences of mistraining and overtraining and, in response, proposes the LEAN model, a new framework for designing more effective cybersecurity readiness programs.
Problem
Organizations invest heavily in cybersecurity readiness programs, but these initiatives often fail due to poor design, leading to mistraining and overtraining. This not only makes the training ineffective but can also create adverse effects like employee anxiety and fatigue, paradoxically amplifying an organization's cyber vulnerabilities instead of reducing them.
Outcome
- Conventional cybersecurity training often leads to four adverse effects on employees: threat anxiety, security fatigue, risk passivity, and cyber hesitancy. - These individual effects cause significant organizational problems, including erosion of individual performance, fragmentation of team dynamics, disruption of client experiences, and stagnation of the security culture. - The study proposes the LEAN model to counteract these issues, based on four strategies: Localize, Empower, Activate, and Normalize. - The LEAN model recommends tailoring training to specific roles (Localize), fostering ownership and authority (Empower), promoting coordinated action through collaborative exercises (Activate), and embedding security into daily operations to build a proactive culture (Normalize).
Host: Welcome to A.I.S. Insights, the podcast where we connect Living Knowledge with business innovation. I'm your host, Anna Ivy Summers. Host: Today, we're diving into a fascinating new study called "How to Design a Better Cybersecurity Readiness Program." With me is our analyst, Alex Ian Sutherland. Alex, welcome. Expert: Great to be here, Anna. Host: This study explores the common pitfalls of cybersecurity training, looking at what happens when we mistrain or overtrain employees. More importantly, it proposes a new framework for getting it right. Host: So, Alex, let's start with the big picture. Companies are pouring billions into cybersecurity training. What's the problem this study identified? Expert: The problem is that much of that investment is wasted. The study shows that poorly designed training doesn't just fail to work; it can actually make things worse. Host: Worse? How so? Expert: Instead of reducing risk, it can create what the study calls adverse effects, like extreme anxiety about security, or a kind of burnout called security fatigue. Paradoxically, this can amplify an organization's vulnerabilities. Host: So our attempts to build a human firewall are actually creating cracks in it. How did the researchers uncover this? What was their approach? Expert: They went straight to the source. They conducted in-depth interviews with 23 employees at the four major U.S. accounting firms—organizations that are on the front lines of handling sensitive client data. Host: And what were the key findings from those interviews? What are these negative side effects you mentioned? Expert: The study identified four main consequences. The first is Threat Anxiety, where employees become so hyper-aware and fearful of making a mistake that their productivity drops. They second-guess every email they open. Host: I can imagine that. What's next? Expert: Second is Security Fatigue. This is cognitive burnout from constant alerts, repetitive training, and complex rules. Employees get overwhelmed and simply tune out, which is incredibly dangerous. Host: It sounds like alarm fatigue for the inbox. Expert: Exactly. The third is Risk Passivity, which is a paradoxical outcome. Some employees become so desensitized by constant warnings they start ignoring real threats. Others become paralyzed by the perceived risk of every action. Host: And the last one? Expert: The fourth is Cyber Hesitancy. This is a reluctance to use new tools or even collaborate with colleagues for fear of blame. It creates a culture of suspicion, not security. The study found this fragments team dynamics and stalls innovation. Host: These sound like serious cultural issues, not just IT problems. This brings us to the most important question for our listeners: Why does this matter for business, and what's the solution? Expert: It matters because the old approach is broken. The study proposes a new framework to fix it, called the LEAN model. It's an acronym for four key strategies. Host: Okay, break it down for us. What does LEAN stand for? Expert: The 'L' is for Localize. It means stop the one-size-fits-all training. Tailor the content to an employee's specific role. What an accountant needs to know is different from someone in marketing. Host: That makes sense. What about 'E'? Expert: 'E' is for Empower. This is about fostering ownership. Instead of just pushing rules, involve employees in creating and improving security protocols. This gives them a real stake in the outcome. Host: From passive recipient to active participant. I like it. What's 'A'? Expert: 'A' is for Activate. This means moving beyond solo quizzes to collaborative, team-based exercises. Let teams practice responding to a simulated threat together, fostering coordinated action and mastery. Host: And finally, 'N'? Expert: 'N' is for Normalize. This is the goal: embed security so deeply into daily operations that it becomes a natural part of the workflow, not a separate, dreaded task. It reframes security as a business enabler, not a barrier. Host: So, to summarize, it seems the core message is that our cybersecurity training is often counterproductive, creating negative effects like fatigue and anxiety. Host: The solution is a more human-focused, LEAN approach: Localize the training, Empower employees to take ownership, Activate teamwork through practice, and Normalize security into the company culture. Host: Alex, thank you for breaking that down for us. It’s a powerful new way to think about security. Expert: My pleasure, Anna. Host: And thank you to our listeners for tuning into A.I.S. Insights — powered by Living Knowledge. Join us next time as we explore the latest research impacting your business.
This paper presents an in-depth case study on how the global technology company Siemens successfully moved artificial intelligence (AI) projects from pilot stages to full-scale, value-generating applications. The study analyzes Siemens' journey through three evolutionary stages, focusing on the concept of 'AI democratization', which involves integrating the unique skills of domain experts, data scientists, and IT professionals. The findings provide a framework for how other organizations can build the necessary capabilities to adopt and scale AI technologies effectively.
Problem
Many companies invest in artificial intelligence but struggle to progress beyond small-scale prototypes and pilot projects. This failure to scale prevents them from realizing the full business value of AI. The core problem is the difficulty in making modern AI technologies broadly accessible to employees, which is necessary to identify, develop, and implement valuable applications across the organization.
Outcome
- Siemens successfully scaled AI by evolving through three stages: 1) Tactical AI pilots, 2) Strategic AI enablement, and 3) AI democratization for business transformation. - Democratizing AI, defined as the collaborative integration of domain experts, data scientists, and IT professionals, is crucial for overcoming key adoption challenges such as defining AI tasks, managing data, accepting probabilistic outcomes, and addressing 'black-box' fears. - Key initiatives that enabled this transformation included establishing a central AI Lab to foster co-creation, an AI Academy for upskilling employees, and developing a global AI platform to support scaling. - This approach allowed Siemens to transform manufacturing processes with predictive quality control and create innovative healthcare products like the AI-Rad Companion. - The study concludes that democratizing AI creates value by rooting AI exploration in deep domain knowledge and reduces costs by creating scalable infrastructures and processes.
Host: Welcome to A.I.S. Insights, the podcast powered by Living Knowledge where we break down complex research into actionable business strategy. I’m your host, Anna Ivy Summers. Host: Today, we’re diving into a fascinating study titled "How Siemens Democratized Artificial Intelligence." It’s an in-depth look at how a global giant like Siemens successfully moved AI projects from small pilots to full-scale, value-generating applications. Host: With me is our analyst, Alex Ian Sutherland. Alex, great to have you. Expert: Great to be here, Anna. Host: So, let's start with the big picture. We hear a lot about companies investing in AI, but the study suggests many are hitting a wall. What's the core problem they're facing? Expert: That's right. The problem is often called 'pilot purgatory'. Companies get excited, they run a few small-scale AI prototypes, and they work. But then, they get stuck. They fail to scale these projects across the organization, which means they never see the real business value. Host: Why is scaling so hard? What’s the roadblock? Expert: The study identifies a few key challenges. First, defining the right tasks for AI. This requires deep business knowledge. Second, dealing with data—you need massive amounts for training, and it has to be the *right* data. Expert: And perhaps the biggest hurdles are cultural. AI systems give probabilistic answers—'maybe' or 'likely'—not the black-and-white answers traditional software provides. That requires a shift in mindset. Plus, there’s the 'black-box' fear: if you don’t understand how the AI works, how can you trust it? Host: That makes sense. It's as much a people problem as a technology problem. So how did the researchers in this study figure out how Siemens cracked this code? Expert: They conducted an in-depth case study, looking at Siemens' journey over several years. They interviewed key leaders and practitioners across different divisions, from healthcare to manufacturing, to build a comprehensive picture of their transformation. Host: And what did they find? What was the secret sauce for Siemens? Expert: The key finding is that Siemens succeeded by intentionally evolving through three distinct stages. They didn't just jump into the deep end. Host: Can you walk us through those stages? Expert: Of course. Stage one, before 2016, was called "Let a thousand flowers bloom." It was very tactical. Lots of small, isolated AI pilot projects were happening, but they weren't connected to a larger strategy. Expert: Then came stage two, "Strategic AI Enablement." This is when senior leadership got serious, communicating that AI was critical for the company's future. They created an AI Lab to bring business experts and data scientists together to co-create solutions. Host: And the final stage? Expert: The third and current stage is "AI Democratization for Business Transformation." This is the real game-changer. The goal is to make AI accessible and usable for everyone, not just a small group of specialists. Host: The study uses that term a lot—'AI Democratization'. Can you break down what that means in practice? Expert: It’s not about giving everyone coding tools. It’s about creating a collaborative structure that integrates the unique skills of three specific groups: the domain experts—these are your engineers, doctors, or factory managers who know the business problems inside and out. Expert: Then you have the data scientists, who build the models. And finally, the IT professionals, who build the platforms and infrastructure to scale the solutions securely. Democratization is the process of making these three groups work together seamlessly. Host: This sounds great in theory. So, why does this matter for businesses listening right now? What is the practical takeaway? Expert: This is the most crucial part. The study frames the business impact in two ways: driving value and reducing cost. Expert: First, on the value side, democratization roots AI in deep domain knowledge. The study highlights a case at a Siemens factory where they initially just gave data scientists a huge amount of production data and said, "find the golden nugget." It didn't work. Host: Why not? Expert: Because the data scientists didn't have the context. It was only when they teamed up with the process engineers—the domain experts—that they could identify the most valuable problems to solve, like predicting quality control bottlenecks. Value comes from solving real problems, and your business experts are the ones who know those problems best. Host: Okay, so involving business experts drives value. What about the cost side? Expert: Democratization lowers the long-term cost of AI. By creating centralized resources—like an AI Academy to upskill employees and a global AI platform—you create a scalable foundation. Instead of every department reinventing the wheel for each new project, you have shared tools, shared knowledge, and a common infrastructure. This makes deploying new AI applications faster and much more cost-efficient. Host: So it's about building a sustainable, company-wide capability, not just a collection of one-off projects. Expert: Exactly. That's how you escape pilot purgatory and start generating real, transformative value. Host: Fantastic. So, to sum it up for our listeners: the promise of AI isn't just about hiring brilliant data scientists. According to this study, the key to unlocking its real value is 'democratization'. Host: This means moving through stages, from scattered experiments to a strategic, collaborative approach that empowers your business experts, data scientists, and IT teams to work as one. This not only creates more valuable solutions but also builds a scalable, cost-effective foundation for the future. Host: Alex, this has been incredibly insightful. Thank you for breaking it down for us. Expert: My pleasure, Anna. Host: And thanks to all of you for tuning into A.I.S. Insights. Join us next time as we continue to translate research into results.
Artificial Intelligence, AI Democratization, Digital Transformation, Organizational Capability, Case Study, AI Adoption, Siemens
MIS Quarterly Executive (2023)
How Shell Fueled Digital Transformation by Establishing DIY Software Development
Noel Carroll, Mary Maher
This paper presents a case study on how the international energy company Shell successfully implemented a large-scale digital transformation. It details their 'Do It Yourself' (DIY) program, which empowers employees to create their own software applications using low-code/no-code platforms. The study analyzes Shell's approach and provides recommendations for other organizations looking to leverage citizen development to drive digital initiatives.
Problem
Many organizations struggle with digital transformation, facing high failure rates and uncertainty. These initiatives often fail to engage the broader workforce, creating a bottleneck within the IT department and a disconnect from immediate business needs. This study addresses how a large, traditional company can overcome these challenges by democratizing technology and empowering its employees to become agents of change.
Outcome
- Shell successfully drove digital transformation by establishing a 'Do It Yourself' (DIY) citizen development program, empowering non-technical employees to build their own applications. - A structured four-phase process (Sensemaking, Stakeholder Participation, Collective Action, Evaluating Progress) was critical for normalizing and scaling the program across the organization. - Implementing a risk-based governance framework, the 'DIY Zoning Model', allowed Shell to balance employee autonomy and innovation with necessary security and compliance controls. - The DIY program delivered significant business value, including millions of dollars in cost savings, improved operational efficiency and safety, and increased employee engagement. - Empowering employees with low-code tools not only solved immediate business problems but also helped attract and retain new talent from the 'digital generation'.
Host: Welcome to A.I.S. Insights, the podcast where we translate complex research into actionable business intelligence. I'm your host, Anna Ivy Summers. Host: Today, we're diving into a fascinating case study about one of the world's largest energy companies. The study is titled, "How Shell Fueled Digital Transformation by Establishing DIY Software Development." Host: It details how Shell successfully empowered its own employees, many with no technical background, to create their own software applications using low-code platforms, completely changing the way they innovate. Host: With me to break it down is our analyst, Alex Ian Sutherland. Alex, welcome. Expert: Great to be here, Anna. Host: So, Alex, let's start with the big picture. Digital transformation is a buzzword we hear constantly, but the study notes that these projects have incredibly high failure rates. What’s the core problem that Shell was trying to solve? Expert: You're right, the failure rate is staggering—the study even quotes a figure of 87.5%. The core problem for many large, traditional companies is a massive bottleneck in the central IT department. Expert: Business teams on the front lines see problems that need fixing today, but their requests for a software solution can get stuck in an IT backlog for months, or even years. This creates a huge disconnect between technology and immediate business needs. Host: So IT becomes a gatekeeper instead of an enabler. Expert: Exactly. And that frustration leads to challenges like poor governance, cultural resistance, and a failure to get the wider workforce engaged in the transformation journey. Shell wanted to break that cycle. Host: How did the researchers get an inside look at how Shell did this? What was their approach? Expert: They conducted an intensive case study. This involved in-depth interviews with 18 key people at Shell, from senior executives who sponsored the program all the way to the frontline engineers and geologists who were actually building the apps. This gave them a 360-degree view of the entire process. Host: So what was the secret sauce? What did the study find was the key to Shell's success? Expert: The secret was a program they aptly named "Do It Yourself," or DIY. They essentially democratized software development by giving employees access to low-code and no-code platforms. These are tools with drag-and-drop interfaces that let people build powerful applications without needing to be a professional coder. Host: That sounds potentially chaotic for a company of over 80,000 employees. How did they manage the risk and ensure it was done effectively? Expert: That's the most critical finding. They didn't just hand out the tools and hope for the best. The study highlights two things: first, a structured four-phase process to roll out the program, focusing on building a culture of change. Expert: And second, a brilliant governance framework called the 'DIY Zoning Model'. Think of it like a traffic light. The 'Green Zone' was for low-risk, simple apps that any employee could build freely. Host: Like automating a personal spreadsheet or a team workflow? Expert: Precisely. Then there was an 'Amber Zone' for more complex apps that handled more sensitive data. For those, the employee had to partner with specialists from the IT department. And finally, a 'Red Zone' for business-critical systems, which remained firmly in the hands of professional developers. Host: That’s a very smart way to balance freedom and control. So, the structure was there, but did it deliver real value? Expert: The results were massive. The study documents millions of dollars in cost savings. For example, one app built by refinery engineers to manage pump repairs reduced downtime and aimed to cut repair time by 50%. Expert: Another app, which helps optimize furnace settings, created a potential value of up to $3 million a year at a single site. It also dramatically improved safety, efficiency, and employee engagement. Host: This is a great story about Shell, but Alex, this is the most important question: what can our listeners, who lead very different businesses, learn from this? Why does it matter for them? Expert: There are three huge takeaways. First, democratize technology. The people closest to a problem are often the best equipped to solve it. Empowering them with the right tools unburdens your IT department and delivers faster, more relevant solutions. Expert: Second, governance can be an enabler, not a blocker. The 'DIY Zoning Model' proves you don't have to choose between speed and safety. A risk-based framework allows innovation to flourish within safe boundaries. Expert: And finally, and most importantly, treat it as a cultural transformation, not a technology project. Shell succeeded because they invested in training, coaching, and building communities. They used events like hackathons to generate excitement. They understood that true transformation is about changing how people think and work together. Host: So it’s about putting the human element at the center of your digital strategy. Expert: That’s the perfect summary. Host: Fantastic insights, Alex. To recap for our listeners: Shell's success shows that empowering your employees through a well-governed citizen development program can unlock incredible value, bust through IT backlogs, and drive real cultural change. Host: Alex Ian Sutherland, thank you so much for breaking that down for us. Expert: My pleasure, Anna. Host: And thank you for tuning in to A.I.S. Insights — powered by Living Knowledge. Join us next time as we uncover more valuable lessons from the world of research.
Digital Transformation, Citizen Development, Low-Code/No-Code, Change Management, Case Study, Shell, Organizational Culture
MIS Quarterly Executive (2024)
How Large Companies Can Help Small and Medium-Sized Enterprise (SME) Suppliers Strengthen Cybersecurity
Jillian K. Kwong, Keri Pearlson
This study investigates the cybersecurity challenges faced by small and medium-sized enterprise (SME) suppliers and proposes actionable strategies for large companies to help them improve. Based on interviews with executives and cybersecurity experts, the paper identifies key barriers SMEs encounter and outlines five practical actions large firms can take to strengthen their supply chain's cyber resilience.
Problem
Large companies increasingly require their smaller suppliers to meet the same stringent cybersecurity standards they do, creating a significant burden for SMEs with limited resources. This gap creates a major security vulnerability, as attackers often target less-secure SMEs as a backdoor to access the networks of larger corporations, posing a substantial third-party risk to entire supply chains.
Outcome
- SME suppliers are often unable to meet the security standards of their large partners due to four key barriers: unfriendly regulations, organizational culture clashes, variability in cybersecurity frameworks, and misalignment of business processes. - Large companies can proactively strengthen their supply chain by providing SMEs with the resources and expertise needed to understand and comply with regulations. - Creating incentives for meeting security benchmarks is more effective than penalizing suppliers for non-compliance. - Large firms should develop programs to help SMEs elevate their cybersecurity culture and align security processes with their own. - Coordinating with other large companies to standardize cybersecurity frameworks and assessment procedures can significantly reduce the compliance burden on SMEs.
Host: Welcome to A.I.S. Insights — powered by Living Knowledge. I’m your host, Anna Ivy Summers. In today's interconnected world, your company’s security is only as strong as its weakest link. And often, that link is a small or medium-sized supplier.
Host: With me today is our analyst, Alex Ian Sutherland, to discuss a recent study titled, "How Large Companies Can Help Small and Medium-Sized Enterprise Suppliers Strengthen Cybersecurity." Alex, welcome.
Expert: Thanks for having me, Anna. This is a critical topic. The study investigates the cybersecurity challenges smaller suppliers face and, more importantly, proposes actionable strategies for large companies to help them improve.
Host: So let's start with the big problem here. Why is the gap in cybersecurity between large companies and their smaller suppliers such a major risk?
Expert: It’s a massive vulnerability. Large companies demand their smaller suppliers meet the same stringent security standards they do. But for an SME with limited staff and budget, that's often an impossible task. Attackers know this. They specifically target less-secure suppliers as a backdoor into the networks of their bigger clients.
Host: Can you give us a real-world example of that?
Expert: Absolutely. The study reminds us of the infamous 2013 data breach at Target. The hackers didn't attack Target directly at first. They got in using credentials stolen from a small, third-party HVAC vendor. That single point of entry ultimately exposed the data of over 100 million customers. It’s a classic case of the supply chain being the path of least resistance.
Host: A sobering reminder. So how did the researchers in this study approach such a complex issue?
Expert: They went straight to the source. The study is based on 27 in-depth interviews with executives, cybersecurity leaders, and supply chain managers from both large corporations and small suppliers. They gathered insights from people on the front lines who deal with these challenges every single day.
Host: And what were the biggest takeaways from those conversations? What did they find are the main barriers for these smaller companies?
Expert: The study identified four key barriers. The first is what they call "unfriendly regulation." Most cybersecurity rules are designed for big companies with legal and compliance departments. SMEs often lack the expertise to even understand them.
Host: So the rules themselves are a hurdle. What’s the second barrier?
Expert: Organizational culture clashes. For an SME, the primary focus is keeping the business running and getting products out the door. Cybersecurity can feel like a costly, time-consuming distraction, so it constantly gets pushed to the back burner.
Host: That makes sense. And the other two barriers?
Expert: Framework variability and process misalignment. Imagine being a small supplier for five different large companies, and each one asks you to comply with a slightly different security framework. One interviewee described it as "trying to navigate a sea of frameworks in a rowboat, without a map or radio." It creates a huge, confusing compliance burden.
Host: That's a powerful image. It really frames this as a partnership problem, not just a technology problem. So this brings us to the most important question for our listeners: what can businesses actually *do* about it?
Expert: This is the core of the study. It moves beyond just identifying problems to proposing five concrete actions large companies can take. First, provide your SME suppliers with the resources and expertise they lack. This could be workshops, access to your legal teams, or clear guidance on how to comply with regulations.
Host: So it's about helping, not just demanding. What’s the next action?
Expert: Create positive incentives. The study found that punishing suppliers for non-compliance is far less effective than rewarding them for meeting security benchmarks. One CTO put it perfectly: suppliers need to be rewarded for their security efforts, not just punished for failure. This changes the dynamic from a chore to a shared goal.
Host: I like that reframing. What else?
Expert: The third and fourth actions are linked. Large firms should develop programs to help SMEs elevate their security culture. And, crucially, they should coordinate with other large companies to standardize security frameworks and assessments. If competitors can agree on one common questionnaire, it saves every SME countless hours of redundant work.
Host: That seems like such a common-sense solution. What's the final recommendation?
Expert: Bring cybersecurity into the procurement process from the very beginning. Too often, security is an afterthought, brought in after a deal is already signed. This leads to delays and friction. By discussing security expectations upfront, you ensure it's a foundational part of the partnership.
Host: So, to summarize, this isn't about forcing smaller suppliers to fend for themselves. It’s about large companies taking proactive steps: providing resources, offering incentives, standardizing requirements, and making security a day-one conversation.
Expert: Exactly. The study’s main message is that strengthening your supply chain's cybersecurity is an act of partnership. When you help your suppliers become more secure, you are directly helping yourself.
Host: A powerful and practical takeaway. Alex, thank you for breaking this down for us.
Expert: My pleasure, Anna.
Host: And thanks to our audience for tuning in to A.I.S. Insights. Join us next time as we continue to explore the intersection of business, technology, and living knowledge.
Cybersecurity, Supply Chain Management, Third-Party Risk, Small and Medium-Sized Enterprises (SMEs), Cyber Resilience, Vendor Risk Management
MIS Quarterly Executive (2023)
How Boards of Directors Govern Artificial Intelligence
Benjamin van Giffen, Helmuth Ludwig
This study investigates how corporate boards of directors oversee and integrate Artificial Intelligence (AI) into their governance practices. Based on in-depth interviews with high-profile board members from diverse industries, the research identifies common challenges and provides examples of effective strategies for board-level AI governance.
Problem
Despite the transformative impact of AI on the business landscape, the majority of corporate boards struggle to understand its implications and their role in governing it. This creates a significant gap, as boards have a fiduciary responsibility to oversee strategy, risk, and investment related to critical technologies, yet AI is often not a mainstream boardroom topic.
Outcome
- Identified four key groups of board-level AI governance issues: Strategy and Firm Competitiveness, Capital Allocation, AI Risks, and Technology Competence. - Boards should ensure AI is integrated into the company's core business strategy by evaluating its impact on the competitive landscape and making it a key topic in annual strategy meetings. - Effective capital allocation involves encouraging AI experimentation, securing investments in foundational AI capabilities, and strategically considering external partnerships and acquisitions. - To manage risks, boards must engage with experts, integrate AI-specific risks into Enterprise Risk Management (ERM) frameworks, and address ethical, reputational, and legal challenges. - Enhancing technology competence requires boards to develop their own AI literacy, review board and committee composition for relevant expertise, and include AI competency in executive succession planning.
Host: Welcome to A.I.S. Insights, powered by Living Knowledge. I’m your host, Anna Ivy Summers. Today, we're diving into a critical topic for every company leader: governance. Specifically, we're looking at a fascinating new study titled "How Boards of Directors Govern Artificial Intelligence."
Host: It investigates how corporate boards oversee and integrate AI into their governance practices, based on interviews with high-profile board members. Here to break it all down for us is our analyst, Alex Ian Sutherland. Alex, welcome.
Expert: Thanks for having me, Anna.
Host: Let's start with the big picture. We hear a lot about AI's potential, but what's the real-world problem this study is trying to solve for boards?
Expert: The problem is a major governance gap. The study points out that while AI is completely reshaping the business landscape, most corporate boards are struggling to understand it. They have a fiduciary duty to oversee strategy, risk, and major investments, but AI often isn't even a mainstream topic in the boardroom.
Host: So, management might be racing ahead with AI, but the board, the ultimate oversight body, is being left behind?
Expert: Exactly. And that's risky. AI requires huge, often uncertain, capital investments. It also introduces entirely new legal, ethical, and reputational risks that many boards are simply not equipped to handle. This gap between the technology's impact and the board's understanding is what the study addresses.
Host: How did the researchers get inside the boardroom to understand this dynamic? What was their approach?
Expert: They went straight to the source. The research is based on a series of in-depth, confidential interviews with sixteen high-profile board members from a huge range of industries—from tech and finance to healthcare and manufacturing. They also spoke with executive search firms to understand what companies are looking for in new directors.
Host: So, based on those conversations, what were the key findings? What are the big themes boards need to be thinking about?
Expert: The study organized the challenges into four key groups. The first is Strategy and Firm Competitiveness. Boards need to ensure AI is actually integrated into the company’s core strategy, not just a flashy side project.
Host: Meaning they should be asking how AI will help the company win in the market?
Expert: Precisely. The second is Capital Allocation. This is about more than just signing checks. It's about encouraging experimentation—what the study calls ‘lighthouse projects’—and making strategic investments in foundational capabilities, like data platforms, that will pay off in the long run.
Host: That makes sense. What's the third group?
Expert: AI Risks. This is a big one. We're not just talking about a system crashing. Boards need to oversee ethical risks, like algorithmic bias, and major reputational and legal risks. The recommendation is to integrate these new AI-specific risks directly into the company’s existing Enterprise Risk Management framework.
Host: And the final one?
Expert: It's called Technology Competence. And this is crucial—it applies to the board itself.
Host: Does that mean every board director needs to become a data scientist?
Expert: Not at all. It’s about developing AI literacy—understanding the business implications. The study found that leading boards are actively reviewing their composition to ensure they have relevant expertise and, importantly, they're including AI competency in CEO and executive succession planning.
Host: That brings us to the most important question, Alex. For the business leaders and board members listening, why does this matter? What is the key takeaway they can apply tomorrow?
Expert: The most powerful and immediate thing a board can do is start asking the right questions. The board's role isn't necessarily to have all the answers, but to guide the conversation and ensure management is thinking through the critical issues.
Host: Can you give us an example of a question a director should be asking?
Expert: Certainly. For strategy, they could ask: "How are our competitors using AI, and how does our approach give us a competitive advantage?" On risk, they might ask: "What is our framework for evaluating the ethical risks of a new AI system before it's deployed?" These questions signal the board's priorities and drive accountability.
Host: So, the first step is simply opening the dialogue.
Expert: Yes. That's the catalyst. The study makes it clear that in many companies, if the board doesn't start the conversation on AI governance, no one will.
Host: A powerful call to action. To summarize: this study shows that boards have a critical and urgent role in governing AI. They need to focus on four key areas: weaving AI into strategy, allocating capital wisely, managing new and complex risks, and building their own technological competence.
Host: And the journey begins with asking the right questions. Alex Ian Sutherland, thank you for these fantastic insights.
Expert: My pleasure, Anna.
Host: And thank you to our audience for tuning into A.I.S. Insights. Join us next time as we continue to explore the ideas shaping business and technology.
AI governance, board of directors, corporate governance, artificial intelligence, strategic management, risk management, technology competence
MIS Quarterly Executive (2023)
Fueling Digital Transformation with Citizen Developers and Low-Code Development
Ainara Novales
Rubén Mancha
This study examines how organizations can leverage low-code development platforms and citizen developers (non-technical employees) to accelerate digital transformation. Through in-depth case studies of two early adopters, Hortilux and Volvo Group, along with interviews from seven other firms, the paper identifies key strategies and challenges. The research provides five actionable recommendations for business leaders to successfully implement low-code initiatives.
Problem
Many organizations struggle to keep pace with digital innovation due to a persistent shortage and high cost of professional software developers. This creates a significant bottleneck in application development, slowing down responsiveness to customer needs and hindering digital transformation goals. The study addresses how to overcome this resource gap by empowering business users to create their own software solutions.
Outcome
- Set a clear strategy for selecting the right use cases for low-code development, starting with simple, low-complexity tasks like process automation. - Identify, assign, and provide training to upskill tech-savvy employees into citizen developers, ensuring they have the support and guidance needed. - Establish a dedicated low-code team or department to provide organization-wide support, training, and governance for citizen development initiatives. - Ensure the low-code architecture is extendable, reusable, and up-to-date to avoid creating complex, siloed applications that are difficult to maintain. - Evaluate the technical requirements and constraints of different solutions to select the low-code platform that best fits the organization's specific needs.
Host: Welcome to A.I.S. Insights — powered by Living Knowledge. I’m your host, Anna Ivy Summers. Host: Today, we're diving into a fascinating study titled, "Fueling Digital Transformation with Citizen Developers and Low-Code Development." Host: In essence, it explores how companies can use so-called 'citizen developers'—that is, non-technical employees—to build software and accelerate innovation using simple, low-code platforms. Host: To help us unpack this, we have our expert analyst, Alex Ian Sutherland. Welcome, Alex. Expert: Great to be here, Anna. Host: Alex, let's start with the big picture. What’s the core business problem this study is trying to solve? Expert: The problem is one that nearly every business leader will recognize: the IT bottleneck. Expert: Companies need to innovate digitally to stay competitive, but there's a huge shortage of professional software developers. They're expensive and in high demand. Host: So this creates a long queue for the IT department, and business projects get delayed. Expert: Exactly. This study highlights that the software development bottleneck slows down everything, from responding to customer needs to achieving major digital transformation goals. Businesses are realizing they can't just rely on their central IT department to build every single application they need. Host: It’s a resource gap. So, how did the researchers investigate this? What was their approach? Expert: They took a very practical, real-world approach. They conducted in-depth case studies on two companies that were early adopters of low-code: Hortilux, a provider of lighting solutions for greenhouses, and the Volvo Group. Expert: They also interviewed executives from seven other firms across different industries to understand the strategies, challenges, and what actually works in practice. Host: So, by looking at these pioneers, what key findings or recommendations emerged? Expert: One of the most critical findings was the need for a clear strategy. The successful companies didn't try to boil the ocean. Host: What does that mean in this context? Expert: It means they started small. They strategically selected simple, low-complexity tasks for their first low-code projects, like automating internal processes. This builds momentum and demonstrates value without high risk. Host: That makes sense. And what about the people side of things? This idea of a 'citizen developer' is central here. Expert: Absolutely. A key recommendation is to actively identify tech-savvy employees within business departments—people in HR, finance, or marketing who are good with technology but aren't coders. Expert: The Volvo Group case is a perfect example. They began by upskilling employees in their HR department. These employees, who understood the HR processes inside and out, were trained to build their own simple applications to automate their work. Host: But you can't just hand them the tools and walk away, I assume. Expert: No, and that's the third major finding. You need to establish a dedicated low-code support team. Volvo created a central team within IT that was exclusively focused on supporting these citizen developers across the entire company. They provide training, set guidelines for security and privacy, and act as a center of excellence. Host: This sounds like a powerful way to democratize development. So, Alex, for the business leaders listening, why does this really matter? What are the key takeaways for them? Expert: I think there are three big takeaways. First, it’s about speed and agility. By empowering business units to build their own solutions for smaller problems, you break that IT bottleneck we talked about. The business can react faster to its own needs. Host: It frees up the professional developers to work on the more complex, mission-critical systems. Expert: Precisely. The second takeaway is about innovation. The people closest to a business problem are often the best equipped to solve it. Low-code gives them the tools to do so. This unlocks a huge potential for ground-up innovation that would otherwise be stuck in an IT request queue. Expert: And finally, it's a powerful tool for talent development. The study showed how employees at Volvo who started as citizen developers in HR created entirely new career paths for themselves, some even becoming professional low-code developers. It’s a way to upskill and retain your best people in an increasingly digital world. Host: Fantastic. So, to summarize: start with a clear, focused strategy on small-scale projects, identify and empower your own employees to become citizen developers, and crucially, back them up with a dedicated support structure. Host: The result isn't just faster application development, but a more innovative and agile organization. Alex, thank you so much for breaking that down for us. Expert: It was my pleasure, Anna. Host: And a big thank you to our listeners for tuning into A.I.S. Insights. Join us next time as we continue to explore more research from the world of Living Knowledge.
low-code development, citizen developers, digital transformation, IT strategy, application development, software development bottleneck, case study
MIS Quarterly Executive (2023)
F. Warren McFarlan's Pioneering Role in Impacting IT Management Through Academic Research
Blake Ives, Mary Lacity, Jeanne Ross
This article chronicles the distinguished career of F. Warren McFarlan, a seminal figure in the field of IT management. Based on interviews with McFarlan and his colleagues, as well as archival material, the paper details his immense contribution to bridging the divide between academic research and practical IT management. It highlights his methods, influential frameworks, and enduring legacy in educating generations of IT practitioners and researchers.
Problem
There is often a significant gap between academic research and the practical needs of business managers. Academics typically focus on theory and description, while business leaders require actionable, prescriptive insights. This paper addresses this challenge by examining the career of F. Warren McFarlan as a case study in how to successfully produce practice-based research that is valuable to both the academic and business communities.
Outcome
- F. Warren McFarlan was a foundational figure who played a pioneering role in establishing IT management as a respected academic and business discipline. - He effectively bridged the gap between academia and industry by developing practical frameworks and using the case study method to teach senior executives how to manage technology strategically. - Through his extensive body of research, including over 300 cases and numerous influential articles, he provided managers with accessible tools to assess IT project risk and align technology with business strategy. - McFarlan was instrumental in championing academic outlets for practice-based research, notably serving as editor-in-chief of MIS Quarterly during a critical period to ensure its survival and relevance. - His legacy includes not only his own research but also his mentorship of junior faculty and his role in building the IT management program at Harvard Business School.
Host: Welcome to A.I.S. Insights, the podcast at the intersection of business and technology, powered by Living Knowledge. I’m your host, Anna Ivy Summers. Host: Today, we're diving into a fascinating study titled "F. Warren McFarlan's Pioneering Role in Impacting IT Management Through Academic Research." Host: It chronicles the career of a key figure who helped bridge the often-vast divide between academic theory and the real-world practice of managing technology in business. With me is our analyst, Alex Ian Sutherland. Alex, welcome. Expert: Great to be here, Anna. Host: So Alex, let’s start with the big picture. This study seems to be about more than just one person's career. It highlights a fundamental challenge in business, doesn't it? Expert: Absolutely. The core problem is a persistent gap between the world of academic research and the day-to-day needs of business managers. Academics often focus on developing theory, while leaders on the ground need actionable, practical advice. Host: They’re speaking different languages, in a way. Expert: Exactly. And this was especially true in the early days of IT in the 1960s. The study points out that when computers started entering the business world, managers had to find experts who didn't really exist yet. So they turned to business schools, but even there, IT management wasn't a respected discipline. It was a completely new frontier. Host: So how did the researchers go about studying McFarlan’s career to understand how he navigated that new frontier? Expert: The approach was biographical and historical. The authors conducted extensive interviews with McFarlan himself, as well as his colleagues and former students. They also dug into the Harvard Business School archives to piece together how he built his methods and his influence over several decades. Host: And what did they find? What were the keys to his success in bridging that gap? Expert: The study points to a few critical things. First, he was truly a pioneer. He helped establish IT management as a legitimate field of study at a time when many of his own colleagues were skeptical. Host: But it was his method that was really revolutionary, right? Expert: Yes, and that's the second key finding. He relied heavily on the case study method. He developed an archive of over 300 cases, which were essentially detailed stories of how real companies were struggling with and succeeding with technology. Host: So he wasn't teaching abstract theory, he was teaching through real-world examples. Expert: Precisely. This led to his third major contribution: creating simple, powerful frameworks that managers could actually use. These frameworks didn't require an engineering degree or knowledge of "bits and bytes." They provided a language for executives to talk about technology strategy. Host: Can you give us an example of one of these frameworks? Expert: One of the most famous was a grid for assessing IT project risk. It looked at three simple criteria: the project size, its structure, and the novelty of the technology. This allowed a CEO, not just the IT manager, to understand the risk profile of their entire tech portfolio and manage it accordingly. Host: That sounds incredibly practical. So, Alex, this is a great historical look at a foundational figure. But for a business leader listening to us right now, why does Warren McFarlan’s approach still matter in the age of AI and cloud computing? Expert: It matters more than ever, Anna. The first big takeaway is the critical need for ‘translators.’ McFarlan’s genius was translating complex technology into the language of business risk, strategy, and value. Every company today needs leaders who can do the same for AI, cybersecurity, or data analytics. Host: So it's about bridging that communication gap within the organization. Expert: Yes. The second takeaway is about strategic alignment. McFarlan created a framework called the "strategic grid" that forced executives to ask if their IT was just a "Factory" or "Support" function, or if it was truly "Strategic." Businesses today must constantly ask that same question. Is your tech a cost center, or is it a source of competitive advantage? Host: A question that is certainly top-of-mind for many boards. What else? Expert: The power of storytelling. McFarlan didn't just present data; he used case studies about real companies—from American Airlines to a then-tiny startup called Alibaba—to teach lessons. For any leader trying to drive change, using concrete examples of what works and what doesn't is far more powerful than just theory. Host: It makes the abstract tangible. Expert: Exactly. And the final, and perhaps most important lesson, is that senior leaders cannot afford to be technologically illiterate. The study quotes McFarlan telling a room of senior executives, "Twenty years ago, you were illiterate in IT and they knew it. Today, you're still illiterate, but you don't know it!" That warning is just as urgent today. You can't delegate the understanding of technology's strategic impact. Host: A powerful and timeless message. So, to sum it up: businesses need leaders who can act as translators, who relentlessly align technology with strategy, and who understand that tech literacy starts at the top. Expert: That's the enduring legacy this study highlights. His methods for making technology understandable and manageable are just as relevant today as they were 50 years ago. Host: Alex, thank you for bringing this research to life and sharing these actionable insights. Expert: My pleasure, Anna. Host: And thanks to all of you for tuning in to A.I.S. Insights, powered by Living Knowledge. Join us next time as we explore the latest research impacting business and technology.
F. Warren McFarlan, IT Management, Practice-Based Research, Academic-Practitioner Gap, Case Study Research, Harvard Business School, Strategic IT
MIS Quarterly Executive (2024)
Experiences and Lessons Learned at a Small and Medium-Sized Enterprise (SME) Following Two Ransomware Attacks
Donald Wynn, Jr., W. David Salisbury, Mark Winemiller
This paper presents a case study of a small U.S. manufacturing company that suffered two distinct ransomware attacks four years apart, despite strengthening its cybersecurity after the first incident. The study analyzes both attacks, the company's response, and the lessons learned from the experiences. The goal is to provide actionable recommendations to help other small and medium-sized enterprises (SMEs) improve their defenses and recovery strategies against evolving cyber threats.
Problem
Small and medium-sized enterprises (SMEs) face unique cybersecurity challenges due to significant resource constraints compared to larger corporations. They often lack the financial capacity, specialized expertise, and trained workforce to implement and maintain adequate technical and procedural controls. This vulnerability is increasingly exploited by cybercriminals, with a high percentage of ransomware attacks specifically targeting these smaller, less-defended businesses.
Outcome
- All businesses are targets: The belief in 'security by obscurity' is a dangerous misconception; any online presence makes a business a potential target for cyberattacks. - Comprehensive backups are essential: Backups must include not only data but also system configurations and software to enable a full and timely recovery. - Management buy-in is critical: Senior leadership must understand the importance of cybersecurity and provide the necessary funding and organizational support for robust defense measures. - People are a key vulnerability: Technical defenses can be bypassed by human error, as demonstrated by the second attack which originated from a phishing email, underscoring the need for continuous employee training. - Cybercrime is an evolving 'arms race': Attackers are becoming increasingly sophisticated, professional, and organized, requiring businesses to continually adapt and strengthen their defenses.
Host: Welcome to A.I.S. Insights — powered by Living Knowledge. I'm your host, Anna Ivy Summers. Today we're diving into a story that serves as a powerful warning for any business operating online. We're looking at a study titled, "Experiences and Lessons Learned at a Small and Medium-Sized Enterprise (SME) Following Two Ransomware Attacks".
Host: With me is our analyst, Alex Ian Sutherland. Alex, this study follows a small U.S. manufacturing company that was hit by ransomware not once, but twice, despite strengthening its security after the first incident. It’s a real-world look at how businesses can defend and recover from these evolving threats.
Expert: It is, Anna. And it's a critical topic.
Host: So, let's start with the big problem. We often hear about massive corporations getting hacked. Why does this study focus on smaller businesses?
Expert: Because they are the primary target. SMEs face unique challenges due to resource constraints. They often lack the financial capacity or specialized staff to build robust cyber defenses. The study points out that a huge percentage of ransomware attacks—over 80% in some reports—are aimed specifically at these smaller, less-defended companies. Cybercriminals see them as easy targets.
Host: To explore this, what approach did the researchers take?
Expert: They conducted an in-depth case study of one company. By focusing on this single manufacturing firm, they could analyze the two attacks in detail—one in 2017 and a second, more advanced attack in 2021. They documented the company's response, the financial and operational impact, and the critical lessons learned from both experiences.
Host: Getting hit twice provides a unique perspective. What was the first major finding from this?
Expert: The first and most fundamental finding was that all businesses are targets. Before the 2017 attack, the company’s management believed in 'security by obscurity'—they thought they were too small and not in a high-value industry like finance to be of interest. That was a costly mistake.
Host: A wake-up call, for sure. After that first attack, they tried to recover. What did they learn from that process?
Expert: They learned that comprehensive backups are absolutely essential. They had backups of their data, but not their system configurations or software. This meant recovery was a slow, painful process of rebuilding servers from scratch, leading to almost two weeks of downtime for critical systems.
Host: That kind of downtime could kill a small business. You mentioned management's mindset was a problem initially. Did that change?
Expert: It changed overnight. The third finding is that management buy-in is critical. The IT director had struggled to get funding for security before the attack. Afterwards, the threat became real. He was promoted to Vice President, and the study quotes him saying, “Finding cybersecurity dollars was no longer difficult.”
Host: So with new funding and better technology, they were prepared. But they still got hit a second time. How did that happen?
Expert: This highlights the fourth key finding: people are a key vulnerability. The second, more sophisticated attack in 2021 didn't break through a firewall; it walked in the front door through a phishing email that a single employee clicked. It proved that technology alone isn't enough.
Host: It's a classic problem. And what did that second attack reveal about the attackers themselves?
Expert: It showed that cybercrime is an evolving 'arms race'. The first attack was relatively crude. The second was from a highly professional ransomware group called REvil, which operates like a criminal franchise. They used a 'double extortion' tactic—not just encrypting the company's data, but also stealing it and threatening to release sensitive HR files publicly.
Host: That's terrifying. So, Alex, this is the most important question for our listeners. What are the practical takeaways? Why does this matter for their business?
Expert: There are four key actions every business leader should take. First, accept that you are a target, no matter your size or industry. Budget for cybersecurity proactively, don't wait for a disaster.
Expert: Second, ensure your backups are truly comprehensive and test your disaster recovery plan. You need to be able to restore entire systems, not just data, and you need to know that it actually works.
Expert: Third, invest in your people. Continuous security awareness training is not optional; it’s one of your most effective defenses against threats like phishing that target human error.
Expert: And finally, build relationships with external experts *before* you need them. For the second attack, the company had an incident response firm on retainer. Having experts to call immediately made a massive difference. You don’t want to be looking for help in the middle of a crisis.
Host: Powerful advice. To summarize: assume you're a target, build and test a full recovery plan, train your team relentlessly, and have experts on speed dial. This isn't just a technology problem; it's a business continuity problem.
Host: Alex Ian Sutherland, thank you for sharing these critical insights with us.
Expert: My pleasure, Anna.
Host: And thank you for tuning into A.I.S. Insights, powered by Living Knowledge. Join us next time as we translate academic research into actionable business strategy.
ransomware, cybersecurity, SME, case study, incident response, cyber attack, information security