- Shopping Bag ( 0 items )
The Valuation of Information Technology Information technology hasmany well-known success stories, such as America Online, @Home, andWindows(r) 95. However, there have also been far too many failures.The reason for this is that the effect of information technology ona company's shareholder value has been unpredictable. Lacking amethod to analyze the value of an IT system, managers are forced tomake decisions based on fragmented data and guesswork, which oftenprove to be faulty. Now, it is possible for you to avoid the samemistakes with your information system choices. The Valuation ofInformation Technology demonstrates how to assess the shareholdervalue created by a system before it is built. Top managementconsultant Christopher Gardner provides a unique framework foranalyzing the value of an IT system in a quantitative fashion. Thissolution-oriented book walks you through every aspect of evaluatingan IT system for your business, from concept to shareholder value.Gardner lays out a method that will allow you to not only determinethe contribution of a system to shareholder value, but also guidethe activities involved in its construction so they create value.Integrating techniques from market research, computer science, andcorporate finance, Gardner shows how you can maximize your chancesfor success in applying information technology. The book is repletewith real-world examples from such companies as AT&T, @Home,and Time Warner. These field-tested solutions will help you tacklevarious practical problems, improve your corporate decision-making,and make more productive use of capital and labor by avoidinginvestment mistakes. Written from the shareholder valueperspective, The Valuation of Information Technology:
* Explains step by step how to estimate the shareholder valuecreated by an IT system
* Describes how the analytical methods provided are applied inpractice to get answers, with Internet examples
* Emphasizes ease-of-use with direct language and liberal use oftables and figures
* Shows how any type of IT system can be evaluated using thetechniques discussed
Clear and accessible, The Valuation of Information Technology isboth a management and analytical tool for developing a successfulinformation system.
Note: The Figures and/or Tables mentioned in this chapter do not appear on the web.
But come, you suitors, since here is a prize set out before you; for I shall
bring you the great bow of godlike Odysseus. And the one who takes the
bow in his hand, strings it with the greatest ease, and sends an arrow
clean through all the twelve axes, shall be the one I go away with . . .
--Penelope promising marriage to the best archer
The Odyssey of Homer XXI, 73-77
(translated by R. Lattimore)
We begin by describing the overarching framework for analyzing the economics of information technology systems, around which this book is structured. The starting point is to develop a clear understanding of the objective used to distinguish attractive systems from those that are not.
The objective of information technology systems development in business is to increase the wealth of shareholders by adding to the growth premium of their stock. Ideally, the increase achieved should be the maximum obtainable. Maximizing shareholder wealth consists of maximizing the value of the cash flow stream generated by operations, specifically those cash flows that are generated by a future investment in an information technology system (see Figure 1.1). This is the objective that is used here as the basis for determining whether an information technology system has attractive economics.
1.2 ANALYTICAL FRAMEWORK
Conceptually, the framework for analyzing the economics of information technology systems is simple. The first step is to identify the target customer opportunity. The second step is to align the information technology system to cost-effectively provide the features customers want. The third and final step is to accurately measure the economic value that can be captured (see Figure 1.2). An analogy can be drawn between this process and archery: picking the target, aiming the bow and arrow at the most vital point, and gauging the spoils before shooting.
The practical application of this analytical framework, however, is complex. It requires taking a quantitative approach at each step, with the level of accuracy obtained proportional to the amount of rigor in the analysis. The result is the quantification of the shareholder value created by an information technology system.
Often a first analysis will show that what customers desire is not technically achievable or economically attractive. Multiple iterations of an analysis may be required to resolve the tension between segment-specific desires and time-dependent technology and economics. As in archery, a target may be beyond the reach of the bow and arrow (not technically achievable) or a target may not be worth expending an arrow on (not economically attractive). In this way, wild ideas can be separated from those that truly have promise, based on their bottom line impact.
To avoid possible confusion, the range of information technology systems encompassed and the limits of applicability of the framework need to be spelled out.
An information technology system is defined as a means for automating data, voice, video, or multimedia information flows. This definition is broader than the classical datacentric view to reflect that a digital signal of adequate bandwidth can carry any of these types of information, leading to the convergence of industries that once separately handled data, voice, and video. Simultaneously, it includes the traditional analog approaches of the past that are still with us today. Data, as used here, includes all alphanumeric and graphical information (e.g., text, spreadsheets, graphics). Voice includes all audio information (e.g., speech and music). Video includes all image information (e.g., still-frame and full-motion). Multimedia is any combination of the preceding.
Range of Systems Encompassed
Any information system that can be specified in a quantitative way can be analyzed with this framework. The range of systems encompassed is, therefore, quite general. Essentially, any "black box" where information is input, processed, and output falls within our capability for analysis. The information system does not need to be built to be analyzed.
To illustrate (see Figure 1.3), at the highest level the information represented can be video, voice, and data separately or in combination. The signal used to represent the information can be digital or analog. The system can be networked or stand-alone. If networked, communication can be one-to-one (switched) or one-to-many (broadcast). Transmission can be interactive (2-way) or passive (1-way). Additional choices of distance (e.g., local or long-distance), medium (e.g., wired or wireless), and detailed implementation approach can be made. Thus, the entire range of computer system structures, from large-scale networks to small-scale palmtops, can be analyzed successfully. In addition, analog system structures, such as television, the phonograph, and microfilm can be analyzed.
Limits of Applicability
The output of the analysis is a valuation of the cash flow stream generated by an information technology system. The limits of its applicability emerge, therefore, under those circumstances in which a well-defined valuation cannot be calculated. The circumstances that characterize this danger zone are:
These circumstances often arise when one is dealing with "bleeding" edge technology, highly complex projects, and far-out time horizons. In the 1950s, estimating the demand for computers was difficult because potential customers (or vendors for that matter) could not envisage its uses. In the early years of computer networking, nobody knew whether the traffic would consist of mostly short or long, frequent or infrequent messages-- a consideration with major implications for network capacity and performance. The developers of supercomputers planned to use revolutionary wafer-scale integrated circuits, until they encountered insurmountable heat dissipation problems. Last, improperly sized application software development efforts have often led to large, unpredicted cost overruns.
Two approaches for handling the analysis can provide useful results (see Figure 1.4), should you find yourself in this danger zone. The first applies when the accuracy of the valuation falls just below the minimum acceptable level (see Figure 1.5) and involves performing a "scenario assessment." In this case, scenarios should be developed that can be translated into variations of inputs, and a range of valuations obtained to bracket the results and gauge the amount of uncertainty and risk. The second approach applies when the error in the valuation is extreme, and can be used to set system development targets. Here, a domain of valuations should be obtained by parameterizing the inputs and deriving the combinations of input levels that yield acceptable valuations. These input level combinations can then be set as system development targets.
The minimum acceptable accuracy level is a function of the magnitude of the financial impact and the degree to which the business case either for or against is compelling (see Figure 1.5). The magnitude of the financial impact can be assessed against capital budgets and income projections. The business case can be viewed as strong if the valuation is found to be large in either a positive (for) or negative (against) direction. It is weak if the valuation is close to zero.
PROBLEMS AND SOLUTIONS
Problem 1.1: Under what conditions is maximizing shareholder wealth (equity value) identical to maximizing the value of the cash flow stream generated by a system?
Solution: The value of equity equals the value of operations less the value of debt. The value of operations and debt is equal to the cash flow from operations and the cash flow to debtholders, respectively, discounted at the appropriate risk-adjusted rates. So the required conditions are the cash flow to debtholders must be held constant and the system project does not change the risk profile.
Problem 1.2: What are some ways the analytical framework could result in a finding that the economics of a system are unattractive?
Solution: The customer opportunity could be of insufficient size; the cost to address the opportunity may be too high; the window of opportunity may be too narrow or too distant in time; and the risk of failure may be too high.
Problem 1.3: What are some examples that fit the definition of an information technology system other than those listed in Figure 1.3?
Solution: High-definition television, amateur radio, and stereo systems.
Problem 1.4: Give some additional real-world examples of cases that fall outside the limit of applicability of the analytical framework.
Solution: Massively parallel processors, josephson junctions, optical computers (as of 1999).
Voice of the Customer.
When Customers Can't Express Themselves.
INFORMATION TECHNOLOGY SYSTEM.
Information Flows and Capacity.
Glossary of Notation.
About the Author.