Erik Krogh, PhD, Practitioner Faculty of Information Systems
“Managing Online in Perpetual Perfect Storms: Insights from IndyMac Bank.” MIS Quarterly Executive, 4(4), (2005), with Omar A. El Sawy, & Paul Gray.
2005 “Best Paper Award” winner, Society for Information Management (SIM)
Abstract
How can an enterprise manage strategically using an IT-intensive business model in a highly turbulent environment? How can it take best advantage of IT to enhance its dynamic capabilities in hyper-growth conditions? How can the CIO help lead the enterprise to managing online in conditions of rapid business change? We liken this situation to managing online in perpetual “perfect storms.”
This paper draws on the experiences and insights of IndyMac Bank to answer these questions. IndyMac is an IT-intensive mortgage bank that works in a rapidly changing environment. It conducts most of its business online, and has grown at a compounded rate of 41% since 1999. Even though it is a relatively small company, IndyMac changed the rules of the staid mortgage industry by its innovative use of IT and by cleverly weaving IT into the fabric of its business ecosystem. In the process, it learned how to manage online and gain strategic advantage while working in perpetual perfect storms.
Mark W.S. Chun, PhD, Professor of Information Systems Technology Management
Owen P. Hall, Jr., PhD, PE, PhD, Professor of Decision Sciences
Charla Charla Griffy-Brown, PhD, Professor of Information Systems Technology Management and Director of the Center for Teaching and Learning Excellence
“Cloud Syzygy Technologies,” Ivey Cases (2016).
Abstract
This teaching case focuses on assessing the benefits and risks associated with adopting cloud-based computing as an overall corporate IT strategy. Specific learning objectives include:
1) To explore the benefits and risks of adopting cloud computing technologies,
2) To assess how and when companies should adopt cloud computing technologies,
3) To understand the skills necessary for the successful adoption of cloud computing, and
4) To appreciate the trade-offs associated with various cloud-based product lines.
Keywords: cloud computing, software as a service, agile IT architecture, security