- Management Reference Guide
- Table of Contents
- Introduction
- Strategic Management
- Establishing Goals, Objectives, and Strategies
- Aligning IT Goals with Corporate Business Goals
- Utilizing Effective Planning Techniques
- Developing Worthwhile Mission Statements
- Developing Worthwhile Vision Statements
- Instituting Practical Corporate Values
- Budgeting Considerations in an IT Environment
- Introduction to Conducting an Effective SWOT Analysis
- IT Governance and Disaster Recovery, Part One
- IT Governance and Disaster Recovery, Part Two
- Customer Management
- Identifying Key External Customers
- Identifying Key Internal Customers
- Negotiating with Customers and Suppliers—Part 1: An Introduction
- Negotiating With Customers and Suppliers—Part 2: Reaching Agreement
- Negotiating and Managing Realistic Customer Expectations
- Service Management
- Identifying Key Services for Business Users
- Service-Level Agreements That Really Work
- How IT Evolved into a Service Organization
- FAQs About Systems Management (SM)
- FAQs About Availability (AV)
- FAQs About Performance and Tuning (PT)
- FAQs About Service Desk (SD)
- FAQs About Change Management (CM)
- FAQs About Configuration Management (CF)
- FAQs About Capacity Planning (CP)
- FAQs About Network Management
- FAQs About Storage Management (SM)
- FAQs About Production Acceptance (PA)
- FAQs About Release Management (RM)
- FAQs About Disaster Recovery (DR)
- FAQs About Business Continuity (BC)
- FAQs About Security (SE)
- FAQs About Service Level Management (SL)
- FAQs About Financial Management (FN)
- FAQs About Problem Management (PM)
- FAQs About Facilities Management (FM)
- Process Management
- Developing Robust Processes
- Establishing Mutually Beneficial Process Metrics
- Change Management—Part 1
- Change Management—Part 2
- Change Management—Part 3
- Audit Reconnaissance: Releasing Resources Through the IT Audit
- Problem Management
- Problem Management–Part 2: Process Design
- Problem Management–Part 3: Process Implementation
- Business Continuity Emergency Communications Plan
- Capacity Planning – Part One: Why It is Seldom Done Well
- Capacity Planning – Part Two: Developing a Capacity Planning Process
- Capacity Planning — Part Three: Benefits and Helpful Tips
- Capacity Planning – Part Four: Hidden Upgrade Costs and
- Improving Business Process Management, Part 1
- Improving Business Process Management, Part 2
- 20 Major Elements of Facilities Management
- Major Physical Exposures Common to a Data Center
- Evaluating the Physical Environment
- Nightmare Incidents with Disaster Recovery Plans
- Developing a Robust Configuration Management Process
- Developing a Robust Configuration Management Process – Part Two
- Automating a Robust Infrastructure Process
- Improving High Availability — Part One: Definitions and Terms
- Improving High Availability — Part Two: Definitions and Terms
- Improving High Availability — Part Three: The Seven R's of High Availability
- Improving High Availability — Part Four: Assessing an Availability Process
- Methods for Brainstorming and Prioritizing Requirements
- Introduction to Disk Storage Management — Part One
- Storage Management—Part Two: Performance
- Storage Management—Part Three: Reliability
- Storage Management—Part Four: Recoverability
- Twelve Traits of World-Class Infrastructures — Part One
- Twelve Traits of World-Class Infrastructures — Part Two
- Meeting Today's Cooling Challenges of Data Centers
- Strategic Security, Part One: Assessment
- Strategic Security, Part Two: Development
- Strategic Security, Part Three: Implementation
- Strategic Security, Part Four: ITIL Implications
- Production Acceptance Part One – Definition and Benefits
- Production Acceptance Part Two – Initial Steps
- Production Acceptance Part Three – Middle Steps
- Production Acceptance Part Four – Ongoing Steps
- Case Study: Planning a Service Desk Part One – Objectives
- Case Study: Planning a Service Desk Part Two – SWOT
- Case Study: Implementing an ITIL Service Desk – Part One
- Case Study: Implementing a Service Desk Part Two – Tool Selection
- Ethics, Scandals and Legislation
- Outsourcing in Response to Legislation
- Supplier Management
- Identifying Key External Suppliers
- Identifying Key Internal Suppliers
- Integrating the Four Key Elements of Good Customer Service
- Enhancing the Customer/Supplier Matrix
- Voice Over IP, Part One — What VoIP Is, and Is Not
- Voice Over IP, Part Two — Benefits, Cost Savings and Features of VoIP
- Application Management
- Production Acceptance
- Distinguishing New Applications from New Versions of Existing Applications
- Assessing a Production Acceptance Process
- Effective Use of a Software Development Life Cycle
- The Role of Project Management in SDLC— Part 2
- Communication in Project Management – Part One: Barriers to Effective Communication
- Communication in Project Management – Part Two: Examples of Effective Communication
- Safeguarding Personal Information in the Workplace: A Case Study
- Combating the Year-end Budget Blitz—Part 1: Building a Manageable Schedule
- Combating the Year-end Budget Blitz—Part 2: Tracking and Reporting Availability
- References
- Developing an ITIL Feasibility Analysis
- Organization and Personnel Management
- Optimizing IT Organizational Structures
- Factors That Influence Restructuring Decisions
- Alternative Locations for the Help Desk
- Alternative Locations for Database Administration
- Alternative Locations for Network Operations
- Alternative Locations for Web Design
- Alternative Locations for Risk Management
- Alternative Locations for Systems Management
- Practical Tips To Retaining Key Personnel
- Benefits and Drawbacks of Using IT Consultants and Contractors
- Deciding Between the Use of Contractors versus Consultants
- Managing Employee Skill Sets and Skill Levels
- Assessing Skill Levels of Current Onboard Staff
- Recruiting Infrastructure Staff from the Outside
- Selecting the Most Qualified Candidate
- 7 Tips for Managing the Use of Mobile Devices
- Useful Websites for IT Managers
- References
- Automating Robust Processes
- Evaluating Process Documentation — Part One: Quality and Value
- Evaluating Process Documentation — Part Two: Benefits and Use of a Quality-Value Matrix
- When Should You Integrate or Segregate Service Desks?
- Five Instructive Ideas for Interviewing
- Eight Surefire Tips to Use When Being Interviewed
- 12 Helpful Hints To Make Meetings More Productive
- Eight Uncommon Tips To Improve Your Writing
- Ten Helpful Tips To Improve Fire Drills
- Sorting Out Today’s Various Training Options
- Business Ethics and Corporate Scandals – Part 1
- Business Ethics and Corporate Scandals – Part 2
- 12 Tips for More Effective Emails
- Management Communication: Back to the Basics, Part One
- Management Communication: Back to the Basics, Part Two
- Management Communication: Back to the Basics, Part Three
- Asset Management
- Managing Hardware Inventories
- Introduction to Hardware Inventories
- Processes To Manage Hardware Inventories
- Use of a Hardware Inventory Database
- References
- Managing Software Inventories
- Business Continuity Management
- Ten Lessons Learned from Real-Life Disasters
- Ten Lessons Learned From Real-Life Disasters, Part 2
- Differences Between Disaster Recovery and Business Continuity , Part 1
- Differences Between Disaster Recovery and Business Continuity , Part 2
- 15 Common Terms and Definitions of Business Continuity
- The Federal Government’s Role in Disaster Recovery
- The 12 Common Mistakes That Cause BIAs To Fail—Part 1
- The 12 Common Mistakes That Cause BIAs To Fail—Part 2
- The 12 Common Mistakes That Cause BIAs To Fail—Part 3
- The 12 Common Mistakes That Cause BIAs To Fail—Part 4
- Conducting an Effective Table Top Exercise (TTE) — Part 1
- Conducting an Effective Table Top Exercise (TTE) — Part 2
- Conducting an Effective Table Top Exercise (TTE) — Part 3
- Conducting an Effective Table Top Exercise (TTE) — Part 4
- The 13 Cardinal Steps for Implementing a Business Continuity Program — Part One
- The 13 Cardinal Steps for Implementing a Business Continuity Program — Part Two
- The 13 Cardinal Steps for Implementing a Business Continuity Program — Part Three
- The 13 Cardinal Steps for Implementing a Business Continuity Program — Part Four
- The Information Technology Infrastructure Library (ITIL)
- The Origins of ITIL
- The Foundation of ITIL: Service Management
- Five Reasons for Revising ITIL
- The Relationship of Service Delivery and Service Support to All of ITIL
- Ten Common Myths About Implementing ITIL, Part One
- Ten Common Myths About Implementing ITIL, Part Two
- Characteristics of ITIL Version 3
- Ten Benefits of itSMF and its IIL Pocket Guide
- Translating the Goals of the ITIL Service Delivery Processes
- Translating the Goals of the ITIL Service Support Processes
- Elements of ITIL Least Understood, Part One: Service Delivery Processes
- Case Study: Recovery Reactions to a Renegade Rodent
- Elements of ITIL Least Understood, Part Two: Service Support
- Case Studies
- Case Study — Preparing for Hurricane Charley
- Case Study — The Linux Decision
- Case Study — Production Acceptance at an Aerospace Firm
- Case Study — Production Acceptance at a Defense Contractor
- Case Study — Evaluating Mainframe Processes
- Case Study — Evaluating Recovery Sites, Part One: Quantitative Comparisons/Natural Disasters
- Case Study — Evaluating Recovery Sites, Part Two: Quantitative Comparisons/Man-made Disasters
- Case Study — Evaluating Recovery Sites, Part Three: Qualitative Comparisons
- Case Study — Evaluating Recovery Sites, Part Four: Take-Aways
- Disaster Recovery Test Case Study Part One: Planning
- Disaster Recovery Test Case Study Part Two: Planning and Walk-Through
- Disaster Recovery Test Case Study Part Three: Execution
- Disaster Recovery Test Case Study Part Four: Follow-Up
- Assessing the Robustness of a Vendor’s Data Center, Part One: Qualitative Measures
- Assessing the Robustness of a Vendor’s Data Center, Part Two: Quantitative Measures
- Case Study: Lessons Learned from a World-Wide Disaster Recovery Exercise, Part One: What Did the Team Do Well
- (d) Case Study: Lessons Learned from a World-Wide Disaster Recovery Exercise, Part Two
This is the second of a two-part article on business ethics and corporate scandals. In part one I discussed the issues of personal and business ethics, and then described two recent corporate scandals involving RadioShack and Tyco International. In this segment part two I look at two even larger recent scandals involving WorldCom and Enron.
The WorldCom Case
On November 10, 1997, WorldCom and MCI Communications merged to form the US$37 billion company of MCI WorldCom, later renamed WorldCom. This was the largest corporate merger in United States history. The company's subsequent bankruptcy in 2003 arising from accounting scandals was symptomatic of the dotcom and Internet excesses of the late 1990s.
After its merger in 1997, MCI WorldCom continued on with more ambitious expansion plans. On October 5, 1999 it announced a US$129 billion merger agreement with Sprint Corporation. This would have made MCI WorldCom the largest telecommunications company in the United States, eclipsing AT&T for the first time. But the US Department of Justice and the European Union (EU), fearing an unfair monopoly, applied sufficient pressure to block the deal. On July 13, 2000 the Board of Directors of both companies acted to terminate the merger; later that year MCI WorldCom renamed itself WorldCom.
The failure of the merger with Sprint marked the beginning of a steady downturn of WorldCom's financial health. Its stock price was declining, and banks were pressuring CEO Bernard Ebbers for coverage of extensive loans that had been based on over-inflated stock. The loans financed WorldCom expansions into non-technical areas such as timber and yachting that never proved to be profitable. As conditions worsened, Ebbers continued borrowing until finally WorldCom found itself in an almost untenable position. In April 2002 Ebbers was ousted as CEO, and replaced with John Sidgmore of UUNet Technologies.
Beginning in 1999 and continuing through early 2002, the company used fraudulent accounting methods to hide its declining financial condition by presenting a misleading picture of financial growth and profitability. In addition to Ebbers, others who perpetuated the fraud include CFO David Sullivan, Controller David Myers and the Director of General Accounting Buford Yates.
In June 2002 internal auditors discovered some $3.8 billion of fraudulent funds during a routine examination of capital expenditures and promptly notified the WorldCom board of directors. The board acted swiftly: Sullivan was fired, Myers resigned and Arthur Anderson (WorldCom's external auditing firm) was replaced with KPMG. By the end of 2003, it was estimated that WorldCom's total assets had been inflated by almost $11 billion.
On July 21, 2002 WorldCom filed for Chapter 11 bankruptcy protection in the largest such filing in United States history. The company emerged from bankruptcy as MCI in 2004 with approximately $5.7 billion in debt and $6 billion in cash. On February 14, 2005 Verizon Communications bought MCI for $7.6 billion. In December 2005 Microsoft announced MCI would join them by providing Windows Live Messenger customers with voice over the Internet protocol (VoIP) service for calls around the world. This had been MCI's last totally new product called "MCI Web Calling," and has now been renamed "Verizon Web Calling." It continues to be a promising product for future markets.
CEO Bernard Ebbers was found guilty on March 15, 2005 of all charges and convicted of fraud, conspiracy and filing false documents with regulators. He was sentenced to 25 years in prison. He began serving his sentence on September 26, 2006 in Yazoo City, Mississippi. The other executives who co-conspired with Ebbers all pled guilty to various charges and were given slightly reduced sentences.
There are many lessons to be learned from this case, but two elements especially stand out. One is that the fraudulent accounting was found during a routine examination of company records, indicating a fair degree of arrogance on the part of the conspirators as little was done to conceal the irregularities. Second, it marked a rare instance of a reputable external accounting firm being involved, at least peripherally, with suspicious activities. But the tarnishing of Arthur Anderson's reputation was only beginning as we will see in the next section.
The Enron Case
The most famous case of corporate fraud during this era was that of the Enron Energy Corporation headquartered in Houston, Texas. It resulted in itself and its external auditing firm both being put out of business. Never before in United States business have two major corporations fallen more deeply or more quickly. This case epitomizes how severe the consequences can become as a result of unethical business practices.
Enron enjoyed profitable growth and a sterling reputation during the late 1990s. It pioneered and marketed the energy commodities business involving the buying and selling of natural gas, water and waste water, communication bandwidths and electrical generation and distribution, among others. Fortune magazine named Enron "America's Most Innovative Company" for six consecutive years from 1996 to 2001. It was on Fortune's list of the "100 Best Companies to Work for in America" in 2000.
But by 2001 Enron's global reputation was becoming undermined by persistent rumors of bribery and strong-armed political tactics to secure contracts in Central America, South America, Africa, and the Philippines. In July 2001 Enron admitted to incurring a $102 million loss and in November of the same year Enron admitted to hiding hundreds of millions more. By the end of 2001 the financial collapse of Enron as a corporation was in full effect and its stock price plummeted to less than one dollar.
In 2002 a complex network of suspicious offshore partnerships and questionable accounting practices surfaced. The mastermind behind these activities was Enron CFO Andrew Fastow. He was indicted on November 1, 2002, by a federal grand jury in Houston on 78 counts including fraud, money laundering and conspiracy. He and his wife Lea Fastow, former assistant treasurer, accepted a plea agreement on January 14, 2004. Andrew Fastow agreed to serve a ten-year prison sentence and pay $23.8 million and his wife agreed to a five-month prison sentence. In exchange, both would testify against other Enron corporate officers.
Federal prosecutors issued indictments against dozens of Enron executives. Key among these were Kenneth Lay, the former Chairman of the Board and Chief Executive Officer and Jeffrey Skilling, former Chief Executive Officer and Chief Operating Officer. They were served in July 2004 with a 53-count, 63-page indictment covering a broad range of financial crimes. Among these was bank fraud, making false statements to banks and auditors, securities fraud, wire fraud, money laundering, conspiracy and insider trading.
Lay pled not guilty to his eleven criminal charges claiming he had been misled by those around him. His wife, Linda Lay, also claimed innocence to a bizarre set of associated circumstances. On November 28, 2001, Linda Lay sold approximately 500,000 shares of her Enron stock (when its value was still substantial) some 15 minutes before news was made public that Enron was collapsing at which time the stock price sunk to under one dollar.
After a highly visible and contentious trial of Lay and Skilling, the jury returned its verdicts on May 25, 2006. Skilling was convicted on 19 of 28 counts of securities fraud and wire fraud and acquitted on the remaining nine, including insider trading. He was sentenced to 24 years, 4 months in prison which he began serving on October 23, 2006. Skilling was also ordered to pay with his own money $26 million to the Enron pension. Lay was convicted of all six counts of securities and wire fraud and sentenced to 45 years in prison. On July 5, 2006, Lay died at age 64 after suffering a heart attack the day before.
The Arthur Andersen Case
Corporate officers from Enron were not the only ones to suffer the consequences of the scandal. On June 15, 2002, Arthur Andersen was convicted of obstruction of justice for shredding documents related to its audit of Enron. On May 31, 2005, the Supreme Court of the United States unanimously overturned Andersen's conviction due to flaws in the jury obstructions. Despite this ruling, it is highly unlikely Andersen will ever return as a viable business.
Arthur Andersen was founded in 1913 and enjoyed a highly regard reputation for most of its history. But the firm lost nearly all of its clients after its Enron indictment, and there were over 100 civil suits brought against it related to its audits of Enron and other companies, including WorldCom. From a peak of 28,000 employees in the United States and 85,000 worldwide, the firm now employs roughly 200 people, most of who are in Chicago handling the various lawsuits. Andersen was considered one of the "Big Five" large international accounting firms, shown in Listing 1, which has since become the "Big Four."
Figure 1 Big Five Accounting Firms in 2002
- Arthur Andersen
- Deloitte & Touche
- Ernst & Young
- KPMG
- PricewaterhouseCoopers
Summary
This concludes the second part of the two-part series on Ethics and Scandals. In this final segment I discussed the issues of personal and business ethics, and then described two of the largest corporate scandals in U.S. history: WorldCom and Enron. In subsequent sections of this Reference Guide I will present some of the recent legislation that was enacted in direct response to these scandals, and point out the impact these new laws have on the management of IT organizations.