{"id":6877,"date":"2013-09-16T09:14:49","date_gmt":"2013-09-16T14:14:49","guid":{"rendered":"http:\/\/www.mrc-productivity.com\/blog\/?p=6877"},"modified":"2022-11-22T10:57:02","modified_gmt":"2022-11-22T16:57:02","slug":"5-reasons-for-non-adoption-or-circumvention-of-a-bi-solution","status":"publish","type":"post","link":"https:\/\/www.mrc-productivity.com\/blog\/2013\/09\/5-reasons-for-non-adoption-or-circumvention-of-a-bi-solution\/","title":{"rendered":"5 Reasons for Non-Adoption or Circumvention of a BI Solution"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2010\/11\/Education.jpg\" alt=\"Education\" width=\"76\" height=\"100\" class=\"alignleft size-full wp-image-725\" \/><em>** This guest post was written by Estelle Nicholson.  Learn more about Estelle in the author bio at the end of this post. **<\/em><\/p>\n<p>After an initial burst of enthusiasm, we\u2019ve discovered that BI projects, like many other <a onclick=\"_gaq.push(['_trackEvent', 'Blog post', 'Why IT Project Fail', 'Blog']); \" href=\"https:\/\/www.mrc-productivity.com\/blog\/2013\/04\/why-development-projects-fail-and-what-can-it-do-about-it\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: bold\">IT projects<\/span><\/a>, get derailed or circumvented for a host of reasons. People who approach BI projects come from environments outside of traditional IT, so it\u2019s important to understand reasons why your project isn\u2019t getting off the ground (or why it\u2019s crashing) and some of the potential consequences.<br \/>\n<a name=\"20130913\"><\/a><!--more--><\/p>\n<h3>1. The Goldilocks Project: Making it \u201cJust Right\u201d<\/h3>\n<p><strong>Overdesign<\/strong> (better known as Analysis Paralysis). While planning is good,  an interminable requirements specification period and inflexible project management methodologies, can cause delays. At the same time, the users\u2019 requirements will change based on what they see in the industry, and the need for the BI solutions will intensify. Overdesigned projects don\u2019t get adopted because, by the time they are completed, the users have moved on to other solutions and aren\u2019t participating in the design and testing process. The lack of end-user involvement means these projects don\u2019t do what the users wanted, don&#8217;t have all the data pieces or functionality they wanted, and aren&#8217;t flexible enough to be modified. If the developers do get feedback, the redesign results in major components being moved to the \u201cnext release\u201d  &#8211; the death knell for a project.<\/p>\n<p><strong>Underdesign<\/strong>. On the other hand, the allure of speedily getting hands onto the data can lead to overpromising by vendors or IT and disappointment by users. \u201cNo up-front design required\u201d solutions promised in the big data world will show you your data. However, to be useful in BI, the design gets pushed to the analytical layer, opening a new set of problems for eager analysts. The skull sweat and design work have to come in somewhere and sometime. Just slapping a BI tool on top of your data just means you\u2019ve paid for a slick new interface and the vendor\u2019s sales team has moved on to the next sucker customer.<\/p>\n<p>Design and implementation time have to be \u201cjust right.\u201d Too much takes too long and you lose users\u2019 interest. Too little and your analysts will be floundering in a sea of disorganized data. This requires a delicate balance of user and technical involvement.<\/p>\n<h3>2. Lack of Integration<\/h3>\n<p><figure id=\"attachment_6894\" aria-describedby=\"caption-attachment-6894\" style=\"width: 200px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2013\/09\/small_4273913228.jpg\" alt=\"photo credit: Horia Varlan via photopin cc\" width=\"200\" height=\"133\" class=\"size-full wp-image-6894\" \/><figcaption id=\"caption-attachment-6894\" class=\"wp-caption-text\">photo credit: <a href=\"https:\/\/www.flickr.com\/photos\/horiavarlan\/4273913228\/\">Horia Varlan<\/a> via photopin <a href=\"https:\/\/creativecommons.org\/licenses\/by\/2.0\/\">cc<\/a><\/figcaption><\/figure><span style=\"line-height: 1.7em;\">Even if the design and implementation are right a user has less incentive to switch to a BI solution that doesn&#8217;t offer key areas of integration. Examples are when a user still needs to go outside the system to incorporate a needed piece of data, or when a user has a separate sign-on process to use the system. Sometimes seemingly trivial steps in a workflow can lead to resistance.<\/span><\/p>\n<h3>3. Unrealistic Expectations<\/h3>\n<p>Finally, when stakeholders hear buzz terms like big data, sensor data, mobile reporting, etc. it could create a sense of needing to aim higher than what is in range or even than what is necessary at a firm. A firm with nascent BI that is still getting buy-in or figuring out <a onclick=\"_gaq.push(['_trackEvent', 'PDF Download', 'Reporting Checklist', 'Blog']); \" href=\"https:\/\/www.mrc-productivity.com\/research\/Report_Checklist.pdf\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: bold\">reporting<\/span><\/a> will do better by building up a foundation of BI before worrying about the latest trend.<\/p>\n<p>All of these will lead to people disparaging your BI solution and using something else \u2013 leading to&#8230;Self-Service BI.<\/p>\n<h3>4. Self-Service Circumvention<\/h3>\n<p>Masses of raw data obtained through an underdesigned solution or even from an IT department that is churning out extracts to satisfy requests could lead to dangerous circumvention issues. Enterprising, technically adept analysts might maintain a server inside the firewall (at best) or perhaps on the cloud so that they can analyze their data using tools they get from an unauthorized and uncontrolled source.<\/p>\n<h3>5. Self-Service Non-Adoption and Circumvention<\/h3>\n<p><figure id=\"attachment_6815\" aria-describedby=\"caption-attachment-6815\" style=\"width: 240px\" class=\"wp-caption alignright\"><a href=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2013\/09\/small_3674823974.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2013\/09\/small_3674823974.jpg\" alt=\"photo credit: subflux via photopin cc\" width=\"240\" height=\"112\" class=\"size-full wp-image-6815\" \/><\/a><figcaption id=\"caption-attachment-6815\" class=\"wp-caption-text\">photo credit: <a href=\"https:\/\/www.flickr.com\/photos\/subflux\/3674823974\/\">subflux<\/a> via photopin <a href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/2.0\/\">cc<\/a><\/figcaption><\/figure><span style=\"line-height: 1.7em;\">Going one step further, what about the recidivists who are offered up a BI solution and use the self-service features to simply pull their own extracts of data? This could be a perfectly appropriate use of a BI solution, or it could hog resources and then present the double danger of data in random databases, spreadsheets or on the cloud.<\/p>\n<p>When users bypass approved systems, they also bypass IT&#8217;s ability to protect the organization&#8217;s networks and sensitive information. In addition to exposing sensitive information, the use of unapproved (and unknown) external services can open a hole for a potential network security breach. When employees leave, you may lose access to those password-protected accounts (even if you knew they existed) \u2013 leaving sensitive data sitting out in the cloud for the former employee (and possibly others) to access.<\/p>\n<p>BI can be a game-changing tool for a company if done and used properly, but it\u2019s important to recognize that BI non-adoption or circumvention has implications beyond some wasted effort and money on another failed IT project.<\/span><\/p>\n<div style=\"width: 530px; height: 103px; padding: 10px; background-color: #efefef; margin-bottom: 10px; margin-top: 10px; line-height: 1.5em;\">\n<a title=\"Estelle Nicholson\" href=\"https:\/\/www.linkedin.com\/pub\/estelle-nicholson\/3\/a9b\/231\"><\/a><strong> About the Author:<\/strong> <br \/><a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Guest Author Bio', 'Nicholson']); \" href=\"https:\/\/www.linkedin.com\/pub\/estelle-nicholson\/3\/a9b\/231\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">Estelle Nicholson<\/span><\/a> is an independent business intelligence consultant, with experience working on several business intelligence projects at a Fortune 500 financial firm. She has worked on various aspects of (what is now called) BI for nearly 20 years.\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>** This guest post was written by Estelle Nicholson. Learn more about Estelle in the author bio at the end of this post. ** After an initial burst of enthusiasm, we\u2019ve discovered that BI projects, like many other IT projects, get derailed or circumvented for a host of reasons. People who approach BI projects come &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.mrc-productivity.com\/blog\/2013\/09\/5-reasons-for-non-adoption-or-circumvention-of-a-bi-solution\/\"> <span class=\"screen-reader-text\">5 Reasons for Non-Adoption or Circumvention of a BI Solution<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":11,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","slim_seo":{"title":"5 Reasons for Non-Adoption or Circumvention of a BI Solution - mrc&#039;s Cup of Joe Blog","description":"** This guest post was written by Estelle Nicholson. Learn more about Estelle in the author bio at the end of this post. ** After an initial burst of enthusiasm"},"footnotes":""},"categories":[8],"tags":[10],"class_list":["post-6877","post","type-post","status-publish","format-standard","hentry","category-education","tag-business-intelligence"],"_links":{"self":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts\/6877","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/comments?post=6877"}],"version-history":[{"count":18,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts\/6877\/revisions"}],"predecessor-version":[{"id":13872,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts\/6877\/revisions\/13872"}],"wp:attachment":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/media?parent=6877"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/categories?post=6877"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/tags?post=6877"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}