WO1998038588A1 - Business analysis tool and method - Google Patents

Business analysis tool and method Download PDF

Info

Publication number
WO1998038588A1
WO1998038588A1 PCT/GB1998/000642 GB9800642W WO9838588A1 WO 1998038588 A1 WO1998038588 A1 WO 1998038588A1 GB 9800642 W GB9800642 W GB 9800642W WO 9838588 A1 WO9838588 A1 WO 9838588A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
business
value
assets
matrix
Prior art date
Application number
PCT/GB1998/000642
Other languages
French (fr)
Inventor
William Mark Mayon-White
Michael John Lesser
Bernard William Dyer
James Backhouse
Original Assignee
Mayon White William Mark
Michael John Lesser
Bernard William Dyer
James Backhouse
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mayon White William Mark, Michael John Lesser, Bernard William Dyer, James Backhouse filed Critical Mayon White William Mark
Publication of WO1998038588A1 publication Critical patent/WO1998038588A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q99/00Subject matter not provided for in other groups of this subclass

Definitions

  • the present invention relates to a tool for management of business assets (and particularly but not exclusively information assets), to a method of establishing an inventory of business information assets and to a method of establishing a distribution of value of business information assets, and the total value of each class of information assets, and the total value of a business 's information assets, as well as to a computer adapted for use in such methods.
  • An object of the present invention is to provide a management tool and a method which are more systematic, consistent, accurate and useful than those used in the prior art.
  • a further object of the present invention is to provide a tool and method to facilitate answering at least some of the following questions which are frequently addressed to practising managers:
  • the present invention provides a tool for management of business assets comprising means for establishing a matrix of information concerning business assets, rows and columns in the matrix each being associated with respective categories of such assets such that the cells define a discrete distribution in two or more dimensions of categories of such iriformation, graphical user interface means including means for prompting a user to enter information about business assets of an appropriate category in each cell, display means for displaying the matrix of mformation and processor means arranged to process the information in the matrix, wherein the nature of the information in different categories varies over one dimension of the matrix and the business aspect to which the information in different categories relates varies over another dimension of the matrix.
  • the business may, in addition build up a picture of changes in asset values over time.
  • said different categories of the nature of the information include human know-how and/or analogue information and/or digital information.
  • analogue information is meant information which is not represented digitally such as the information embodied in a die form of casting a specified shape for example, and that which is maintained in iconic form as writing or symbols on paper or other media.
  • Digital information could include any information stored digitally on eg. a computer or computer-readable medium.
  • Human know-how could include the skills and capabilities of the workforce for example.
  • the different categories of the business aspect to which the information relates include technical and/or commercial and/or financial aspects (preferably all three).
  • cells in said matrix are selectable by a pointing device (such as a mouse for example) operable by the user and, when thus selected, cause windows to open on said display means which prompt the user to enter business assets of the appropriate category and relating to the appropriate business aspect in the corresponding cells.
  • a pointing device such as a mouse for example
  • said cells in the matrix are sub-divided into different classes of business assets independently of said categories of nature of information and business aspect.
  • the cell containing technical analogue information could contain details of different processes and different machines.
  • Such technical analogue information might, for example, be a technical memorandum describing the manufacture of a pharmaceutical product or an engineer's machined foam or plastic model.
  • the invention provides a method of establishing an inventory of business information assets comprising the steps:
  • step iii) categorising the information of step ii) at least two-dimensionally according to a) the nature of the information and b) the business aspect to which the information relates;
  • step iv) assigning a value to the inventory of step iv) by applying a valuation to the items in each category of step iii).
  • the categorising step is performed by means of a matrix as used in the first aspect of the invention.
  • the valuation step v) is performed by applying a formula which includes a weighting factor having the effect of multiplying the value in each category by a factor of between zero and unity.
  • the weighting factor can, for example, represent the scarcity or accessibility of the corresponding asset. For example, if the relevant business asset is a die of which only one is possessed by the company and further dies of that type are difficult to obtain or can be obtained only after a long delay or can be obtained only in uneconomically large quantities then the weighting factor will be relatively high.
  • an equation or a computer program supplied by an external analyst may be assigned a higher weighting value if the company's contract with the analyst only allows limited use of the formula or program - eg. once a month.
  • the above valuation step v) is performed by applying a formula and which includes a security weighting factor having an exponent, the security weighting factor having the effect of multiplying the assigned value by a factor dependent on the security of the associated business asset, the exponent having the effect of multiplying said factor by an amount dependent on the degree of dependence of the value on the security of said associated business asset.
  • a formula and which includes a security weighting factor having an exponent the security weighting factor having the effect of multiplying the assigned value by a factor dependent on the security of the associated business asset
  • the exponent having the effect of multiplying said factor by an amount dependent on the degree of dependence of the value on the security of said associated business asset.
  • all business information assets are divided into one of the three classes: human know-how, analogue information and digital information and all the business aspects are divided into one of the three classes: technical, commercial and financial, although of course other classes may alternatively or additionally be used.
  • At least some items are difficult to value and may not be capable of being valued objectively.
  • at least some items are valued subjectively by:
  • the above valuation step v) is preferably performed by applying a formula which includes a weighting factor having the effect of multiplying the value in each category by a factor of between zero and unity.
  • the above valuation step is performed by applying a formula which includes a security weighting factor having an exponent, the security weighting factor having the effect of multiplying the assigned value by a factor dependent on the security of the associated business asset, the exponent having the effect of multiplying said factor by an amount dependent on the degree of dependence of the value on the security of said associated business asset.
  • the invention also provides a computer program to guide a user through at least steps I) to iv) of the above method by means of a graphical user interface.
  • the invention provides a method of establishing a distribution of value of business information assets comprising the steps:
  • step I) categorising the information of step I) at least two-dimensionally according to a) the nature of the information and b) the business aspect to which the information relates;
  • the above method is useful in establishing a distribution or "footprint", which is a unique identifier, of business information assets which can be compared with the corresponding distribution or "footprint” of other companies in the same sector.
  • the resulting comparison is useful in financial analysis, management consultancy, planning mergers and acquisitions, and the like.
  • the valuations of steps iii) and iv) above can be selected from valuations based on:
  • the invention also provides a computer programmed to prompt a user through the steps of the above method by a graphical user interface.
  • the computer can be arranged to modify the valuations by applying formulae containing the weighting factors described above.
  • the information is classified by means of a matrix as used in the first aspects of the invention.
  • Figure 1 is a schematic perspective view of a computer programmed to act as a tool in accordance with the present invention
  • Figure 2 is a screen dump showing one layer of a matrix established by the programmed computer of Figure 1;
  • Figure 3 is a three-dimensional representation of the above matrix
  • Figure 4 is a screen dump showing a screen generated by the computer of Figure 1 in response to clicking on one of the boxes in the screen dump of Figure 2;
  • Figure 5 is a flow diagram showing the first, information mapping phase of a method in accordance with the second aspect of the invention
  • Figure 5b) is a flow diagram showing the second, information valuation phase of an embodiment of the above method
  • Figure 5 c is a flow diagram showing the third, information evaluation phase of the above embodiment.
  • Figure 6 is a flow diagram illustrating the computation of the value of the assets of a business using the programmed computer of Figure 1.
  • the computer 1 (which is preferably a Pentium® PC running the Windows® operating system) is provided with a conventional keyboard 2 and mouse 3 which supply input signals to a microprocessor 5 having data buses connecting it to ROM 6 and RAM 7.
  • the microprocessor is also linked in a conventional manner to a hard disk 11 on which a program for use with the invention is stored.
  • the microprocessor is coupled in a conventional manner to a floppy disk drive 10 and has an output to a conventional display 9.
  • An additional output (not shown) links the computer to a printer 4. It will be appreciated by persons skilled in the art that the above is a simplified description of a general purpose PC.
  • a program stored on hard disk 11 is arranged to load a matrix 8 into RAM 7 and this matrix will now be described with reference to Figures 2 and 3.
  • references (in whatever form) to information, its use, processing or storage imply, where the context so allows, that the information is handled by the computer as electrical signals which are, as appropriate, stored in computer memory, processed by the microprocessor 5 and output as visual signals on the display 9.
  • the matrix is three-dimensional and contains eg. three layers (corresponding to periods P 1 , P2 and P3) of a rectangular 3 x 3 array of information cells 8c ( Figure 2) in the array being divided in the horizontal direction into the three categories of human, analogue and digital business assets and being divided vertically into the three categories of technical, commercial and financial business aspects.
  • each of the nine cells 8c of the matrix is divided into different classes of assets.
  • the commercial analogue information cell (identified as X (2,2)) is divided into personnel, assets, processes and indices (weighting factors).
  • X 2,2
  • indices weighting factors
  • the program loaded from hard disk 11 presents each of the above sub-divisions of the cells 8c as a "hot button" which when clicked on using the mouse 3 or other pointing device leads the user to a further screen as shown in Figure 4.
  • the screen represented in Figure 4 concerns information recorded on paper eg. designs and drawings and has a box 12 in which the user enters the number of pages of a given document and a box 13 in which the user enters the identity of the repository of the relevant design or other document.
  • the repository can be a class of documents such as documents relating to engine design for example.
  • this may include a subjective valuation in accordance with the third aspect of the invention.
  • the information entered by the user is then processed by the called up program to arrive at a crude valuation x.
  • the user then calls up a program for calculating a local weight w by clicking on the "local weight” hot button 16.
  • the called up program then enters into a dialogue with the user on the screen to enable an appropriate local weight to be calculated for the relevant data which represents the scarcity value of the data.
  • the user clicks on a "security index” hot button 17 which similarly calls up a program which enters into a dialogue on screen with the user to enable a security index s ⁇ to be calculated.
  • the value of the local weight w and the value of the security index s ⁇ are recorded and displayed in boxes 18 and 19 respectively and the resulting weighted value is determined by the program and displayed in box 25 alongside the information already entered in boxes 12 and 13 which is repeated in boxes 21 and 23 respectively.
  • buttons may be provided, via which access can for instance be gained to proprietary sof ware.
  • links may be made to software such as HTvTEW (London School of Economics), @RISK (US) , WITNESS (Lanner Group), the Microsoft Excel spreadsheet tool, a database engine such as the Microsoft Access tool, and COPIT (UK software associated with the British Standards Institution code of practice on security management).
  • the above process is then repeated for a further item and the results displayed in a similar manner in box 26 adjacent to the repository name in box 22 and the number of pages in box 24 respectively.
  • the processor is then repeated for all the items falling within the (1,2) cell 8c and the sub-total of the value of all the company's assets in that category is displayed in box 27.
  • the values appropriate to one period may be calculated from the values determined in respect of another period from a known relationship governing eg. the depreciation of value of various categories of information over time.
  • O ⁇ S ⁇ 1 is the security index
  • W y is the local weight on X
  • V is the value
  • ⁇ u f(a,b,c, ) where the terms are attributes of information value: a is market price: sell price, buy price, spread b is replacement cost c is maintenance cost d is cost of creation e is information turnover: timeliness and half-life f is accuracy: verifiability, completeness, date, evidential value g is availability: criticality and risk in business process h is security: protection cost, data protection, privacy k is ownership: originality, designs, patents, brands, IP
  • the array X represents a layer of the above-described matrix 8 and x y represents the sum of the unweighted values of the assets in the cell 8c of the ith row and jth column.
  • W ;j is the local weighting value for information in the ith row and jth column
  • S is the security index appropriate to the ith row and jth column and the exponent ⁇ y modifies the value of S.
  • can have any positive value.
  • represents the criticality of the security of the information to its value.
  • the value of the local weighting index is a function of (eg. a linear function) of the values represented by the parameters a to k, some or all of which may need to be determined subjectively in accordance with the third aspect of the invention.
  • Figures 5a) to 5c) show in flow diagram form a method of establishing an inventory of business information assets in accordance with the second aspects of the invention, this procedure preferably including the above-described establishment of the matrix and summing the value sub-totals derived for each cell 8C.
  • the analysis is opened (step 28) and the scope is determined in step 29.
  • the analysis may be applied at a relatively crude level at board level, or may be applied (at a greater level of detail) to a business unit or may be applied (comprehensively, in still greater detail) to the entire enterprise represented by the company.
  • the valuation objectives are then established (step 30) before mapping all the processes and information assets utilised in the company.
  • a test for completeness (step 30a) may be applied at this stage and if it is failed then the steps 29 and 30 can be repeated until the test is satisfied.
  • a test for completeness (step 32) is applied in any event and if it is failed steps 29 to 31 are repeated. Otherwise the analysis proceeds to the output to phase 2 ( Figure 5b)).
  • step (34) the information assets are sorted and grouped, which essentially corresponds to generating the appropriate sub-divisions in each of these cells 8C of matrix 8 as illustrated in Figure 2.
  • An initial inventory of the information asset is then made (step 35) in order to ensure that nothing has been omitted and optionally a test for completeness (step 35a) is applied at this point. If it is failed then steps 34 and 35 are repeated until it is satisfied and the analysis can proceed to step 36, the valuation of the assets. This is carried out under the guidance of the computer program as described above with reference to Figures 1 to 4.
  • step 37 If these are failed then steps 34 to 36 are repeated and if these are passed then the analysis proceeds to the information evaluation phase (step 38) as illustrated in Figure 5c).
  • Step 40 The processes illustrated in Figure 5c) involve the evaluation of the "information footprint "(Step 40), ie. the two-dimensional distribution of value against the nature (human/analogue/digital) of the information and business aspects (technical/commercial/financial), followed by an examination of the contribution to the business made by each of the categories corresponding to the various cells 8C (step 41). It may turn out for example that a large store of value in a particular class of asset is not being utilised efficiently and this may lead to discussions as to whether to sell the asset or use it in a different manner.
  • a security assessment (step 42) is then carried out in order to assess the risks associated with the various categories of information asset and a report can be presented to the company (step 43).
  • the company can then consider the outcome (step 44) and either close the analysis (step 46) or repeat the analysis in more detail or in respect of another part of the business (step 45). In other words the analysis could revert to step 29 and could be applied (say to a different business unit).
  • Figure 6 now summarises the information processing performed with the aid of the computer 1 of Figure 1 and involves an initial step of selecting the type and form for information (step 47) by clicking on the appropriate sub-division of the appropriate cell 8C as shown in Figure 2 resulting in the opening of a data entry screen (step 48), a typical entry screen being shown in Figure 4 followed by selecting a field (12 or 13 - Figure 4) and entering the data (step 49) and repeating for every item of data appropriate to the selected cell (step 50). This procedure is then repeated for all the other cells 8C (step 51) and the data entry screen is closed (step 52) followed by applying the appropriate weighting factors w and s ⁇ to enable the subtitles of value for each cell to be calculated. An output screen is then selected (step 54), the form of output is then selected (step 55) and the output is then saved to a file and/or printed and/or displayed on screen (step 56).
  • the methods and tool of the invention enable a thor ough analysis of a company's assets (particularly its information assets) to be performed in a systematic manner, which will aid in the optimisation of industrial output and should enable other technical problems to be identified and overcome.

Abstract

A matrix (8) is established for the business assets of a company and is divided into a 3 x 3 array of cells (8C) and distributed over human, analogue and digital categories of information and technical, commercial and financial aspects of the business. A user is guided by the program to enter the relevant business assets in the appropriate cells and the program then guides the user in compiling an inventory of all the business assets and valuing the assets in each category associated with a respective cell. Weighting factors are applied to all the crude values to take into account the scarcity of particular items of information, their security and the dependence on security of their value. A two-dimensional 'footprint' of value against information type and business aspect results which can be compared with corresponding 'footprints' of other companies in the sector to enable anomalies to be identified.

Description

BUSINESS ANALYSIS TOOL AND METHOD
The present invention relates to a tool for management of business assets (and particularly but not exclusively information assets), to a method of establishing an inventory of business information assets and to a method of establishing a distribution of value of business information assets, and the total value of each class of information assets, and the total value of a business 's information assets, as well as to a computer adapted for use in such methods.
The value of information is implicitly recognised by legislation such as data protection, copyright and patent laws, insider trading regulations and the like. However, there are no generally recognised methods for assessing the monetary value of information in widespread use.
Furthermore, the body of literature on information theory which stretches back some forty-five years does not include a generally accepted method for systematically reviewing and assessing the value of an organisation's information and data resources. Organisations imply in many different ways that information has a value, yet the financial value is rarely made explicit. When this is done, it is restricted to those classes of information which are bought and sold, eg. share price information and credit ratings.
There is also a body of work associated with accounting standards, part of which is concerned with the value of intangibles and with the capitalisation of R & D expenditure. The institutions responsible for accounting standards recognise the difficulties in valuing intangibles. In general, the value of intangibles and goodwill is treated as a residual element. However, this approach is increasingly regarded as unsatisfactory and ineffective.
An object of the present invention is to provide a management tool and a method which are more systematic, consistent, accurate and useful than those used in the prior art. A further object of the present invention is to provide a tool and method to facilitate answering at least some of the following questions which are frequently addressed to practising managers:
1. What information assets are held by your company (a) in human memory, skill and experience, (b) on paper, and © captured and stored within the databases and algorithms of your computer systems?
2. Does your business strategy recognise and reflect the importance and value of your information assets?
3. Is there a clear and accurate picture of the ownership of the information assets needed to operate your business? (and are you fully aware of your obligations to the owners of any third party information assets which you employ?)
4. Is your business strategy successfully aligned with your information systems strategy and does this reflect the value of the information assets managed through such systems?
5. Do your human resource systems and staff development programmes maintain the value of the information assets which are embodied in the skills and experience of your employees?
6. How do your information and knowledge management practices match up against those of your industry sector?
7. Have you addressed the information "make" or "buy" decision across all your information assets and requirements?
8. Do your security, contingency and business continuity plans adequately protect the integrity and availability of your key information assets? 9. Are your analyses of the business value chain able to demonstrate how information assets add value to your products and services?
10. Do your management systems allow you to include valuations of your information assets in your company reports in such a way that your shareholders, investors, and employees are able to assess the contribution of mformation to the business?
In one aspect, the present invention provides a tool for management of business assets comprising means for establishing a matrix of information concerning business assets, rows and columns in the matrix each being associated with respective categories of such assets such that the cells define a discrete distribution in two or more dimensions of categories of such iriformation, graphical user interface means including means for prompting a user to enter information about business assets of an appropriate category in each cell, display means for displaying the matrix of mformation and processor means arranged to process the information in the matrix, wherein the nature of the information in different categories varies over one dimension of the matrix and the business aspect to which the information in different categories relates varies over another dimension of the matrix.
When the invention is used over a period of time, the business may, in addition build up a picture of changes in asset values over time.
By establishing, processing and displaying information in the form of a matrix as aforesaid, information can be processed in a faster and more efficient way than has hitherto been possible.
It will be understood that the tool can be implemented purely in computer hardware, by the use of appropriate circuitry, or (more preferably) in a combination of computer hardware and software.
Preferably, said different categories of the nature of the information include human know-how and/or analogue information and/or digital information. By analogue information is meant information which is not represented digitally such as the information embodied in a die form of casting a specified shape for example, and that which is maintained in iconic form as writing or symbols on paper or other media. Digital information could include any information stored digitally on eg. a computer or computer-readable medium. Human know-how could include the skills and capabilities of the workforce for example.
Preferably, the different categories of the business aspect to which the information relates include technical and/or commercial and/or financial aspects (preferably all three).
Preferably, cells in said matrix are selectable by a pointing device (such as a mouse for example) operable by the user and, when thus selected, cause windows to open on said display means which prompt the user to enter business assets of the appropriate category and relating to the appropriate business aspect in the corresponding cells.
Preferably, said cells in the matrix are sub-divided into different classes of business assets independently of said categories of nature of information and business aspect. For example, the cell containing technical analogue information could contain details of different processes and different machines. Such technical analogue information might, for example, be a technical memorandum describing the manufacture of a pharmaceutical product or an engineer's machined foam or plastic model.
Further preferred features of this aspect of the invention are defined in dependent claims to the above tool.
In another aspect, the invention provides a method of establishing an inventory of business information assets comprising the steps:
I) establishing the information processing steps performed in the business; ii) establishing the information utilised in and generated by said information processing steps;
iii) categorising the information of step ii) at least two-dimensionally according to a) the nature of the information and b) the business aspect to which the information relates;
iv) establishing an inventory of items of information in each category of step iii);
v) assigning a value to the inventory of step iv) by applying a valuation to the items in each category of step iii).
Preferably, the categorising step is performed by means of a matrix as used in the first aspect of the invention.
Preferably the valuation step v) is performed by applying a formula which includes a weighting factor having the effect of multiplying the value in each category by a factor of between zero and unity. The weighting factor can, for example, represent the scarcity or accessibility of the corresponding asset. For example, if the relevant business asset is a die of which only one is possessed by the company and further dies of that type are difficult to obtain or can be obtained only after a long delay or can be obtained only in uneconomically large quantities then the weighting factor will be relatively high. In the financial sector, an equation or a computer program supplied by an external analyst may be assigned a higher weighting value if the company's contract with the analyst only allows limited use of the formula or program - eg. once a month.
In a preferred embodiment the above valuation step v) is performed by applying a formula and which includes a security weighting factor having an exponent, the security weighting factor having the effect of multiplying the assigned value by a factor dependent on the security of the associated business asset, the exponent having the effect of multiplying said factor by an amount dependent on the degree of dependence of the value on the security of said associated business asset. For example financially sensitive information which would drastically affect a company's share price if generally known would have a high value of the exponent.
Preferably, all business information assets are divided into one of the three classes: human know-how, analogue information and digital information and all the business aspects are divided into one of the three classes: technical, commercial and financial, although of course other classes may alternatively or additionally be used.
It is recognised that at least some items are difficult to value and may not be capable of being valued objectively. In order to overcome this technical problem in a preferred embodiment, at least some items are valued subjectively by:
a) ranking them in order of value with comparable items of which at least one item, and preferably several items, has or have a known or assignable value;
b) establishing a normalised valuation scale from the ranked items of step a), and
c) deriving the unknown value from the known or assigned value and the normalised valuation scale.
For example, if item C were considered to have a value twice that of item D and items A and B were both considered to have a value twice that of item C then the values on an arbitrary percentage scale of A, B, C and D would be 100, 100, 50 and 25. If item A could be assigned a value of say £5,000 either subjectively or by reference to some market value then items C and D could be valued at £2,500 and £1,250 respectively.
Since it is recognised in accordance with a preferred feature of the invention that the valuation of an information asset can be affected by local factors such as scarcity and security, the above valuation step v) is preferably performed by applying a formula which includes a weighting factor having the effect of multiplying the value in each category by a factor of between zero and unity. Preferably the above valuation step is performed by applying a formula which includes a security weighting factor having an exponent, the security weighting factor having the effect of multiplying the assigned value by a factor dependent on the security of the associated business asset, the exponent having the effect of multiplying said factor by an amount dependent on the degree of dependence of the value on the security of said associated business asset.
The invention also provides a computer program to guide a user through at least steps I) to iv) of the above method by means of a graphical user interface.
In a further aspect, the invention provides a method of establishing a distribution of value of business information assets comprising the steps:
I) establishing the information utilised in the business;
ii) categorising the information of step I) at least two-dimensionally according to a) the nature of the information and b) the business aspect to which the information relates;
iii) assigning a tentative value to the information in each category by a first method;
iv) assigning a tentative value to the information in each category by a second method, and
v) arriving at a distribution of value by constructing a distribution between the distribution envelopes of steps iii) and iv).
The above method is useful in establishing a distribution or "footprint", which is a unique identifier, of business information assets which can be compared with the corresponding distribution or "footprint" of other companies in the same sector. The resulting comparison is useful in financial analysis, management consultancy, planning mergers and acquisitions, and the like. The valuations of steps iii) and iv) above can be selected from valuations based on:
I) external market value,
ii) value based on attribution to costs and contribution to profit, and
iii) subjective perception of value, for example.
The invention also provides a computer programmed to prompt a user through the steps of the above method by a graphical user interface. Optionally, the computer can be arranged to modify the valuations by applying formulae containing the weighting factors described above.
Preferably the information is classified by means of a matrix as used in the first aspects of the invention.
Preferred embodiments of the invention are described below by way of example only with reference to Figures 1 to 6, wherein:
Figure 1 is a schematic perspective view of a computer programmed to act as a tool in accordance with the present invention;
Figure 2 is a screen dump showing one layer of a matrix established by the programmed computer of Figure 1;
Figure 3 is a three-dimensional representation of the above matrix;
Figure 4 is a screen dump showing a screen generated by the computer of Figure 1 in response to clicking on one of the boxes in the screen dump of Figure 2;
Figure 5 is a flow diagram showing the first, information mapping phase of a method in accordance with the second aspect of the invention; Figure 5b) is a flow diagram showing the second, information valuation phase of an embodiment of the above method;
Figure 5 c) is a flow diagram showing the third, information evaluation phase of the above embodiment; and
Figure 6 is a flow diagram illustrating the computation of the value of the assets of a business using the programmed computer of Figure 1.
Referring to Figure 1 , the computer 1 (which is preferably a Pentium® PC running the Windows® operating system) is provided with a conventional keyboard 2 and mouse 3 which supply input signals to a microprocessor 5 having data buses connecting it to ROM 6 and RAM 7. The microprocessor is also linked in a conventional manner to a hard disk 11 on which a program for use with the invention is stored. Additionally, the microprocessor is coupled in a conventional manner to a floppy disk drive 10 and has an output to a conventional display 9. An additional output (not shown) links the computer to a printer 4. It will be appreciated by persons skilled in the art that the above is a simplified description of a general purpose PC. In accordance with one aspect of the present invention, a program stored on hard disk 11 is arranged to load a matrix 8 into RAM 7 and this matrix will now be described with reference to Figures 2 and 3.
From henceforth, it will be understood that references (in whatever form) to information, its use, processing or storage imply, where the context so allows, that the information is handled by the computer as electrical signals which are, as appropriate, stored in computer memory, processed by the microprocessor 5 and output as visual signals on the display 9.
Referring to Figure 3, the matrix is three-dimensional and contains eg. three layers (corresponding to periods P 1 , P2 and P3) of a rectangular 3 x 3 array of information cells 8c (Figure 2) in the array being divided in the horizontal direction into the three categories of human, analogue and digital business assets and being divided vertically into the three categories of technical, commercial and financial business aspects.
The user selects an appropriate layer of matrix 8 (Figure 2) and is presented with a screen as shown in Figure 2 wherein each of the nine cells 8c of the matrix is divided into different classes of assets. For example, the commercial analogue information cell (identified as X (2,2)) is divided into personnel, assets, processes and indices (weighting factors). In this case the value of staff records, statements of qualification and so on are entered and computed from the "hot button" labelled "personnel".
The program loaded from hard disk 11 presents each of the above sub-divisions of the cells 8c as a "hot button" which when clicked on using the mouse 3 or other pointing device leads the user to a further screen as shown in Figure 4.
The particular screen shown in Figure 4 is displayed in response to clicking on the "Personnel" hot button in Cell X(l,2). For example, an employment agent supplying skilled engineers on contract to an offshore oil production platform would need to hold records of the technical qualifications for his contract staff.
The screen represented in Figure 4 concerns information recorded on paper eg. designs and drawings and has a box 12 in which the user enters the number of pages of a given document and a box 13 in which the user enters the identity of the repository of the relevant design or other document. The repository can be a class of documents such as documents relating to engine design for example. When the user is satisfied that he has completed boxes 12 and 13 correctly he clicks on boxes 14 and 15 respectively to enter the respective data and the program loaded from hard disk 11 then performs its functions. Firstly, it calls up a program which calculates the value of the asset (in this case a design document relating to engine design) by means of questions presented on screen to the user who enters the required information. In some cases this may include a subjective valuation in accordance with the third aspect of the invention. The information entered by the user is then processed by the called up program to arrive at a crude valuation x. The user then calls up a program for calculating a local weight w by clicking on the "local weight" hot button 16. The called up program then enters into a dialogue with the user on the screen to enable an appropriate local weight to be calculated for the relevant data which represents the scarcity value of the data. The user then clicks on a "security index" hot button 17 which similarly calls up a program which enters into a dialogue on screen with the user to enable a security index sα to be calculated. The value of the local weight w and the value of the security index sα are recorded and displayed in boxes 18 and 19 respectively and the resulting weighted value is determined by the program and displayed in box 25 alongside the information already entered in boxes 12 and 13 which is repeated in boxes 21 and 23 respectively.
Other hot buttons may be provided, via which access can for instance be gained to proprietary sof ware. For example links may be made to software such as HTvTEW (London School of Economics), @RISK (US) , WITNESS (Lanner Group), the Microsoft Excel spreadsheet tool, a database engine such as the Microsoft Access tool, and COPIT (UK software associated with the British Standards Institution code of practice on security management).
The above process is then repeated for a further item and the results displayed in a similar manner in box 26 adjacent to the repository name in box 22 and the number of pages in box 24 respectively. The processor is then repeated for all the items falling within the (1,2) cell 8c and the sub-total of the value of all the company's assets in that category is displayed in box 27.
A similar procedure is then carried out for the other cells 8c in the matrix and for the other layers of such cells relating to different periods. In some cases, the values appropriate to one period may be calculated from the values determined in respect of another period from a known relationship governing eg. the depreciation of value of various categories of information over time.
Mathematically, the weighting may be represented as follows (in the following series the terms "I" and "j" are omitted to prevent confusion with their previous use): Let X = [X. .] be an array with X. £R
Figure imgf000014_0001
where O≤ S≤ 1 is the security index, is the local weight on S and where Wy is the local weight on X, and V is the value.
Let ∑u = f(a,b,c, ) where the terms are attributes of information value: a is market price: sell price, buy price, spread b is replacement cost c is maintenance cost d is cost of creation e is information turnover: timeliness and half-life f is accuracy: verifiability, completeness, date, evidential value g is availability: criticality and risk in business process h is security: protection cost, data protection, privacy k is ownership: originality, designs, patents, brands, IP
The array X represents a layer of the above-described matrix 8 and xy represents the sum of the unweighted values of the assets in the cell 8c of the ith row and jth column. In this case m = 3 and n = 3. W;j is the local weighting value for information in the ith row and jth column, S is the security index appropriate to the ith row and jth column and the exponent αy modifies the value of S. α can have any positive value. As noted above, α represents the criticality of the security of the information to its value.
In general, the value of the local weighting index is a function of (eg. a linear function) of the values represented by the parameters a to k, some or all of which may need to be determined subjectively in accordance with the third aspect of the invention.
Figures 5a) to 5c) show in flow diagram form a method of establishing an inventory of business information assets in accordance with the second aspects of the invention, this procedure preferably including the above-described establishment of the matrix and summing the value sub-totals derived for each cell 8C.
The analysis is opened (step 28) and the scope is determined in step 29. For example, the analysis may be applied at a relatively crude level at board level, or may be applied (at a greater level of detail) to a business unit or may be applied (comprehensively, in still greater detail) to the entire enterprise represented by the company. The valuation objectives are then established (step 30) before mapping all the processes and information assets utilised in the company. Optionally, a test for completeness (step 30a) may be applied at this stage and if it is failed then the steps 29 and 30 can be repeated until the test is satisfied. After the processes and information assets have been mapped in step 31 a test for completeness (step 32) is applied in any event and if it is failed steps 29 to 31 are repeated. Otherwise the analysis proceeds to the output to phase 2 (Figure 5b)). It should be noted that all of the above processes involve discussion with the company's personnel but may additionally involve a dialogue guided by a computer program.
In the next taxonomy step (34) the information assets are sorted and grouped, which essentially corresponds to generating the appropriate sub-divisions in each of these cells 8C of matrix 8 as illustrated in Figure 2. An initial inventory of the information asset is then made (step 35) in order to ensure that nothing has been omitted and optionally a test for completeness (step 35a) is applied at this point. If it is failed then steps 34 and 35 are repeated until it is satisfied and the analysis can proceed to step 36, the valuation of the assets. This is carried out under the guidance of the computer program as described above with reference to Figures 1 to 4.
Again, appropriate checks for completeness are performed (step 37). If these are failed then steps 34 to 36 are repeated and if these are passed then the analysis proceeds to the information evaluation phase (step 38) as illustrated in Figure 5c).
The processes illustrated in Figure 5c) involve the evaluation of the "information footprint "(Step 40), ie. the two-dimensional distribution of value against the nature (human/analogue/digital) of the information and business aspects (technical/commercial/financial), followed by an examination of the contribution to the business made by each of the categories corresponding to the various cells 8C (step 41). It may turn out for example that a large store of value in a particular class of asset is not being utilised efficiently and this may lead to discussions as to whether to sell the asset or use it in a different manner.
A security assessment (step 42) is then carried out in order to assess the risks associated with the various categories of information asset and a report can be presented to the company (step 43). The company can then consider the outcome (step 44) and either close the analysis (step 46) or repeat the analysis in more detail or in respect of another part of the business (step 45). In other words the analysis could revert to step 29 and could be applied (say to a different business unit).
Figure 6 now summarises the information processing performed with the aid of the computer 1 of Figure 1 and involves an initial step of selecting the type and form for information (step 47) by clicking on the appropriate sub-division of the appropriate cell 8C as shown in Figure 2 resulting in the opening of a data entry screen (step 48), a typical entry screen being shown in Figure 4 followed by selecting a field (12 or 13 - Figure 4) and entering the data (step 49) and repeating for every item of data appropriate to the selected cell (step 50). This procedure is then repeated for all the other cells 8C (step 51) and the data entry screen is closed (step 52) followed by applying the appropriate weighting factors w and sα to enable the subtitles of value for each cell to be calculated. An output screen is then selected (step 54), the form of output is then selected (step 55) and the output is then saved to a file and/or printed and/or displayed on screen (step 56).
It will be seen that the methods and tool of the invention enable a thor ough analysis of a company's assets (particularly its information assets) to be performed in a systematic manner, which will aid in the optimisation of industrial output and should enable other technical problems to be identified and overcome.
The accompanying annex is hereby incorporated in its entirety by reference.
It will be understood that the present invention has been described above purely by way of example, and modifications of detail can be made within the scope of the invention.
Each feature disclosed in the description, and (where appropriate) the claims and drawings may be provided independently or in any appropriate combination.

Claims

Claims
1. A tool for management of business assets comprising means for establishing a matrix of information concerning business assets, rows and columns in the matrix each being associated with respective categories of such assets such that the cells define a discrete distribution in two or more dimensions of categories of such information, graphical user interface means including means for prompting a user to enter information about business assets of an appropriate category in each cell, display means for displaying the matrix of information and processor means arranged to process the information in the matrix, wherein the nature of the information in different categories varies over one dimension of the matrix and the business aspect to which the information in different categories relates varies over another dimension of the matrix.
2. A tool as claimed in claim 1 wherein said different categories of the nature of the information include human know-how and/or analogue information and/or digital information.
3. A tool as claimed in claim 1 or claim 2 wherein said different categories of the business aspect to which the information relates include technical and/or commercial and/or financial aspects.
4. A tool as claimed in claim 3 as dependent on claim 2 wherein said matrix divides all information assets into one of the three categories: human know-how, analogue information and digital information and divides all the business aspects into one of the three categories: technical, commercial and financial.
5. A tool as claimed in any preceding claim wherein cells in said matrix are selectable by a pointing device operable by the user and, when thus selected, cause windows to open on said display means which prompt the user to enter business assets of the appropriate category and relating to the appropriate business aspect in the corresponding cells.
6. A tool as claimed in any preceding claim wherein said cells in the matrix are subdivided into different classes of business assets independently of said categories of nature of information and business aspect.
7. A tool as claimed in claim 6 wherein the subdivisions of said cells are variable by the user.
8. A tool as claimed in any preceding claim wherein cells in the matrix are associated with respective formulae for deriving one or more parameters deducible from said business assets and said processing means is arranged to calculate said one or more parameters from the information stored in the cells.
9. A tool as claimed in claim 8 wherein said one or more parameters include an extensive parameter which is determined by the sum of the contributions from two or more of said cells.
10. A tool as claimed in claim 9 wherein said extensive parameter is value.
11. A tool as claimed in claim 9 or claim 10 comprising means for associating cells in said matrix with an expression for establishing the value of said parameter in respect of each cell, the expression including a weighting factor to be applied to an extensive variable whose entry is prompted by the tool, said weighting factor having the effect of multiplying said extensive variable by a factor of between zero and unity.
12. A tool as claimed in any of claims 9 to 11 comprising means for associating cells in said matrix with an expression for establishing the value of said parameter in respect of each cell, the expression including a security weighting factor having an exponent, the security weighting factor having the effect of multiplying said extensive variable by a factor dependent on the security of an associated business asset, the exponent having the effect of multiplying said factor by an amount dependent on the degree of dependence of said parameter on the security of said associated business asset.
13. A tool as claimed in any preceding claim wherein the dimensionality of said matrix is at least three and said matrix has at least two layers of said cells, the respective layers relating to different time frames.
14. A tool as claimed in claim 13 wherein said processing means is arranged to populate the cells in one layer with information derived from calculations performed on information in another layer.
15. A method of establishing an inventory of business information assets comprising the steps:
I) establishing the information processing steps performed in the business;
ii) establishing the information utilised in and generated by said information processing steps;
iii) categorising the information of step ii) at least two-dimensionally according to a) the nature of the information and b) the business aspect to which the information relates;
iv) establishing an inventory of items of information in each category of step iii);
v) assigning a value to the inventory of step iv) by applying a valuation to the items in each category of step iii).
16. A method as claimed in claim 15 wherein said valuation step v) is performed by applying a formula which includes a weighting factor having the effect of multiplying the value in each category by a factor of between zero and unity.
17. A method as claimed in claim 15 or claim 16 wherein said valuation step v) is performed by applying a formula which includes a security weighting factor having an exponent, the security weighting factor having the effect of multiplying the assigned value by a factor dependent on the security of the associated business asset , the exponent having the effect of multiplying said factor by an amount dependent on the degree of dependence of the value on the security of said associated business asset.
18. A method as claimed in any of claims 15 to 17 wherein all business information assets are divided into one of the three classes: human know-how, analogue information and digital information and all the business aspects are divided into one of the three classes: technical, commercial and financial.
19. A method as claimed in any of claims 15 to 18 wherein at least some items are valued subjectively by:
a) ranking them in order of value with comparable items of which at least one item has a known or assignable value;
b) establishing a normalised valuation scale from the ranked items of step a), and
c) deriving the unknown value from the known or assigned value and the normalised valuation scale.
20. A method as claimed in any of claims 15 to 19 when performed by a tool as claimed in any of claims 1 to 14.
21. A computer programmed to guide a user through at least steps I) to iv) of the method of claim 15 by means of a graphical user interface.
22. A computer as claimed in claim 21 which is arranged to perform step v) of the method of claim 15 by applying a formula as defined in claim 16 or claim 17.
23. A method of establishing a distribution of value of business information assets comprising the steps:
I) establishing the information utilised in the business;
ii) categorising the information of step I) at least two-dimensionally according to a) the nature of the information and b) the business aspect to which the information relates;
iii) assigning a tentative value to the information in each category by a first method;
iv) assigning a tentative value to the information in each category by a second method, and
v) arriving at a distribution of value by constructing a distribution between the distribution envelopes of steps iii) and iv).
24. A method as claimed in claim 23 wherein the valuations of steps iii) and iv) are selected from valuations based on:
I) external market value,
ii) value based on attribution to costs and contribution to profit, and iii) subjective perception of value.
25. A computer programmed to prompt a user through the steps of the method of claim 23 or claim 24 by a graphical user interface.
26. A computer as claimed in claim 25 which is arranged to modify the valuations by applying a formula as defined in claim 15 and/or claim 16.
27. A computer as claimed in claim 25 or claim 26 wherein the information is classified by means of a matrix as defined in any of claims 1 to 4.
28. A computer when programmed to perform any of the steps of 15 to 20 or 23 and 24.
29. A footprint of business information assets obtained using the method of any of Claims 15 to 19.
30. A business analysis tool or method substantially as described herein above with reference to the accompanying drawings.
PCT/GB1998/000642 1997-02-28 1998-03-02 Business analysis tool and method WO1998038588A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GBGB9704187.5A GB9704187D0 (en) 1997-02-28 1997-02-28 Business analysis tool and method
GB9704187.5 1997-02-28

Publications (1)

Publication Number Publication Date
WO1998038588A1 true WO1998038588A1 (en) 1998-09-03

Family

ID=10808485

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB1998/000642 WO1998038588A1 (en) 1997-02-28 1998-03-02 Business analysis tool and method

Country Status (2)

Country Link
GB (1) GB9704187D0 (en)
WO (1) WO1998038588A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000034911A2 (en) * 1998-12-11 2000-06-15 Arthur Andersen Llp System for modeling, measuring, managing, and depicting the effects of business decisions on market value
US6321205B1 (en) * 1995-10-03 2001-11-20 Value Miner, Inc. Method of and system for modeling and analyzing business improvement programs
WO2002001430A1 (en) * 2000-06-28 2002-01-03 Whw Holding B.V. System and method for changing a value assigned to a value bearer
US7523065B2 (en) 2001-12-12 2009-04-21 Asset Trust, Inc. Risk transfer supply chain system
US7580848B2 (en) 1997-01-06 2009-08-25 Asset Trust, Inc. Method of and system for analyzing, modeling and valuing elements of a business enterprise
US7970640B2 (en) 2002-06-12 2011-06-28 Asset Trust, Inc. Purchasing optimization system
US10839321B2 (en) 1997-01-06 2020-11-17 Jeffrey Eder Automated data storage system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0587290A2 (en) * 1992-07-30 1994-03-16 Teknekron Infoswitch Corporation Method and system for monitoring and/or controlling the performance of an organization
US5359724A (en) * 1992-03-30 1994-10-25 Arbor Software Corporation Method and apparatus for storing and retrieving multi-dimensional data in computer memory
US5365425A (en) * 1993-04-22 1994-11-15 The United States Of America As Represented By The Secretary Of The Air Force Method and system for measuring management effectiveness
US5572644A (en) * 1992-04-08 1996-11-05 Borland International, Inc. System and methods for multi-dimensional information processing

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5359724A (en) * 1992-03-30 1994-10-25 Arbor Software Corporation Method and apparatus for storing and retrieving multi-dimensional data in computer memory
US5572644A (en) * 1992-04-08 1996-11-05 Borland International, Inc. System and methods for multi-dimensional information processing
EP0587290A2 (en) * 1992-07-30 1994-03-16 Teknekron Infoswitch Corporation Method and system for monitoring and/or controlling the performance of an organization
US5365425A (en) * 1993-04-22 1994-11-15 The United States Of America As Represented By The Secretary Of The Air Force Method and system for measuring management effectiveness

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6321205B1 (en) * 1995-10-03 2001-11-20 Value Miner, Inc. Method of and system for modeling and analyzing business improvement programs
US7580848B2 (en) 1997-01-06 2009-08-25 Asset Trust, Inc. Method of and system for analyzing, modeling and valuing elements of a business enterprise
US7693733B2 (en) 1997-01-06 2010-04-06 Asset Trust, Inc. Method of and system for analyzing, modeling and valuing elements of a business enterprise
US10839321B2 (en) 1997-01-06 2020-11-17 Jeffrey Eder Automated data storage system
WO2000034911A2 (en) * 1998-12-11 2000-06-15 Arthur Andersen Llp System for modeling, measuring, managing, and depicting the effects of business decisions on market value
WO2000034911A3 (en) * 1998-12-11 2000-11-30 Arthur Andersen Llp System for modeling, measuring, managing, and depicting the effects of business decisions on market value
WO2002001430A1 (en) * 2000-06-28 2002-01-03 Whw Holding B.V. System and method for changing a value assigned to a value bearer
NL1016309C2 (en) * 2000-06-28 2002-02-12 Whw Holding B V System and method for changing for a value assigned to a value bearer.
US7523065B2 (en) 2001-12-12 2009-04-21 Asset Trust, Inc. Risk transfer supply chain system
US7970640B2 (en) 2002-06-12 2011-06-28 Asset Trust, Inc. Purchasing optimization system

Also Published As

Publication number Publication date
GB9704187D0 (en) 1997-04-16

Similar Documents

Publication Publication Date Title
Beynon-Davies Information Systems Development: an introduction to information systems engineering
Cooper et al. Project risk management guidelines
Chambers et al. The operational auditing handbook: auditing business and IT processes
WO2003012573A2 (en) Method and system for valuing intellectual property
Elliott et al. Audit technology: A heritage and a promise
Wilson Marketing Audit Handbook
Rashedi et al. How influence the accounting information systems quality of internal control on financial reporting quality
US11688017B1 (en) Computer system and method for detecting, extracting, weighing, benchmarking, scoring, reporting and capitalizing on complex risks found in buy/sell transactional agreements, financing agreements and research documents
Ragowsky et al. Assessing the value provided by ERP applications through organizational activities
Calof et al. Big data analytics and international market selection: an exploratory study
Bickerdyke et al. Reducing the regulatory burden: does firm size matter?
Antill et al. Systems analysis: made simple computerbooks
WO1998038588A1 (en) Business analysis tool and method
JP2004046363A (en) Medium and small size enterprise grading evaluation system
US7467107B1 (en) Web-based system and method for hedge fund compliance
Chorafas Financial models and simulation
Bashir et al. EVALUATION OF SHARI'AH GOVERNANCE PRACTICES IN SAUDI ARABIAN BANKS
Teye et al. Assessing the Internal Control System of Cocoa Processing Company, Tema, Ghana
Aoude Computerized construction delay management system
Michaelson Development Of An Expert Computer System To Assist In The C
Grimlund A framework for the integration of auditing evidence.
Jauhiainen How should corporate governance structures and mechanisms be created to comprise AI-based accounting and its auditing in the future?
Dusseau An analysis of the relationship between financial performance and total quality management implementation
Baksa Continuous monitoring of enterprise risks: A delphi feasibility study
Yuspin et al. Risk aversion in the future of financial advisory: The legal protections for Robo-Advisor users in mutual fund investments

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): CA JP US

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: CA

122 Ep: pct application non-entry in european phase