![]() |
procurementveryard projects > business relationship management > procurement |
we offer | material | links | |
consultancy
management briefings and technical education independent advice on tools and methods |
|
![]() |
![]() |
The Pitfalls of Procurementveryard projects > procurement > pitfalls |
![]() |
Counter-Productive Procurement Mechanismsveryard projects > procurement > counter-productive mechanisms |
Savvy suppliers use these very mechanisms to gazump their customers. They win a competitive tendering situation by submitting a low bid against a flawed specification, in the certain knowledge that they can recoup the profitability of the contract later by "discovering" the flaws in the contract. And the customer often loses more (both financially and otherwise) by resisting the supplier's gazumping gambit than by acceding to it.
(This is like house-buyers who use trivial details on the structural survey to demand large reductions in the already agreed price.)
The fact that the purchaser insists on these mechanisms communicates a lack of trust to the supplier. This lack of trust is self-fulfilling -- the suppliers behave badly because they are in a context where bad behaviour (on both sides) is expected.
It could be argued that it is the lack of trust shown by these mechanisms that encourages such tricky tactics.
Although these phenomena are notorious in IT -- especially in relation to large Government contracts -- they can be found in many other domains - including military, aerospace and civil engineering projects.
We need strategies for building trust (or dismantling distrust), with a recognition that this may take time.
Good fences make good neighbours. What is the nature of the fence
between business and IT? High enough to demark
the territory, low enough to have a decent conversation. Some procurement
procedures and contracts are like planting
Cyprus Leylendii - it grows so high, you cannot see your angry neighbour
plotting with a chainsaw. Hedging your bets?
![]() |
Trust
Procurement Examples (Risk Broker) Boundaries Business-IT Alignment |
![]()
|
![]() ![]() |