MANAGING INFORMATION TECHNOLOGY 7th EDITION CHAPTER 13 LEADING THE INFORMATION SYSTEMS FUNCTION Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-1 MANAGING THE IT ASSETS Technology Computer and communications infrastructure that enables information sharing over standard IT platforms Human Resources IT people talent with appropriate skills mix Business/IT Relationship Partnering relationships between business and IT managers, including joint decision-making Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-2 EVOLVING IS LEADERSHIP ROLE • Executive IS leadership role has evolved over time due to: – Rapid technological change – Opportunities for strategic IT applications and business intelligence – Increase in IT-savvy business managers – Ubiquitous IT usage Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-3 TOP IS EXECUTIVE ISSUES IN 2010 1. Business productivity and cost reduction 2. Business agility and speed-to-market 3. IT and business alignment 4. IT reliability and efficiency 5. Business process re-engineering Source: Survey of Society of Information Management members in mid-2010 Luftman and Ben-Zvi, MISQ Executive, Dec. 2010 Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-4 IS ORGANIZATION RESPONSIBILITIES AND GOVERNANCE • IS GOVERNANCE - Locus of decision-making and accountability for: 1) computer and network operations 2) application software (development of new applications and maintenance of existing applications) Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-5 TWO PRIMARY IS RESPONSIBILITIES Computer & Network Operations Application Software Development & Maintenance Planning, purchasing, installing, operating, and maintaining/upgrading: - Acquiring (custom-developing, purchasing or “renting”) - Computer hardware - Implementing - Maintaining/upgrading - Systems software on which applications software “runs” - Local area networks and wide area networks that support distributed computing and telecommunications for the enterprise Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall Application software for: - the entire enterprise - business units/departments - smaller work groups - individuals 13-6 IS GOVERNANCE ALTERNATIVES • Centralized Decision making and IS workers are concentrated within a central IS unit to take advantage of economies of scale and opportunities for integration of IS resources • Decentralized Decision making and IS workers are dispersed to be closer to business managers within highly autonomous business units and be responsive to their needs • Federal Combines both the centralized and decentralized designs to have the “best of both worlds.” The most typical Federal design is: – Centralized responsibilities for computer operations & networks – Decentralized responsibilities for applications software Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-7 IS GOVERNANCE ALTERNATIVES Fig 13.2 Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-8 IS GOVERNANCE ALTERNATIVES . • Another type of Federal IS governance design: - Centralized for “Shared” resources (services & applications) - Decentralized for “Local” IS resources “Local” Applications Software applications specific to a business unit or function Shared Applications (Enterprise systems such as ERP, CRM) Shared IT Services Fig 13.1: Shared versus “Local” IS Resources Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-9 SHARED SERVICES IN A MULTINATIONAL FIRM Shared Services Organization for Asia Pacific region at British America Tobacco Source: Brown and Vessey, 2003 Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-10 MANAGING IT SERVICE DELIVERY Technology Tradeoff Decisions - Equipment Location - Client/Server Allocations - Operating System Standards - Network Redundancy - Bandwidth Capacity - Network Response Time - Security, Privacy and Network Access Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-11 GREEN COMPUTING TRADEOFF DECISIONS • Hydroelectric Power • Virtualization Tools • Thin Clients • Enhanced sleep modes for microcomputers • E-waste recycling Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-12 EXAMPLE: BECOMING GREEN WITH BUSINESS INTELLIGIENCE United Parcel Service • Business intelligence helped identify ways for UPS to reduce idling times of its delivery trucks, saving fuel and reducing pollution - Creates fuel-efficient routes for its package delivery vehicles - Cuts fuel consumption by monitoring and reducing idling time of trucks at their delivery destinations • Move from a scheduled maintenance program to a condition-based maintenance program for its trucks - Fewer truck breakdowns and fewer replacement parts required for the vehicles, which eliminates waste Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-13 CHARGEBACK SYSTEMS • Chargeback systems place control of IS spending with business managers and enables them to better understand their true IT costs • Examples of IT resources that can be part of chargeback costs: - IS personnel (time spent and rate for specific skills) - Computer usage (or computer cycles used) - Disk file space (data storage costs based on type of storage unit) - Number of transactions processed - Amount of computer main memory used (per unit of time) - Number of users of an application Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-14 CHARGEBACK SYSTEMS Potential Benefits Fig 13.4 Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-15 CHARGEBACK SYSTEMS • What makes a good Chargeback System? - Understandable - Prompt and regular feedback - Controllable - Accountable - Costs related to benefits - Consistent with goals Fig 13.5 Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-16 SERVICE LEVEL AGREEMENTS (SLAs) Service Level Agreements (SLAs) Defines the client expectation for a specific type of IT service as well as procedures to follow when these expectations are not met. • Should include: - A simple definition of the service to be provided (e.g., help desk support) - The name(s) and contact information of IS personnel to contact for this service - A table listing the services to be provided and their costs (e.g., how quickly different types of problems will be responded to, and the costs associated with providing this type of service level) - Escalation procedures (e.g., who to contact if the agreed upon service response is not being provided) - A sign-off page for the appropriate business client and the IS liaison preparing the SLA document Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-17 IT SERVICE MANAGEMENT with ITIL • Information Technology Infrastructure Library (ITIL) - Processes that focus on the business aspect of IT service delivery - created by the British Office of Government Commerce - Describes how various IT processes should be performed to ensure outcomes such as: - Adequate computer capacity exists for new IT applications or other IT infrastructure changes - Tracking of a computer incident from the time it first appears until a system change is made to permanently fix the problem - Formal change management process are followed for changes to any component of an IT system ITIL Official Site Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-18 IT SERVICE DELIVERY: SUPPORTING COMPUTER USERS • IT support for employees using computer tools, including those developing software applications with these tools • Key principle: - Unique aspects of the organization, as well as the different support needs of work units and computer users, need to be taken into account when designing strategies and tactics for user support Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall Fig 13.6 Framework for Designing User Support 13-19 STRATEGIES FOR SUPPORTING USER COMPUTING 1.Laissez-Faire (“hands-off”) 2. Acceleration 3. Containment 4. Controlled Growth Fig 13.7 Strategies for User Computing Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-20 STRATEGIES FOR SUPPORTING USER COMPTING Laissez-faire • “Hands off” approach: low levels of control but also few resources for support • Common in 1980s when PCs were first introduced into corporations: IT leaders did not attempt to support or control their introduction. • Today: approach may be used with new personal technologies Acceleration • Low levels of formal controls and significant investments in resources to support users, to promote growth in tool usage • The goal is to encourage users to acquire and learn about computer tools, including developing their own applications, before introducing heavy control policies Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-21 STRATEGIES FOR SUPPORTING USER COMPTING Containment • Risk adverse approach with high levels of formal controls and procedures, including strict policies for tool security • Appropriate for highly regulated environments to be sure policies and procedures are formulated and enforced Controlled Growth • Combines high levels of formal controls and procedures with significant investments in resources • Considered to be the ideal, mature approach: organizations initially begin with a different strategy and then migrate to controlled growth Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-22 SERVICE LEVEL AGREEMENTS FOR DESKTOP SUPPORT • Speed in responding to user requests is a key performance metric • Different support levels based on the problem type are established in consultation with business unit managers • Different types of problems will have different maximum time periods in which they should be solved Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall Fig 13.8 13-23 COMMON SUPPORT SERVICES Fig 13.9 Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-24 COMMON POLICIES AND PROCEDURES • Establishing technology “standards” is typically an IS department responsibility, but some organizations have committees with business unit representatives to establish policies • Organizations communicate the policies and procedures to new employees via orientation programs • Control Policies have to be modified in response to new technologies, ways of working, new laws and new external threats Fig 13.10 Common Policies and Procedures Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-25 SUPPORTING TELECOMMUTERS • Telecommuters spend at least a part of their regular business hours using IT to perform their jobs outside of a company’s physical facilities, using a mobile office, an office in their personal home, or a temporary office at a shared work center away from the company’s main office. • Potential benefits from implementing Telecommuting include: - Increased workday flexibility and improved work-life balance for the telecommuter - Easier accommodation of communications across time zones for the organization Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-26 MANAGING IT APPLICATIONS • Legacy Systems - Maintenance of aging legacy systems can make up a large portion of IT budget - Integration of new technologies with legacy systems can be difficult and time-consuming - The trend is to replace custom-developed applications with purchased software packages for common business applications: the maintenance burden is moved to the vendor, which is expected to regularly develop revised versions of the software Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-27 IT APPLICATIONS PORTFOLIO APPROACH • IT Applications Portfolio – Software portfolio needs to be managed as an asset – For installed software, a company must know: - What software it owns - Where it is located - What it does - How effective it is - What risks are associated with the continued use – Systems project decisions take into account existing software as well as projects for new systems already underway Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-28 METRICS FOR IT APPLICATIONS – Performance metrics for projects to develop new applications: - High Quality - On-time Delivery - Within budget – IS processes to manage and deliver IT applications • Example: CMM (or CMMI) - Five levels of process maturity that can be measured - For outsourcing vendors, the certified CMM level of a vendor is often used in client firm evaluations of potential vendors Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-29 FIVE LEVELS OF CAPABILITY MATURITY FOR SOFTWARE DEVELOPMENT (CMM) Fig 13.11 Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-30 PROJECT MANAGEMENT OFFICE (PMO) – Management structure to oversee projects and improve project processes – Provides benefits in the form of: - Repeatable processes - Established change management procedures - Post-project reviews - Skilled project leaders Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-31 MANAGING IT HUMAN RESOURCES – Highest percentage of a typical IS budget is for IS personnel – Five categories of IS personnel skills: - Technical - Project Management - Business Domain - Sourcing - IT Administration Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-32 CATEGORIES OF IT HUMAN RESOURCE SKILLS Technical Skills • Systems analysis • Systems design • Programming • Systems testing • Database design/administration • IT architecture/standards • Operations (service delivery/ITIL) • Mainframe • Distributed systems • Operating systems • Voice/data telecommunications • Help desk/desktop support • Continuity/disaster recovery Project Management Skills • Project team leadership • Project planning, budgeting, & scheduling • Project risk management • User relationship management • CMM utilization • Working globally/virtual teaming Fig 13.12 Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-33 CATEGORIES OF IT HUMAN RESOURCE SKILLS Business Domain Skills • Account management & communications • Industry application knowledge • Company-specific knowledge • Function-specific knowledge • Business process design & reengineering • Change management/readiness Sourcing Skills • • • • Sourcing strategy Third-party provider selection Contracting & legal Vendor relationship management IT Administration Skills • IT governance • Financial management • Internal HR management Fig 13.12 continued Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-34 MANAGING IT HUMAN RESOURCES – Attracting, recruiting, and retaining qualified staff is a key responsibility for IS managers in collaboration with an organization’s HR staff – Some common practices that managers use to retain valued IS personnel include: - Changing the work environment to be more employee-friendly - Increasing career development opportunities - Providing community-building initiatives - Establishing monetary or other employee incentives Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-35 COMMON PRACTICES FOR RETAINING IT WORKERS Fig 13.13 Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-36 INTERNAL AND EXTERNAL IT STAFFING • Insourcing and Outsourcing of IT skills Large firms in developed countries (e.g., U.S., Western Europe) today outsource some IS activities to countries with lower labor costs - What skills are most likely to be outsourced? - What skills are most likely to be retained in-house? Fig 13.14 Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-37 MANAGING THE BUSINESS/IT RELATIONSHIP Business/IT Relationship Partnering relationships between business and IT managers, including joint decision-making - Business managers must work with IS managers to realize investments in IT resources - A formal statement of the IS organization’s role may be helpful in strengthening a strained or failed IT-Business relationship - A strong relationship is characterized as a partnership Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-38 MANAGING THE BUSINESS/IT RELATIONSHIP • Horizontal (lateral) mechanisms can be used to help build and foster the business/IT partnership Fig 13.15 Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-39 EXAMPLES OF HORIZONTAL MECHANISMS Formal Groups • Common example: IS Steering Committee with responsibilities to: - Approve requests for new technology investments - Set priorities for application development and implementation - Monitor progress of IT projects against timelines and budgets - Share responsibility and ownership for achieving business value from IT investments Formal Roles • Some organizations have managers in integrator roles to help achieve a strong Business/IT relationship • An Account Manager is an integrator role that manages the relationship between the IS organization and a particular business unit Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-40 MEASURING OVERALL IS PERFORMANCE Balanced Scorecar d • A tool that provides an overview of organizational performance that is not strictly based on financial performance. In this tool, customer satisfaction, internal processes, innovation and learning, and financial performance are the “balanced” metrics. Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-41 IS MANAGEMENT IN GLOBAL ORGANIZATIONS • Many large corporations operate globally • Key management issue is extent to which IT is standardized • Key region and country factors that impact global IT management: - Country Telecommunications Infrastructure - Legal and Security Considerations - Language and Culture - Time Zone Differences Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-42 MANAGING IT OUTSOURCING • Potential Outsourcing Benefits - Reduced costs - Obtaining expertise from large service provider - Ability to expand geographically - Flexibility to expand or reduce IT resources - Access to new technology Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-43 MANAGING IT OUTSOURCING • Common Characteristics of IT Service Outsourcing - Cost savings from leveraging different labor markets - Long-term contracts, which are common for outsourcing computer & communications, can be very complex and require months of preparation prior to vendor selection and contract negotiation - Outsourced IT services typically difficult to bring back in-house Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-44 MANAGING OFFSHORE IT OUTSOURCING Offshore Outsourcing: Outsourcing to a location outside of the country where the client is located Near-shore: Offshore outsourcing to a geographic location that is close to the “shores” of the client (which can take advantage of overlapping time zones) Best-shore: This term refers to the fact that there are multiple options for firms with multiple geographic sites, as they may have options to choose among their own global locations and select the “best shore” for a particular IT activity based on labor markets (costs and expertise), time zones (overlapping versus those that take advantage of different time zones), etc. Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-45 MANAGING OFFSHORE IT OUTSOURCING • Some key issues to consider for sourcing alternatives: - Support of business units that will be affected Impact due to differences in business practices and norms of personnel with different national backgrounds Need for training programs due to national, cultural, language, and location differences Need for face-to-face communications and/or appropriateness of available collaboration tools for a specific IT activity Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-46 COPYRIGHT All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 13-47
© Copyright 2026 Paperzz