Professional Documents
Culture Documents
IT Business Alignment
Business-IT alignment is a dynamic state in which a business organization is able to use information
technology (IT) effectively to achieve business objectives:
One of the main tasks of a CIO is to ensure that IT aligns with the business. It involves optimizing
communication between executives who make the business decisions and IT managers who oversee the
technical operations. The implementation of flexible business plans and IT architectures, as well as
effective cost allocation, are critical components of any business-IT alignment effort.
Some definitions focus more on outcomes (the ability of IT to produce business value) than means (the
harmony between IT and business decision-makers within the organizations).
Example:
“Alignment is the capacity to demonstrate a positive relationship between information technologies and
the accepted financial measures of performance.”
IT Alignment Achievement
To achieve IT Alignment, organizations must make better decisions that take into account both business
and IT disciplines. Establishing processes for decision-making and control is essentially what is meant by
the term "governance".
Ultimately, value must come not just from the IT tools that are selected, but also in the way that they
are used in the organization. For this reason, the scope of IT Alignment also includes business
transformation, in which organizations redesign how work is accomplished in order to realize
efficiencies made possible by new IT.
Technology resources
...are infrastructure, proprietary technology, hardware, and software.
Not necessarily rare or valuable, but difficult to appropriate and imitate. Low mobility but a fair degree
of substitutability.
It skills
...are technological knowledge, development knowledge, and operational skills.
Highly mobile, but less imitable or substitutable. Not necessarily rare but highly valuable.
Managerial IT resources
...is vendor and outsourcer relationship skills, market responsiveness, IS-business partnerships, IS
planning, and management skills.
More rare than the technology and IT skill resources. Also of higher value. High mobility given the short
tenure of CIOs. Nonsubstitutable.
Scenario planning
Scenario planning is not about predicting a future. Rather, it attempts to describe what is possible. The
result of scenario analysis is a group of distinct futures, all of which are plausible. The challenge then is
how to deal with each of possible scenarios.
The result of a BSP project is a technology roadmap aligning investments and business strategy. BSP
comprises 15 steps, which are classified into three sections by function.
• KPIs measure actual performance of critical aspects of IT such as projects, servers, networks
against predefined goals such as growing revenue, lowering costs, reducing risk.
• KPIs measure real-time performance or predict future results. Proactive vs. reactive.
In contrast, as companies find their business strategy is increasingly tied to IT solutions, the concerns
about outsourcing increase. In general, risks increase as the boundaries between the client company
and outsourcing vendor responsibilities blur and the scope of responsibilities expands. The failure rate
of outsourcing relationships remains high, with estimates ranging from 40 to 70 percent. Risks
associated with outsourcing: Shirking occurs when a vendor deliberately underperforms while claiming
full payment (e.g., billing for more hours than were worked, providing excellent staff at first and later
replacing them with less qualified ones). Poaching occurs when a vendor develops a strategic
application for a client and then uses it for other clients (e.g., vendor redevelops similar systems for
other clients at much lower cost, or vendor enters into client's business, competing against it).
Opportunistic reprising ("holdup') occurs when a client enters into a long-term contract with a vendor
and the vendor changes financial terms at some point or overcharges for unanticipated enhancements
and contract extensions.
Other risks are: irreversibility of the outsourcing decision, possible breach of contract by the vendor or
its inability to deliver, loss of control over IT decisions, loss of critical IT skills, vendor lock-in, loss of
control over data, loss of employee morale and productivity, and uncontrollable contract growth.
Another possible risk of outsourcing is failure to consider all of the costs. Some costs are hidden. Among
the most significant additional expenses associated with outsourcing are: (1) benchmarking and analysis
to determine if outsourcing is the right choice, (2) investigating and contracting with a vendor, (3)
transitioning work and knowledge to the outsourcer, (4) ongoing staffing and management of the
outsourcing relationship, and (5) transitioning back to in-house IT after outsourcing
Offshore outsourcing is outsourcing with a vendor located in a country other than the one in which the
client company is based. This trend is primarily due to global markets, lower costs, and increased access
to skilled labor.
It is not only the cost and the technical capabilities that matter. Several factors should be considered,
including the business and political environments in the selected country the quality of the
infrastructure, and risks such as IT competency, human capital, the economy, the legal environment,
and cultural differences. Risks and uncertainties involved in offshore outsourcing: cost-reduction
expectations, data/security and protection, process discipline which is the use of the same process
repeatedly without innovation, loss of business knowledge, vendor failure to deliver, scope creep, which
is the request for additional services not included in the outsourcing agreement, government regulation,
differences in culture, turnover of key personnel, knowledge transfer.
Types of work that are not readily offshore outsourced include the following: Work that has not been
reutilized, Work that if off shored would result in the client company losing too much control over
critical operations, Situations in which off shoring would place the client company at too great a risk
to its data security, data privacy, or intellectual property and proprietary information , Business
activities that rely on an uncommon combination of specific application domain knowledge and IT
knowledge in order to do the work properly. A tool useful in measuring the business value of
outsourcing relationships is the balanced scorecard
BALANCED SCORECARD
The balanced scorecard is a strategic planning and management system that is used extensively in
business and industry, government, and nonprofit organizations worldwide to align business activities to
the vision and strategy of the organization, improve internal and external communications, and monitor
organization performance against strategic goals.
The critical characteristics that define a balanced scorecard are:[
• its focus on the strategic agenda of the organization concerned
The adoption process itself passes through 5 stages: (1) acquire knowledge (2) persuade (3) decide (4)
implement, and (5) confirm.
The adoption process is cyclical in nature, not linear. While the process is relatively predictable, we
can’t assume that the process will be the same for the introduction of all types of technology introduces
into different types of organizations, or even the same technology introduces into a different
organization.
Implementing IT Projects
Information technology (IT) project implementation is still a grey area. Implementation of IT projects,
especially large IT projects, is synonymous to management of changes in an organization. When
formulating effective change management strategies to support the introduction of IT, it may be useful
to integrate and use concepts and practices drawn from disciplines such as traditional project
management, organizational/product innovation, and change management theory and practices.
Managing Implementation
• Must be within budget.
• Must be on time.
• Must meet user expectations.
• Must be fully functional, to the level promised.
Concept of BPM
• Includes methods & tools to support design, analysis, implementation, management &
optimization of operational business processes.
• Extension of workflow management: documents, information & activities flow between
participants according to existing process models & rules.
• Consists of activities performed by businesses to optimize & adapt their processes.
• Consist of designing, analyzing, implementing, managing & optimizing a process for
effectiveness & efficiency.
Business Process Modeling is referred to as business process mapping. It includes techniques &
activities used as part of larger business process management discipline.
CHANGE MANAGEMENT
Change management is a structured approach to transition individuals, teams, and organizations from a
current state to a desired future state. Change management issues arise when organizations and their
suppliers or new business partners-in the case of a merger or acquisition-follow very different work
practices. In the vast majority of cases the problem in introducing new systems is not in the technology,
most change management issues arise because people and the work they do are impacted by the
introduction of new or modified IT systems. Problems are often connected with the change in power
distribution. Faced with potential shifts in power, key stakeholders may consciously or unconsciously
resist by delaying, sabotaging, or insisting on the modification of system development. These tactics may
include
• Unfreezing-in this first stage, people have a tendency to seek out a situation in which they feel
relatively safe and have a sense of control. Alternative situations are not appealing, even if they
appear to be preferable to the current state.
• Change-sometimes referred to as transition, often requires people to go through several stages
of apprehension before they are prepared to move forward. Good leadership is important in this
stage.
• Refreezing-The third and final stage in the change process involves the process of moving to a
new place of stability. Refreezing may be a slow process because not everyone will be at the
same point of transition from the old way of doing things to the new.
Organizational transformation
A major change in the way that an organization does business is typically referred to as organizational
transformation. John Kotter teamed up with Holger Rathgeber to present a simple story of radical
change and the issues associated with managing such a change.
Kotter's organizational transformation model consists of an eight-step change process that
organizations should follow in order to successfully transform an organization.
The eight steps are the following:
1. Address the "human side" of change systematically: Develop a formal approach for managing
change and adapt it often as circumstances change within the organization.
2. Start at the top: Top managers, including the CEO and CIO, must show full support for the change in
order to challenge and motivate the rest of the organization.
3. Involve every layer: Change occurs at all levels of the organization. In addition to securing top-level
support, it is important to cultivate leaders at various levels to support the change so that the change
cascades down.
4. Make the formal case: The need for change is always challenged. A formal written statement of the
envisioned change helps create and solidify alignment between change leaders and the change team.
5. Create ownership: Top management leaders need to work with the design teams to fully understand
the changes that will result from the introduction or modification of technology. Leaders must be willing
to accept responsibility for achieving change and offer incentives for participation in problem
identification and solution generation.
6. Communicate the message: Issues related to change must be clearly communicated. Employees must
be repeatedly provided with the right information at the right time through multiple channels to ensure
they understand the consequences of the change initiative.
7. Assess the cultural landscape: As change cascades down through organizational levels, the culture
and behaviors of employees must be addressed up front. Core cultural values, behaviors, and
perceptions must be addressed in regard to readiness for change; conflict areas must be identified and
factors that can impact resistance must be defined.
9. Prepare for the Unexpected: No matter how well a plan is executed, there are always surprises along
the way. The impact of change must be continually re-examined to measure the source and level of
resistance, and necessary adjustments made to maintain momentum and achieve objectives.
10. Speak to the Individual: All organizational change involves change at the individual level; for the
company to change, the individual and the way he or she works must change also. Employees must be
involved in the change process, and individual reward must be offered.
Offshore Outsourcing
Offshore outsourcing is one of the manifestations of the trend toward globalization – blurring of
geographical barriers – that is being accelerated by IT. Well-educated English-speaking employees
residing in countries such as India and the Philippines can perform services demanded by firms based in
the U.S, Great Britain, or any other country.
Processing confidential data offshore creates valid concerns about identity theft and privacy issues.
Privacy standards in the country where the data originate may be very different from the privacy laws
and safeguards in the country where the data are processed.
The remarkable communications capabilities delivered by IT promote globalization not only through
offshore outsourcing of high-tech jobs, but also by enabling firms to distribute core corporate functions
around the globe. A newer type of outsourcing is business process outsourcing. BPO is the process of
hiring another company to handle business activities.
IT Delivery Models
The common trend is the delivery of IT services that limit the amount of responsibility and risk
businesses much shoulder in acquiring and maintaining technology that enables core business functions.
Building and maintaining enterprise systems using service-oriented architecture (SOA) promises speed
of innovation, flexibility, and reuse of existing assets. In simple terms, an SOA is an infrastructure in
which software applications are broken or other services.
Other IT delivery models that are being deployed are:
Impact on Individuals
Many people feel a loss of identity, known as dehumanization, because of computerization. They feel
like just another number because computers reduce or eliminate the human element that was present
in the non-computerized systems.
On the other hand, while the major objective of technologies is to increase productivity, they can also
create personalized, flexible systems that allow individuals to include their opinions and knowledge in
the system. These technologies attempt to be people-oriented and user-friendly.
Acquisition of IT applications
The acquisition issue is complex for various reasons:
1. There is a wide range of sizes and types of IT applications.
2. Applications keep changing over time.
3. Applications may involve several business partners.
4. There is no single way to acquire IT applications.
Once an option is chosen, the system can be acquired.At the end of this step,an application is ready to
be installed and deployed.No matter what option is chosen, you most likely will have to select one or
more vendors, and then work with and manage these vendors.
After the applications pass all of the tests, they can be rolled out to the end users. Here developers have
to deal with issues such as conversion from the old to the new system, training, changes in priorities
affecting acceptance of the application, and resistance to changing processes to maximize the benefit
from the application.
IT PROJECT JUSTIFICATION
Once potential IT projects are identified, they usually need to be justified. Since enterprises have limited
resources, they cannot embark on all projects at once. Therefore, like other proposed enterprise
projects, they must be evaluated against competing demands for funds. The evaluation is usually divided
into two parts.
1.First, it is necessary to explore the need for each system—that is, find the information needs of the
users and how the application will meet those needs.
2.Second, it is necessary to justify it from a cost-benefit point of view. The need for information systems
is usually related to organizational planning and to the analysis of its performance vis-à-vis that of its
competitors. The cost-benefit justification looks at the wisdom of the specific IT investment compared
to investing in alternative IT or other projects. You must determine if it makes sense from a business
perspective to pursue the IT project at this time and if this is the best use of your company’s cash. Once
justification is done, a plan for the application acquisition can be made.
END-USER DEVELOPMENT
End-user development (also known as end-user computing) is the development and
use of ISs by people outside the IS department. This includes users in all functional
areas at all skill levels and organizational levels: managers, executives, staff, secretaries, and others.
This section is about selecting an acquisition approach, vendor and software selection, and
implementation issues.
For smaller packages, users can use trialware from the Internet before purchase. Most vendors offer
demo software for a limited testing time. Also, vendors may demonstrate the software. Six steps in
selecting a vendor and software package are the following:
CONNECTING TO DATABASES
Most IT applications need to be connected to a database.