The document discusses identifying, evaluating, and ranking information system applications. It outlines three approaches to identification: business systems planning, critical success factor method, and structured and unstructured approaches. Evaluation criteria include techniques for evaluating, financial justification, substitutability, and innovation. Value chain analysis helps identify if an application adds value to a company, and risks to information systems include organizational, IT infrastructure, definitional, technical, and evaluation risks.
The document discusses identifying, evaluating, and ranking information system applications. It outlines three approaches to identification: business systems planning, critical success factor method, and structured and unstructured approaches. Evaluation criteria include techniques for evaluating, financial justification, substitutability, and innovation. Value chain analysis helps identify if an application adds value to a company, and risks to information systems include organizational, IT infrastructure, definitional, technical, and evaluation risks.
The document discusses identifying, evaluating, and ranking information system applications. It outlines three approaches to identification: business systems planning, critical success factor method, and structured and unstructured approaches. Evaluation criteria include techniques for evaluating, financial justification, substitutability, and innovation. Value chain analysis helps identify if an application adds value to a company, and risks to information systems include organizational, IT infrastructure, definitional, technical, and evaluation risks.
➢ Evaluation of Application criteria is as under :
• Techniques of evaluating [Read yourself] • Financial Justification (justify the monetary value during evaluation) • Substitutory (substitute to evaluate) • Innovation
➢ Value Chain Analysis
Value Chain Analysis helps us to identify whether it adds value in the company or not)