Professional Documents
Culture Documents
E-commerce today
By this law, the network on the right has a value that is 15 times that of the network
on the left
Disruptive Technology
Digital Markets
Information Asymmetry
Dynamic Pricing
Disintermediation
Digital Goods
Digital Markets Vs. Traditional Markets
On-line Auctions
Forward Auctions
Reverse Auctions
Advantages of E-Business
Information Reach
o Expand the number of people a business can target
Information Richness
o Increase the depth and breadth of details in communications
Mass Customization
o Provide a range of features in standard products that can be altered to
customer specifics
Personalization
o Understand customers sufficiently to provide not only products but ways of
doing business specifically suited to them
Long Tail
Because E-businesses are not limited by shelf space, they can offer a far wider
selection of products that may suit only a few customers.
Reducing Costs
o Business processes that take less time and human effort.
Improving Operations
o Communications customized to meet consumer needs and available 24/7.
Improving Effectiveness
o Web sites must increase revenue and new customers and reduce service calls
o Interactivity metrics measure E-business success: number of repeat visits,
times spent on site and number of pages viewed among other activities.
Limitations of e-Commerce
Technological Limitations
o Lack of universally accepted security standards
o Insufficient telecommunications bandwidth
o Expensive accessibility
Non-technological Limitations
o Perception that EC is unsecure
o Unresolved legal issues
o Lacks a critical mass of sellers and buyers
Advertising
Sales
Subscription
Free/Freemium
Transaction Fee
Affiliate
B2C e-Commerce
Electronic storefronts
Electronic malls
Online Service Industries
Cyberbanking
Online advertising
Issues in e-Tailing
Multichannelling: a process many companies use to integrate their on-line and off-
line channels
Electronic Exchanges
Electronic Payments
Purchasing cards
Electronic cash
o Stored-value money cards
o Smart cards
o Person-to-person payments
Digital Wallets
New Marketplace
Electronic Exchanges
There are three basic types of public exchanges: vertical, horizontal, and functional
o Vertical Exchanges
o Horizontal Exchanges
o Functional Exchanges
E-Government Models
Uses strategies & technologies to improve services and communication with the citizen-
consumer
Wisdom of crowds/crowdsourcing
Large numbers of people can make better decisions about topics and products
than a single person
Prediction markets:
Peer-to-peer betting markets on specific outcomes (elections, sales figures,
designs for new products
Mobile computing has two major characteristics that differentiate it from other
forms of computing:
o Mobility
o Broad reach
Mobile Commerce
m-Commerce Applications
Location-based Services
Banking and Financial Services
Telemetry Applications
Intrbusiness Applications
Accessing Information
Mobile Computing
Five value-added attributes of mobile computing:
o Ubiquity
o Convenience
o Instant connectivity
o Personalization
o Localization of products and services
Introduction
Poor processes
o Can damage productivity and morale
o Cause a business to fail
3. Assign system development to the particular subsidiary which is the centre of excellence for the required business or tech
4. Outsource to global or offshore development countries that have the required skills and experience.
Systems as Planned Organizational Change
Degrees of organizational change
Automation: Mechanizing procedures to speed up the performance of existing
tasks
o Increases efficiency
o Replaces manual tasks
Rationalization of procedures: The streamlining of standard operating procedures
o Often found in programs for making continuous quality improvements;
e.g. TQM, Six Sigma
Business process redesign: Redesign of business processes to reorganize
workflows and reduce waste and repetitive tasks
o Analyze, simplify, and redesign business processes
o Reorganize workflow, combine steps, eliminate repetition
Paradigm shift: Radical reconceptualization of the nature of the both the business
and the organization
Open-Source Software
Outsourcing
Custom Development
Advantages:
o Many choices
o Test software
o Save time
o Familiar product
o Many users
o Eliminate need to hire specialized personnel
Disadvantages:
o May not meet needs
o Difficult to modify
o No control over content
o Difficult to integrate
o May be discontinued
o Controlled by another company
Requires a lot of documentation and formal reviews at end of each major step
Agile Methodology
o Aims for customer satisfaction with early and continuous delivery of useful
system or software components meeting bare minimum requirements.
Iterative Development
o The basis for Agile Methodologies
o Consists of a series of fast, efficient, short, lower cost projects that achieve
rapid feedback and acceptance
o Speed, size and focus account for end user satisfaction
The Agile Alliance Manifesto
Tenets
Advantages:
o Meeting user requirements
o Sense of ownership by users
o Faster development
Disadvantages
o Problems due to lack of development expertise
o Not consistent with organizational goals
o Lack of alternatives and documentation
End-User Development
Uses fourth-generation languages to allow end-users to develop systems with little
or no help from technical specialists
Fourth generation languages: Less procedural than conventional programming
languages
Advantages:
More rapid completion of projects
High-level of user involvement and satisfaction
Disadvantages:
Not designed for processing-intensive applications
Inadequate management and control, testing, documentation
Loss of control over data
Managing end-user development
Require cost-justification of end-user system projects
Establish hardware, software, and quality standards
Developing Successful Systems
Governance
o Helps create value from projects by providing processes to align systems
development with organizational goals
o Responsibilities and authority is clearly assigned and defined
Managing Projects
People
o Hardest and most critical of IT planning efforts
o Resolving conflicts, balancing individual and team needs
o Project manager must be skilled in communication, negotiation, marketing
and salesmanship
Communications
o Communications Plan provides the basis for formal, regular, periodic status
reports
o Ad hoc messages of small wins, corrections, reminders and requirements
Additional considerations:
o Are IS operating performing satisfactorily?
o How is my IS outsource provider performing?
o What are the risk factors to consider in an IS project?
o What questions should be asked to ensure an IS project proposal is realistic?
o What are the characteristics of a healthy IT project?
o Which factors are most crucial to monitor to ensure an IS project remains on
track?
Outsourcing Projects
Onshore outsourcing
o Engaging a company within the country
Nearshore outsourcing
o Engaging a company in a nearby country, example USA
Offshore outsourcing
o Engaging organizations from developing countries or countries far away
o Often used for code writing and systems development
Results of Outsourcing
Companies concentrate on Core Competencies using outsourcing as a revenue
generation, not cost cutting strategy
Contract Length
o Long-term contracts due to high start up costs
o Difficulties in getting out of unsuitable contracts
o Problems in foreseeing business needs over the long term
o Problems in restructuring IS department after the contract is finished
Competitive Edge
o Competitive focus and edge can be lost if computer system is central to the
enterprises success and the functions are outsourced
Confidentiality
o Pricing policies, product mix information, formulas and sales analysis may
be less secure
o Requires additional investment in security and surveillance to ensure there
are no problems
Scope definition
o Affects outsourcing contracts as well as in-house development
o Problems arise from contractual misunderstandings especially dealing with
what is considered within the scope and outside of the scope of the
agreement
Includes the organizations design, as well as the managerial choices that define, set
up, coordinate, and control its work processes.
Figure on the next slide summarizes complementary design variables from the
managerial levers framework.
Variable Description
Organizational variables
Decision rights Authority to initiate, approve, implement, and control various types of decisions necessary to
plan and run the business.
Business processes The set of ordered tasks needed to complete key objectives of the business.
Formal reporting The structure set up to ensure coordination among all units within the organization.
relationships
Informal networks Mechanism, such as ad hoc groups, which work to coordinate and transfer information outside
the formal reporting relationships.
Control variables
Planning The processes by which future direction is established, communicated, and implemented.
Performance measurement The set of measures that are used to assess success in the execution of plans and the processes
and evaluation by which such measures are used to improve the quality of work.
Incentives The monetary and non-monetary devices used to motivate behavior within an organization.
Cultural variables
Values The set of implicit and explicit beliefs that underlie decisions made and actions taken.
Ideally the person with the most information and in the best position should have
these rights. (i.e. senior leaders).
Organizational design focus on making sure that decision rights are properly
allocated.
Zara - decision rights moved to the store managers, providing for quicker
responses to their local customer base.
IS are typically used to store and communicate information along the lines of the
hierarchy in a centralized structure.
Data from the operations is sent upward through the hierarchy using IS.
Data from operations that have been captured at lower levels need to be
consolidated, managed and made secure at a higher level.
The data is integrated into databases that are designed to enable employees at all
levels of the organization can see the information that they need when they need it.
Work is organized into small work groups and integrated regionally and
nationally/globally.
Managers are flooded with more information than they can process.
Employees share their knowledge and experience, and participate in making key
organizational decisions.
Decision making is more timely and accurate because data are collected and stored
instantly.
Concerned with how planning is performed in organizations and how people and
processes are monitored, evaluated, and compensated or rewarded.
Senior leaders ensure the things that are supposed to happen actually happen.
Planning and IS
Monitoring and IS
Software collecting monitoring data directly from work tasks, or embedding the
creation and storage of performance information into software used to perform
work is more reliable.
Balance employees right to privacy against the needs of the business to have
surveillance mechanisms in place.
Done properly, can make employees feel good without paying them more money.
Managers must consider both the metrics and qualitative data in assigning
compensation and rewards.
IS development and use can be impacted by culture at all levels within the
organization.
Both national and organizational cultures can affect the IT issues and vice versa.
Differences in national culture may affect IT in a variety of ways: impacting IS
development, technology adoption and diffusion, system use and outcomes, and
management and strategy.
Hofstede Dimensions and the GLOBE Dimensions
GLOBE DESCRIPTION RELATIONSHIP TO
DIMENSIONS HOFSTEDE DIMENSION
At the organizational level, cultural values are often related to satisfied users,
successful IS implementations, or knowledge management success.
Time and place of work are increasingly blending with other aspects of living.
Employees can work at home via cyberspace and at times that accommodate home-
life and leisure activities.
Increasingly, places are being constructed in cyberspace using Web 2.0 tools that
encourage collaboration.
How can IT increase the effectiveness of the workers doing the work?
o How can IT support collaboration?
Digital natives introduced the use of social networking and blogs into the
workplace.
IT Supports Collaboration
Thomas Friedman, the author of the popular The World is Flat and other books,
argues that collaboration is the way that small companies can act big and
flourish in todays flat world.
The key to success is for such companies to take advantage of all the new tools for
collaboration to reach farther, faster, wider, and deeper.
Every department in every business has someone who knows the computer as
part of his or her job.
New Ways to Do Traditional Work
Many traditional jobs are now done by computers (i.e., using spell check instead of
an editor).
The introduction of IT into an organization can greatly change the day-to-day tasks
performed by the employees.
The cost and time required to access information has plummeted, increasing
personal productivity and giving workers new tools.
Some workers do not need to communicate with their co-workers for the bulk of the
workday.
Changing Collaboration
The boundaries between work and play are being blurred, and people often struggle
with work-life balance.
IS can greatly change day-to-day tasks, which in turn change the skills needed by
workers.
IT Has Changed Hiring
Workers must know how to use the technology for their job or be trainable.
o Hiring procedures incorporate activities that determine the skills of
applicants.
IT utilization affects the array of non-technical skills needed in an organization.
o IT-savvy companies can eliminate clerical capabilities from their hiring
practices and focus resources on more targeted skills.
IT has become an essential part of the hiring process (online job postings, online
applications, etc.).
o Social networking also involves informal introductions and casual
conversations in cyberspace.
o Virtual interviews can be arranged to reduce recruiting costs.
Companies increasingly realize that hiring is changing.
o Recruiting efforts reflect the new approaches people are using to look for jobs.
o Tech-savvy job applicants are now using business-oriented social networks,
jobs, online job search engines, and a new Facebook app.
The design of the work needed by an organization is a function of:
o the skill mix required for the firms work processes.
o the flow of those processes themselves.
Employees who cannot keep pace are increasingly unemployable.
The terms telecommuting and mobile worker are often used to describe flexible
work arrangements.
Telecommuting (or teleworking) - work arrangements with employers that allow
employees to work from home, at a customer site, or from other convenient
locations instead of the corporate office.
Telecommuting is derived from combining telecommunications with
commuting.
o Workers use telecommunications instead of commuting to the office.
Mobile workers:
o work from wherever they are.
o utilize technology necessary to access coworkers, company computers,
intranets, and other information sources.
Factors Driving Telecommuting and Mobile Work
Work is increasingly knowledge-based. Employees can create, assimilate, and
distribute knowledge at home as effectively as they can at an office.
Telecommuting enables workers to shift their work to accommodate their
lifestyles (e.g., parents, disability).
o Telecommuting enables geographic flexibility.
New technologies used by telecommuters are becoming better and cheaper (e.g.,
price of PC and back office applications).
The increasing reliance on web-based technologies by all generations (particularly
Generation Y and Millennials).
A mounting emphasis on conserving energy.
o As the cost of gasoline continues to skyrocket, employees are looking for
ways to save money.
o Companies can also experience lower energy costs from telecommuting.
Energy is no longer needed to heat or cool these office spaces.
o Companies seek to comply with the Clean Air Act and to be praised for their
green computing practices. At the same time, they are reaping considerable
cost savings.
Training should be offered so all workers can understand the new work
environment.
Managers must find new ways to evaluate and supervise those employees without
seeing them every day in the office.
o Work to coordinate schedules and ensure adequate communication among all
workers.
o Establish policies about using different technologies to support
communications.
o Help the organization adapt by building business processes to support remote
workers.
Security Issues in Remote Work
BYOD (Bring Your Own Device) - remote workers have their own computers in
the location where they work.
Virtual teams offer advantages in terms of expanding the knowledge base through
team membership.
Managers can draw team members with needed skills or expertise from around the
globe without large travel expenses.
Communication dynamics (e.g., non-verbal) are Teams may use richer communication media.
altered.
Technology Team members must have proficiency across a Technology is not critical, and tools are not
wide range of technologies. essential for communications.
Technology offers an electronic repository. Electronic repositories are not typically used.
Work group effectiveness may be more Task technology fit may not be as critical.
dependent on alignment of the group and
technologies used.
Team Diversity Members typically come from different Because members are more homogeneous, group
organizations and/or cultures which makes it: identity is easier to form.
Policies about the selection, evaluation, and compensation of virtual team members
may need to be enacted.
Communication and Technology Challenges
Communication Challenges
o Managers must learn to keep the lines of communication open to allow team
members to get their work done.
o Frequent communication is essential to success.
o Need appropriate technological support (i.e., video teleconferencing, etc.).
o Face-to-face meetings are the heartbeat of successful global virtual teams.
o Well-managed synchronous meetings using video teleconferencingor
possibly in a virtual worldcan activate the heartbeat.
Technology Challenges
o All team members must have the same or compatible technologies at their
locations.
o Managers must ensure that remote workers have seamless telephone transfers
to the home office, desktop support, network connectivity, and security
support.
o Policies and norms (unwritten rules) must be established.
o Diversity challenges different cultures have different perceptions of time
and task importance.
o Providing the appropriate technologies for each culture is key.
WHAT TO DO WITH WIKILEAKS
Problem: Whistleblowers can capture huge amounts of incriminating documents on
a laptop, memory stick, or portable hard drive. This information can be sent through
personal e-mail accounts or online drop sites, or they can simply submit it directly to
WikiLeaks (www.wikileaks.org). WikiLeaks receives approximately 10,000 new
documents every day. Since its inception, in December 2006, WikiLeaks has had
significant impacts on both businesses and governments; how can future disclosures
be prevented?
Result: How can organizations and governments respond to WikiLeaks? Lawsuits
will not work, because WikiLeaks, is a mere conduit for documents. Moreover, even
if a company or a government somehow won a judgment against WikiLeaks, that
would not shut down the company, because its assets are spread all over the world.
Governments may need to revise their practices to avoid being targeted.
IT Solution: Several cyber security measures from the DLP (data leak protection)
industry have been tried. However, none have been effective. Recently,
organizations have turned to network forensics, which is the process of constantly
collecting every digital fingerprint on an organizations servers to trace and
identify an intruder who has broken into the system. Although this software gathers
data and makes them easily available, it does not identify the culprit.
ETHICAL ISSUES
Ethics refers to the principles of right and wrong that individuals use to make
choices that guide their behaviour.
ETHICAL FRAMEWORKS
Ethical Frameworks are standards used to develop general frameworks for ethics or
ethical decision making:
o Utilitarian
o Rights
o Fairness
o Common Good
Traditional GVV
Code of ethics: a collection of principles that are intended to guide decision making
by members of an organization.
Accessibility What information does a person or an organization have a right to obtain? Under what
conditions? With what safeguards?
Social Create value for society in a Does this action create a net
contra manner that is just and benefit for society? Does the
ct nondiscriminatory. proposed action discriminate
against any group in
particular, and is its
implementation socially just?
PRIVACY
Electronic Surveillance
ELECTRONIC SURVEILLANCE
The law supports the right of employers to read their employees e-mail and other
electronic documents and to monitor their employees Internet use.
Utility companies
Employers
Government agencies
Hospitals
Retail establishments
Clicking here will take you to the Government of Canada article on the Pros and
Cons of Social Networking in business
Opt-out model permits the company to collect personal information until the
customer specifically requests that the data not be collected.
Many of these laws conflict with those of other countries, or they require specific
security measures.
Whose laws have jurisdiction when records are stored in a different country for
reprocessing or retransmission purposes.
INFORMATION SECURITY
Information security refers to all of the processes and policies designed to protect an
organizations information and information systems (IS) from unauthorized access,
use, disclosure, disruption, modification, or destruction.
Five key factors that affect the vulnerability and security organizational information
resources:
o Todays interconnected, interdependent, wirelessly networked business
environment;
o Smaller, faster, cheaper computers and storage devices;
o Decreasing skills necessary to be a computer hacker;
o International organized crime taking over cybercrime;
o Lack of management support.
SECURITY THREATS
UNINTENTIONAL THREATS
Information systems are vulnerable to many potential hazards and threats.
HUMAN ERROR
DELIBERATE THREATS
Espionage or trespass
Information extortion
Sabotage or vandalism
Identity theft
Software attacks
Alien software
CONTROLS
The purpose of controls is to safeguard assets, optimize the use of the
organizations resources, and prevent or detect errors or fraud.
o General controls apply to more than one functional area. Example:
passwords
o Application controls are specific to one application. Example: approval of
payroll wage rates
Authorization determines which actions, rights, or privileges the person has, based
on his or her verified identify.
o Privilege
o Least privilege
COMMUNICATIONS CONTROLS
Firewalls
Anti-malware systems
Encryption
In the event of a major disaster, organizations can employ several strategies for
business continuity including:
o hot sites
o warm sites
o cold sites
o off-site data storage
INFORMATION POLICIES
Failed computer systems can lead to significant or total loss of business function
Firms now more vulnerable than ever
o Confidential personal and financial data
o Trade secrets, new products, strategies
A security breach may cut into firms market value almost immediately
Inadequate security and controls also bring forth issues of liability
A plan of how the firm will use social IT, aligned with organization strategy and
IS strategy
A vision of how the business would operate if it seamlessly and thoroughly
incorporated social and collaborative capabilities throughout the business model
Answers the same type of questions of what, how, and who, as any other business
strategy
Web 2.0 (the social web): a term used to describe a phase of World Wide Web
evolution characterized by dynamic webpages, social media, mashup applications,
broadband connectivity and user-generated content.
Social media: a collection of Web applications, based on Web 2.0 technology and
culture that allows people to connect and collaborate with others by creating and
sharing digital content.
World Wide Web (the Internet): a network of documents on the Internet, called
webpages, constructed with HTML markup language that supports links to other
documents and media (e.g. graphics, video, audio, etc.).
Cluetrain Manifesto
o Understanding not only how people behave, but also the way they think
about things.
o Transforms Markets to conversations where successful companies will learn
to engage customers instead of traditional unidirectional or broadcast
communications.
The mapping and measuring of relationships and flows between people, groups,
organizations, computers, or other information or knowledge-processing entities.
Social graph: to the global social network reflecting how we are all connected to
one another through relationships.
Giant global graph: illustrates the connections between people and/or documents
and pages online.
Leveraging the Power of the Crowd
Crowdsourcing: a model of problem solving and idea generation that marshals the
collective talents of a large group of people.
Crowdsourcing Websites
Tongal (online videos)
Amazons Mechanical Turk (marketplace solutions)
Eli Lilly (science)
Social Networks and Crowdfunding
The Problem
o All businesses at one point or another are faced with the problem of raising
money. This is definitely the case for new start-up businesses. Did you ever want
to become an entrepreneur? To start your own company, one of the first things
you will need is money. All businesses from small to large need to find the
necessary funds to turn business ideas into products and services.
The Solution
o One solution to finding the money that organizations need is the emerging area of
social media. Crowdfunding, such as Pursu.it (http://pursu.it), uses websites to
allow those in need of cash to raise funds small from a large pool of investors or
donors. Crowdfunding websites has links to popular social media networks such
as Facebook and Twitter and that helps them to reach a large population of
potential donors.
The Results
o As of mid-2012, there were more than 450 active crowdfunding sites around the
world, mostly in North America and Europe, including 17 in Canada. Through
these crowdfunding platforms, investors and donors gave almost US$1.5 billion in
2011 to support more than one million causes. It was expected that contributions
to crowdsourcing sites would double in 2013 from the previous year.
Social Networking Services and Communities
Virtual Reality
o Second Life is a social network that uses avatars to represent their residents
(users). Users can develop their own apps.
o Avatars are an icon, figure, or visual representation of a person in a digital
environment.
Private Social Networking Services
Engaging Consumers
Blogs
o Websites were people regularly post a variety of content in various digital
formats.
o Blogs can establish reputations and promote business interests and/or share
viewpoints.
o Blogospheres are connected blogs.
o Microblogs are frequent, but brief posts such as Twitter.
o Blogging Platforms are software used to create and edit content with features
that make blogging relatively easy.
o Wordpress (51%) and Blogger (21%) are the most popular blogging
platforms.
Engaging Consumers
Twitter
o A valuable tool for activists engaged in organizing protests, debating political
viewpoints, and broadcasting real-time information through Tweets.
o Uses content tags called Hashtags (#) to allow users to follow conversations
and/or trends.
Wikis:
o harness the collective intelligence of Internet users, combining the input of
many individuals
o provide a central repository for capturing constantly updated product features
and specifications, tracking issues, resolving problems, and maintaining
project histories
o enable companies to collaborate with customers, suppliers, and other
business partners on projects.
Netcasting
Monitoring Service
o Conversation tracking on social media sites
Paid services: Radian 6, Alterian SM2, Hubspot.
Free services: Twitter Search, Social Mention
o Provides organizations a better understanding of brand, product, and even
executive perception from consumers.
o Brand advocates positively portray a brand or company online.
Social Metrics and Monitoring Tools
Social analytics:
o Is a set of tools developed to measure the impact of the social IT investments
on the business.
o analyzes conversations, tweets, blogs, and other social IT data to create
meaningful, actionable facts.
A misalignment between the demands on the business side and the IT offerings on
the supply side.
IT and the business are at different levels of maturity in their growth and
development.
When the capabilities of the IT organization are in balance with the demand of the
business, both are at the same level.
Business-IT Maturity Model
IT organizations all provide services to their businesses at the right time and in the
right way based on:
o the skills and capabilities of their people.
o the organizational focus of management.
Firms differ in their IT activities because of:
o their organizational goals.
o the firms size.
o the organizational structure.
o the level of maturity.
time zones.
languages.
customs and holidays.
cultures.
The following figure summarizes how a global IT perspective affects six
information management issues.
Global considerations for the IT organization
The IT organization does not directly perform core business functions (e.g. selling,
manufacturing, and accounting).
Uses technology as the core tool in creating competitive advantage and aligning
business and IT strategies.
In the early days, the CIO was predominantly responsible for controlling costs and
reported to the CFO.
IT Portfolio Management
The goal is for the company to fund and invest in the most valuable initiatives that,
taken together as a whole, generate maximum benefits to the business.
Transactional Systems
o Systems that streamline or cut costs.
Infrastructure Systems
o Shared IT services used for multiple applications such as servers, networks,
databases, or laptops.
Informational Systems
o Systems that provide information used to control, manage, communicate,
analyze, or collaborate.
Strategic Systems
o Systems used to gain a competitive advantage in the marketplace.
New systems are evaluated on their own merits as well as their overall impact on
the portfolio.
Informational Strategic
20% 13%
Transactional
13%
Infrastructure
54%
Weills work suggests that a different balance between IT investments is needed for
a cost-focused strategy compared to an agility-focused strategy.
Valuing IT Investments
New IT investments are often justified in terms of monetary costs and benefits.
Soft benefits, such as the ability to make future decisions, make it difficult to
measure the payback of IT investment.
o The systems are complex, and calculating the costs is an artnot a science.
o Calculating a payback period may be more complex than other types of
capital investments.
o Many times the payback cannot be calculated because the investment is a
necessity rather than a choicewithout any tangible payback.
Return on Investment (ROI) ROI= (Estimated lifetime benefits-Estimated lifetime costs)/Estimated lifetime costs.
Net Present Value (NPV) Calculated by discounting the costs and benefits for each year of systems lifetime
using present value.
Economic Value Added (EVA) EVA = net operating profit after taxes.
Payback Analysis Time that will lapse before accrued benefits overtake accrued and continuing costs.
Internal Rate of Return (IRR) Return on the IT investment compared to the corporate policy on rate of return.
Weighted Scoring Methods Costs and revenues/savings are weighted based on their strategic importance, etc.
Prototyping A scaled-down version of a system is tested for its costs and benefits.
Game Theory or Role-playing These approaches may surface behavioral changes or new tasks attributable to a new
system.
Simulation A model is used to test the impact of a new system or series of tasks; low-cost
method.
Analysis Pitfalls
Both IT and business managers may encounter a number of pitfalls when analyzing
return on investment:
o Not every situation calls for in-depth analysis.
o Not every evaluation method works in every case. Factors to consider
include:
the assets employed.
the duration of the project.
any uncertainty about implementation.
o Circumstances may alter the way a particular valuation method is used.
Managers use an adjusting factor in their estimates.
o Managers can fall into analysis paralysis.
Experience and being mindful of the risks of incorrect valuation help
decide when to stop analyzing.
o Even when the numbers say a project is not worthwhile, the investment may
be necessary to remain competitive.
Monitoring IT Investments
Ensure that the money spent on IT results in benefits for the organization.
A common, accepted set of metrics must be created.
o Metrics must be monitored and communicated to senior management and
customers of the IT department.
o Metrics are often financial in nature (e.g., ROI, NPV).
o IT metrics include:
logs of errors encountered by users, end-user surveys, user turnaround
time, logs of computer and communication up/downtime, system
response time, and percentage of projects completed on time and/or
within budget.
o Business metrics include:
the number of contacts with external customers, sales revenue accrued
from web channels, and new business leads generated.
Companies use it to assess the full impact of their corporate strategies on their
customers and workforce as well as their financial performance.
This methodology allows managers to look at the business from four perspectives:
o Customer, internal business, innovation/learning, and financial.
Scorecard Applied to IT Departments
IT Dashboards
IT dashboards:
o summarize key metrics for senior managers in a way that provides quick
identification of the status of the organization.
o provide frequently-updated information on areas of interest within the IT
department.
The data focuses on project status or operational systems status.
In order to increase its transparency, the U.S. federal government created an IT
dashboard website in 2009.
o The increased transparency increased accountability for managing the
investments.
Types of IT Dashboards
Types of IT Dashboards:
Portfolio dashboards.
o Show senior IT leaders the status, problems, milestones, progress, expenses,
and other metrics related to specific projects.
Business-IT dashboards.
o Show relevant business metrics and link them to the IT systems that support
them.
Service dashboards.
o Show the important metrics about the IS such as up-time, throughput, service
tickets, progress on bug fixes, help desk satisfaction, etc.
Improvement dashboards.
o Monitor the three to five key improvement goals for the IT group.
The three main funding methods are chargeback, allocation, and corporate
budget.
o Both chargeback and allocation methods distribute the costs back to the
businesses, departments, or individuals within the company.
o In corporate budgeting, costs are not linked directly with any specific user or
business unit; costs are recovered using corporate coffers.
Chargeback
Allocation
Allocation funding method recovers costs based on something other than usage
such as revenues, login accounts, or number of employees.
Simpler to implement and apply each month compared to the chargeback
mechanism.
The rate charged is often fixed at the beginning of the year.
Two main advantages:
o The level of detail required to calculate the allocations is much less.
Leads to cost savings.
o Charges from the IT organization are predictable.
Generates far less frequent arguments from the business units.
Corporate Budget
With the corporate budget funding method, the costs fall to the corporate bottom
line rather than levying charges on specific users or business units
Corporate budget advantages:
o Relatively simple method for funding IT costs.
o Requires no calculation of prices of the IT systems.
o Bills are not generated on a regular cycle to the businesses.
o Concerns are raised less often.
o IT managers control the entire budget.
o Control the use of the funds.
Have more input into what systems are created, how they are
managed, and when they are retired.
o Encourages the use of new technologies because learners are not charged for
exploration and inefficient system use.