Professional Documents
Culture Documents
MANAGEMENT
SANJIVA SHANKAR DUBEY
Today, Information Technology (IT) has become the strategic value creator
and differentiator for most companies.
Therefore, it needs to be managed strategically, effectively and efficiently to
optimize its benefits.
We need to understand the proven principles and practices of IT strategy and
get a holistic perspective of its planning, execution and management.
We need to examine IT as a strategic resource and adopt a strategic
approach for its management, and align it with overall business strategy.
Once the various building blocks of IT strategy are developed, we need to
page.]
This outline is designed around 20 sessions.
[
Strategy
IT
Session
Management
Slide No.
12
Introduction
1. Business Strategy: Challenges and Opportunities for IT
2. Business and IT Alignment
16
7 15
16 24
34
3 Strategic IT Planning
25 46
56
4. Enterprise IT Architecture
47 56
78
5. IT Application Strategy
57 68
910
69 76
Mid-term/ quiz,
etc.
IT
Chapter
Author can be contacted for quiz papers and questions for both mid-term
and end-term assessments.
1112
77 101
1314
102 119
1516
9. IT Sourcing Strategy
120 133
1718
134 141
1920
142 149
150
End-term exams
IT Strategy and Management
(Author: Sanjiva Shankar Dubey)
1
BUSINESS STRATEGY: CHALLENGES
AND OPPORTUNITIES FOR IT
1.3.1
What are the Challenges and
Opportunities with IT?
Why it is so?
Global competition, global marketplace and global
connectivity.
It is both
Comprises
IT application strategy
Technology management strategy for IT
IT management strategy.
10
11
12
13
14
[Note to faculties:
Please refer to review questions and ask the students
to answer them.]
End of Chapter 1
IT Strategy and Management
(Author: Sanjiva Shankar Dubey)
15
2
BUSINESS AND IT ALIGNMENT
16
17
18
Discipline
Design
19
20
21
22
23
End of Chapter 2
IT Strategy and Management
(Author: Sanjiva Shankar Dubey)
24
3
STRATEGIC IT PLANNING
25
In this chapter we
26
27
28
29
30
31
32
33
34
35
36
37
Operational3 months
Tactical3 months2 years
Strategic3-5 years.
38
People planning
Financial planning
Administrative actions
Technology planning.
39
40
Completing SITP
41
42
Review Questions
1.
2.
What are the prevalent planning approaches for the SITP process? What are
its advantages and disadvantages? Which one will you choose for a large
public sector oil distribution company?
3.
Enumerate and explain some of the prominent best practices for achieving
good SITP.
4.
43
44
8.
9.
45
[Note to Faculties:
End of Chapter 3
IT Strategy and Management
(Author: Sanjiva Shankar Dubey)
46
4
ENTERPRISE IT ARCHITECTURE
47
4.1
INTRODUCTION
48
49
50
51
52
53
54
55
[Note to Faculties:
Students should
Go through the articles given as reference:
End of Chapter 4
IT Strategy and Management
(Author: Sanjiva Shankar Dubey)
56
5
IT APPLICATION STRATEGY
57
5.1 INTRODUCTION
58
Cash management
E-business and e-commerce
E-procurement
E-selling and e-marketing
E-employee care
Business intelligence, data warehousing and data mining
Knowledge management
and many more.
59
60
Low cost
Changing requirements
Simple application
Good talent pool
Low recurring cost.
61
Affordability
Scalability/modularity
Flexibility
Easy to use
Good quality
Accelerating rates of COTS enhancement and
expanding system requirements.
62
Architectural requirements
Domain requirements
Organizational requirements
63
64
65
66
5.6 POST-IMPLEMENTATION
SUPPORT AND MANAGEMENT
67
[Note to Faculties:
End of Chapter 5
IT Strategy and Management
(Author: Sanjiva Shankar Dubey)
68
6
TECHNOLOGY MANAGEMENT
STRATEGY FOR IT
69
70
71
72
73
74
75
[Note to Faculties:
End of Chapter 6
76
7
STRATEGY FOR IT PROGRAM
MANAGEMENT AND PMO
77
7.1 INTRODUCTION
Strategies for managing IT projects, program and
portfolio, addressing inter-project management
issues, managerial as well as financial concepts.
78
79
80
81
82
83
84
85
86
87
88
89
Revolutionary approach
versus
Evolutionary/incremental approach.
90
PMO director/manager
Project manager
Project portfolio manager
PM process/methodology trainer
Solution architects
Relationship/account manager
Tools support/administration
Project office administrative support
Librarian/document control.
91
92
93
94
95
7.18/7.19 CobiT
CobiTControl Objectives for Information and related
Technologyis developed and promoted by IT Governance
Institute.
CobiT maturity levels are:
1. LEVEL 0: Non-existent
2. LEVEL 1: InitialAd hoc and disorganized
3. LEVEL 2: RepeatableFollows regular pattern
4. LEVEL 3: DefinedDocumented/communicated
5. LEVEL 4: ManagedMonitored and measured
6. LEVEL 5: OptimizedBest practices followed/automated.
96
Low
Medium
High.
They can also be grouped as
Infrastructure
97
Initiation
Scope planning
Scope definition
Scope verification
Scope change control
Also involves
Project categorization: Size, type and priority
Project cost and expected returns: Using net present value
(NPV) analysis, return on investment (ROI) and payback analysis
(see the formula worked out on p. 137)
Project charter: Defining project scope and returns (see Fig. 7.4,
p. 138)
Individual project planning: See pp. 13940
Scope verification and scope change control: After project is
delivered.
98
99
100
[Note to Faculties:
References to be reviewed
All review questions should be answered.]
End of Chapter 7
101
8
IT SERVICE MANAGEMENT
STRATEGY
102
8.1 INTRODUCTION
103
104
105
106
107
It began as a
108
Version 2.0
Version 3.0.
109
Service operation
Service operation
Service transition
Service transition
Service transition.
110
111
ITSCM Strategies
See p. 159.
Recovery options are:
Cold standby
Warm standby
Hot standby
Other methods such as manual recovery and reciprocal
arrangement.
112
113
This includes:
114
LEVEL 0: Undefined
LEVEL 1: Initial
LEVEL 2: Repeatable
LEVEL 3: Defined
LEVEL 4: Managed
LEVEL 5: Optimized.
115
8.8
IT SERVICE MANAGEMENT
IMPLEMENTATION STAGES
116
117
118
[Note to Faculties:
End of Chapter 8
119
9
IT SOURCING STRATEGY
120
9.1 BACKGROUND
121
122
9.3
9.4
WHAT IS OUTSOURCING?
WHAT TO OUTSOURCE?
Application development
Support of application
Database or end-user equipment development
Business processes, e.g., CRM /SCM and back office
functions such as payroll.
123
124
Information security
Confidentiality
Apparent loss of control
Hidden costs
Outsourced companys lack of ability and experience.
125
9.7
Right partner
Proper requirement gathering
Proper cost-benefit analysis
Partnership approach.
9.8
126
127
Offshoring
Near-shoring
Inshoring
Smart-shoring, smart-sourcing or multi-sourcing
Full outsourcing.
128
129
130
This involves:
Relationship management
Performance monitoring.
131
132
[Note to Faculties:
End of Chapter 9
133
10
PLANNING AND MEASURING
RETURNS ON IT INVESTMENT
134
10.1 BACKGROUND
135
136
137
138
139
Scale of IT service
Regular publication
Benefits measurement (post-implementation).
140
[Note to Faculties:
End of Chapter 10
141
11
STRATEGIES FOR MANAGING
IT-LED CHANGE
142
11.1 INTRODUCTION
143
Business leader
Business user
IT professional
IT service provider
IT outsourcing partner.
144
11.2.111.2.3 Issues
Business alignment
End-users
IT professionals (in-house as well as partners).
145
146
147
148
[Note to Faculties:
End of Chapter 11
149
150