Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Symantec erp turmoil case study

25/11/2021 Client: muhammad11 Deadline: 2 Day

Read The CRM At Minitrex Case Study

IT STRATEGY: ISSUES AND PRACTICES

This page intentionally left blank

IT STRATEGY: ISSUES AND PRACTICES

T h i r d E d i t i o n

James D. McKeen Queen’s University

Heather A. Smith Queen’s University

Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto

Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo

Editor in Chief: Stephanie Wall Acquisitions Editor: Nicole Sam Program Manager Team Lead: Ashley Santora Program Manager: Denise Vaughn Editorial Assistant: Kaylee Rotella Executive Marketing Manager: Anne K. Fahlgren Project Manager Team Lead: Judy Leale Project Manager: Thomas Benfatti Procurement Specialist: Diane Peirano Cover Designer: Lumina Datamantics Full Service Project Management: Abinaya Rajendran at Integra Software Services, Pvt. Ltd. Cover Printer: Courier/Westford Composition: Integra Software Services, Pvt. Ltd. Printer/Binder: Courier/Westford Text Font: 10/12 Palatino LT Std

Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on appropriate page within text.

Copyright © 2015, 2012 and 2009 by Pearson Education, Inc., Upper Saddle River, New Jersey, 07458. Pearson Prentice Hall. All rights reserved. Printed in the United States of America. This publication is protected by Copyright and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. For information regarding permission(s), write to: Rights and Permissions Department.

Library of Congress Cataloging-in-Publication Data

McKeen, James D. IT strategy: issues and practices/James D. McKeen, Queen’s University, Heather A. Smith, Queen’s University.—Third edition. pages cm ISBN 978-0-13-354424-4 (alk. paper) ISBN 0-13-354424-9 (alk. paper) 1. Information technology—Management. I. Smith, Heather A. II. Title. HD30.2.M3987 2015 004.068—dc23 2014017950

ISBN–10: 0-13-354424-9 ISBN–13: 978-0-13-354424-4

10 9 8 7 6 5 4 3 2 1

CONTENTS

Preface xiii

About the Authors xxi

Acknowledgments xxii

Section I Delivering Value with IT 1

Chapter 1 DEVELOPING AND DELIVERING ON THE IT VALUE PROPOSITION 2 Peeling the Onion: Understanding IT Value 3

What Is IT Value? 3 Where Is IT Value? 4 Who Delivers IT Value? 5 When Is IT Value Realized? 5

The Three Components of the IT Value Proposition 6 Identification of Potential Value 7 Effective Conversion 8 Realizing Value 9

Five Principles for Delivering Value 10 Principle 1. Have a Clearly Defined Portfolio Value Management

Process 11 Principle 2. Aim for Chunks of Value 11 Principle 3. Adopt a Holistic Orientation to Technology Value 11 Principle 4. Aim for Joint Ownership of Technology Initiatives 12 Principle 5. Experiment More Often 12

Conclusion 12 References 13

Chapter 2 DEVELOPING IT STRATEGY FOR BUSINESS VALUE 15 Business and IT Strategies: Past, Present, and Future 16 Four Critical Success Factors 18 The Many Dimensions of IT Strategy 20 Toward an IT Strategy-Development Process 22 Challenges for CIOs 23

Conclusion 25 25

Chapter 3 LINKING IT TO BUSINESS METRICS 27 Business Measurement: An Overview 28 Key Business Metrics for IT 30

v

vi Contents

Designing Business Metrics for IT 31 Advice to Managers 35

Conclusion 36 36

Chapter 4 BUILDING A STRONG RELATIONSHIP WITH THE BUSINESS 38 The Nature of the Business–IT Relationship 39 The Foundation of a Strong Business–IT

Relationship 41 Building Block #1: Competence 42 Building Block #2: Credibility 43 Building Block #3: Interpersonal Interaction 44 Building Block #4: Trust 46

Conclusion 48 48 Appendix A The Five IT Value Profiles 50 Appendix B Guidelines for Building a Strong Business–IT

Relationship 51

Chapter 5 COMMUNICATING WITH BUSINESS MANAGERS 52 Communication in the Business–IT Relationship 53 What Is “Good” Communication? 54 Obstacles to Effective Communication 56 “T-Level” Communication Skills for IT Staff 58 Improving Business–IT Communication 60

Conclusion 61 61 Appendix A IT Communication Competencies 63

Chapter 6 BUILDING BETTER IT LEADERS FROM THE BOTTOM UP 64 The Changing Role of the IT Leader 65 What Makes a Good IT Leader? 67 How to Build Better IT Leaders 70 Investing in Leadership Development: Articulating the Value

Proposition 73 Conclusion 74 75

MINI CASES Delivering Business Value with IT at Hefty Hardware 76 Investing in TUFS 80 IT Planning at ModMeters 82

Contents vii

Section II IT Governance 87

Chapter 7 CREATING IT SHARED SERVICES 88 IT Shared Services: An Overview 89 IT Shared Services: Pros and Cons 92 IT Shared Services: Key Organizational Success Factors 93 Identifying Candidate Services 94 An Integrated Model of IT Shared Services 95 Recommmendations for Creating Effective IT

Shared Services 96 Conclusion 99 99

Chapter 8 A MANAGEMENT FRAMEWORK FOR IT SOURCING 100 A Maturity Model for IT Functions 101 IT Sourcing Options: Theory Versus Practice 105 The “Real” Decision Criteria 109

Decision Criterion #1: Flexibility 109 Decision Criterion #2: Control 109 Decision Criterion #3: Knowledge Enhancement 110 Decision Criterion #4: Business Exigency 110

A Decision Framework for Sourcing IT Functions 111 Identify Your Core IT Functions 111 Create a “Function Sourcing” Profile 111 Evolve Full-Time IT Personnel 113 Encourage Exploration of the Whole Range

of Sourcing Options 114 Combine Sourcing Options Strategically 114

A Management Framework for Successful Sourcing 115 Develop a Sourcing Strategy 115 Develop a Risk Mitigation Strategy 115 Develop a Governance Strategy 116 Understand the Cost Structures 116

Conclusion 117 117

Chapter 9 THE IT BUDGETING PROCESS 118 Key Concepts in IT Budgeting 119 The Importance of Budgets 121 The IT Planning and Budget Process 123

viii Contents

Corporate Processes 123 IT Processes 125 Assess Actual IT Spending 126

IT Budgeting Practices That Deliver Value 127 Conclusion 128 129

Chapter 10 MANAGING IT- BASED RISK 130 A Holistic View of IT-Based Risk 131 Holistic Risk Management: A Portrait 134 Developing a Risk Management Framework 135 Improving Risk Management Capabilities 138 Conclusion 139 140 Appendix A A Selection of Risk Classification

Schemes 141

Chapter 11 INFORMATION MANAGEMENT: THE NEXUS OF BUSINESS AND IT 142 Information Management: How Does IT Fit? 143 A Framework For IM 145

Stage One: Develop an IM Policy 145 Stage Two: Articulate the Operational

Components 145 Stage Three: Establish Information Stewardship 146 Stage Four: Build Information Standards 147

Issues In IM 148 Culture and Behavior 148 Information Risk Management 149 Information Value 150 Privacy 150 Knowledge Management 151 The Knowing–Doing Gap 151

Getting Started in IM 151 Conclusion 153 154

Appendix A Elements of IM Operations 155

MINI CASES Building Shared Services at RR Communications 156 Enterprise Architecture at Nationstate Insurance 160 IT Investment at North American Financial 165

Contents ix

Section III IT-Enabled Innovation 169

Chapter 12 INNOVATION WITH IT 170 The Need for Innovation: An Historical

Perspective 171 The Need for Innovation Now 171 Understanding Innovation 172 The Value of Innovation 174 Innovation Essentials: Motivation, Support,

and Direction 175 Challenges for IT leaders 177 Facilitating Innovation 179

Conclusion 180 181

Chapter 13 BIG DATA AND SOCIAL COMPUTING 182 The Social Media/Big Data Opportunity 183 Delivering Business Value with Big Data 185 Innovating with Big Data 189 Pulling in Two Different Directions: The Challenge

for IT Managers 190 First Steps for IT Leaders 192

Conclusion 193 194

Chapter 14 IMPROVING THE CUSTOMER EXPERIENCE: AN IT PERSPECTIVE 195 Customer Experience and Business value 196 Many Dimensions of Customer Experience 197 The Role of Technology in Customer Experience 199 Customer Experience Essentials for IT 200 First Steps to Improving Customer Experience 203

Conclusion 204 204

Chapter 15 BUILDING BUSINESS INTELLIGENCE 206 Understanding Business Intelligence 207 The Need for Business Intelligence 208 The Challenge of Business Intelligence 209 The Role of IT in Business Intelligence 211 Improving Business Intelligence 213

Conclusion 216 216

x Contents

Chapter 16 ENABLING COLLABORATION WITH IT 218 Why Collaborate? 219 Characteristics of Collaboration 222 Components of Successful Collaboration 225 The Role of IT in Collaboration 227 First Steps for Facilitating Effective Collaboration 229

Conclusion 231 232

MINI CASES Innovation at International Foods 234 Consumerization of Technology at IFG 239 CRM at Minitrex 243 Customer Service at Datatronics 246

Section IV IT Portfolio Development and Management 251

Chapter 17 APPLICATION PORTFOLIO MANAGEMENT 252 The Applications Quagmire 253 The Benefits of a Portfolio Perspective 254 Making APM Happen 256

Capability 1: Strategy and Governance 258 Capability 2: Inventory Management 262 Capability 3: Reporting and Rationalization 263

Key Lessons Learned 264 Conclusion 265 265

Appendix A Application Information 266

Chapter 18 MANAGING IT DEMAND 270 Understanding IT Demand 271 The Economics of Demand Management 273 Three Tools for Demand management 273 Key Organizational Enablers for Effective Demand

Management 274 Strategic Initiative Management 275 Application Portfolio Management 276 Enterprise Architecture 276 Business–IT Partnership 277 Governance and Transparency 279

Conclusion 281 281

Contents xi

Chapter 19 CREATING AND EVOLVING A TECHNOLOGY ROADMAP 283 What is a Technology Roadmap? 284 The Benefits of a Technology Roadmap 285

External Benefits (Effectiveness) 285 Internal Benefits (Efficiency) 286

Elements of the Technology Roadmap 286 Activity #1: Guiding Principles 287 Activity #2: Assess Current Technology 288 Activity #3: Analyze Gaps 289 Activity #4: Evaluate Technology

Landscape 290 Activity #5: Describe Future Technology 291 Activity #6: Outline Migration Strategy 292 Activity #7: Establish Governance 292

Practical Steps for Developing a Technology Roadmap 294

Conclusion 295 295 Appendix A Principles to Guide a Migration

Strategy 296

Chapter 20 ENHANCING DEVELOPMENT PRODUCTIVITY 297 The Problem with System Development 298 Trends in System Development 299 Obstacles to Improving System Development

Productivity 302 Improving System Development Productivity: What we

know that Works 304 Next Steps to Improving System Development

Productivity 306 Conclusion 308 308

Chapter 21 INFORMATION DELIVERY: IT’S EVOLVING ROLE 310 Information and IT: Why Now? 311 Delivering Value Through Information 312 Effective Information Delivery 316

New Information Skills 316 New Information Roles 317 New Information Practices 317

xii Contents

New Information Strategies 318 The Future of Information Delivery 319

Conclusion 321 322

MINI CASES Project Management at MM 324 Working Smarter at Continental Furniture International 328 Managing Technology at Genex Fuels 333

Index 336

PREFACE

Today, with information technology (IT) driving constant business transformation, overwhelming organizations with information, enabling 24/7 global operations, and undermining traditional business models, the challenge for business leaders is not simply to manage IT, it is to use IT to deliver business value. Whereas until fairly recently, decisions about IT could be safely delegated to technology specialists after a business strategy had been developed, IT is now so closely integrated with business that, as one CIO explained to us, “We can no longer deliver business solutions in our company without using technology so IT and business strategy must constantly interact with each other.”

What’s New in This Third Edition?

IT shared services; big data and social computing; business intelligence; manag- ing IT demand; improving the customer experience; and enhancing development productivity.

resourcing options; and innovating with IT.

Working Smarter at Continental Furniture and Enterprise Architecture at Nationstate Insurance.

from the second edition being moved to the Web site.

All too often, in our efforts to prepare future executives to deal effectively with the issues of IT strategy and management, we lead them into a foreign country where they encounter a different language, different culture, and different customs. Acronyms (e.g., SOA, FTP/IP, SDLC, ITIL, ERP), buzzwords (e.g., asymmetric encryption, proxy servers, agile, enterprise service bus), and the widely adopted practice of abstraction (e.g., Is a software monitor a person, place, or thing?) present formidable “barriers to entry” to the technologically uninitiated, but more important, they obscure the impor- tance of teaching students how to make business decisions about a key organizational resource. By taking a critical issues perspective, IT Strategy: Issues and Practices treats IT as a tool to be leveraged to save and/or make money or transform an organization—not as a study by itself.

As in the first two editions of this book, this third edition combines the experi- ences and insights of many senior IT managers from leading-edge organizations with thorough academic research to bring important issues in IT management to life and demonstrate how IT strategy is put into action in contemporary businesses. This new edition has been designed around an enhanced set of critical real-world issues in IT management today, such as innovating with IT, working with big data and social media,

xiii

xiv Preface

enhancing customer experience, and designing for business intelligence and introduces students to the challenges of making IT decisions that will have significant impacts on how businesses function and deliver value to stakeholders.

IT Strategy: Issues and Practices focuses on how IT is changing and will continue to change organizations as we now know them. However, rather than learning concepts “free of context,” students are introduced to the complex decisions facing real organi- zations by means of a number of mini cases. These provide an opportunity to apply the models/theories/frameworks presented and help students integrate and assimilate this material. By the end of the book, students will have the confidence and ability to tackle the tough issues regarding IT management and strategy and a clear understand- ing of their importance in delivering business value.

Key Features of This Book management issues as opposed to technology issues

- sions, enabling problem-based learning

A DIFFERENT APPROACH TO TEACHING IT STRATEGY The real world of IT is one of issues—critical issues—such as the following:

media, in our business?

However, the majority of management information systems (MIS) textbooks are orga- nized by system category (e.g., supply chain, customer relationship management, enterprise resource planning), by system component (e.g., hardware, software, networks), by system function (e.g., marketing, financial, human resources), by system type (e.g., transactional, decisional, strategic), or by a combination of these. Unfortunately, such an organization does not promote an understanding of IT management in practice.

IT Strategy: Issues and Practices tackles the real-world challenges of IT manage- ment. First, it explores a set of the most important issues facing IT managers today, and second, it provides a series of mini cases that present these critical IT issues within the context of real organizations. By focusing the text as well as the mini cases on today’s critical issues, the book naturally reinforces problem-based learning.

Preface xv

IT Strategy: Issues and Practices includes thirteen mini cases—each based on a real company presented anonymously.1 Mini cases are not simply abbreviated versions of standard, full-length business cases. They differ in two significant ways:

1. A horizontal perspective. Unlike standard cases that develop a single issue within an organizational setting (i.e., a “vertical” slice of organizational life), mini cases take a “horizontal” slice through a number of coexistent issues. Rather than looking for a solution to a specific problem, as in a standard case, students analyzing a mini case must first identify and prioritize the issues embedded within the case. This mim- ics real life in organizations where the challenge lies in “knowing where to start” as opposed to “solving a predefined problem.”

2. Highly relevant information. Mini cases are densely written. Unlike standard cases, which intermix irrelevant information, in a mini case, each sentence exists for a reason and reflects relevant information. As a result, students must analyze each case very carefully so as not to miss critical aspects of the situation.

Teaching with mini cases is, thus, very different than teaching with standard cases. With mini cases, students must determine what is really going on within the organiza- tion. What first appears as a straightforward “technology” problem may in fact be a political problem or one of five other “technology” problems. Detective work is, there- fore, required. The problem identification and prioritization skills needed are essential skills for future managers to learn for the simple reason that it is not possible for organi- zations to tackle all of their problems concurrently. Mini cases help teach these skills to students and can balance the problem-solving skills learned in other classes. Best of all, detective work is fun and promotes lively classroom discussion.

To assist instructors, extensive teaching notes are available for all mini cases. Developed by the authors and based on “tried and true” in-class experience, these notes include case summaries, identify the key issues within each case, present ancillary information about the company/industry represented in the case, and offer guidelines for organizing the class- room discussion. Because of the structure of these mini cases and their embedded issues, it is common for teaching notes to exceed the length of the actual mini case!

This book is most appropriate for MIS courses where the goal is to understand how IT delivers organizational value. These courses are frequently labeled “IT Strategy” or “IT Management” and are offered within undergraduate as well as MBA programs. For undergraduate juniors and seniors in business and commerce programs, this is usually the “capstone” MIS course. For MBA students, this course may be the compulsory core course in MIS, or it may be an elective course.

Each chapter and mini case in this book has been thoroughly tested in a variety of undergraduate, graduate, and executive programs at Queen’s School of Business.2

1 We are unable to identify these leading-edge companies by agreements established as part of our overall research program (described later). 2 Queen’s School of Business is one of the world’s premier business schools, with a faculty team renowned for its business experience and academic credentials. The School has earned international recognition for its innovative approaches to team-based and experiential learning. In addition to its highly acclaimed MBA programs, Queen’s School of Business is also home to Canada’s most prestigious undergraduate business program and several outstanding graduate programs. As well, the School is one of the world’s largest and most respected providers of executive education.

xvi Preface

These materials have proven highly successful within all programs because we adapt how the material is presented according to the level of the students. Whereas under- graduate students “learn” about critical business issues from the book and mini cases for the first time, graduate students are able to “relate” to these same critical issues based on their previous business experience. As a result, graduate students are able to introduce personal experiences into the discussion of these critical IT issues.

ORGANIZATION OF THIS BOOK One of the advantages of an issues-focused structure is that chapters can be approached in any order because they do not build on one another. Chapter order is immaterial; that is, one does not need to read the first three chapters to understand the fourth. This pro- vides an instructor with maximum flexibility to organize a course as he or she sees fit. Thus, within different courses/programs, the order of topics can be changed to focus on different IT concepts.

Furthermore, because each mini case includes multiple issues, they, too, can be used to serve different purposes. For example, the mini case “Building Shared Services at RR Communications” can be used to focus on issues of governance, organizational structure, and/or change management just as easily as shared services. The result is a rich set of instructional materials that lends itself well to a variety of pedagogical appli- cations, particularly problem-based learning, and that clearly illustrates the reality of IT strategy in action.

The book is organized into four sections, each emphasizing a key component of developing and delivering effective IT strategy:

Section I: Delivering Value with IT is designed to examine the complex ways that IT and business value are related. Over the past twenty years, researchers and prac- titioners have come to understand that “business value” can mean many different things when applied to IT. Chapter 1 (Developing and Delivering on the IT Value Proposition) explores these concepts in depth. Unlike the simplistic value propo- sitions often used when implementing IT in organizations, this chapter presents “value” as a multilayered business construct that must be effectively managed at several levels if technology is to achieve the benefits expected. Chapter 2 (Developing IT Strategy for Business Value) examines the dynamic interrelationship between business and IT strategy and looks at the processes and critical success factors used by organizations to ensure that both are well aligned. Chapter 3 (Linking IT to Business Metrics) discusses new ways of measuring IT’s effectiveness that pro- mote closer business–IT alignment and help drive greater business value. Chapter 4 (Building a Strong Relationship with the Business) examines the nature of the business–IT relationship and the characteristics of an effective relationship that delivers real value to the enterprise. Chapter 5 (Communicating with Business Managers) explores the business and interpersonal competencies that IT staff will need in order to do their jobs effectively over the next five to seven years and what companies should be doing to develop them. Finally, Chapter 6 (Building Better IT Leaders from the Bottom Up) tackles the increasing need for improved leadership skills in all IT staff and examines the expectations of the business for strategic and innovative guidance from IT.

Preface xvii

In the mini cases associated with this section, the concepts of delivering value with IT are explored in a number of different ways. We see business and IT executives at Hefty Hardware grappling with conflicting priorities and per- spectives and how best to work together to achieve the company’s strategy. In “Investing in TUFS,” CIO Martin Drysdale watches as all of the work his IT depart- ment has put into a major new system fails to deliver value. And the “IT Planning at ModMeters” mini case follows CIO Brian Smith’s efforts to create a strategic IT plan that will align with business strategy, keep IT running, and not increase IT’s budget. Section II: IT Governance explores key concepts in how the IT organization is structured and managed to effectively deliver IT products and services to the orga- nization. Chapter 7 (IT Shared Services) discusses how IT shared services should be selected, organized, managed, and governed to achieve improved organizational performance. Chapter 8 (A Management Framework for IT Sourcing) examines how organizations are choosing to source and deliver different types of IT functions and presents a framework to guide sourcing decisions. Chapter 9 (The IT Budgeting Process) describes the “evil twin” of IT strategy, discussing how budgeting mecha- nisms can significantly undermine effective business strategies and suggesting practices for addressing this problem while maintaining traditional fiscal account- ability. Chapter 10 (Managing IT-based Risk) describes how many IT organizations have been given the responsibility of not only managing risk in their own activities (i.e., project development, operations, and delivering business strategy) but also of managing IT-based risk in all company activities (e.g., mobile computing, file sharing, and online access to information and software) and the need for a holistic framework to understand and deal with risk effectively. Chapter 11 (Information Management: The Nexus of Business and IT) describes how new organizational needs for more useful and integrated information are driving the development of business-oriented functions within IT that focus specifically on information and knowledge, as opposed to applications and data.

The mini cases in this section examine the difficulties of managing com- plex IT issues when they intersect substantially with important business issues. In “Building Shared Services at RR Communications,” we see an IT organiza- tion in transition from a traditional divisional structure and governance model to a more centralized enterprise model, and the long-term challenges experi- enced by CIO Vince Patton in changing both business and IT practices, includ- ing information management and delivery, to support this new approach. In “Enterprise Architecture at Nationstate Insurance,” CIO Jane Denton endeavors to make IT more flexible and agile, while incorporating new and emerging tech- nologies into its strategy. In “IT Investment at North American Financial,” we show the opportunities and challenges involved in prioritizing and resourcing enterprisewide IT projects and monitoring that anticipated benefits are being achieved. Section III: IT-Enabled Innovation discusses some of the ways technology is being used to transform organizations. Chapter 12 (Innovation with IT) examines the nature and importance of innovation with IT and describes a typical inno- vation life cycle. Chapter 13 (Big Data and Social Computing) discusses how IT leaders are incorporating big data and social media concepts and technologies

xviii Preface

to successfully deliver business value in new ways. Chapter 14 (Improving the Customer Experience: An IT Perspective) explores the IT function’s role in creating and improving an organization’s customer experiences and the role of technology in helping companies to understand and learn from their customers’ experiences. Chapter 15 (Building Business Intelligence) looks at the nature of business intelli- gence and its relationship to data, information, and knowledge and how IT can be used to build a more intelligent organization. Chapter 16 (Enabling Collaboration with IT) identifies the principal forms of collaboration used in organizations, the primary business drivers involved in them, how their business value is measured, and the roles of IT and the business in enabling collaboration.

The mini cases in this section focus on the key challenges companies face in innovating with IT. “Innovation at International Foods” contrasts the need for pro- cess and control in corporate IT with the strong push to innovate with technology and the difficulties that ensue from the clash of style and culture. “Consumerization of Technology at IFG” looks at issues such as “bring your own device” (BYOD) to the workplace. In “CRM at Minitrex,” we see some of the internal technological and political conflicts that result from a strategic decision to become more customercen- tric. Finally, “Customer Service at Datatronics” explores the importance of present- ing unified, customer-facing IT to customers. Section IV: IT Portfolio Development and Management looks at how the IT function must transform itself to be able to deliver business value effectively in the future. Chapter 17 (Application Portfolio Management) describes the ongoing management process of categorizing, assessing, and rationalizing the IT application portfolio. Chapter 18 (Managing IT Demand) looks at the often neglected issue of demand management (as opposed to supply management), explores the root causes of the demand for IT services, and identifies a number of tools and enablers to facilitate more effective demand management. Chapter 19 (Creating and Evolving a Technology Roadmap) examines the challenges IT managers face in implement- ing new infrastructure, technology standards, and types of technology in their real- world business and technical environments, which is composed of a huge variety of hardware, software, applications, and other technologies, some of which date back more than thirty years. Chapter 20 (Enhancing Development Productivity) explores how system development practices are changing and how managers can create an environment to promote improved development productivity. And Chapter 21 (Information Delivery: IT’s Evolving Role) examines the fresh challenges IT faces in managing the exponential growth of data and digital assets; privacy and account- ability concerns; and new demands for access to information on an anywhere, any- time basis.

The mini cases associated with this section describe many of these themes embedded within real organizational contexts. “Project Management at MM” mini case shows how a top-priority, strategic project can take a wrong turn when proj- ect management skills are ineffective. “Working Smarter at Continental Furniture” mini case follows an initiative to improve the company’s analytics so it can reduce its environmental impact. And in the mini case “Managing Technology at Genex Fuels,” we see CIO Nick Devlin trying to implement enterprisewide technology for competitive advantage in an organization that has been limping along with obscure and outdated systems.

Preface xix

SUPPLEMENTARY MATERIALS

Online Instructor Resource Center The following supplements are available online to adopting instructors:

Data Management; Developing IT Capabilities; The Identity Management Challenge; Social Computing; Managing Perceptions of IT; IT in the New World of Corporate Governance Reforms; Enhancing Customer Experiences with Technology; Creating Digital Dashboards; and Managing Electronic Communications.

Organization at Ag-Credit; Information Management at Homestyle Hotels; Knowledge Management at Acme Consulting; Desktop Provisioning at CanCredit; and Leveraging IT Vendors at SleepSmart.

For detailed descriptions of all of the supplements just listed, please visit http:// www.pearsonhighered.com/mckeen.

CourseSmart eTextbooks Online CourseSmart is an exciting new choice for students looking to save money. As an alter- native to purchasing the print textbook, students can purchase an electronic version of the same content and save up to 50 percent off the suggested list price of the print text. With a CourseSmart etextbook, students can search the text, make notes online, print out reading assignments that incorporate lecture notes, and bookmark important pas- sages for later review. www.coursesmart.com.

THE GENESIS OF THIS BOOK Since 1990 we have been meeting quarterly with a group of senior IT managers from a number of leading-edge organizations (e.g., Eli Lilly, BMO, Honda, HP, CIBC, IBM, Sears, Bell Canada, MacDonalds, and Sun Life) to identify and discuss critical IT manage- ment issues. This focus group represents a wide variety of industry sectors (e.g., retail, manufacturing, pharmaceutical, banking, telecommunications, insurance, media, food processing, government, and automotive). Originally, it was established to meet the com- panies’ needs for well-balanced, thoughtful, yet practical information on emerging IT management topics, about which little or no research was available. However, we soon recognized the value of this premise for our own research in the rapidly evolving field of IT management. As a result, it quickly became a full-scale research program in which we were able to use the focus group as an “early warning system” to document new IT management issues, develop case studies around them, and explore more collaborative approaches to identifying trends, challenges, and effective practices in each topic area.3

3 This now includes best practice case studies, field research in organizations, multidisciplinary qualitative and quantitative research projects, and participation in numerous CIO research consortia.

http://www.pearsonhighered.com/mckeen
http://www.pearsonhighered.com/mckeen
http://www.coursesmart.com
xx Preface

As we shared our materials with our business students, we realized that this issues- based approach resonated strongly with them, and we began to incorporate more of our research into the classroom. This book is the result of our many years’ work with senior IT managers, in organizations, and with students in the classroom.

Each issue in this book has been selected collaboratively by the focus group after debate and discussion. As facilitators, our job has been to keep the group’s focus on IT management issues, not technology per se. In preparation for each meeting, focus group members researched the topic within their own organization, often involving a number of members of their senior IT management team as well as subject matter experts in the process. To guide them, we provided a series of questions about the issue, although members are always free to explore it as they see fit. This approach provided both struc- ture for the ensuing discussion and flexibility for those members whose organizations are approaching the issue in a different fashion.

The focus group then met in a full-day session, where the members discussed all aspects of the issue. Many also shared corporate documents with the group. We facilitated the discussion, in particular pushing the group to achieve a common understanding of the dimensions of the issue and seeking examples, best practices, and guidelines for deal- ing with the challenges involved. Following each session, we wrote a report based on the discussion, incorporating relevant academic and practitioner materials where these were available. (Because some topics are “bleeding edge,” there is often little traditional IT research available on them.)

Each report has three parts:

1. A description of the issue and the challenges it presents for both business and IT managers

2. Models and concepts derived from the literature to position the issue within a con- textual framework

3. Near-term strategies (i.e., those that can be implemented immediately) that have proven successful within organizations for dealing with the specific issue

Each chapter in this book focuses on one of these critical IT issues. We have learned over the years that the issues themselves vary little across industries and organizations, even in enterprises with unique IT strategies. However, each organization tackles the same issue somewhat differently. It is this diversity that provides the richness of insight in these chapters. Our collaborative research approach is based on our belief that when dealing with complex and leading-edge issues, “everyone has part of the solution.” Every focus group, therefore, provides us an opportunity to explore a topic from a variety of perspectives and to integrate different experiences (both successful and oth- erwise) so that collectively, a thorough understanding of each issue can be developed and strategies for how it can be managed most successfully can be identified.

ABOUT THE AUTHORS

James D. McKeen is Professor Emeritus at the Queen’s School of Business. He has been working in the IT field for many years as a practitioner, researcher, and consultant. In 2011, he was named the “IT Educator of the Year” by ComputerWorld Canada. Jim has taught at universities in the United Kingdom, France, Germany, and the United States. His research is widely published in a number of leading journals and he is the coau- thor (with Heather Smith) of five books on IT management. Their most recent book—IT Strategy: Issues and Practices (2nd ed.)—was the best-selling business book in Canada (Globe and Mail, April 2012).

Heather A. Smith has been named the most-published researcher on IT management issues in two successive studies (2006, 2009). A senior research associate with Queen’s University School of Business, she is the author of five books, the most recent being IT Strategy: Issues and Practices (Pearson Prentice Hall, 2012). She is also a senior research associate with the American Society for Information Management’s Advanced Practices Council. A former senior IT manager, she is codirector of the IT Management Forum and the CIO Brief, which facilitate interorganizational learning among senior IT executives. In addition, she consults and collaborates with organizations worldwide.

xxi

ACKNOWLEDGMENTS

The work contained in this book is based on numerous meetings with many senior IT managers. We would like to acknowledge our indebtedness to the following individuals who willingly shared their insights based on their experiences “earned the hard way”:

Michael Balenzano, Sergei Beliaev, Matthias Benfey, Nastaran Bisheban, Peter Borden, Eduardo Cadena, Dale Castle, Marc Collins, Diane Cope, Dan Di Salvo, Ken Dschankilic, Michael East, Nada Farah, Mark Gillard, Gary Goldsmith, Ian Graham, Keiko Gutierrez, Maureen Hall, Bruce Harding, Theresa Harrington, Tom Hopson, Heather Hutchison, Jim Irich, Zeeshan Khan, Joanne Lafreniere, Konstantine Liris, Lisa MacKay, Mark O’Gorman, Amin Panjwani, Troy Pariag, Brian Patton, Marius Podaru, Helen Restivo, Pat Sadler, A. F. Salam, Ashish Saxena, Joanne Scher, Stewart Scott, Andy Secord, Marie Shafi, Helen Shih, Trudy Sykes, Bruce Thompson, Raju Uppalapati, Len Van Greuning, Laurie Schatzberg, Ted Vincent, and Bond Wetherbe.

We would also like to recognize the contribution of Queen’s School of Business to this work. The school has facilitated and supported our vision of better integrat- ing academic research and practice and has helped make our collaborative approach to the study of IT management and strategy an effective model for interorganizational learning.

James D. McKeen Kingston, Ontario

Heather A. Smith School of Business

June 2014

xxii

S E C T I O N I

Delivering Value with IT

Chapter 1 Developing and Delivering on the IT Value Proposition Chapter 2 Developing IT Strategy for Business Value Chapter 3 Linking IT to Business Metrics Chapter 4 Building a Strong Relationship with the Business Chapter 5 Communicating with Business Managers Chapter 6 Building Better IT Leaders from the Bottom Up

Mini Cases ■ Delivering Business Value with IT at Hefty Hardware ■ Investing in TUFS ■ IT Planning at ModMeters

2

C H A P T E R

1 Developing and Delivering on the IT Value Proposition1

1 This chapter is based on the authors’ previously published article, Smith, H. A., and J. D. McKeen. “Developing and Delivering on the IT Value Proposition.” Communications of the Association for Information Systems 11 (April 2003): 438–50. Reproduced by permission of the Association for Information Systems.

It’s déjà vu all over again. For at least twenty years, business leaders have been trying to figure out exactly how and where IT can be of value in their organizations. And IT managers have been trying to learn how to deliver this value. When IT was used mainly as a productivity improvement tool in small areas of a business, this was a relatively straightforward process. Value was measured by reduced head counts— usually in clerical areas—and/or the ability to process more transactions per person. However, as systems grew in scope and complexity, unfortunately so did the risks. Very few companies escaped this period without making at least a few disastrous invest- ments in systems that didn’t work or didn’t deliver the bottom-line benefits executives thought they would. Naturally, fingers were pointed at IT.

With the advent of the strategic use of IT in business, it became even more difficult to isolate and deliver on the IT value proposition. It was often hard to tell if an invest- ment had paid off. Who could say how many competitors had been deterred or how many customers had been attracted by a particular IT initiative? Many companies can tell horror stories of how they have been left with a substantial investment in new forms of technology with little to show for it. Although over the years there have been many improvements in where and how IT investments are made and good controls have been established to limit time and cost overruns, we are still not able to accurately articulate and deliver on a value proposition for IT when it comes to anything other than simple productivity improvements or cost savings.

Problems in delivering IT value can lie with how a value proposition is conceived or in what is done to actually implement an idea—that is, selecting the right project and doing the project right (Cooper et al. 2000; McKeen and Smith 2003; Peslak 2012). In addition, although most firms attempt to calculate the expected payback of an IT invest- ment before making it, few actually follow up to ensure that value has been achieved or to question what needs to be done to make sure that value will be delivered.

3

This chapter first looks at the nature of IT value and “peels the onion” into its different layers. Then it examines the three components of delivering IT value: value identification, conversion, and value realization. Finally, it identifies five general principles for ensuring IT value will be achieved.

PEELING THE ONION: UNDERSTANDING IT VALUE

Thirty years ago the IT value proposition was seen as a simple equation: Deliver the right technology to the organization, and financial benefits will follow (Cronk and Fitzgerald 1999; Marchand et al. 2000). In the early days of IT, when computers were most often used as direct substitutes for people, this equation was understandable, even if it rarely worked this simply. It was easy to compute a bottom-line benefit where “technology” dollars replaced “salary” dollars.

Problems with this simplistic view quickly arose when technology came to be used as a productivity support tool and as a strategic tool. Under these conditions, managers had to decide if an IT investment was worth making if it saved people time, helped them make better decisions, or improved service. Thus, other factors, such as how well technology was used by people or how IT and business processes worked together, became important considerations in how much value was realized from an IT investment. These issues have long confounded our understanding of the IT value prop- osition, leading to a plethora of opinions (many negative) about how and where technol- ogy has actually contributed to business value. Stephen Roach (1989) made headlines with his macroeconomic analysis showing that IT had had absolutely no impact on pro- ductivity in the services sector. More recently, research shows that companies still have a mixed record in linking IT to organizational performance, user satisfaction, productivity, customer experience, and agility (Peslak 2012).

These perceptions, plus ever-increasing IT expenditures, have meant business managers are taking a closer look at how and where IT delivers value to an organization (Ginzberg 2001; Luftman and Zadeh 2011). As they do this, they are beginning to change their understanding of the IT value proposition. Although, unfortunately, “silver bullet thinking” (i.e., plug in technology and deliver bottom-line impact) still predomi- nates, IT value is increasingly seen as a multilayered concept, far more complex than it first appeared. This suggests that before an IT value proposition can be identified and delivered, it is essential that managers first “peel the onion” and understand more about the nature of IT value itself (see Figure 1.1).

What Is IT Value?

Value is defined as the worth or desirability of a thing (Cronk and Fitzgerald 1999). It is a subjective assessment. Although many believe this is not so, the value of IT depends very much on how a business and its individual managers choose to view it. Different companies and even different executives will define it quite differently. Strategic posi- tioning, increased productivity, improved decision making, cost savings, or improved service are all ways value could be defined. Today most businesses define value broadly and loosely, not simply as a financial concept (Chakravarty et al. 2013). Ideally, it is tied to the organization’s business model because adding value with IT should enable a firm to do its business better. In the focus group (see the Preface), one company sees value

4

resulting from all parts of the organization having the same processes; another defines value by return on investment (ROI); still another measures it by a composite of key performance indicators. In short, there is no single agreed-on measure of IT value. As a result, misunderstandings about the definition of value either between IT and the busi- ness or among business managers themselves can lead to feelings that value has not been delivered. Therefore, a prerequisite of any IT value proposition is that everyone involved in an IT initiative agree on what value they are trying to deliver and how they will recognize it.

Where Is IT Value?

Value may also vary according to where one looks for it (Davern and Kauffman 2000; Oliveira and Martins 2011). For example, value to an enterprise may not be perceived as value in a work group or by an individual. In fact, delivering value at one level in an orga- nization may actually conflict with optimizing value at another level. Decisions about IT value are often made to optimize firm or business process value, even if they cause difficulties for business units or individuals. As one manager explained, “At the senior levels, our bottom-line drivers of value are cost savings, cash flow, customer satisfaction, and revenue. These are not always visible at the lower levels of the organization.” Failure to consider value implications at all levels can lead to a value proposition that is coun- terproductive and may not deliver the value that is anticipated. Many executives take a hard line with these value conflicts. However, it is far more desirable to aim for a value

What Value will be Delivered?

Where will Value be Delivered?

Who will Deliver Value?

When will Value be Delivered?

How will Value be Delivered?

FIGURE 1.1 IT Value Is a Many-Layered Concept

5

that is not a win–lose proposition but is a win–win at all levels. This can leverage overall value many times over (Chan 2000; Grant and Royle 2011).

Who Delivers IT Value?

Increasingly, managers are realizing that it is the interaction of people, information, and technology that delivers value, not IT alone.2 Studies have confirmed that strong IT practices alone do not deliver superior performance. It is only the combination of these IT practices with an organization’s skills at managing information and people’s behav- iors and beliefs that leads to real value (Birdsall 2011; Ginzberg 2001; Marchand et al. 2000). In the past, IT has borne most of the responsibility for delivering IT value. Today, however, business managers exhibit a growing willingness to share responsibility with IT to ensure value is realized from the organization’s investments in technology. Most companies now expect to have an executive sponsor for any IT initiative and some busi- ness participation in the development team. However, many IT projects still do not have the degree of support or commitment from the business that IT managers feel is necessary to deliver fully on a value proposition (Peslak 2012).

When Is IT Value Realized?

Value also has a time dimension. It has long been known that the benefits of technol- ogy take time to be realized (Chan 2000; Segars and Chatterjee 2010). People must be trained, organizations and processes must adapt to new ways of working, information must be compiled, and customers must realize what new products and services are being offered. Companies are often unprepared for the time it takes an investment to pay off. Typically, full payback can take between three and five years and can have at least two spikes as a business adapts to the deployment of technology. Figure 1.2 shows this “W” effect, named for the way the chart looks, for a single IT project.

Initially, companies spend a considerable amount in deploying a new technology. During this twelve-to-sixteen-month period, no benefits occur. Following implementa- tion, some value is realized as companies achieve initial efficiencies. This period lasts for about six months. However, as use increases, complexities also grow. Information overload can occur and costs increase. At this stage, many can lose faith in the initia- tive. This is a dangerous period. The final set of benefits can occur only by making the business simpler and applying technology, information, and people more effectively. If a business can manage to do this, it can achieve sustainable, long-term value from its IT investment (Segars and Chatterjee 2010). If it can’t, value from technology can be offset by increased complexity.

Time also changes perceptions of value. Many IT managers can tell stories of how an initiative is vilified as having little or no value when first implemented, only to have people say they couldn’t imagine running the business without it a few years later. Similarly, most managers can identify projects where time has led to a clearer

2 These interactions in a structured form are known as processes. Processes are often the focus of much orga- nizational effort in the belief that streamlining and reengineering them will deliver value. In fact, research shows that without attention to information and people, very little value is delivered (Segars and Chatterjee 2010). In addition, attention to processes in organizations often ignores the informal processes that contribute to value.

6

understanding of the potential value of a project. Unfortunately, in cases where antici- pated value declines or disappears, projects don’t always get killed (Cooper et al. 2000).

Clarifying and agreeing on these different layers of IT value is the first step involved in developing and delivering on the IT value proposition. All too often, this work is for- gotten or given short shrift in the organization’s haste to answer this question: How will IT value be delivered? (See next section.) As a result, misunderstandings arise and tech- nology projects do not fulfill their expected promises. It will be next to impossible to do a good job developing and delivering IT value unless and until the concepts involved in IT value are clearly understood and agreed on by both business and IT managers.

THE THREE COMPONENTS OF THE IT VALUE PROPOSITION

Developing and delivering an IT value proposition involves addressing three compo- nents. First, potential opportunities for adding value must be identified. Second, these opportunities must be converted into effective applications of technology. Finally, value

12–16 Months

EVA

Time

Get the House in Order

Harvest Low- Hanging Fruit

Make the Business Complex

Make Business Simpler

16–22 Months 22–38 Months 3–5 Years

FIGURE 1.2 The ‘W’ Effect in Delivering IT Value (Segars & Chatterjee, 2010)

Best Practices in Understanding IT Value

7

must be realized by the organization. Together, these components comprise the funda- mentals of any value proposition (see Figure 1.3).

Identification of Potential Value

Identifying opportunities for making IT investments has typically been a fairly informal activity in most organizations. Very few companies have a well-organized means of doing research into new technologies or strategizing about where these tech- nologies can be used (McKeen and Smith 2010). More companies have mechanisms for identifying opportunities within business units. Sometimes a senior IT manager will be designated as a “relationship manager” for a particular unit with responsi- bility for working with business management to identify opportunities where IT could add value (Agarwal and Sambamurthy 2002; Peslak 2012). Many other com- panies, however, still leave it up to business managers to identify where they want to use IT. There is growing evidence that relegating the IT organization to a passive role in developing systems according to business instructions is unlikely to lead to high IT value. Research shows that involving IT in business planning can have a direct and positive influence on the development of successful business strategies using IT (Ginzberg 2001; Marchand et al. 2000). This suggests that organizations should estab- lish joint business–IT mechanisms to identify and evaluate both business and technical opportunities where IT can add value.

Once opportunities have been identified, companies must then make decisions about where they want to focus their dollars to achieve optimal value. Selecting the right projects for an organization always involves balancing three fundamental factors: cash, timing, and risk (Luehrman 1997). In principle, every company wants to under- take only high-return projects. In reality, project selection is based on many different factors. For example, pet or political projects or those mandated by the government or competitors are often part of a company’s IT portfolio (Carte et al. 2001). Disagreement at senior levels about which projects to undertake can arise because of a lack of a coher- ent and consistent mechanism for assessing project value. All organizations need some formal mechanism for prioritizing projects. Without one, it is very likely that project selection will become highly politicized and, hence, ineffective at delivering value. There are a variety of means to do this, ranging from using strictly bottom-line metrics, to comparing balanced scorecards, to adopting a formal value-assessment methodology. However, although these methods help to weed out higher cost–lower return projects, they do not constitute a foolproof means of selecting the right projects for an organiza- tion. Using strict financial selection criteria, for example, can exclude potentially high- value strategic projects that have less well-defined returns, longer payback periods, and more risk (Cooper et al. 2000; DeSouza 2011). Similarly, it can be difficult getting

Identification Conversion Realization IT

Value

FIGURE 1.3 The Three Components of the IT Value Proposition

8

important infrastructure initiatives funded even though these may be fundamental to improving organizational capabilities (Byrd 2001).

Therefore, organizations are increasingly taking a portfolio approach to project selection. This approach allocates resources and funding to different types of projects, enabling each type of opportunity to be evaluated according to different criteria (McKeen and Smith 2003; Smith and McKeen 2010). One company has identified three different classes of IT—infrastructure, common systems, and business unit applications—and funds them in different proportions. In other companies, funding for strategic initia- tives is allocated in stages so their potential value can be reassessed as more information about them becomes known. Almost all companies have found it necessary to justify infrastructure initiatives differently than more business-oriented projects. In fact, some remove these types of projects from the selection process altogether and fund them with a “tax” on all other development (McKeen and Smith 2003). Other companies allocate a fixed percentage of their IT budgets to a technology renewal fund.

Organizations have come a long way in formalizing where and how they choose to invest their IT dollars. Nevertheless, there is still considerable room for judgment based on solid business and technical knowledge. It is, therefore, essential that all executives involved have the ability to think strategically and systematically as well as financially about project identification and selection.

Effective Conversion

“Conversion” from idea/opportunity to reality has been what IT organizations have been all about since their inception. A huge amount of effort has gone into this central component of the IT value proposition. As a result, many IT organizations have become very good at developing and delivering projects on time and on budget. Excellent project management, effective execution, and reliable operations are a critical part of IT value. However, they are not, in and of themselves, sufficient to convert a good idea into value or to deliver value to an organization.

Today managers and researchers are both recognizing that more is involved in effective conversion than good IT practices. Organizations can set themselves up for failure by not providing adequate and qualified resources. Many companies start more projects than they can effectively deliver with the resources they have available. Not having enough time or resources to do the job means that people are spread too thin and end up taking shortcuts that are potentially damaging to value (Cooper et al. 2000). Resource limitations on the business side of a project team can be as damaging to con- version as a lack of technical resources. “[Value is about] far more than just sophisticated managerial visions. . . . Training and other efforts . . . to obtain value from IT investments

Best Practices in Identifying Potential Value

9

are often hamstrung by insufficient resources” (Chircu and Kauffman 2000). Inadequate business resources can lead to poor communication and ineffective problem solving on a project (Ginzberg 2001). Companies are beginning to recognize that the number and quality of the staff assigned to an IT project can make a difference to its eventual out- come. They are insisting that the organization’s best IT and businesspeople be assigned to critical projects.

Other significant barriers to conversion that are becoming more apparent now that IT has improved its own internal practices include the following:

Organizational barriers. The effective implementation of IT frequently requires the extensive redesign of current business processes (Chircu and Kauffman 2000). However, organizations are often reluctant to make the difficult complementary business changes and investments that are required (Carte et al. 2001). “When new IT is implemented, everyone expects to see costs come down,” explained one manager. “However, most projects involve both business and IT deliverables. We, therefore, need to take a multifunctional approach to driving business value.” In recognition of this fact, some companies are beginning to put formal change man- agement programs in place to help businesses prepare for the changes involved with IT projects and to adapt and simplify as they learn how to take advantage of new technology. Knowledge barriers. Most often new technology and processes require employ- ees to work differently, learn new skills, and have new understanding of how and where information, people, and technologies fit together (Chircu and Kauffman 2000; Perez-Lopez and Alegre 2012). Although training has long been part of new IT implementations, more recently businesses are recognizing that delivering value from technology requires a broader and more coordinated learning effort (Smith and McKeen 2002). Lasting value comes from people and technology working together as a system rather than as discrete entities. Research confirms that high- performing organizations not only have strong IT practices but also have people who have good information management practices and who are able to effectively use the information they receive (Beath et al. 2012; Marchand et al. 2000).

Realizing Value

The final component of the IT value proposition has been the most frequently ignored. This is the work involved in actually realizing value after technology has been imple- mented. Value realization is a proactive and long-term process for any major initiative. All too often, after an intense implementation period, a development team is disbanded to work on other projects, and the business areas affected by new technology are left to

Best Practices in Conversion

10

sink or swim. As a result, a project’s benefits can be imperfectly realized. Technology must be used extensively if it is to deliver value. Poorly designed technology can lead to high levels of frustration, resistance to change, and low levels of use (Chircu and Kauffman 2000; Sun et al., 2012).

Resistance to change can have its root cause in an assumption or an action that doesn’t make sense in the everyday work people do. Sometimes this means challeng- ing workers’ understanding of work expectations or information flows. At other times it means doing better analysis of where and how a new process is causing bottlenecks, overwork, or overload. As one manager put it, “If value is not being delivered, we need to understand the root causes and do something about it.” His company takes the unusual position that it is important to keep a team working on a project until the expected benefits have been realized. This approach is ideal but can also be very costly and, therefore, must be carefully managed. Some companies try to short-circuit the value management process by simply taking anticipated cost savings out of a business unit’s budget once technology has been implemented, thereby forcing it to do more with less whether or not the technology has been as beneficial as anticipated. However, most often organizations do little or no follow-up to determine whether or not benefits have been achieved.

Measurement is a key component of value realization (Thorp 1999). After imple- mentation, it is essential that all stakeholders systematically compare outcomes against expected value and take appropriate actions to achieve benefits. In addition to monitor- ing metrics, a thorough and ongoing assessment of value and information flows must also be undertaken at all levels of analysis: individual, team, work unit, and enterprise. Efforts must be taken to understand and improve aspects of process, information, and technology that are acting as barriers to achieving value.

A significant problem with not paying attention to value recognition is that areas of unexpected value or opportunity are also ignored. This is unfortunate because it is only after technology has been installed that many businesspeople can see how it could be leveraged in other parts of their work. Realizing value should, therefore, also include provisions to evaluate new opportunities arising through serendipity.

FIVE PRINCIPLES FOR DELIVERING VALUE

In addition to clearly understanding what value means in a particular organization and ensuring that the three components of the IT value proposition are addressed by every project, five principles have been identified that are central to developing and deliver- ing value in every organization.

Best Practices in Realizing Value

11

Principle 1. Have a Clearly Defined Portfolio Value Management Process

Every organization should have a common process for managing the overall value being delivered to the organization from its IT portfolio. This would begin as a means of identifying and prioritizing IT opportunities by potential value relative to each other. It would also include mechanisms to optimize enterprise value (e.g., through tactical, stra- tegic, and infrastructure projects) according to a rubric of how the organization wants to allocate its resources.

A portfolio value management process should continue to track projects as they are being developed. It should ensure not only that projects are meeting schedule and budget milestones but also that other elements of conversion effectiveness are being addressed (e.g., business process redesign, training, change management, informa- tion management, and usability). A key barrier to achieving value can be an organiza- tion’s unwillingness to revisit the decisions made about its portfolio (Carte et al. 2001). Yet this is critically important for strategic and infrastructure initiatives in particular. Companies may have to approve investments in these types of projects based on imper- fect information in an uncertain environment. As they develop, improved information can lead to better decision making about an investment. In some cases this might lead to a decision to kill a project; in others, to speed it up or to reshape it as a value proposition becomes clearer.

Finally, a portfolio value management process should include an ongoing means of ensuring that value is realized from an investment. Management must monitor expected outcomes at appropriate times following implementation and hold someone in the organization accountable for delivering benefits (Smith and McKeen 2010).

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Top Essay Tutor
Financial Solutions Provider
Engineering Exam Guru
Phd Writer
Premium Solutions
Accounting & Finance Master
Writer Writer Name Offer Chat
Top Essay Tutor

ONLINE

Top Essay Tutor

After reading your project details, I feel myself as the best option for you to fulfill this project with 100 percent perfection.

$48 Chat With Writer
Financial Solutions Provider

ONLINE

Financial Solutions Provider

Being a Ph.D. in the Business field, I have been doing academic writing for the past 7 years and have a good command over writing research papers, essay, dissertations and all kinds of academic writing and proofreading.

$34 Chat With Writer
Engineering Exam Guru

ONLINE

Engineering Exam Guru

I have read your project description carefully and you will get plagiarism free writing according to your requirements. Thank You

$17 Chat With Writer
Phd Writer

ONLINE

Phd Writer

This project is my strength and I can fulfill your requirements properly within your given deadline. I always give plagiarism-free work to my clients at very competitive prices.

$21 Chat With Writer
Premium Solutions

ONLINE

Premium Solutions

After reading your project details, I feel myself as the best option for you to fulfill this project with 100 percent perfection.

$44 Chat With Writer
Accounting & Finance Master

ONLINE

Accounting & Finance Master

This project is my strength and I can fulfill your requirements properly within your given deadline. I always give plagiarism-free work to my clients at very competitive prices.

$43 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

ME - Online - Research paper 2 - Week 5 discussion - Determination of ascorbic acid in vitamin c tablets lab report - Five areas of importance for timeliness and maximization of reimbursement - Www mcspam dot net - Cables with concentrated loads examples - Issa case study steve rogers - Immigration accreditation past exam papers - Knights templar opening ceremony - Hplc analysis of aspirin lab - Christian Ethics Essay - What is the quotient in simplified form? state any restrictions on the variable. show work. - Essay - Advantages and disadvantages of data collection - Burglar alarm circuit using logic gates - Cre form 3 questions and answers - Barriers to Evidence Based by 2020 to Nursing Goal - Christmas story left right game - Classification of bacteria flow chart - Wyndham by request program - 1.97 miles in km - Nock on silverback for sale - Byron bay cookie factory tour - Head start program usc - Battery spill containment requirements - Is cockapoo a recognized breed - Strategic Planning1 - Latent heat of fusion of ice physics - SOCW 6090 Week 4 - Post Responses - Health and safety management plan template - Today's gay youth the ugly frightening statistics - Turnberg building salford royal - Power privilege and difference pdf - Magic drawing board revealed - A researcher wishes to estimate with 95 confidence - The georgians care home - +91-8306951337 get your love back by vashikaran IN Erode - Igel thin client laptop - Gap analysis in service marketing ppt - Hildegard of bingen alleluia o virga mediatrix - Uma offers students different majors within the allied healthcare field - Cost volume profit analysis chapter 3 solutions - Week 2 identification of healthcare policy concern - Golden section search maximum matlab - Sallen key filter analysis - 75 mason street hawthorn - Job requirements matrix for sales associate - Email Assignment - Translated letter from the embalmer - Ecosmart 27 flow sensor - A patient has just received her first dose of imatinib - Quality management techniques ppt - W5 continuing - 3820 mod 2 - Inherit the wind scenes - Week one human resources - Egyptian civiliaztion - The hobbit chapter 1 - Inherit the wind essay - Crosley company a machinery dealer - Case study 2 - Was the treaty of versailles fair - Brasso multi purpose metal polish - How to end a school captain speech - Molecular model kit color key - Show that the formula mass of nacl is - Sonnet x death be not proud - Html5 vs silverlight comparison - Declaring a relationship to centrelink - What does single seats only mean ticketek - Scott devine net worth - Ny times what's going on in this graph - Which of the following statements is true about overhead - Disadvantages of international trade - Broken rites list of offenders - Advantages and disadvantages of distillation - 0olo - Are there few or many nuclei at the end plate - Airtec master 35 parts - Chemistry of benzene electrophilic aromatic substitution - The beautiful struggle analysis - If you're happy and you know it jack hartmann - Paper - The financial statements of lioi steel fabricators - General Psychology Discussion - Cinematography - Research proposal - Sensifast sybr no rox kit - Secondary impression material for complete denture - After a death roo borson analysis - Merrill lynch securities and health care retirement - Bureaucratic control in management - George hartline and the harmless doves - Pj carey contractors limited - Robinhood vision statement - Intel itanium 2 processor - Beckwith: Paragraphs 8-10 -lzh - M4 - Assignment 1: Sentencing Options - Correctional processes - Classification tree tool for test design