SlideShare a Scribd company logo
1 of 64
IS 483 Information Systems Management James Nowotarski 22 May 2003
[object Object],[object Object],Today’s Objectives
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Today’s agenda
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Today’s agenda
IT Risk Management ,[object Object],[object Object],[object Object],[object Object],[object Object],Major Categories of Risk ,[object Object],[object Object],[object Object]
IT Risk Management ,[object Object],[object Object],[object Object],[object Object],[object Object],Major Categories of Risk ,[object Object],[object Object],[object Object],[object Object],[object Object]
IT Risk Management ,[object Object],[object Object],[object Object],[object Object],[object Object],Major Categories of Risk ,[object Object],[object Object],[object Object]
IT Risk Management ,[object Object],[object Object],[object Object],[object Object],[object Object],Major Categories of Risk ,[object Object],[object Object],[object Object],[object Object]
IT Risk Management ,[object Object],[object Object],[object Object],[object Object],[object Object],Major Categories of Risk ,[object Object],[object Object],[object Object],[object Object],[object Object]
IT Risk Management The process in which potential risks to a business are  identified ,  analyzed  and  mitigated ,  along with  the process of  balancing  the cost of protecting the company against a risk vs. the cost of exposure to that risk. Risk Management
Risk Frameworks Fidelity’s Risk Cube
Risk Frameworks Risk Awareness Risk Management Risk Measurement ----------  Fidelity Risk Cube   ----------  Identify Analyze Mitigate Measure
Risk Frameworks RISK Cube - Key Questions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Risk Management Approaches Risk Management Approaches ,[object Object],[object Object],[object Object],[object Object]
Risk vs. Technology Maturity Impact of Technology Maturity Risk Early Adopter Mid Adopter Late Adopter hands-on implementation experience little exper / high risk more exper / mid risk much exper / low risk vendor survival for project after shake-out high risk mid risk low risk sudden changes in direction of technology high risk mid risk low risk integrating technology with existing portfolio high risk mid risk low risk Benefits Period for Start of Payoff  Short term Mid term Long term Size of Returns per period Biggest Bigger  Big 
Risk Management at Project Level Steps Taken by Prudent Managers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Procurement - Process RFP Process Objective :  Identify best solution to meet stated business need while minimizing cost and risk 1.  Pre-RFP 2. RFP 3. Proposal Submissions 4. Proposal Evaluations 5. Vendor Selection 6. Procurement Method 7. ROI Analysis 8. Negotiate Contract
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Today’s agenda
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Today’s agenda
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Today’s agenda
IT Outsourcing ,[object Object],[object Object],Information technology (IT) outsourcing is widely accepted by most commercial organizations
IT Outsourcing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Information technology (IT) outsourcing is the use of a third party to provide services rather than using those in-house.   Drivers
IT Outsourcing “ [g]et rid of context and focus on core” - Billy McCarter, former CIO of Fireman’s Fund, who reduced IT staff from 1,100 to 600 with much of the work outsourced to offshore workers A desire to focus on core competencies is frequently the strongest driver to outsource   “ [a]llows me and my staff to focus on fun areas . . . be more productive, more visible to the business, understand what the business needs versus worrying about whether one of the servers needs additional RAM” - Daniel Sheehan, CIO at Advo, Inc.  (infoweek, 4/14/03)
IT Outsourcing  IT is often viewed as a commodity and, thus, not “core” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Carr, N.  “IT Doesn’t Matter.”  Harvard Business Review.  May 2003.
IT Outsourcing ,[object Object],[object Object],[object Object],[object Object],Processes once considered core are now candidates for outsourcing.   Examples
IT Outsourcing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],What parts of IT to outsource? most common IT activities to outsource
IT Outsourcing ,[object Object],[object Object],[object Object],To what extent should you outsource? most common approaches
IT Outsourcing ,[object Object],[object Object],[object Object],[object Object],Transitional Outsourcing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IT Outsourcing ,[object Object],[object Object],Selective Outsourcing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IT Outsourcing Selective Outsourcing “ Global access to Enterprise Service Providers (ESPs) with low cost structures is accelerating outsourcing adoption rates, leading to the proliferation of mixed-sourcing delivery models in which the ‘best’ provider of a particular service wins.”  (Gartner 2003)
IT Outsourcing Selective Outsourcing “ Today, businesses look to "selective sourcing & services" for their IT infrastructure, operations and management needs. With selective sourcing the focus is on securing services for very specific needs. Using managed contracts, selective sourcing has proved very successful in limiting risk, motivating vendor performance and achieving goals. With selective sourcing/services organizations have the best of both worlds with the flexibility to select a best practice supplier while maintaining overall control of their IT practices.”  --  Strategic Sourcing Advisory Council, http://www.ssacouncil.org/
IT Outsourcing Selective Outsourcing “ I don’t believe you should have a dozen partners, because then it’s not a real relationship”  --  Mukesh Mehta, VP of IT at Metropolitan Life, InformationWeek, 23 December 2002
IT Outsourcing ,[object Object],[object Object],[object Object],Total Outsourcing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IT Outsourcing Survey Results Type of sourcing Success Failure Mixed Total outsourcing 38% 35% 27% Selective outsourcing  77% 20% 3% In house 76% 24% 0% Source:  Study of 116 companies by college professors Mary Lacity and Leslie Willcocks, Computerworld, 10 May 1999
IT Outsourcing Consider business, economic, and technical factors in deciding whether to outsource Business Considerations Outsource Insource Commodity Differential Critical Useful Strategic Importance Potential for Differentiation
IT Outsourcing Consider business, economic, and technical factors in deciding whether to outsource (cont.) Economic Considerations Outsource Insource Subcritical Critical Leading Lagging Managerial Practices In-House Economies of Scale
IT Outsourcing Consider business, economic, and technical factors in deciding whether to outsource (cont.) Technical Considerations Low High High Low Degree of  Technology Integration Degree of Technology Maturity Outsource Insource
IT Outsourcing Give examples of applications that would be good candidates for insourcing and outsourcing based on technical considerations Technical Considerations Low High High Low Degree of  Technology Integration Degree of Technology Maturity Outsource Insource
IT Outsourcing:  Offshore ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IT organizations ,[object Object],[object Object],[object Object],[object Object],Solutions providers ,[object Object],[object Object],[object Object],[object Object],[object Object],Types of projects
[object Object],[object Object],[object Object],[object Object],IT Outsourcing:  Offshore Cost and quality are the two main reasons for going offshore
[object Object],[object Object],[object Object],[object Object],[object Object],India is the leading location for offshore sourcing Reasons IT Outsourcing:  Offshore
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Wall Street’s top firms are investing heavily in offshore outsourcing of IT and operations IT Outsourcing:  Offshore
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Wall Street’s top firms are investing heavily in offshore outsourcing of IT and operations (cont.) IT Outsourcing:  Offshore
IT Outsourcing ,[object Object],[object Object],[object Object],[object Object],[object Object],- InformationWeek, 12 May 2003 Wall Street’s top firms are investing heavily in offshore outsourcing of IT and operations (cont.)
[object Object],[object Object],[object Object],India’s advantage is beginning to erode Reasons IT Outsourcing:  Offshore
[object Object],[object Object],[object Object],[object Object],[object Object],Need to manage risks of offshore outsourcing Potential Risk Areas IT Outsourcing:  Offshore
[object Object],Discuss Outsourcing strips a company of an important core competence -- IT know-how.  Outsourcing offloads a burdensome technical responsibility and allows management to focus on its core business.
[object Object],[object Object],Discuss
[object Object],[object Object],Discuss
[object Object],[object Object],[object Object],[object Object],[object Object],IT Outsourcing There are several risks to be managed Risks
[object Object],Discuss
IT Outsourcing Trends ,[object Object],[object Object],Trends
IT Outsourcing Trends ,[object Object],[object Object],A Growing Market
IT Outsourcing Trends ,[object Object],[object Object],Recent News
[object Object]
5.  Vendor Selection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
6.  Procurement Methods ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
7.  ROI Analysis ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
8.  Contract Negotiation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
8.  Contract Negotiation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Statement of Work Approach to quality Definition of quality metrics
[object Object],You Get What You Measure
Statement of Work Approach to Quality and Measurement Plan Do Check Act 1.  Identify quality standards and goals 2.  Measure project performance 3.  Compare metrics against goals  4.  Conduct quality reviews, e.g., peer reviews 5.  Test for defects 6. Eliminate causes of deficient performance -  fix defects -  fix root causes
Statement of Work Quality Metrics Measures customer satisfaction using objective surveys. Customer Satisfaction Identifies defect-prone components of the system Defect Density Measures the number of defects detected and removed over time Defect Removal Rate Measures the percentage of the requirements that have been addressed by the system Requirements Traceability Measure percentage of the actual defects originating in a stage of the project that were actually detected in that stage Defect Detection Efficiency Measures the amount of the software system covered by the testing process Test Coverage Measures the percentage of the development effort spent on internal quality evaluation efforts Quality Evaluation Effort Measures the amount of work accomplished by the development team in each phase Progress
Procurement - Process RFP Process 1.  Pre-RFP 2. RFP 3. Proposal Submissions 4. Proposal Evaluations 5. Vendor Selection 6. Procurement Method 7. ROI Analysis 8. Negotiate Contract

More Related Content

What's hot

Governance matrix
Governance matrixGovernance matrix
Governance matrix
zeusi9iuto
 
Improve IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure RoadmapImprove IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure Roadmap
Info-Tech Research Group
 
Craft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Craft an End-to-End Data Center Consolidation Strategy to Maximize BenefitsCraft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Craft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Info-Tech Research Group
 
Information technology risks
Information technology risksInformation technology risks
Information technology risks
salman butt
 
Optimize Change Management
Optimize Change ManagementOptimize Change Management
Optimize Change Management
Info-Tech Research Group
 
ANZ SMS Synopsis
ANZ SMS SynopsisANZ SMS Synopsis
ANZ SMS Synopsis
patrikbzz
 

What's hot (20)

Getting Smart With IT Investment: IT Cost Analyses Should Link to Business Ac...
Getting Smart With IT Investment: IT Cost Analyses Should Link to Business Ac...Getting Smart With IT Investment: IT Cost Analyses Should Link to Business Ac...
Getting Smart With IT Investment: IT Cost Analyses Should Link to Business Ac...
 
8 Strategies for IT Transformation
8 Strategies for IT Transformation8 Strategies for IT Transformation
8 Strategies for IT Transformation
 
Business Risk: Effective Technology Protecting Your Business
Business Risk: Effective Technology Protecting Your BusinessBusiness Risk: Effective Technology Protecting Your Business
Business Risk: Effective Technology Protecting Your Business
 
Governance matrix
Governance matrixGovernance matrix
Governance matrix
 
Improve IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure RoadmapImprove IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure Roadmap
 
CDO Vision: The Value of Data
CDO Vision: The Value of DataCDO Vision: The Value of Data
CDO Vision: The Value of Data
 
Craft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Craft an End-to-End Data Center Consolidation Strategy to Maximize BenefitsCraft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Craft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
 
Fundamentals of Designing, Building, & Implementing a Service Delivery Center
Fundamentals of Designing, Building, & Implementing a Service Delivery CenterFundamentals of Designing, Building, & Implementing a Service Delivery Center
Fundamentals of Designing, Building, & Implementing a Service Delivery Center
 
IT Service Management (ITSM) Model for Business & IT Alignement
IT Service Management (ITSM) Model for Business & IT AlignementIT Service Management (ITSM) Model for Business & IT Alignement
IT Service Management (ITSM) Model for Business & IT Alignement
 
A Data-driven Maturity Model for Modernized, Automated, and Transformed IT
A Data-driven Maturity Model for Modernized, Automated, and Transformed ITA Data-driven Maturity Model for Modernized, Automated, and Transformed IT
A Data-driven Maturity Model for Modernized, Automated, and Transformed IT
 
It Sales Presentation 2010 03 31
It Sales Presentation   2010 03 31It Sales Presentation   2010 03 31
It Sales Presentation 2010 03 31
 
Make Smarter Decisions with WISEMINER
Make Smarter Decisions with WISEMINERMake Smarter Decisions with WISEMINER
Make Smarter Decisions with WISEMINER
 
Santoshdahal assessment2 s242842.ppt
Santoshdahal assessment2 s242842.pptSantoshdahal assessment2 s242842.ppt
Santoshdahal assessment2 s242842.ppt
 
Serene Zawaydeh - Big Data -Investment -Wavelets
Serene Zawaydeh - Big Data -Investment -WaveletsSerene Zawaydeh - Big Data -Investment -Wavelets
Serene Zawaydeh - Big Data -Investment -Wavelets
 
Information technology risks
Information technology risksInformation technology risks
Information technology risks
 
Creating IT Value-A Better Way to Make IT Investment Decisions
Creating IT Value-A Better Way to Make IT Investment DecisionsCreating IT Value-A Better Way to Make IT Investment Decisions
Creating IT Value-A Better Way to Make IT Investment Decisions
 
Become a Transformational CIO
Become a Transformational CIOBecome a Transformational CIO
Become a Transformational CIO
 
Optimize Change Management
Optimize Change ManagementOptimize Change Management
Optimize Change Management
 
IT Investment Management
IT Investment ManagementIT Investment Management
IT Investment Management
 
ANZ SMS Synopsis
ANZ SMS SynopsisANZ SMS Synopsis
ANZ SMS Synopsis
 

Viewers also liked

Coolest Colored And Most Poisonous Frogs
Coolest Colored And Most Poisonous FrogsCoolest Colored And Most Poisonous Frogs
Coolest Colored And Most Poisonous Frogs
Thilini
 
Sol Ep Io Fia 2008 2
Sol Ep Io Fia 2008 2Sol Ep Io Fia 2008 2
Sol Ep Io Fia 2008 2
UPC
 
電光國小遊學簡報
電光國小遊學簡報電光國小遊學簡報
電光國小遊學簡報
kiku
 
Our Powerpoint
Our PowerpointOur Powerpoint
Our Powerpoint
gueste5b03
 
OSCON 2008: Porting to Python 3.0
OSCON 2008: Porting to Python 3.0OSCON 2008: Porting to Python 3.0
OSCON 2008: Porting to Python 3.0
guest4d09
 

Viewers also liked (20)

Challenge Info 2007
Challenge Info 2007Challenge Info 2007
Challenge Info 2007
 
Around the World NOW
Around the World NOWAround the World NOW
Around the World NOW
 
Mfg Nov05
Mfg Nov05Mfg Nov05
Mfg Nov05
 
Sl3c3
Sl3c3Sl3c3
Sl3c3
 
C And C Presentation
C And C PresentationC And C Presentation
C And C Presentation
 
Serendip Walk
Serendip WalkSerendip Walk
Serendip Walk
 
Scan Ict Gambia Jobe, Darboe En
Scan Ict Gambia   Jobe, Darboe   EnScan Ict Gambia   Jobe, Darboe   En
Scan Ict Gambia Jobe, Darboe En
 
10.ariketa
10.ariketa10.ariketa
10.ariketa
 
Coolest Colored And Most Poisonous Frogs
Coolest Colored And Most Poisonous FrogsCoolest Colored And Most Poisonous Frogs
Coolest Colored And Most Poisonous Frogs
 
Fábrica de Software - PSOffice Os Manager
Fábrica de Software  - PSOffice Os ManagerFábrica de Software  - PSOffice Os Manager
Fábrica de Software - PSOffice Os Manager
 
Sol Ep Io Fia 2008 2
Sol Ep Io Fia 2008 2Sol Ep Io Fia 2008 2
Sol Ep Io Fia 2008 2
 
Denverforum Rosenfeld
Denverforum RosenfeldDenverforum Rosenfeld
Denverforum Rosenfeld
 
電光國小遊學簡報
電光國小遊學簡報電光國小遊學簡報
電光國小遊學簡報
 
Atpde Atextile
Atpde AtextileAtpde Atextile
Atpde Atextile
 
Our Powerpoint
Our PowerpointOur Powerpoint
Our Powerpoint
 
Hoy Me Dio Tiempo
Hoy Me Dio TiempoHoy Me Dio Tiempo
Hoy Me Dio Tiempo
 
Smedc 08 Ede Award Winners
Smedc 08 Ede Award WinnersSmedc 08 Ede Award Winners
Smedc 08 Ede Award Winners
 
2008032411534620710
20080324115346207102008032411534620710
2008032411534620710
 
lleo
lleolleo
lleo
 
OSCON 2008: Porting to Python 3.0
OSCON 2008: Porting to Python 3.0OSCON 2008: Porting to Python 3.0
OSCON 2008: Porting to Python 3.0
 

Similar to Class 2003 05 22

Technology Risk Services
Technology Risk ServicesTechnology Risk Services
Technology Risk Services
sarah kabirat
 
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
Jim Mason
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
subramanian K
 
It infrastructure management
It infrastructure managementIt infrastructure management
It infrastructure management
Shoaib Patel
 
IDC Executive Programs Brochure
IDC Executive Programs Brochure IDC Executive Programs Brochure
IDC Executive Programs Brochure
IDC Research Inc.
 
Adomavicius et al.Technology Trends in the IT LandscapeSP.docx
Adomavicius et al.Technology Trends in the IT LandscapeSP.docxAdomavicius et al.Technology Trends in the IT LandscapeSP.docx
Adomavicius et al.Technology Trends in the IT LandscapeSP.docx
daniahendric
 
PowerPoint presentation
PowerPoint presentationPowerPoint presentation
PowerPoint presentation
webhostingguy
 

Similar to Class 2003 05 22 (20)

Technology Risk Services
Technology Risk ServicesTechnology Risk Services
Technology Risk Services
 
09.consulting collaboration innovation imc thailand_dr_montri_v
09.consulting collaboration innovation imc thailand_dr_montri_v09.consulting collaboration innovation imc thailand_dr_montri_v
09.consulting collaboration innovation imc thailand_dr_montri_v
 
Scr Tims
Scr TimsScr Tims
Scr Tims
 
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
 
Tft2 Task3 Essay
Tft2 Task3 EssayTft2 Task3 Essay
Tft2 Task3 Essay
 
Outsourcing Presentation - New Jersey Technology Council Webinar
Outsourcing Presentation - New Jersey Technology Council WebinarOutsourcing Presentation - New Jersey Technology Council Webinar
Outsourcing Presentation - New Jersey Technology Council Webinar
 
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOvercoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
Formal Information Technology in a Small, Growing Company
Formal Information Technology in a Small, Growing CompanyFormal Information Technology in a Small, Growing Company
Formal Information Technology in a Small, Growing Company
 
The IT archipelago
The IT archipelagoThe IT archipelago
The IT archipelago
 
Brighttalk converged infrastructure and it operations management - final
Brighttalk   converged infrastructure and it operations management - finalBrighttalk   converged infrastructure and it operations management - final
Brighttalk converged infrastructure and it operations management - final
 
TechExecs Optimizing Outsourcing Linked In
TechExecs Optimizing Outsourcing Linked InTechExecs Optimizing Outsourcing Linked In
TechExecs Optimizing Outsourcing Linked In
 
It infrastructure management
It infrastructure managementIt infrastructure management
It infrastructure management
 
Strategic Management and Information Technology Outsourcing
Strategic Management and Information Technology OutsourcingStrategic Management and Information Technology Outsourcing
Strategic Management and Information Technology Outsourcing
 
Human Resources Outsourcing
Human Resources OutsourcingHuman Resources Outsourcing
Human Resources Outsourcing
 
IDC Executive Programs Brochure
IDC Executive Programs Brochure IDC Executive Programs Brochure
IDC Executive Programs Brochure
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
Adomavicius et al.Technology Trends in the IT LandscapeSP.docx
Adomavicius et al.Technology Trends in the IT LandscapeSP.docxAdomavicius et al.Technology Trends in the IT LandscapeSP.docx
Adomavicius et al.Technology Trends in the IT LandscapeSP.docx
 
PowerPoint presentation
PowerPoint presentationPowerPoint presentation
PowerPoint presentation
 
It implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-briefIt implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-brief
 

More from FNian

Wipro Media Q1 0809
Wipro Media Q1 0809Wipro Media Q1 0809
Wipro Media Q1 0809
FNian
 
Watts Brief
Watts BriefWatts Brief
Watts Brief
FNian
 
The Role Of Business In Society Presentation At
The Role Of Business In Society   Presentation AtThe Role Of Business In Society   Presentation At
The Role Of Business In Society Presentation At
FNian
 
Unit C Eco Toolbox
Unit C Eco ToolboxUnit C Eco Toolbox
Unit C Eco Toolbox
FNian
 
Singapore Jakarta Conf
Singapore Jakarta ConfSingapore Jakarta Conf
Singapore Jakarta Conf
FNian
 
Syndication Pp
Syndication PpSyndication Pp
Syndication Pp
FNian
 
Integration of internal database system
Integration of internal database systemIntegration of internal database system
Integration of internal database system
FNian
 
Analyse sourcing and manufacturing strategies
Analyse sourcing and manufacturing strategiesAnalyse sourcing and manufacturing strategies
Analyse sourcing and manufacturing strategies
FNian
 
Scitc 2006 India 2005 And Future
Scitc 2006 India 2005 And FutureScitc 2006 India 2005 And Future
Scitc 2006 India 2005 And Future
FNian
 
Miller China Trade
Miller China TradeMiller China Trade
Miller China Trade
FNian
 
Developing a market plan
Developing a market planDeveloping a market plan
Developing a market plan
FNian
 
Gianelle Tattara
Gianelle TattaraGianelle Tattara
Gianelle Tattara
FNian
 
Gp Industry
Gp IndustryGp Industry
Gp Industry
FNian
 
House
HouseHouse
House
FNian
 
How To Biuld Internal Rating System For Basel Ii
How To Biuld Internal Rating System For Basel IiHow To Biuld Internal Rating System For Basel Ii
How To Biuld Internal Rating System For Basel Ii
FNian
 
Gujarat
GujaratGujarat
Gujarat
FNian
 
Ietp Session 2 June 28
Ietp Session   2 June 28Ietp Session   2 June 28
Ietp Session 2 June 28
FNian
 
India An Overview
India An OverviewIndia An Overview
India An Overview
FNian
 
Intra Industry
Intra IndustryIntra Industry
Intra Industry
FNian
 
Innovation Class 6
Innovation Class 6Innovation Class 6
Innovation Class 6
FNian
 

More from FNian (20)

Wipro Media Q1 0809
Wipro Media Q1 0809Wipro Media Q1 0809
Wipro Media Q1 0809
 
Watts Brief
Watts BriefWatts Brief
Watts Brief
 
The Role Of Business In Society Presentation At
The Role Of Business In Society   Presentation AtThe Role Of Business In Society   Presentation At
The Role Of Business In Society Presentation At
 
Unit C Eco Toolbox
Unit C Eco ToolboxUnit C Eco Toolbox
Unit C Eco Toolbox
 
Singapore Jakarta Conf
Singapore Jakarta ConfSingapore Jakarta Conf
Singapore Jakarta Conf
 
Syndication Pp
Syndication PpSyndication Pp
Syndication Pp
 
Integration of internal database system
Integration of internal database systemIntegration of internal database system
Integration of internal database system
 
Analyse sourcing and manufacturing strategies
Analyse sourcing and manufacturing strategiesAnalyse sourcing and manufacturing strategies
Analyse sourcing and manufacturing strategies
 
Scitc 2006 India 2005 And Future
Scitc 2006 India 2005 And FutureScitc 2006 India 2005 And Future
Scitc 2006 India 2005 And Future
 
Miller China Trade
Miller China TradeMiller China Trade
Miller China Trade
 
Developing a market plan
Developing a market planDeveloping a market plan
Developing a market plan
 
Gianelle Tattara
Gianelle TattaraGianelle Tattara
Gianelle Tattara
 
Gp Industry
Gp IndustryGp Industry
Gp Industry
 
House
HouseHouse
House
 
How To Biuld Internal Rating System For Basel Ii
How To Biuld Internal Rating System For Basel IiHow To Biuld Internal Rating System For Basel Ii
How To Biuld Internal Rating System For Basel Ii
 
Gujarat
GujaratGujarat
Gujarat
 
Ietp Session 2 June 28
Ietp Session   2 June 28Ietp Session   2 June 28
Ietp Session 2 June 28
 
India An Overview
India An OverviewIndia An Overview
India An Overview
 
Intra Industry
Intra IndustryIntra Industry
Intra Industry
 
Innovation Class 6
Innovation Class 6Innovation Class 6
Innovation Class 6
 

Recently uploaded

Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
dlhescort
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
Renandantas16
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
Matteo Carbone
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 

Recently uploaded (20)

Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 

Class 2003 05 22

  • 1. IS 483 Information Systems Management James Nowotarski 22 May 2003
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. IT Risk Management The process in which potential risks to a business are identified , analyzed and mitigated , along with the process of balancing the cost of protecting the company against a risk vs. the cost of exposure to that risk. Risk Management
  • 12. Risk Frameworks Risk Awareness Risk Management Risk Measurement ---------- Fidelity Risk Cube ---------- Identify Analyze Mitigate Measure
  • 13.
  • 14.
  • 15. Risk vs. Technology Maturity Impact of Technology Maturity Risk Early Adopter Mid Adopter Late Adopter hands-on implementation experience little exper / high risk more exper / mid risk much exper / low risk vendor survival for project after shake-out high risk mid risk low risk sudden changes in direction of technology high risk mid risk low risk integrating technology with existing portfolio high risk mid risk low risk Benefits Period for Start of Payoff  Short term Mid term Long term Size of Returns per period Biggest Bigger  Big 
  • 16.
  • 17. Procurement - Process RFP Process Objective : Identify best solution to meet stated business need while minimizing cost and risk 1. Pre-RFP 2. RFP 3. Proposal Submissions 4. Proposal Evaluations 5. Vendor Selection 6. Procurement Method 7. ROI Analysis 8. Negotiate Contract
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. IT Outsourcing “ [g]et rid of context and focus on core” - Billy McCarter, former CIO of Fireman’s Fund, who reduced IT staff from 1,100 to 600 with much of the work outsourced to offshore workers A desire to focus on core competencies is frequently the strongest driver to outsource “ [a]llows me and my staff to focus on fun areas . . . be more productive, more visible to the business, understand what the business needs versus worrying about whether one of the servers needs additional RAM” - Daniel Sheehan, CIO at Advo, Inc. (infoweek, 4/14/03)
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30. IT Outsourcing Selective Outsourcing “ Global access to Enterprise Service Providers (ESPs) with low cost structures is accelerating outsourcing adoption rates, leading to the proliferation of mixed-sourcing delivery models in which the ‘best’ provider of a particular service wins.” (Gartner 2003)
  • 31. IT Outsourcing Selective Outsourcing “ Today, businesses look to "selective sourcing & services" for their IT infrastructure, operations and management needs. With selective sourcing the focus is on securing services for very specific needs. Using managed contracts, selective sourcing has proved very successful in limiting risk, motivating vendor performance and achieving goals. With selective sourcing/services organizations have the best of both worlds with the flexibility to select a best practice supplier while maintaining overall control of their IT practices.” -- Strategic Sourcing Advisory Council, http://www.ssacouncil.org/
  • 32. IT Outsourcing Selective Outsourcing “ I don’t believe you should have a dozen partners, because then it’s not a real relationship” -- Mukesh Mehta, VP of IT at Metropolitan Life, InformationWeek, 23 December 2002
  • 33.
  • 34. IT Outsourcing Survey Results Type of sourcing Success Failure Mixed Total outsourcing 38% 35% 27% Selective outsourcing 77% 20% 3% In house 76% 24% 0% Source: Study of 116 companies by college professors Mary Lacity and Leslie Willcocks, Computerworld, 10 May 1999
  • 35. IT Outsourcing Consider business, economic, and technical factors in deciding whether to outsource Business Considerations Outsource Insource Commodity Differential Critical Useful Strategic Importance Potential for Differentiation
  • 36. IT Outsourcing Consider business, economic, and technical factors in deciding whether to outsource (cont.) Economic Considerations Outsource Insource Subcritical Critical Leading Lagging Managerial Practices In-House Economies of Scale
  • 37. IT Outsourcing Consider business, economic, and technical factors in deciding whether to outsource (cont.) Technical Considerations Low High High Low Degree of Technology Integration Degree of Technology Maturity Outsource Insource
  • 38. IT Outsourcing Give examples of applications that would be good candidates for insourcing and outsourcing based on technical considerations Technical Considerations Low High High Low Degree of Technology Integration Degree of Technology Maturity Outsource Insource
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62. Statement of Work Approach to Quality and Measurement Plan Do Check Act 1. Identify quality standards and goals 2. Measure project performance 3. Compare metrics against goals 4. Conduct quality reviews, e.g., peer reviews 5. Test for defects 6. Eliminate causes of deficient performance - fix defects - fix root causes
  • 63. Statement of Work Quality Metrics Measures customer satisfaction using objective surveys. Customer Satisfaction Identifies defect-prone components of the system Defect Density Measures the number of defects detected and removed over time Defect Removal Rate Measures the percentage of the requirements that have been addressed by the system Requirements Traceability Measure percentage of the actual defects originating in a stage of the project that were actually detected in that stage Defect Detection Efficiency Measures the amount of the software system covered by the testing process Test Coverage Measures the percentage of the development effort spent on internal quality evaluation efforts Quality Evaluation Effort Measures the amount of work accomplished by the development team in each phase Progress
  • 64. Procurement - Process RFP Process 1. Pre-RFP 2. RFP 3. Proposal Submissions 4. Proposal Evaluations 5. Vendor Selection 6. Procurement Method 7. ROI Analysis 8. Negotiate Contract