International
Customers often come to us and say “I want to implement
Change Management.” The first thing we would ask them is
“Why?”
ITIL is a Best Practice standard, which people have heard of
and they think it sounds good. But often they haven’t taken
time to analyze their own organization’s issues. They don’t
really understand why they need ITIL or how it is going to
help them; instead, they implement ITIL processes because
it looks good on paper. But you can waste a lot of money
on implementing ITIL if you don’t understand your own
organization’s pain points.
CIOs need to prove they have spent their budget wisely. For
example, they may spend 50,000 Euros on implementing ITIL
processes. You would hope that at the end of the project, they
would see improvements in customer satisfaction, cost saving
and reduced incidents. But on many occasions, organizations
don’t stand back and think about what the desired outcomes of
implementing ITIL will be – they just do it and at the end of the
project nothing actually changes.
We think ITIL has to answer for itself. We don’t want its value to
be impossible to measure. If you want to do ITIL you must start
with analyzing what problems you are facing, what motivates
your customers and what you want to achieve.
ITIL is a tool to use, and it is a good one. But goals must be
clear from the outset. Think about who is your customer? Is it -
your CEO? Can he or she give you the direction you need? Or
is it your project manager? Should you go together to speak to
the boss about what the company needs?
It’s so important to set this direction first. You need to think
about who your customer is and what he wants. Goals should
be agreed together. That means talking to someone in the
organization with senior authority, and making sure they agree
with the person who holds the purse strings. For SERVIEW, if
we can’t ask these questions and get good answers then we
would rather not work with that particular customer. We feel we
would be the wrong supplier for them because without answers
to those questions we wouldn’t be able to apply the advice and
the actions that would benefit the organization.
Written by Kate Winter
January 2012
You can waste a lot of money
on implementing ITIL if you
don’t understand your own
organization’s pain points.
ITIL® Adoption –
the Challenges
Markus Bause, Director SERVIEW GmbH
1
Account management can be challenging because customers
can race ahead in their decision making and we have to take
them two steps backwards to get those fundamental questions
answered. This is important because ITIL often changes the
organization structure from hierarchical to process-oriented. This
can be a difficult transition so it is important that very early on in
the project, the management team has thought about how they
want the organization to look in the future. In a process oriented
culture people take on more responsibility because they ...
Foundation of Organization Design (MGMT673)Reading Materia.docxVannaJoy20
Foundation of Organization Design
(MGMT673)
Reading Material
Building Motivation
Communicate Why the Redesign is Needed
People need a compelling reason to change. With all of the changes being requested and demanded of people in the current world, people must be convinced that change is necessary.
Even when leadership initiates organizational change, it is often experienced as just one more unrealistic and often absurd demand. Employees are likely to respond in a passive-aggressive manner and simply do things the same. The previously engaged workforce may suddenly start misplacing things, ignoring e-mails, and spending hours talking with colleagues about what is happening. It is the leadership’s responsibility to not only have a vision but to also see that motivation for the change effort is high. Consultants can be helpful to management in this regard, but ultimately it is management’s responsibility. An offhand announcement of a redesign can literally bring production to a halt in a business. Even though management feels the redesign is in the employees’ best interest, if they are not properly prepared and brought in, the employees are likely to respond to the news in a way that will not move things forward. In fact, without a timely and wise explanation of why changes are needed, they may see the redesign as irresponsibility on the part of management.
Communicating Credible Reasons and Expectations for the Redesign
Management must take the time not only to provide a clear vision of the redesign but to also communicate why the redesign is necessary. The cost of not taking time to communicate credible reasons as to why the redesign was done and providing credible expectations of what it will take to realize the benefits of the redesign, will cost the company dearly.
One way to build support is to involve employees and other stakeholders in the diagnosis and redesign. This takes time, but it helps employees understand why the redesign is important and builds motivation for making it work. However, if management already has its mind made up and is going to do what it wants to do regardless, involvement can backfire in a big way.
At the least, a communication campaign is essential. The campaign must be honest because employees and other stakeholders can see through the spin and hype.
Do not Ignore Resistance
Resistance is feedback. Figure out why it is there, and do not force it. Like the plumber or mechanic who forces a part to fit, the likely result is generally a broken part. Force generally does not work and is nearly always expensive and time-consuming. Resistance is natural. Ohm’s lawapplies to human behavior much like it does in physics—there is always resistance. Good managers and consultants learn from the resistance and manage it.
Managing the Changing Relationships
Acknowledge Changing Relationships and Responsibilities
Redesigns nearly always change relationships and responsibilities. Not addressing these lead to conf.
Foundation of Organization Design (MGMT673)Reading Materia.docxVannaJoy20
Foundation of Organization Design
(MGMT673)
Reading Material
Building Motivation
Communicate Why the Redesign is Needed
People need a compelling reason to change. With all of the changes being requested and demanded of people in the current world, people must be convinced that change is necessary.
Even when leadership initiates organizational change, it is often experienced as just one more unrealistic and often absurd demand. Employees are likely to respond in a passive-aggressive manner and simply do things the same. The previously engaged workforce may suddenly start misplacing things, ignoring e-mails, and spending hours talking with colleagues about what is happening. It is the leadership’s responsibility to not only have a vision but to also see that motivation for the change effort is high. Consultants can be helpful to management in this regard, but ultimately it is management’s responsibility. An offhand announcement of a redesign can literally bring production to a halt in a business. Even though management feels the redesign is in the employees’ best interest, if they are not properly prepared and brought in, the employees are likely to respond to the news in a way that will not move things forward. In fact, without a timely and wise explanation of why changes are needed, they may see the redesign as irresponsibility on the part of management.
Communicating Credible Reasons and Expectations for the Redesign
Management must take the time not only to provide a clear vision of the redesign but to also communicate why the redesign is necessary. The cost of not taking time to communicate credible reasons as to why the redesign was done and providing credible expectations of what it will take to realize the benefits of the redesign, will cost the company dearly.
One way to build support is to involve employees and other stakeholders in the diagnosis and redesign. This takes time, but it helps employees understand why the redesign is important and builds motivation for making it work. However, if management already has its mind made up and is going to do what it wants to do regardless, involvement can backfire in a big way.
At the least, a communication campaign is essential. The campaign must be honest because employees and other stakeholders can see through the spin and hype.
Do not Ignore Resistance
Resistance is feedback. Figure out why it is there, and do not force it. Like the plumber or mechanic who forces a part to fit, the likely result is generally a broken part. Force generally does not work and is nearly always expensive and time-consuming. Resistance is natural. Ohm’s lawapplies to human behavior much like it does in physics—there is always resistance. Good managers and consultants learn from the resistance and manage it.
Managing the Changing Relationships
Acknowledge Changing Relationships and Responsibilities
Redesigns nearly always change relationships and responsibilities. Not addressing these lead to conf.
Jamie Flinchbaugh, author of "Hitchhikers Guide to Lean," shares thoughts on the evolution of lean thinking.
Published with permission from the author.
This is a slightly modified version (includes text of speaker notes) of the presentation that our CEO, Brennan, delivered at the CHRO Summit in Toronto. It focuses on why leaders need to focus on employee engagement more, why they don't currently and how to fix that.
Agency of the future - beginning the transformation journey42medien
There is a need for some agencies to re-frame the way they look at their need to evolve. Instead of the default thinking being "we need to implement X technology, hire/fire Y person or merge Z departments" they should start asking, "what is really defining the problem space we are now in and what will be the major factors of change moving forward". Only from this point, can a relevant and grounded future be established.
Deeper thinking about what we've learned from Toyota, including using principles and rules, not tools. Posted by AME with permission from Jamie Flinchbaugh.
The purpose of this research paper is to identify why Human Resources (HR) is a change agent in any organization to drive organizational excellence. HR practitioners, as change agents, are responsible for easing the impact of changes in their organization and to empower employees against the consequences of these inevitable changes. Sometimes, the change helps to produce a significant increase in performance excellence and the company can boost sales and production without major additional cost.
Several vital competencies that are reviewed in this paper include how HR practitioners are path creators amongst the path breakers of organizational culture, by being change drivers and business focused. HR practitioners who are unable to function as change agents will inevitably create a barrier against their becoming a well-integrated strategic partner. Therefore, the role of change agent also mediates the relationship between certain HR competencies and organizational performance. This involves monitoring employee engagement and keeping levels high, developing strategies to retain top performers, and continuing to provide value-added services to employees.
Most of us wouldn't start our own business. However, some of use may move up to the management role. How would Entreneurship relates to our day-to-day job and affect our attitudes towards our daily decisions?
Book summary - Perspectives on agility - Hrishikesh KarekarHrishikesh Karekar
Based on insights from years of agile coaching and leading large agile transformations, Perspectives on agility provides a point of view on some of the crucial aspects that leaders, coaches, and agile practitioners need to focus on in their journey for business agility.
The Ultimate Guide to Employee EngagementGary Skipper
Employee engagement has many benefits to an organisation including improved productivity, retention, ideas creation, customer service, team work & loyalty.
But how do you create an environment where staff want to proactively provide a positive contribution to your business and passionately believe in its long term goals and objectives?
In today's fast changing and challenging world of HR. Organizations are focusing on HR Metrics & Analytic's than ever before. It has evolved from centuries and its importance is growing day by day. It has a very crucial role to play for the success of an Individual & an Organization. If we practice this powerful tool it will change the things in and around and can show what it can do....
I thank you for your time and reading my presentation. Your valuable feedback and suggestions are appreciated.
In today's fast changing and challenging world of HR. Organizations are focusing more on HR Metrics & Analytic's than ever before. It has evolved from centuries and its importance is growing day by day. It has a very crucial role to play for the success of an Individual & an Organization. If we practice this powerful tool it will change the things in and around and can show what it can do.....
I thank you for your time and going through my presentation. Your valuable feedback and suggestions are appreciated.
Human Factor of Technology Deployment - Accellos & Columbia Colstor IARW-WFLOaccellosinc
Presentation on The Human Factor of Technology Deployment - Driving Value through Partnership and Organizational Change Management by Joe Couto of Accellos and Blake Barthlemess of Columbia Colstor given at the 123rd IARW-WFLO Convention and Expo 2014
Please readRobert Geraci, Russia Minorities and Empire,” in .docxTatianaMajor22
Please read:
Robert Geraci, “Russia: Minorities and Empire,” in Abbott Gleason, ed., A Companion to Russian History (Oxford: Wiley-Blackwell, 2009), 243-260.
And discuss:
How does Geraci portray the legacy of the early Russian history for the make-up of 18-19th century Russia?
Please read: Leonard Victor Rutgers, “Roman Policy Towards the Jews: Expulsions from the City of Rome during the First Century C.E.,” in Classical Antiquity, Vol. 13, No. 1 (Apr., 1994), pp. 56-74.
And discuss: Rutgers surveys the different reasons historians have given for the expulsion of the Jews from Rome in the first century C.E. Who place did Jews have in Roman society at this time? Were they expelled because of their religious practices, or because they were ‘unruly’ as Rutgers argues? If so, what caused them to act in this way? What kind of historical evidence does the author use?
There are 2 essay, each one should write at least 300-350 words and plus one reference page.
MLA format. Must use quote( “ ”) for every source you use from website. And put (author, page number) behind quote.
Roman Policy towards the Jews: Expulsions from the City of Rome during the First Century
C.E.
Author(s): Leonard Victor Rutgers
Source: Classical Antiquity, Vol. 13, No. 1 (Apr., 1994), pp. 56-74
Published by: University of California Press
Stable URL: http://www.jstor.org/stable/25011005 .
Accessed: 26/08/2011 13:35
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at .
http://www.jstor.org/page/info/about/policies/terms.jsp
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of
content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms
of scholarship. For more information about JSTOR, please contact [email protected]
University of California Press is collaborating with JSTOR to digitize, preserve and extend access to Classical
Antiquity.
http://www.jstor.org
http://www.jstor.org/action/showPublisher?publisherCode=ucal
http://www.jstor.org/stable/25011005?origin=JSTOR-pdf
http://www.jstor.org/page/info/about/policies/terms.jsp
LEONARD VICTOR RUTGERS
Roman Policy towards the Jews:
Expulsions from the City of Rome
during the First Century c. E.
Tant de causes secretes se melent souvent a la cause apparente, tant de ressorts
inconnus servent a persecuter un homme, qu'il est impossible de demeler dans les
siecles posterieures la source cachee des malheurs des hommes les plus consider
ables, a plus forte raison celle du supplice d'un particulier qui ne pouvait etre
connu que par ceux de son parti.
-Voltaire, Traite sur la tolerance (1763)
IN THIS ARTICLE I want to discuss the evidence for expulsions of Jews from
the city of Rome in the first century C.E. Scholars have long been interested in the
reasons underlying these expulsions. Because the anci.
Ford VS ChevroletThere are many reasons that make the Chevy.docxTatianaMajor22
Ford VS Chevrolet
There are many reasons that make the Chevy’s and Ford’s motors two most common trucks. Studies reveal that that they are the most popular vehicles on sales today. It is because they are powerful, versatile and reasonably priced. They also come in a wide variety of configurations and styles. However, many buyers and sellers have questioned themselves on the better vehicle compared to the other in terms of quality, Wi-Fi, price ranges, value, and costs. To compare and contrast on this subject, let us take an example of two vehicles each from each company to facilitate comparison.
Ford offers the full-size track with automatic high-beam control, automatic parallel parking and power-retractable running boards. Fords are elegant, and they are mostly aluminum making them save weight and bolster gas mileage. None of these features are offered Chevy’s. Chevrolets have outstanding quality. They are mostly comprised of steel, for instance, the Chevrolet Silverado. This makes them good for rough roads and difficult terrains.
Fords have employed the use of up to date Wi-Fi technology. Ford intends to provide the Ford Sync, which will provide robust connections for occupants. Latest Chevrolet brands Malibu utilize the 4G LTE Wi-Fi Technology that provides rich in-vehicle experiences. This technology is powerful compared to Ford Sync, and is used for connecting devices and executing few remote operations within the car.
From the value and cost standpoint, Ford can consume a little more, and its payload capacity is a little higher. Additionally, its mileage is too better. The prices vary from nation to nation. Chevrolet seems to be a little cheaper, and reasonably priced going for $33,044, which is slightly less than Ford, but the differences are not serious to propel buyers towards one truck leaving the other
Technophiles are likely to put their preferences on Ford to Chevrolet. On overall, Fords have many features as compared Chevy’s. However, they may be hard to maintain. Compared to Fords, Chevrolets are reliable and cheaper. However, the two brands are equally good performers. It is, therefore, prudent to pick what one thinks would fit his or her usage and preference and personal style
Ethical Systems, Research Paper, Spring 2015, Douglas Green, Page 1 of 1
Ethical
Systems/Final
Research
Paper
2,000
words
minimum,
double-‐spaced
Final
Draft
Due:
Tuesday,
April
28,
12:00
pm
(afternoon)
Please
email
your
final
research
paper
to
me
via
MS
Word
attachment
AND
by
cutting/pasting
the
entire
document
into
the
body
of
your
email.
IF
YOU
DO
NOT
RECEIVE
A
CONFIRMATION
EMAIL
BACK,
I
DID
NOT
RECEIVE
YOUR
ESSAY
AND
YOU
WILL
LOSE
ALL
CREDIT
FOR
THIS
REQUIREMENT.
NO
LATE
WORK
WILL
BE
ACCEPTED…
PERIOD!
.
More Related Content
Similar to InternationalCustomers often come to us and say I want to
Jamie Flinchbaugh, author of "Hitchhikers Guide to Lean," shares thoughts on the evolution of lean thinking.
Published with permission from the author.
This is a slightly modified version (includes text of speaker notes) of the presentation that our CEO, Brennan, delivered at the CHRO Summit in Toronto. It focuses on why leaders need to focus on employee engagement more, why they don't currently and how to fix that.
Agency of the future - beginning the transformation journey42medien
There is a need for some agencies to re-frame the way they look at their need to evolve. Instead of the default thinking being "we need to implement X technology, hire/fire Y person or merge Z departments" they should start asking, "what is really defining the problem space we are now in and what will be the major factors of change moving forward". Only from this point, can a relevant and grounded future be established.
Deeper thinking about what we've learned from Toyota, including using principles and rules, not tools. Posted by AME with permission from Jamie Flinchbaugh.
The purpose of this research paper is to identify why Human Resources (HR) is a change agent in any organization to drive organizational excellence. HR practitioners, as change agents, are responsible for easing the impact of changes in their organization and to empower employees against the consequences of these inevitable changes. Sometimes, the change helps to produce a significant increase in performance excellence and the company can boost sales and production without major additional cost.
Several vital competencies that are reviewed in this paper include how HR practitioners are path creators amongst the path breakers of organizational culture, by being change drivers and business focused. HR practitioners who are unable to function as change agents will inevitably create a barrier against their becoming a well-integrated strategic partner. Therefore, the role of change agent also mediates the relationship between certain HR competencies and organizational performance. This involves monitoring employee engagement and keeping levels high, developing strategies to retain top performers, and continuing to provide value-added services to employees.
Most of us wouldn't start our own business. However, some of use may move up to the management role. How would Entreneurship relates to our day-to-day job and affect our attitudes towards our daily decisions?
Book summary - Perspectives on agility - Hrishikesh KarekarHrishikesh Karekar
Based on insights from years of agile coaching and leading large agile transformations, Perspectives on agility provides a point of view on some of the crucial aspects that leaders, coaches, and agile practitioners need to focus on in their journey for business agility.
The Ultimate Guide to Employee EngagementGary Skipper
Employee engagement has many benefits to an organisation including improved productivity, retention, ideas creation, customer service, team work & loyalty.
But how do you create an environment where staff want to proactively provide a positive contribution to your business and passionately believe in its long term goals and objectives?
In today's fast changing and challenging world of HR. Organizations are focusing on HR Metrics & Analytic's than ever before. It has evolved from centuries and its importance is growing day by day. It has a very crucial role to play for the success of an Individual & an Organization. If we practice this powerful tool it will change the things in and around and can show what it can do....
I thank you for your time and reading my presentation. Your valuable feedback and suggestions are appreciated.
In today's fast changing and challenging world of HR. Organizations are focusing more on HR Metrics & Analytic's than ever before. It has evolved from centuries and its importance is growing day by day. It has a very crucial role to play for the success of an Individual & an Organization. If we practice this powerful tool it will change the things in and around and can show what it can do.....
I thank you for your time and going through my presentation. Your valuable feedback and suggestions are appreciated.
Human Factor of Technology Deployment - Accellos & Columbia Colstor IARW-WFLOaccellosinc
Presentation on The Human Factor of Technology Deployment - Driving Value through Partnership and Organizational Change Management by Joe Couto of Accellos and Blake Barthlemess of Columbia Colstor given at the 123rd IARW-WFLO Convention and Expo 2014
Please readRobert Geraci, Russia Minorities and Empire,” in .docxTatianaMajor22
Please read:
Robert Geraci, “Russia: Minorities and Empire,” in Abbott Gleason, ed., A Companion to Russian History (Oxford: Wiley-Blackwell, 2009), 243-260.
And discuss:
How does Geraci portray the legacy of the early Russian history for the make-up of 18-19th century Russia?
Please read: Leonard Victor Rutgers, “Roman Policy Towards the Jews: Expulsions from the City of Rome during the First Century C.E.,” in Classical Antiquity, Vol. 13, No. 1 (Apr., 1994), pp. 56-74.
And discuss: Rutgers surveys the different reasons historians have given for the expulsion of the Jews from Rome in the first century C.E. Who place did Jews have in Roman society at this time? Were they expelled because of their religious practices, or because they were ‘unruly’ as Rutgers argues? If so, what caused them to act in this way? What kind of historical evidence does the author use?
There are 2 essay, each one should write at least 300-350 words and plus one reference page.
MLA format. Must use quote( “ ”) for every source you use from website. And put (author, page number) behind quote.
Roman Policy towards the Jews: Expulsions from the City of Rome during the First Century
C.E.
Author(s): Leonard Victor Rutgers
Source: Classical Antiquity, Vol. 13, No. 1 (Apr., 1994), pp. 56-74
Published by: University of California Press
Stable URL: http://www.jstor.org/stable/25011005 .
Accessed: 26/08/2011 13:35
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at .
http://www.jstor.org/page/info/about/policies/terms.jsp
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of
content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms
of scholarship. For more information about JSTOR, please contact [email protected]
University of California Press is collaborating with JSTOR to digitize, preserve and extend access to Classical
Antiquity.
http://www.jstor.org
http://www.jstor.org/action/showPublisher?publisherCode=ucal
http://www.jstor.org/stable/25011005?origin=JSTOR-pdf
http://www.jstor.org/page/info/about/policies/terms.jsp
LEONARD VICTOR RUTGERS
Roman Policy towards the Jews:
Expulsions from the City of Rome
during the First Century c. E.
Tant de causes secretes se melent souvent a la cause apparente, tant de ressorts
inconnus servent a persecuter un homme, qu'il est impossible de demeler dans les
siecles posterieures la source cachee des malheurs des hommes les plus consider
ables, a plus forte raison celle du supplice d'un particulier qui ne pouvait etre
connu que par ceux de son parti.
-Voltaire, Traite sur la tolerance (1763)
IN THIS ARTICLE I want to discuss the evidence for expulsions of Jews from
the city of Rome in the first century C.E. Scholars have long been interested in the
reasons underlying these expulsions. Because the anci.
Ford VS ChevroletThere are many reasons that make the Chevy.docxTatianaMajor22
Ford VS Chevrolet
There are many reasons that make the Chevy’s and Ford’s motors two most common trucks. Studies reveal that that they are the most popular vehicles on sales today. It is because they are powerful, versatile and reasonably priced. They also come in a wide variety of configurations and styles. However, many buyers and sellers have questioned themselves on the better vehicle compared to the other in terms of quality, Wi-Fi, price ranges, value, and costs. To compare and contrast on this subject, let us take an example of two vehicles each from each company to facilitate comparison.
Ford offers the full-size track with automatic high-beam control, automatic parallel parking and power-retractable running boards. Fords are elegant, and they are mostly aluminum making them save weight and bolster gas mileage. None of these features are offered Chevy’s. Chevrolets have outstanding quality. They are mostly comprised of steel, for instance, the Chevrolet Silverado. This makes them good for rough roads and difficult terrains.
Fords have employed the use of up to date Wi-Fi technology. Ford intends to provide the Ford Sync, which will provide robust connections for occupants. Latest Chevrolet brands Malibu utilize the 4G LTE Wi-Fi Technology that provides rich in-vehicle experiences. This technology is powerful compared to Ford Sync, and is used for connecting devices and executing few remote operations within the car.
From the value and cost standpoint, Ford can consume a little more, and its payload capacity is a little higher. Additionally, its mileage is too better. The prices vary from nation to nation. Chevrolet seems to be a little cheaper, and reasonably priced going for $33,044, which is slightly less than Ford, but the differences are not serious to propel buyers towards one truck leaving the other
Technophiles are likely to put their preferences on Ford to Chevrolet. On overall, Fords have many features as compared Chevy’s. However, they may be hard to maintain. Compared to Fords, Chevrolets are reliable and cheaper. However, the two brands are equally good performers. It is, therefore, prudent to pick what one thinks would fit his or her usage and preference and personal style
Ethical Systems, Research Paper, Spring 2015, Douglas Green, Page 1 of 1
Ethical
Systems/Final
Research
Paper
2,000
words
minimum,
double-‐spaced
Final
Draft
Due:
Tuesday,
April
28,
12:00
pm
(afternoon)
Please
email
your
final
research
paper
to
me
via
MS
Word
attachment
AND
by
cutting/pasting
the
entire
document
into
the
body
of
your
email.
IF
YOU
DO
NOT
RECEIVE
A
CONFIRMATION
EMAIL
BACK,
I
DID
NOT
RECEIVE
YOUR
ESSAY
AND
YOU
WILL
LOSE
ALL
CREDIT
FOR
THIS
REQUIREMENT.
NO
LATE
WORK
WILL
BE
ACCEPTED…
PERIOD!
.
Fairness and Discipline Weve all been disciplined at one.docxTatianaMajor22
Fairness and Discipline
We've all been disciplined at one time or another by a parent or a teacher. What disciplinary experiences have you had as a child that took a non-punitive approach?
I need paragraph or half page with reference
.
Appendix 12A Statement of Cash Flows—Direct MethodLEARNING .docxTatianaMajor22
Appendix 12A
Statement of Cash Flows—Direct Method
LEARNING OBJECTIVE
6
Prepare a statement of cash flows using the direct method.
To explain and illustrate the direct method, we will use the transactions of Computer Services Company for 2014, to prepare a statement of cash flows. Illustration 12A-1 presents information related to 2014 for Computer Services Company.
To prepare a statement of cash flows under the direct approach, we will apply the three steps outlined in Illustration 12-4.
Illustration 12A-1
Comparative balance sheets, income statement, and additional information for Computer Services Company
STEP 1: OPERATING ACTIVITIES
DETERMINE NET CASH PROVIDED/USED BY OPERATING ACTIVITIES BY CONVERTING NET INCOME FROM AN ACCRUAL BASIS TO A CASH BASIS
Under the direct method, companies compute net cash provided by operating activities by adjusting each item in the income statement from the accrual basis to the cash basis. To simplify and condense the operating activities section, companies report only major classes of operating cash receipts and cash payments. For these major classes, the difference between cash receipts and cash payments is the net cash provided by operating activities. These relationships are as shown in Illustration 12A-2.
Illustration 12A-2
Major classes of cash receipts and payments
An efficient way to apply the direct method is to analyze the items reported in the income statement in the order in which they are listed. We then determine cash receipts and cash payments related to these revenues and expenses. The following pages present the adjustments required to prepare a statement of cash flows for Computer Services Company using the direct approach.
CASH RECEIPTS FROM CUSTOMERS.
The income statement for Computer Services Company reported sales revenue from customers of $507,000. How much of that was cash receipts? To answer that, companies need to consider the change in accounts receivable during the year. When accounts receivable increase during the year, revenues on an accrual basis are higher than cash receipts from customers. Operations led to revenues, but not all of these revenues resulted in cash receipts.
To determine the amount of cash receipts, the company deducts from sales revenue the increase in accounts receivable. On the other hand, there may be a decrease in accounts receivable. That would occur if cash receipts from customers exceeded sales revenue. In that case, the company adds to sales revenue the decrease in accounts receivable. For Computer Services Company, accounts receivable decreased $10,000. Thus, cash receipts from customers were $517,000, computed as shown in Illustration 12A-3.
Illustration 12A-3
Computation of cash receipts from customers
Computer Services can also determine cash receipts from customers from an analysis of the Accounts Receivable account, as shown in Illustration 12A-4.
Illustration 12A-4
Analysis of Accounts Receivable
Illustration.
Effects of StressProvide a 1-page description of a stressful .docxTatianaMajor22
Effects of Stress
Provide a 1-page description of a stressful event currently occurring in your life.
Discuss I am married work a full time job as an occupational therapy assistant am taking two courses
Have to take care of a home feed the animals attend to laundry
Think of my pateitns worry about their well being and what I can do for them ( I bring home my patients issues)
Constantly doing paper work for work such as documentation for billing
I feel like I have no free time for me some days I don’t even eat dinner or lunch because I don’t have time to make anything or am just too tired to cook
On top of this I am married and married ppl do argue and my husband am I have been bunting heads on finances.
Then, referring to information you learned throughout this course, address the following:
· What physiological changes occur in the brain due to the stress response?
· What emotional and cognitive effects might occur due to this stressful situation?
· Would the above changes (physiological, cognitive, or emotional) be any different if the same stress were being experienced by a person of the opposite sex or someone much older or younger than you?
· If the situation continues, how might your physical health be affected?
· What three behavioral strategies would you implement to reduce the effects of this stressor? Describe each strategy. Explain how each behavior could cause changes in brain physiology (e.g., exercise can raise serotonin levels).
· If you were encouraging an adult client to make the above changes, what ethical considerations would you have to keep in mind? How would you address those ethical considerations?
In addition to citing the online course and the text, you are also required to cite a minimum of four scholarly sources. For reputable web sources, look for .gov or .edu sites as opposed to .com sites. Please do not use Wikipedia.
Your paper should be double-spaced, in 12-point Times New Roman font, and with normal 1-inch margins; written in APA style; and free of typographical and grammatical errors. It should include a title page with a running head, an abstract, and a reference page.
The body of the paper should be at least 6 pages in length total
not including the reference or title page
Assignment 1 Grading Criteria
Maximum Points
Described a stressful event.
20
Explained the physiological changes that occur in the brain due to the stress response.
36
Explained the emotional and cognitive effects that may occur due to this stressful situation.
32
Analyzed potential differences in physiological, cognitive, and emotional responses in someone of a different age or sex.
32
Discussed the physical health risks.
28
Provided three behavioral strategies to reduce the effects of the stressor and explained how each could cause changes in brain physiology.
40
Analyzed ethical considerations in implementing behavioral strategies and offered suggestions for addressing these.
40
Integrated at least two scholarly references .
Design Factors NotesCIO’s Office 5 People IT Chief’s Offi.docxTatianaMajor22
Design Factors
Notes
CIO’s Office
5 People
IT Chief’s Office
5 People
LAN/WAN Maint.
20 People
Reception
4 People
Telecommunications
20 People
LAN Management
50 People
Server Room A
2 Person
Server Room B
4 Person
Equipment:
Patch Cable
Computer to Wall
Patch Cable
LAN Room
Cable Trays/Runs
Horizontal Runs
Cisco Border Router
Research: Attached to 5 Floor Switches
Server Room A
10 Servers
Server Room B
10 Servers
Computers
One Per Person
Standard floor (first floor) Lesson 2 Project Plan info
Design Factors
Notes
CIO’s Office
5 People
IT Chief’s Office
5 People
LAN/WAN Maint.
20 People
Reception
4 People
Telecommunications
20 People
LAN Management
50 People
Server Room A
2 Person
Server Room B
4 Person
Equipment:
Patch Cable
Computer to Wall
Patch Cable
LAN Room
Cable Trays/Runs
Horizontal Runs
Cisco Border Router
Research: Attached to 5 Floor Switches
Server Room A
10 Servers
Server Room B
10 Servers
Computers
One Per Person
Basement floor
Design Factors
Notes
Vertical Riser Run
On Outside Wall of LAN Room on Each Floor.
Fiber-Optic Multimode
Riser Runs: Backbone
SC Connectors
Fiber-Optic Cable
Cisco Catalyst: Switch: WS-C3750G-24PS-S: 24 Ports
Leave a Minimum of four ports free on each switch
Color Laser Printer
Minimum of One per Room or One per 20 people
Vertical Riser Run
On Outside Wall of LAN Room on Each Floor and Server RM B on this floor.
Fiber-Optic Multimode
Riser Runs: Backbone
SC Connectors
Fiber-Optic Cable
Cable Trays/Runs
Horizontal Runs
Horizontal Runs
Leave a Minimum of four ports free on each switch
Applicataion
U.S. Minimum Requirement Ranges
Space per Employee - 1997
Two people, such as a supervisor and an employee, can meet in an office with a table or desk between them
60" to 72" x 90" to 126:/5.78m2 to 11.7m2
280Sq. Ft./26.0m2
Worker has a primary desk plus a return
60" to 72"x60"to 84"/5.78 to 7.8m2
193Sq. Ft./17.9m2
Executive office - three to four people can meet around a desk
105 to 130"x96 to 123"/9.75 to 11.4 m2
142Sq. Ft./13.2m2
Basic workstation such as a call center
42" to 52" x 60" to 72"/3.9 to 6.7 m2
114Sq. Ft./10.6 m2
NT1310: Project
Page 1
PRO JECT D ESC RIPT ION
As the project manager for the Cable Planning team, you will manage the creation of the cable plan for
the new building that will be built, with construction set to begin in six weeks.
The deliverables for the entire Cable Plan will consist of an Executive Summary, a PowerPoint
Presentation and an Excel Spreadsheet. You will develop different parts of each of these in three parts.
The final organization should contain these elements:
The Executive Summary:
o Project Introduction
o Standards and Codes
Cable Standards and Codes
Building Standards and Codes
o Project Materials
o Copper Cable, Tools, and Test Equipment
o Fiber-Optic Cable, Tools, and Test Equipment
o Fiber-Optic Design Considerations
o Basement Server Comp.
Question 12.5 pointsSaveThe OSU studies concluded that le.docxTatianaMajor22
Question 1
2.5 points
Save
The OSU studies concluded that leaders exhibit two main types of behavior: structure behavior and consideration behavior.
True
False
Question 2
2.5 points
Save
Fiedler suggests when there is a mismatch between the type of situation in which leaders find themselves, and the leaders style of leadership:
leaders should shift to situations for which they are best suited
the situation should be changed
immediate training is necessary no matter how long it may take
any leadership style is appropriate
the leaders should be flexible enough to adapt to the new situation
Question 3
2.5 points
Save
The OSU studies concluded that leaders exhibit two main styles of behavior:
employee-centered behavior and job-centered behavior
structure behavior and consideration behavior
boss-centered behavior and subordinate-centered behavior
consideration behavior and job-centered behavior
structure behavior and employee-centered behavior
Question 4
2.5 points
Save
The life cycle theory of leadership maintains that:
as a manager becomes more mature, he/she should become more participatory
the organization should match the individual with a specific leadership situation
a manager's leadership style should be independent of the follower's maturity levels
the leader's abilities will peak when the leader is 45 years old, and decline thereafter
a manager's leadership style will be effective only if it is appropriate for the maturity level of the followers
Question 5
2.5 points
Save
According to the characteristics of the emerging leader versus characteristics of the manager, which of the following would be associated with the leader?
problem-solving
independent
consulting
stabilizing
authoritative
Question 6
2.5 points
Save
Under which of the following conditions would Fiedler say a considerate leader would be most effective?
good leader-member relations, high task structure, and strong leader position power
moderately poor leader-member relations, high task structure, and weak leader position power
moderately poor leader-member relations, weak task structure and weak leader position power
good leader-member relations, high task structure, and weak leader position power
good leader-member relations, weak task structure, and weak leader position power
Question 7
2.5 points
Save
Which approach to leadership suggests successful leadership requires a unique combination of leaders, followers, and leadership situations?
transformational leadership
the trait approach
the situational approach to leadership
contingency approach
the contemporary leader approach
Question 8
2.5 points
Save
According to the Vroom-Yetton-Jago Model, when a manager and subordinates meet as a group to discuss the situation, and the group makes the decision, it is the ________ de.
Case Study 1 Questions1. What is the allocated budget .docxTatianaMajor22
Case Study 1 Questions:
1. What is the allocated budget ? $250,000
2. Where does the server room located? Currently, there is no server room
3. What is the number of users with PCs inside each existing site?
Currently there are
4. What is the current cabling used in each location? (cat5e or cat6) Current cabling does not meet the company’s current and future needs
5. Do want us to upgrade token Ring or use a completely new Ethernet network What is your recommendation and why?
6. regarding the ordering system , it is not clear what the we should do , do you want to talk about how to connect the system to the network or how to built the ordering online system because it is more software engineering than networking . Talk about the kind of network (hardware) you recommend based on the business requirements
7. all the sites should have access to our servers in the main branch? yes
8. Regarding the order software, do you need more details about the way it works or just about its connection with the network? Your solution should be from a network point of view
9. Distances are given in Meters or feet? feet
10. Shipment is done by truck, or ships? Currently, only trucking
11. In Dimebox branch, where are administration offices located? See Business goals # 4
12. What is the current network connectivity status? How many devices are currently on the network? How they are physically laid out? Is cabling running all over the floor, hidden in walls or threaded through the ceiling? What are the switches used and its speed? Currently, only the office is networked (token ring) NOVELL
13. What is the minimum Internet speed wanted? See Business Goals on page 2 – I only can tell you what we need the network for, you must tell me what we need to meet the business needs
14. Will the corporation provide wireless access? If yes will it be in all department and buildings? Wireless access would be helpful if we can justify the cost
15. Are there phones in offices? yes
16. What is the internet speed available now? What speed do you want for future? Internet access is through time warner cable company which is not very reliable
17. Do employees access their emails outside the company? yes
18. Do you have plans for future expansion? We like to increase our customer base by 20% over the next year
REMEMBER, you are the IT expert, I’m only a business person who must rely on your expertise.
Network Design and Performance
Case Study
Dooma-Flochies, Inc. with headquarters located on Podunk Road in Trumansburg, NY, is the sole manufacturer of Dooma-Flochies (big surprise). They currently have a manufacturing facility in, Lake Ridge, NY (across Cayuga Lake) on Cayuga Dr. and have recently diversified by purchasing a company, This-N-That, on Industry Ave. in, Dime Box Texas. This-N-That is the sole competitor of Domma-Flochies with their product Thinga-Ma-Jigs. This acquisition gives Dooma-Flochies, Inc a monopoly in this mark.
Behavior in OrganizationsIntercultural Communications Exercise .docxTatianaMajor22
Behavior in Organizations
Intercultural Communications Exercise Response Paper –
Week 5
The most overt cultural differences, such as greeting rituals and name format, can be overcome most easily. The underlying, intangible differences are very difficult to overcome. In this case, the underlying cultural differences are
· Assumptions about the purpose of the event (is the party strictly for fun and for relationship building, or are their business matters to take care of?).
· Assumptions about the purpose and the nature of business relationship.
· Assumptions about power and leadership relationships (who makes the decisions and how?).
· Response styles (verbal and nonverbal signals of agreement, disagreement, politeness, etc.).
Many (though not all) cultural differences can be overcome if you carefully observe other people, think creatively, remain flexible, and remember that your own culture is not inherently superior to others.
The Scenario
Three corporations are planning a joint venture to sponsor an international concert tour. The corporations are Decibel, an agency representing the musicians (from the US, Britain, and Japan); Images, a marketing firm which will handle sales of tickets, snacks and beverages, clothing, and CDs; and Event, a special events company which will hire the ushers, concessionaires, and security officers; print the programs; and clean up the arenas after the shows. The companies come from three different cultures: Blue, Green, and Red. Each has specific cultural traits, customs, and practices.
You are a manager in one of these companies. You will attend the opening cocktail party in Perth, Australia the evening before a 3-day meeting during which the three companies will negotiate the details of the partnership. Your management team includes a Vice President and a number of other managers.
During the 3-day meeting, the companies have the following goals:
Decibel
· As high a royalty rate as possible on sales of T-shirts, videos, and CDs
· Aggressive marketing and advertising to increase attendance and sales
· Good security, both before and during the show Image
Image
· Well known bands that will be easy to market
· As much income as possible from the concerts
· Smoothly functioning event so that publicity from early concerts is positive
Event
· Bands that are not likely to provoke stampedes, riots, or other antisocial behavior
· Bands that are reliable and will show up on time, ready to play
· As much income as possible from the concerts
The cultures that are assigned to the various companies are:
BLUE CULTURE
Image (Marketing Company)
Beliefs, Values, and Attitudes that Underlie This Culture’s Communication
Believe that fate and luck control most things.
Believe in feelings more than reasoning.
An authoritarian leader makes the ultimate decisions.
Nonverbal Traits of This Culture
Treat time as something that is unimportant. It is not a commodity that can be lost.
Conversation distance is close (about 15 inches, face-.
Discussion Question Comparison of Theories on Anxiety Disord.docxTatianaMajor22
Discussion Question:
Comparison of Theories on Anxiety Disorders
There are numerous theories that attempt to explain the development and manifestation of psychological disorders. Some researchers hold that certain disorders result from learned behaviors (behavioral theory), while other researchers believe that there is a genetic or biological basis to psychological disorders (medical model), while still others hold that psychological disorders stem from unresolved unconscious conflict (psychoanalytic theory). How would each of these theoretical viewpoints explain anxiety disorders? Does one explain the development and manifestation of anxiety disorders better than the others?
200- 400 words please
Three min resources with
in text citations and examples
you can use the following as a module reference
cite as university 2014
Anxiety Disorders
Anxiety disorders such as panic disorder, specific phobias, and social anxiety disorder feature a heightened autonomic nervous system response that is above and beyond what would be considered normal when faced with the object or situation that the person reacts to. For example, a person with a specific phobia of spiders (called arachnophobia) experiences a heightened autonomic response when confronted with a spider (or even an image of a spider). This anxiety response must result in significant distress or impairment. In general, anxiety disorders have been linked to underactive gamma-aminobutyric acid (GABA) in the brain, resulting in overexcitability of the amygdala and the anterior cingulate cortex. Additionally, genetic research shows that anxiety disorders demonstrate a clear pattern of genetic predisposition
Charles Darwin's Perspective
We talked about Charles Darwin when discussing evolution and natural selection. Darwin was also very interested in emotions. One of his books published in 1872,The Expression of Emotions in Man and Animals, was devoted to this topic.
Darwin believed that emotions play an important role in the survival of the species and result from evolutionary processes in the same way as other behaviors and psychological functions. Darwin's writing on this topic also prompted psychologists to study animal behavior as a way to better understand human behavior.
James–Lange Theory of Emotions
Modern theories of emotion can be traced to William James and Carl Lange (Pinel, 2011). William James was a renowned Harvard psychologist who is sometimes called the father of American psychology. Carl Lange was a Danish physician. James and Lange formulated the same theory of emotions independently at about the same time (1884). As a result, it is called the James–Lange theory of emotions. This theory reversed the commonsensical notion that emotions are automatic responses to events around us. Instead, it proposes that emotions are the brain's interpretation of physiological responses to emotionally provocative stimuli.
Cannon–Bard Theory of Emotions
In 1915, Harvard physiologist Walt.
I have always liked Dustin Hoffmans style of acting, in this mov.docxTatianaMajor22
I have always liked Dustin Hoffman's style of acting, in this movie he takes on a sexually deprived young male just out of college, and has never been with a female, and is duped by horny older woman that feels neglected. Dustin Hoffman takes the characters form of a young male, goofy, respectful virgin and intelligent male, missing something but not really sure at the beginning till Ann Bancroft coaxes him with seduction to fulfill her own needs. In an other movie called "The life of Little Big Man" he plays almost the same character but as a white child raised by the Native Americans and a wise old chief that deeply care and loves him as his own, and Fay Dunaway plays a Holy rollers wife that is older and sexually deprived and feeling neglected by her husband and also she goes through major changes in her life from devoted wife, to a honey bell/ house hooker, whats funny Dustin Hoffman is a awesome actor but has to have his surrounding characters bring his character to life. The Graduate was Dustin Hoffman's first big movie of his career.
I actually liked movie "Little Big man" way better due to he went through major changes in his life, from being a Native boy warrior, captured by Yankees, meets Fay Dunaway who loves to give baths, to finding his sister who teaches him to be a gunslinger and then returns to his Grand Father to be a native again and tells his blind Grand Father the world of the white man is a crazy one, then his see the Psyho Col. Custer and gets his revenge by telling Custer the truth. The movie Little Big Man makes you laugh, teaches you things about people and survial and cry at times... its a must see...
Although a stray away from the Benjamin Braddock written about in the novel The Graduate, Dustin Hoffman does an awesome job with this character on film. When you first meet Ben he is at a party that his parents are throwing in his academic honor upon his graduation from school and return home. The whole night, Hoffman stumbles though various conversations and tries to coyly escape from the festivities. Small things such as this Hoffman did a great job at, conveying the hesitance and crisis that Ben was going through as a graduate. There are multiple times in the movie he hardly expresses anything at all, yet it clearly shows you that Ben is having a very hard time internally with everything going on. Even through his relationships with Mrs. Robinson and her daughter Elaine you see the young man struggling with himself through either failed attempts at affection or lack thereof.
.
Is obedience to the law sufficient to ensure ethical behavior Wh.docxTatianaMajor22
Is obedience to the law sufficient to ensure ethical behavior? Why, or why not? Support your answer with at least three reasons that justify your position.
100 words
Discuss the differences between an attitude and a behavior. Provide 4 substantive reasons why it is important for organizations to monitor and mitigate employee behavior that is either beneficial or detrimental to the organization's goals and existence.
150 words
.
If you are using the Blackboard Mobile Learn IOS App, please clic.docxTatianaMajor22
If you are using the Blackboard Mobile Learn IOS App, please click "View in Browser." V BUS 520Week 9 Assignment 4 Paper
I need the paper as soon as possible
Students, please view the "Submit a Clickable Rubric Assignment" in the Student Center.
Instructors, training on how to grade is within the Instructor Center.
Assignment 4: Leadership Style: What Do People Do When They Are Leading?
Due Week 9 and worth 100 points
Choose one (1) of the following CEOs for this assignment: Larry Page (Google), Tony Hsieh (Zappos), Gary Kelly (Southwest Airlines), Meg Whitman (Hewlett Packard), Ursula Burns (Xerox), Terri Kelly (W.L. Gore), Ellen Kullman (DuPont), or Bob McDonald (Procter & Gamble). Use the Internet to investigate the leadership style and effectiveness of the selected CEO. (Note: Just choose one that is easier for you to right about.) It does not matter to me which CEO you pick
Write a five to six (5-6) page paper in which you:
1. Provide a brief (one [1] paragraph) background of the CEO.
2. Analyze the CEO’s leadership style and philosophy, and how the CEO’s leadership style aligns with the culture.
3. Examine the CEO’s personal and organizational values.
4. Evaluate how the values of the CEO are likely to influence ethical behavior within the organization.
5. Determine the CEO’s three (3) greatest strengths and three (3) greatest weaknesses.
6. Select the quality that you believe contributes most to this leader’s success. Support your reasoning.
7. Assess how communication and collaboration, and power and politics influence group (i.e., the organization’s) dynamics.
8. Use at least five (5) quality academic resources in this assignment. Note: Wikipedia and other Websites do not qualify as academic resources.
Your assignment must follow these formatting requirements:
· Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
· Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
· Analyze the formation and dynamics of group behavior and work teams, including the application of power in groups.
· Outline various individual and group decision-making processes and key factors affecting these processes.
· Examine the primary conflict levels within organization and the process for negotiating resolutions.
· Examine how power and influence empower and affect office politics, political interpretations, and political behavior.
· Use technology and information resources to research issues in organizational behavior.
· Write clearly and concisely about organizational behavior using proper writing mechanics.
Click here.
Is the proliferation of social media and communication devices a .docxTatianaMajor22
Is the proliferation of social media and communication devices a good thing or a bad thing for society? Use personal examples to support your opinion.
( I’m currently a freshmen in university)
.
MATH 107 FINAL EXAMINATIONMULTIPLE CHOICE1. Deter.docxTatianaMajor22
MATH 107 FINAL EXAMINATION
MULTIPLE CHOICE
1. Determine the domain and range of the piecewise function.
A. Domain [–2, 2];
B. Domain [–1, 1];
C. Domain [–1, 3];
D. Domain [–3/2, –1/2];
2. Solve:
A. 3
B. 3,7
C. 9
D. No solution
3. Determine the interval(s) on which the function is increasing.
A. (−1.3, 1.3)
B. (1, 3)
C. (−∞,−1)and (3,∞)
D. (−2.5, 1)and (4.5,∞)
4. Determine whether the graph of y = 2|x| + 1 is symmetric with respect to the origin,
the x-axis, or the y-axis.
A. symmetric with respect to the origin only
B. symmetric with respect to the x-axis only
C. symmetric with respect to the y-axis only
D. not symmetric with respect to the origin, not symmetric with respect to the x-axis, and
not symmetric with respect to the y-axis
5. Solve, and express the answer in interval notation: | 9 – 7x | ≤ 12.
A. (–∞, –3/7]
B. (–∞, −3/7] ∪ [3, ∞) C. [–3, 3/7]
D. [–3/7, 3]
6. Which of the following represents the graph of 7x + 2y = 14 ?
A. B.
C. D.
7. Write a slope-intercept equation for a line parallel to the line x – 2y = 6 which passes through the point (10, – 4).
A.
B.
C.
D.
8. Which of the following best describes the graph?
A. It is the graph of a function and it is one-to-one.
B. It is the graph of a function and it is not one-to-one.
C. It is not the graph of a function and it is one-to-one.
D. It is not the graph of a function and it is not one-to-one.
9. Express as a single logarithm: log x + log 1 – 6 log (y + 4)
A.
B.
C.
D.
10. Which of the functions corresponds to the graph?
A.
B.
C.
D.
11. Suppose that a function f has exactly one x-intercept.
Which of the following statements MUST be true?
A. f is a linear function.
B. f (x) ≥ 0 for all x in the domain of f.
C. The equation f(x) = 0 has exactly one real-number solution.
D. f is an invertible function.
12. The graph of y = f(x) is shown at the left and the graph of y = g(x) is shown at the right. (No formulas are given.) What is the relationship between g(x) and f(x)?
y = f (x) y = g(x)
A. g(x) = f (x – 3) + 1
B. g(x) = f (x – 1) + 3
C. g(x) = f (x + 3) – 1
D. g(x) = f (x + 1) .
If the CIO is to be valued as a strategic actor, how can he bring.docxTatianaMajor22
If the CIO is to be valued as a strategic actor, how can he bring to the table the ethos of alignment, bound to the demands of process strategic planning to move IT to the forefront of the organization's future? Is there a lack of information on strategic planning? Nope. I think the process of planning is poorly understood, and rarely endorsed. The reasons are simple enough. Planning requires a commitment of resources (time, talent, money); it requires insight; it requires a total immersion in the corporate culture. While organizations do plan, planning is invariably attached to the budget process. It is typically here that the CIO lays out his/her vision for the coming year Now a few years ago authors began writing on the value of aligning IT purpose to organizational purpose. They wrote at a time when enterprise architectural planning was fairly new, and enterprise resource management was on the lips of every executive. My view is that alignment is a natural process driven by the availability of the tools to accomplish it. Twenty years ago making sense of IT was more about processing power, and database management. We are in a new age of IT, and it is the computer that is the network, not the network as an independent self-contained exchange of information. If you will spend some time reviewing the basic materials I provided on strategic planning and alignment, we can begin our discussions for the course. Again, here is the problem I would like for us to tackle: If the CIO is to be valued as a strategic actor, how can he bring to the table the ethos of alignment, bound to the demands of process strategic planning to move IT to the forefront of the organization's future? Most of the articles I bundled together for this week are replete with tables and charts. These can be a heavy read. Your approach should be to review these articles for the "big ideas" or lessons that are take away. I think these studies are significant enough that we will conclude our first week with an understanding of the roles between executive leaders, and how they see Information Technology playing a role in shaping a business strategy.
Read the articles to answer the question. Please No Plagerism or verbatim but you are allowed to quote from the article.
Achieving and Sustaining
Business-IT Alignment
Jerry Luftman
Tom Brier
I
n recent decades, billions of dollars have been invested in intormation tech-
nology (IT). A key concern of business executives is alignment—applying IT
in an appropriate and timely way and in harmony with business strategies,
goals, and needs. This issue addresses both how IT is aligned with the busi-
ness and how the business should be aligned with IT Frustratingly, organizations
seem to find it difficult or impossible to harness the power of information tech-
nology for their own long-term benefit, even though there is worldwide evi-
dence that IT has the power to transform whole industries and markets.' How
can companies.
I am showing below the proof of breakeven, which is fixed costs .docxTatianaMajor22
I am showing below the proof of breakeven, which is fixed costs/ contribution margin.
We start with the definition of breakeven and proceed using elementary algebra to derive the formula. Breakeven is a number and is created by knowing fixed and variable costs, and the retail sales price. It is thus not a point of discussion but is based on the assumptions of these variables.
Proof of Breakeven
Definition of BreakevenVolume: Total Revenue = Total Expenses
Definition
1.Total Revenue = Total Expenses
Breakdown of Definition
2. Retail Price * Volume = Fixed Expenses + Variable Expenses
Further Analysis
3. Retail Price * Volume = Fixed Expenses + (Volume * Unit Variable Expenses)
Subtract (Volume * Unit Variable Expenses) from both sides
4. Fixed Expenses = (Retail Price * Volume) — (Volume * Unit Variable Expenses)
Factor
5. Fixed Expenses = Volume * (Retail Price – Unit Variable Expenses)
Divide both sides by (Retail Price – Unit Variable Expenses)
6. Volume = Fixed Expenses
(Retail Price – Unit Variable Expenses)
Substitution based on Definition
7. Since (Retail Price — Unit Variable Expenses) is called Contribution Margin,
Therefore:
Breakeven Volume = Fixed Expenses / Contribution Margin
NAME_________________________________________________ DATE ____________
1. Explain some of the economic, social, and political considerations involved in changing the tax law.
2. Explain the difference between a Partnership, a Limited Liability Partnership (LLP) and a Limited Liability Company (LLC). In each structure who has liability?
3. How is “control” defined for purposes of Section 351 of the IRS Code?
4. What are the advantages and disadvantages of using debt in a firm’s capital structure?
5. Under what circumstances is a corporation’s assumption of liabilities considered boot in a Section 351exchange?
6. What are the tax consequences for the transferor and transferee when property is transferred to a newly created corporation in an exchange qualifying as nontaxable under Section 351?
7. Why are corporations allowed a dividend-received deduction? What dividends qualify for this special deduction?
8. Provide 3 examples of a Constructive Dividend. Are these Constructive Dividends taxable?
9. Discuss the tax consequences of a new Partnership Formation and give details to gain and losses and basis?
10. Provide 2 similarities and 2 differences when comparing Sections 351 and 721 of the IRS Code.
11. What is the difference between inside and outside basis with a partnership?
12. ABC Partnership distributes $12,000 of taxable income to partner Bob and $24,000 of tax-exempt income to Partner Bob. As a result of these two distributions, how does Bob’s basis change?
13. On January 1, Katie pays $2,000 for a 10% capital, profits, and loss interest in a partnership.
Examine the way in which death and dying are viewed at different .docxTatianaMajor22
Examine the way in which death and dying are viewed at different points in human development.
Using only my text as a reference:
Berger, K.S. (2011). The developing person through the life span (8th ed.).
I need 3 detailed PowerPoint slide with very detailed speaker notes. There must be detailed speaker notes on each slide. The 4th slide will be the reference.
.
Karimi 1 Big Picture Blog Post First Draft College .docxTatianaMajor22
Karimi 1
Big Picture Blog Post First Draft
College Girls in Media
Sogand Karimi
Media and Hollywood movies have affected and influenced society’s perception on
female college students. Due to Hollywood movies and media, society mostly recognizes the
negative stereotypes of a college women. Saran Donahoo, an associate professor and education
administration of Southern Illinois University, once said, “The messages in these films
consistently emphasized college as a place where young women come to have fun, engage in
romances with young men, experiment with sex and alcohol, face dilemmas regarding body
image, and encounter difficulties in associating with other college women.” In this essay I will
be talking about the recurring stereotypes and themes portrayed in three hollywood movies,
Spring Breakers, The house bunny and Legally Blond and how these stereotypes affect our
society.
The movie Spring Breakers is about four college girls who are bored with their daily
routines and want to escape on a spring break vacation to Florida. After realizing they don’t have
enough money, they rub a local diner with fake guns and ski masks. They break the laws in order
to get down to Florida, just to break more rules and laws once they’re there. During the film, you
will notice a lot of partying, drugs and sexual activity. The four girls wear bikinis for majority of
the film and are overly sexual. These are some common themes and stereotypes seen in all three
movies. Media and movies like spring breakers have made it a norm to constantly want to party,
get drunk and have sex as a college woman. In an article by Heather Long, she mentions how the
movie can even be seen as supporting rape culture. She believes because of these stereotypes
always being shown in media, it is contributing to the “girls asking for it” excuse when it comes
to rape cases with young girls. Long also said “...never mind the fact that thousands of college
students are spending their spring break not on a beach, but volunteering with groups like Habitat
for Humanity and the United Way, especially after Hurricanes Katrina and Sandy.” THIS shows
how media only displays one side of a certain group or story. Even though not all college girls
like to party and lay on a beach naked for spring break, that’s what media likes to portray. Not
only does this give the wrong message to our society but it influences bigger issues like rape, as
the author mentioned.
http://www.huffingtonpost.com/2010/03/10/alternative-spring-break_n_494028.html
http://www.huffingtonpost.com/2010/03/10/alternative-spring-break_n_494028.html
Karimi 2
The movie House bunny. The House bunny is a movie about an ex playmate or girlfriend
if Hugh Hefner that gets kicked out of the Playboy Mansion due to her aging. She then becomes
a mother of an unpopular sorority with girls that are bit geeky, and unusual compared to other
girls on campus. The story.
Please try not to use hard words Thank youWeek 3Individual.docxTatianaMajor22
Please try not to use hard words Thank you
Week 3
Individual
Problems and Goals Case Study
Select one of the following three case studies in Ch. 6 of The Helping Process:
· Case Susanna
· Case James and Samantha
· Case Alicia and Montford
Identify three to five problems in the case study you have selected.
Write a 500- to 700-word paperthatincludes the following:
· A problem-solving strategy and a goal for each problem
· The services, resources, and supports the client may need and why
· A description of how goals are measurable and realistically attainable for the client
Here is the case studies
Exercise 3: Careful Assessment
The following case studies are about Susanna, James, Samantha, Alicia, and Montford, all
homeless children attending school. The principal of the school has asked you to conduct
an assessment of these children and provide initial recommendations.
Before you begin this exercise, go to the website that accompanies this book: www.
wadsworth.com/counseling/mcclam, Chapter Three, Link 1, to read more about homeless
families and children.
Susanna
Susanna is 15 years old. Th e city where she lives has four schools: two elementary, one
middle, and one high school. Th ere are about 1,500 students enrolled in the city/county
school district and about 450 in the local high school that Susanna is attending. For the
past six months, Susanna has been living with her boyfriend and his parents. Prior to this,
she left her mother’s home and lived on the streets. She is pregnant and her boyfriend’s
parents want her to move out of their home. Her father lives in a town with his girlfriend,
about 50 miles from the city. Her mother lives outside the city with Susanna’s baby brother.
Right now Susanna’s mother is receiving child support for the two children. Susanna wants
to have a portion of the child support so that she can find a place of her own to live. Her
mother says that the only way that Susanna can have access to that money is to move back
home. Susanna refuses to move back in with her mother.
You receive a call from the behavior specialist at Susanna’s high school. Susanna’s
mother is at the school demanding that Susanna be withdrawn from school. Susanna’s
mother indicates that Susanna will be moving in with her and will be enrolling in another
school district.
Currently Susanna is not doing very well in school. She misses school and she tells the
helper it is because she is tired and that she does not have good food to eat. She has not told
the helper that she is looking for a place to live. Right now she is failing two of her classes
and she has one B and two Ds. Her boyfriend has missed a lot of school, too.
James and Samantha
James is 10 years old and he has a sister, Samantha, who is 8. At the beginning of the
school year, both of the children were attending Boone Elementary School. Both children
live with their aunt and uncle; their parents are in prison. In the middle of the scho.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
InternationalCustomers often come to us and say I want to
1. International
Customers often come to us and say “I want to implement
Change Management.” The first thing we would ask them is
“Why?”
ITIL is a Best Practice standard, which people have heard of
and they think it sounds good. But often they haven’t taken
time to analyze their own organization’s issues. They don’t
really understand why they need ITIL or how it is going to
help them; instead, they implement ITIL processes because
it looks good on paper. But you can waste a lot of money
on implementing ITIL if you don’t understand your own
organization’s pain points.
CIOs need to prove they have spent their budget wisely. For
example, they may spend 50,000 Euros on implementing ITIL
processes. You would hope that at the end of the project, they
would see improvements in customer satisfaction, cost saving
and reduced incidents. But on many occasions, organizations
don’t stand back and think about what the desired outcomes of
implementing ITIL will be – they just do it and at the end of the
project nothing actually changes.
We think ITIL has to answer for itself. We don’t want its value
to
be impossible to measure. If you want to do ITIL you must start
with analyzing what problems you are facing, what motivates
your customers and what you want to achieve.
ITIL is a tool to use, and it is a good one. But goals must be
clear from the outset. Think about who is your customer? Is it -
2. your CEO? Can he or she give you the direction you need? Or
is it your project manager? Should you go together to speak to
the boss about what the company needs?
It’s so important to set this direction first. You need to think
about who your customer is and what he wants. Goals should
be agreed together. That means talking to someone in the
organization with senior authority, and making sure they agree
with the person who holds the purse strings. For SERVIEW, if
we can’t ask these questions and get good answers then we
would rather not work with that particular customer. We feel we
would be the wrong supplier for them because without answers
to those questions we wouldn’t be able to apply the advice and
the actions that would benefit the organization.
Written by Kate Winter
January 2012
You can waste a lot of money
on implementing ITIL if you
don’t understand your own
organization’s pain points.
ITIL® Adoption –
the Challenges
Markus Bause, Director SERVIEW GmbH
1
Account management can be challenging because customers
can race ahead in their decision making and we have to take
them two steps backwards to get those fundamental questions
answered. This is important because ITIL often changes the
organization structure from hierarchical to process-oriented.
3. This
can be a difficult transition so it is important that very early on
in
the project, the management team has thought about how they
want the organization to look in the future. In a process
oriented
culture people take on more responsibility because they are now
accountable for the process.
We take some time to explore how we think things will be and
how functions are going to work together in the future. For
example when an incident occurs, you need to find out why. It
might be that you check with the server team, but they report
that
everything is ok. The database team has a similar story and so
do applications, but at the customer business unit, the process
isn’t working. We need to find the cause of the incident quickly.
Therefore we need to appoint one incident manager who has
the authority to take appropriate action. He must be competent
and have the responsibility to be able to deal with things.
What you don’t want to create is a process manager who is
just a toothless tiger. When people realize they don’t have the
authority to change things they become disengaged and more
responsibility is laid on team leaders, adding extra pressure
for them. Instead we want a situation where the team and
management are working in harmony – they need to agree the
process and work to a set of common commitments.
Like Kotter advises, you need a guiding coalition and
management shall get the agreement of staff before they
decide on roles. People should be aware at the beginning that
they will be responsible and accountable.
How do you get buy in?
All organizations implementing ITIL will need someone who
4. has
an expert understanding of service management. It’s ideal if
there is a senior IT Manager who can talk on the same level as
the CIO. All CIOs have the same problems whichever sector
they
are working in – they want faster service, higher quality
service,
cheaper service and the ability to take advantage of the cloud.
They need to think about what the critical success factors are
for the next few years and what capabilities the organization
has.
ITIL can seem daunting but the reality is it is just a box of
tools.
If you don’t make the conversation about ITIL but about service
management then you can get a good feeling for which services
you should provide, which services you need, and which
services you want.
If you talk about ITIL you will find that lots of people fall
asleep.
Service management talks about issues that everyone can
understand - which capabilities do we have, which are the most
important services to provide etc. SERVIEW uses
entertainment
tools such as Listening Books and games to help people
understand the concepts of service management in an engaging
way. They are instruments to gain understanding and address
peoples’ emotions. We believe if you can get the emotional
commitment then you can get the change you want.
We use a simulation game based on the Apollo 13 mission.
The flight was in trouble and the objective of the mission
changed from going to the moon to getting the crew back
home safely.
5. The simulation puts participants in the Kennedy space control
centre and they are told there’s trouble (i.e. an incident) that
needs an urgent resolution or the crew will perish. Problems
unfold and it is tense; the participants can’t find the information
they need and things change quickly. After 30 minutes the
participants tell us how they are feeling. Everyone is confused;
they lack the correct information and are uncertain how to
save the lives of the crew. We encourage them to establish a
single point of contact – which is a key principle of ITIL. The
participants can then see from their own experience why a
single point of contact is so important.
We find that when people can
see and understand the higher
concepts they think about it in a
different way and become much
more engaged.
How do you know if processes
are working?
To make sure that the ITIL processes are working as hoped,
we advise that customers keep records at the beginning of the
project to demonstrate compliance of steps. Later they can
switch to KPIs which are measureable and repeatable. What
happens is that – over time - people stark working with the
processes, not talking about them. At that stage, you can feel
that the processes are working because change and incidents
are not discussed any more.
When you are driving a car and you reach a stop sign, you don’t
analyze the sign, you just stop the car. There are rules and you
just accept them. ITIL is a box of rules. When someone is not
questioning it or thinking about it you know it is working.
A word of caution though – it takes years to reach this stage,
so organizations need to be patient and keep working at it.
6. You’ve trained your people but are
they competent?
Staff need to understand the theoretical basics of ITIL.
The Foundation exam is the start and strategy and continuous
improvement come later. What is important is that people can
interpret ITIL in their own environment.
It’s easy to tell if your training is good enough because if it is
you
will have compliance of processes and employee satisfaction.
There are always clear signs if people are not following process
correctly. For example, in configuration management, if you
realize that the integrity of your of data in the CMS is not very
good, then your change management won’t be very good – you
will have symptoms that show the process isn’t working.
2
In this case, the organization will need to spend some time
understanding why the process isn’t working – is it because
people
don’t understand it? Or is it because they don’t want to use it?
If
it’s the first scenario then some more training might be in order
– if it
is the latter, maybe staff need a better understanding as to why
the
organization has decided to do things this way.
We find that for most organizations there is a percentage of
people
who support the new way of working, and a percentage who
don’t.
7. ■ Normally there are 10% of people who will think it’s a
great idea and fully embrace it;
■ 40% will think it is good and might help;
■ 40% will think it is a good idea but is risky;
■ 10% will be against the idea and say they don’t want or
need it.
All our simulations and games etc focus on the 80% in the
middle.
If the 10% who don’t want it to work are at management level
then really for the benefit of the organization and their
colleagues
they should leave. If they are at employee level then they
usually
come around once they see their colleagues embracing the new
ideas. If they don’t do this then we tend to find they also leave
the
organization, but there is no significant loss in them doing that.
What you are looking for is a
positive manager who has the
support of the people who work for
him or her. It is important to find out
which people support the change
and which are against it.
It is OK for staff to be constructive
in their criticism, and it is natural for
them to be cautious and nervous
about it. Good communications in
stakeholder management cannot
be over-emphasized.
How do you manage risks in
8. ITIL adoption?
ITIL is very strategic but CEOs can belittle ITIL by thinking it
is
the process for operational IT. Not having senior support is the
biggest risk. Without this commitment there is a huge risk of
failure.
The project sponsor must be committed. They will go through
deep valleys from an emotional point of view, and need to
keep focused on the vision. When the sponsor comes to the
first barrier in the project, it’s important they really believe
what
they are doing is right. They must ask themselves: ‘What is my
vision?’ and ‘Why am I doing this?’
These questions should be answered periodically, and usually
you will get the reassurance that you are doing the right things.
There are lots of risks associated with any kind of change
programme. The goals of IT organizations change as the
needs of customers change, or they may face a merger or
other re-structuring programme. The strategic goals for ITIL
implementation should not be inflexible - they need to be
adjusted every three, four or five months to take into account
evolving political or economic situations. Keep talking.
How do you know your service
management has improved?
It’s quite simple to work out if your service management
has improved:-
■ The satisfaction rate of customers will increase.
■ Try to analyze uncalculated acts against calculated
activities – for example when the organization has lots of
incidents but can solve them immediately. You may not be
able to calculate the benefit of resolving incidents quickly –
9. but you will know it is of huge benefit to the organization.
About APMG
APMG-International is a global examination institute. Our
portfolio of
qualifications includes ITIL®, PRINCE2®, MSP®, M_o_R®
and P3O®.
Our Accredited Training and Consulting Organizations have
gone through
the most rigorous assessment process in the industry. Our
commitment to
high standards means that all candidates and organizations
awarded an
APMG certificate can be assured they have reached our
stringent quality
standards.
M_O_R® is a registered trade mark of the Cabinet Office.
MSP® is a registered trade mark of the Cabinet Office.
PRINCE2® is a registered trademark of the Cabinet Office
International
APMG-International Head Office Sword House
Totteridge Road, High Wycombe, Buckinghamshire UK HP13
6DG
Tel: +44 (0) 1494 452 450
Fax: +44 (0) 1494 531 952
Email: [email protected]
Web: www.apmg-international.com
About SERVIEW
SERVIEW is a training and consulting company
11. Introduction 3
1 Information asset management 4
1.1 Why manage information assets? 4
2 What are the digital challenges? 4
2.1 Adapting to manage the growth in digital content and
information 4
2.2 Understanding how digital information supports the business
5
2.3 Identifying digital information assets and their relationships
5
2.4 Ensuring digital continuity through business and technology
change 5
2.5 Managing the liabilities and risks associated with
information assets 5
2.6 Managing information across the supply chain 5
2.7 Reducing redundancy and duplication, and disposing of
information 5
3 Where digital continuity fits in 5
3.1 Business or organisational change 6
3.2 Technical change 6
3.3 Identifying business needs and technical dependencies 7
12. 3.4 ITIL principles that support digital continuity management 7
3.5 Organising for digital continuity 7
3.6 Financial management and service portfolio management 7
4 Using your IAR to understand the relationships between your
information
assets, business requirements, and technical environment 8
4.1 Defining the scope of your IAR and identifying starting
points 9
4.2 Designing your IAR 9
4.3 Adopting the ITIL asset and configuration management
practices with the IAR 10
5 Using the IAR to improve the way you manage digital
information 10
5.1 Planning for effective and efficient information asset
management 10
5.2 Identifing risks to digital continuity 10
5.3 Identifying and planning the realisation of savings and
efficiencies 11
5.4 Contracting with new IT service providers 11
5.5 Obligations on suppliers to use an IAR when contracting for
IT services 11
6 Manage information assets over time, and during periods of
change 12
14. This White Paper uses ITIL service management best practices
to explain the principles of providing services to business
customers that are fit for purpose, stable and reliable. It is
complementary guidance to ITIL on digital continuity.
This paper explains what IT service providers, and key points of
contact with external IT suppliers, need to do to manage digital
continuity in relation to their business activities.
In brief, you need to take action to make sure that your
technical environment adequately supports the digital
information your organization relies on. That means making
sure it supports the way your organization needs to use its
information, and provides sufficient functionality now and in
the future.
Key recommendations are as follows:
• Understand what information the business needs and how
that information is used in a business context.
• Define information assets by content and business use
rather
than by what system holds the information.
• Define the scope of your information asset register (IAR).
Design it, then use it to improve the way you manage your
digital information.
• Use your IAR to help you to understand and record the
relationships and dependencies between your information
assets, business requirements and technical environment.
• Use your IAR when contracting with new IT service
providers,
to ensure good information asset management. Through the
15. active management of the IAR in the IT services contract,
information assets become true configuration items. This will
help you to effectively manage and maintain digital
continuity, reducing risks as the technology and the
organization itself change.
As part of good information asset management we also
recommend that you assess the impact of asset, business or
IT change on digital continuity. Good change management is
essential if you are to ensure your information assets continue
to support your business requirements.
For more information visit www.nationalarchives.gov.uk/
digitalcontinuity.
This White Paper provides complementary guidance to ITIL.
For
more information visit www.itil-officialsite.com.
Introduction
‘Information is a valuable asset that must be safeguarded.
In the case of information held by public authorities and
businesses … people want to be certain that it is held
securely, maintained accurately, available when necessary
and used appropriately’
Sir Richard Mottram, Foreword, National Information
Assurance Strategy
Organizations depend on digital information to manage and
operate their business. This makes information an asset that
needs managing and protecting as carefully as more tangible
assets such as money or equipment. If you manage your
information assets well, you can operate legally and
accountably,
improve customer and public services, and save or avoid costs.
Information asset management can deliver IT efficiencies. It
16. helps you to identify where you are providing unnecessary
support or where you have under-utilized capability.
If you do not manage your information assets well, you could
lose business-critical digital information. You could also lose
the ability to use digital information as you need to, with all
the associated financial and reputational costs. You could be
storing information that has no business value – and although
technology allows us to store more and more information cost-
effectively, this has knock-on costs which continue to grow.
These include the increased costs of maintaini ng and backing up
the data, and the need for more expensive technologies to find
and retrieve the right information in a timely fashion.
This White Paper provides introductory guidance for IT
providers,
complementing ITIL guidance1. It explains how IT can support
the management of digital continuity; that is, the ability to use
digital information as needed, over time and following change.
It provides guidance on how to manage digital information
assets across an IT service supply chain. This incl udes what you
can do to identify opportunities and manage risk.
It explains what we mean by information assets, and introduces
the basic concepts and principles of managing them. It includes
advice on why and how to manage digital information assets
as a configuration item, linking into the information asset and
configuration management responsibilities covered in ITIL.
It outlines the obligations for contractors to maintain an IAR
for the duration of their contracts. It also summarizes key
recommendations from the UK government’s Digital Continuity
Project2.
1 ITIL is a Registered Trade Mark, and a Registered Community
18. • Capacity management
• Service level management
• Information security management
• IT service continuity management
• Availability management
• Service asset and configuration management
• Change management
• Incident management
1 Information asset
management
An information asset is information held by an
organization, categorized from the perspective of its content
and business use rather than by the IT system that holds it.
An information asset is information that has been grouped in
a way that enables you to protect, manage, share and exploit
it effectively. An organization will need to decide how to
group its information to ensure that the asset is both useful
and able to be effectively managed. An information asset can
contain structured or unstructured information and may
range from a single file to many files.
Information asset management is the effective
management, control and protection of information assets
within an organization. Asset management is the process
responsible for tracking and reporting the value and
ownership of assets throughout their lifecycle.
19. 1.1 Why manage information assets?
Information can be a valuable asset, and it needs to be
managed as such. In this digital age, managing information
assets requires input and support from IT and the people
responsible for knowledge and information in the organization.
Good information asset management protects the information
your business relies on – and that means you can operate legally
and accountably, and take informed decisions. It protects you
from risk – the risk that you will lose information, or lose the
functionality required to use the information you have to
support your business requirements.
Specific IT benefits include:
• Understanding where you are maintaining IT to support
information no longer required by the organization. This will
enable you to take evidence-based cost-saving decisions; for
example, on standardizing applications and software, or
reducing the number of licences you pay for
• The potential for reducing storage costs. If you are
keeping
only the information your business needs, this could lead to
reduced back-up costs and time savings, reduced electricity
costs and a need for fewer servers
• A clearer understanding of how your technical
environment
needs to support the business. You will be helping to ensure
that business-critical information is usable, i.e. that you are
maintaining the required level of functionality
• More effective use of your IAR, with clearer
responsibilities
21. ITIL® Managing Digital Information Assets 5
• Developing strategies to manage digital information
effectively throughout its lifecycle.
2.2 Understanding how digital information
supports the business
Users need information to work efficiently to deliver business
benefits effectively, and to operate legally, accountably and
transparently. One challenge is to know what information is
required, when, where, by whom, and how it is used (now and
in the future); also, how the underlying IT services and
infrastructure support the delivery of information to users over
time and through change.
2.3 Identifying digital information assets and
their relationships
Information is used in many ways and in many formats, through
different channels and interfaces. The challenge is to identify
information assets, their relationships and dependencies.
Without this understanding, it is difficult to manage the costs
and other impacts of change on information assets.
2.4 Ensuring digital continuity through
business and technology change
Digital information is particularly vulnerable to change. It is
reliant on complex systems, formats and media to support it,
and the expertise and understanding of the people who
manage it. Although organizations have procedures to protect
and back up digital data, these will not necessarily ensure the
continuing completeness, availability and usability of digital
information. They cannot protect against changes in the
business and technical environments. The challenge is to ensure
22. that you can use digital information in the way that you need to
as the underlying IT changes, digital information ages, and
organizational structures and business needs change.
2.5 Managing the liabilities and risks
associated with information assets
Information that is not usable or disposed of at the appropriate
time can become a financial, reputational and legal liability; for
example, where there are concerns about privacy, security, and
intellectual property protection associated with digital
information assets.
2.6 Managing information across the supply
chain
Delivering services in today’s world often involves activities
that
are carried out by multiple suppliers. This adds to the
complexity
of the responsibilities and processes involved in managing data
and information across a supply chain.
2.7 Reducing redundancy and duplication,
and disposing of information
With the complexity of systems and IT services it is often
difficult to know what information to keep. Organizations often
either lack the confidence to make decisions and take action on
what to dispose of or archive, or they do not yet have in place
the systems and procedures to enable them to do this.
3 Where digital continuity
fits in
Complete This means that everything you need to use and
24. When these things move out of alignment, you might lose
digital information, or the ability to use it as you need to.
3.1 Business or organizational change
If your organization is given new responsibilities, for example,
you might be required to do new things with your information.
If your IT or information management do not allow that to
happen, then you are at risk of losing digital continuity. That
could be for a variety of reasons. Perhaps your IT service
contract is not flexible enough, so making changes to meet your
new needs is too expensive. Or perhaps your metadata policy is
now inadequate, because it does not provide the rigorous audit
trail you now require.
3.2 Technical change
Changes to your IT environment can also impact on digital
continuity. You can lose essential bits of your information,
such as metadata, during transfer to a new IT system. Or you
could lose functionality if formats or applications are no longer
supported or are upgraded.
Technologies can also become obsolete. If you do not have a
plan in place to migrate at-risk information to new formats
or systems that provide the functionality you need, you could
easily lose digital continuity.
Technical Services and
Environment
You are maintaining
technical capability that
you don’t need
You are maintaining
25. information assets that
you don’t need
You don’t have the
right technical
capability to use your
information assets to
meet your business
needs
You don’t have
the right (form
of) information
assets to meet
your business
need
You are
maintaining
technical
support for
information
assests that you
don’t need
Effective and
Efficient Information
Asset Management:
You have the right
27. perspective.
3.3 Identifying business needs and technical
dependencies
Effective management of digital information assets means
that you have the right capabilities and resources to meet your
ongoing business needs, as shown in Figure 1.
This requires that:
• You understand how your organization needs to use its
information to support its business requirements (i.e. what
information you need, for how long, who needs to use it and
in what way)
• You then make sure that your technical environment and
the
way you manage your information assets support the
identified business requirements.
Your IT should provide support for your information assets in
the way you need to use them – not just today, but as business
needs and technology change, and digital information ages.
The National Archives’ Digital Continuity project is developing
a
service for the public sector that will support digital continuity
management. You can find guidance at www.nationalarchives.
gov.uk/recordsmanagement/dc-guidance.htm
3.4 ITIL principles that support digital
continuity management
ITIL defines a ‘service’ as a means of delivering value to
customers by facilitating the outcomes that customers want to
28. achieve without the ownership of specific costs and risks.
If we consider a business service such as ‘payments’, the
business outcomes are making the right payments on time,
with the expected resources, and without any unexpected
costs or risk. The ‘payments’ business services are supported
by a number of technology services such as ‘information access
administration’, ‘database service’ and ‘storage administration’.
Managing the entire business service along with its underlying
components ensures that we are delivering the required
functionality (or utility – i.e. accurate payments) and service
levels (or warranty) to the business customer.
Managing digital continuity is about making sure that your
technical environment supports your organization to use its
digital information assets as it needs to, now and in the future.
This fits with the ITIL principles of delivering service utility
and
warranty:
• Utility Delivering a service that has a positive effect on
the
performance of tasks associated with desired business
outcomes. This is fitness for purpose.
• Warranty The positive effect is available when needed, in
sufficient capacity or magnitude, and dependable in terms of
continuity and security. This is fitness for use.
The following examples illustrate how ITIL is used by many IT
service providers to ensure that the warranty is delivered:
• Demand management and capacity management to
ensure that sufficient capacity is provided to deliver the
current and future demand for services; for example,
payment workload and digital storage needs
29. • Service level management to ensure that agreed service
level targets can be met; for example, performance levels for
a specified workload
• IT service continuity management to support business
continuity
• Availability management to ensure that all IT components
are appropriate to deliver the agreed service level targets
• Information security management to ensure the
confidentiality, integrity and availability of an organization’s
assets, information, data and IT services
• Incident management to restore service as quickly as
possible to users.
Managing digital continuity will help you to ensure that the
utility and warranty you are providing support the ongoing use
of digital information to fulfil business requirements, at the
right
cost.
3.5 Organizing for digital continuity
Digital continuity should fit within a wider spectrum of activity
within your organization, including the appointment of a senior
sponsor for digital continuity who champions governance. The
senior sponsor may delegate responsibility for this to someone
like a chief information officer, head of knowledge and
information management or chief technology officer – that is,
someone who has the authority to escalate issues to board level
if required. Your organization may also have information asset
owners – senior individuals who have been given additional
responsibility for managing information risk. Every
organization
31. information assets are not adequately supported by technology
(or are likely to become unsupported; for example, as a result
of technological obsolescence or changes to systems and
contracts), and where technology could improve information
asset usability.
The service portfolio can be a valuable tool in decision
making, supporting you to manage changes to information
assets, model the resource requirements required to manage
information assets and deliver digital continuity. Within the
service portfolio, the view of the operational services is the
service catalogue.
The service catalogue management process ensures that
information in the catalogue is accurate and reflects the current
details, status, interfaces and dependencies of all services that
are being run or being prepared to run in the live environment.
It helps to set the customers’ expectations of the value and
potential of their IT service providers.
4 Using your IAR to
understand the relationships
between your information
assets, business
requirements, and technical
environment
The five stages shown in Figure 2 provide a framework of the
actions your organization can take to help you assess and
improve the management of your digital information assets (for
more detail see Annex C). One of the principal ways you can
manage your digital information assets is by adapting your IAR.
The IAR is a conceptual rather than a physical entity. In
practice,
your IAR is likely to consist of a number of separate registers,
32. documenting particular aspects of your digital information and
its environments. It might build on existing lists of information
assets or use the ITIL service asset and configuration
management process to link the various elements. This does
not matter, as long as you can understand what information
assets you have, how the business needs to use them, the
technical dependencies between them, and you can identify
the information assets dependent on each component of your
technical environment. Whatever way you develop your IAR,
you need to be able to use it to assess and manage the impact
of change.
Within an IT services environment, the IAR identifies the
information assets as distinct configuration items which relate
to the technology that enables them and the business outcomes
that they are required to support. Once the IT services IAR
is under active management (including with outsourced
IT suppliers), any impacts on the information assets can be
Figure 2 Key steps to improve the management of your
information assets
1. Understand
the issues and
take action
2. Identify your
scope,
information
assets, how they
are used and their
technical
34. Are there priority areas of the business, IT services or key
information assets that should be tackled first? For example,
new or business-critical services, their applications and
information assets and technology platform.
• What level of detail do you require? You may want to
start
with a high-level overview, and take a phased approach to
developing the underlying detail.
• Are there plans to change or implement information
systems
that would provide opportunities for developing sections of
your IAR?
• Are you due to renew or replace your service contract?
• Do you already have components of the IAR in place that
could be built upon?
4.2 Designing your IAR
• Decide how you will identify your information assets.
How
will you define and classify them? How will you ensure that
each one you identify is unique? Who is the business owner
of each one? How will you quantify the value they provide to
the business? What do they cost to create and maintain?
Work with your knowledge and information management
team to understand what is currently being done and
whether it meets business needs. Roles are defined in Annex
B. If you do not have these specific roles in your organization,
find someone who has similar responsibilities or skills.
• Document the information asset content and context,
where
35. the information is located, its current format and structure,
and relate this to the technical environment that supports it.
• Ensure that your IAR allows you to link what you know
about
the business value and utility requirements of your
information asset with what you know about its technical
characteristics. This will inform decisions about how to
manage the continuity of your digital information assets
through change.
• Ensure that you can also understand what information
assets
are dependent on each component of your technical
environment, so that you can see which information assets
may be affected by changes to your technology.
• Establish processes for updating this mapping, with
regular
review periods to audit for completeness and effectiveness.
• Ensure that ownership and responsibility for maintaining
the
IAR itself is clear. Ownership will probably rest with your
senior sponsor. Responsibility for maintenance will probably
be shared between the information assurance function and
the information asset owners in the business, as appropriate.
Case Study 1
An IT service provider did not understand how digital
information flowed through the business and suspected there
was a lot of duplication of information within applications. It
also wanted to use this knowledge to manage its IT assets
more cost-effectively, and to ensure that it was supporting
information that had real business value, rather than storing
36. huge volumes of data.
The service provider achieved this by establishing a new
configuration management system (CMS). As part of the
initial project assessment, data on digital information assets,
business services, IT services, applications and the rest of the
technical environment was gathered. It found that there were
over 200 applications in use, and for one application each
division had its own name for the same application. Once the
CMS was established it was easier to understand the impact
of changing technology on the information assets. So when
the time came to upgrade key applications, the need to
migrate information contents and keep them usable was
flagged and actioned.
The asset and configuration manager used the following ITIL
categories to help identify and categorize configuration items
(CIs) more effectively:
• Service lifecycle CIs that provide a picture of
the service
provider’s services, how these services will be delivered,
what benefits are expected, at what cost, and when they
will be realized
• Service CIs such as:
– Service capability assets: management, organization,
processes, knowledge, people
– Service resource assets: financial capital, systems,
applications, information, data, infrastructure and
facilities, financial capital, people
– Service and process models
38. management practices with the IAR
Many organizations have implemented the ITIL asset and
configuration management process as a way of maintaining
information about the configuration items required to deliver
an IT service, including their relationships with each other. This
configuration information is managed throughout the lifecycle
of the configuration item (for example, information asset).
Changes to every configuration item are approved through the
ITIL change management process. Implementing the change
includes updating the relevant configuration records, such as
the IAR.
Service providers that manage large and complex IT services
and infrastructures use a supporting system known as the
configuration management system (CMS). The CMS holds all
the information about CIs within the designated scope. For
example, a service CI (such as a web service) will include the
details such as supplier, cost, purchase date, renewal date for
licences and maintenance contracts, and it will be linked to
controlled documentation such as agreements and contracts.
The CMS maintains the relationships between all service
components and records for all related changes. At the data
level, the CMS will provide access to data in asset registers,
wherever possible, rather than duplicating data.
You need to expand ITIL asset and configuration management
approaches to include information assets as configuration items.
If you use a CMS make sure you include information assets,
such as web content, too.
5 Using the IAR to improve
the way you manage digital
information
Once you have established an IAR covering some or all of your
39. information assets, you can begin to use it to improve your
management of digital information, as follows.
5.1 Planning for effective and efficient
information asset management
• Use the mappings of dependencies in your IAR to
understand the potential impact of organizational or system
change.
• Ensure that your enterprise architecture planning and
implementation reflect the business requirements for your
information assets and the need to ensure you can still use
digital information after technical, organizational, or business
change.
• Use your understanding of the impact of change to build a
consideration of the long-term use you need from
information assets into IT system design and development,
to minimize the impact and cost of change.
• Use your understanding of the impact of change to plan
the
migration of information assets to standardized technology
and open standards, wherever possible. This will ensure
information assets are future-proofed and less at risk from
change.
• Use your understanding of the impact of change to
identify
where you can standardize the technology, software,
environment and formats you use to minimize reliance on
bespoke systems, proprietary software or complex formats.
This will make your technology environment easier to
manage and ensure that changes have minimal impact on
digital continuity.
40. 5.2 Identifying risks to digital continuity
• Identify the information assets that you need to use, but
are
currently insufficiently supported by the right technology and
so do not efficiently meet your business requirements – this
is an area of risk to your digital continuity.
• Assess the impact of business and technology change on
the
usability of digital information.
• Identify potential points of failure and vulnerability when
designing the availability and continuity for new and
changed services.
Case Study 2
A consultant helped a bank, a city council and a rail operator
to establish a strategy for digital continuity that would
guarantee the availability of key IT services during business
and technology change projects. In the first phase, ITIL best
practices were used to:
• Establish a service portfolio management
process. The
process ensured that the investment case for proposed
new and changed services covered all the lifecycle costs
of the service including: maintenance, up to three
platform and format changes during the lifetime of the
service, and a budget for disposal of service assets
including the information assets.
• Integrate the existing IT change management
process
42. • Dispose of any information assets that you no longer need.
• Dispose of any technology capability that you no longer
need.
• Identify opportunities to downgrade the technology you
use
to access information or migrate information to different
formats, so that your technology mirrors your needs, saving
money on expensive systems, unnecessary functionality or
high availability.
• Move the information assets to cheaper, more efficient
and
effective storage, de-duplicating assets.
5.4 Contracting with new IT service providers
• Through the active management of the IAR in the IT
services
contract, the information assets become true configuration
items and the organization is able to effectively manage and
maintain digital continuity, reducing risks as the technology
and the organization itself change.
• The OGC model agreement for IT services now includes
reference to an IAR as one of the registers to be maintained
as part of the service configuration management. The IAR
needs to be created by the contracting authority. It is then
maintained by the contractor, who has to assess the impact
of any changes on the usability requirements defined for the
information assets.
• In the contract service description, the services must be
mapped to the information assets that relate to the delivery
of that service in order to deliver the utility (i.e. business
43. outcomes) required.
• The IAR should be initially created by the contracting
authority prior to procurement, used in the due diligence
process and updated or refined during the contract
negotiations.
• Once the IT services contract is in place, the IAR is
referenced
from the contract, and is maintained by the contactor. The
model contract contains several clauses which detail rights or
responsibilities in relation to the IAR. In summary they are as
follows:
– The contractor is obligated to ensure that the IAR is
maintained.
– Any changes to the IAR should go through the
operational change procedure or the contract change
procedure.
– All changes which go through the operational change
procedure or the contract change procedure will
explicitly address the impact on the IAR.
– The authority has the right to audit the IAR for
completeness and accuracy.
5.5 Obligations on suppliers to use an IAR
when contracting for IT services
The OGC model agreement for ICT services includes an
obligation for the contractor to maintain an IAR for the duration
of the contract. There also needs to be agreement on the
approach to:
44. • Managing changes to the IT services, technology
environments and information assets between the contractor
and the authority3
• Sharing asset and configuration management information
where this facilitates more effective change planning and
impact assessment of changes.
Benefits of using an IAR when contracting for IT
services
The following benefits for both the contractor and the
contracting authority can be derived from using the IAR during
procurement and management of IT services:
• Clear definition of the information assets that a new
contractor will be expected to support in relation to
delivering the service, leading to clarity and understanding
between both parties on the service provision.
• Appropriate service design that fully meets business
requirements for information and that takes into account any
legacy technology issues.
• The flexibility required to keep digital information usable
is
built in to service design, so making change less costly – for
example, by moving towards open standards-based design,
rather than bespoke systems.
• Early identification of potential digital continuity issues
during procurement, leading to agreement on issue
resolutions during the solution design phase rather than
relying on post-contract change control – this is more
economic and carries a lower technical risk.
• Improved ability to make joint decisions about IT
46. As part of good information asset management you must assess
the impact of asset, business management or IT change on
digital continuity and the availability of IT services to ensure
your
information assets continue to support your business needs and
to reduce the likelihood of continuity issues arising. Figure 3
shows how to use the ITIL service lifecycle to achieve this.
6.1 Using the ITIL service lifecycle to manage
digital continuity
Many organizations are adopting the ITIL service lifecycle (see
Figure 3) to enable them to manage business and technology
changes more effectively and efficiently. You can use the ITIL
service lifecycle to help you to manage digital information
assets
through business and technology change.
The service lifecycle contains five elements as shown in Figure
3, each of which rely on service principles, processes, roles
and performance measures. Each part of the lifecycle exerts
Co
mp
lem
entary Publications
Web Support Serv
ice
s
ITIL
49. It includes the changes necessary to assure continuity of
services, achievement of service levels, and conformance to
standards and regulations. It guides organizations on how
to develop capabilities for service management including
the service management system, measurement method,
technology and processes.
3. Service transition the service design is built, tested
and deployed into production with minimal unwanted
consequences. It covers the transition of an organization
from one state to another while controlling risk and
supporting organizational knowledge for decision support.
It provides guidance on managing changes, release
and deployment management, controlling assets and
configurations, service validation and testing.
4. Service operation includes guidance on achieving
effectiveness and efficiency in the delivery and support
of operational services to ensure value for the customer,
user and service provider. It provides knowledge for
operations managers and practitioners to make better
decisions in areas such as managing the availability of
services, controlling demand, optimizing capacity utilization,
scheduling of operations and avoiding or resolving service
incidents and managing problems.
5. Continual service improvement provides guidance
in measuring and improving the services to create and
maintain value for customers. It combines principles,
practices and methods from quality management, change
management and capability improvement.
7 Conclusion
IT service providers and those managing outsourced IT have an
active role to play in managing digital continuity – ensuring
that
50. the technical environment adequately supports the information
assets that the organization relies on, and supports the way the
organization needs to use that information after change.
To achieve this we recommend that you:
• Understand the business needs for information and its
context of use
• Define information assets by content and business use
rather
than by the system that holds the information
• Define the scope of an IAR, design it, and use it to
improve
the way you manage your digital information (using existing
configuration management approaches where possible)
• Use your IAR to help you to understand and record the
relationship and dependencies between your information
assets, business requirements and technical environment
• Use your IAR when contracting with new IT service
providers,
to ensure good information asset management.
In this way, information assets become true configuration
items and you will be able to effectively manage and maintain
digital continuity, reducing risks as the technology and the
organization itself changes.
The changes we suggest you make to your IAR will enable you
to collate the information you need to:
• Identify information assets that you need to use, but that
are
52. – Identify technology that is supporting unneeded
information assets, allowing you to dispose of any
surplus technology capacity
– Identify opportunities to downgrade the technology
you use to access information or migrate it to different
formats
– Move information assets to cheaper, more efficient and
effective storage, avoiding duplication of assets.
You can find more information about managing digital
continuity at www.nationalarchives.gov.uk/digitalcontinuity
Annex A Glossary of terms and
definitions
asset Any resource or capability. Assets of a
service provider include anything that
could contribute to the delivery of a
service. Assets can be one of the following
types: management, organization, process,
knowledge, people, information, applications,
infrastructure, and financial capital.
Source: ITIL Service Strategy
An information asset is information held
by an organization, categorized from the
perspective of its content and business use
rather than by the IT system that holds it.
Information assets could be single or logical
groupings of files, data sets or databases,
and include both the digital object and
associated metadata.
53. Source: Digital Continuity Project
digital continuity The ability to access and use your digital
information assets, in the way you need to,
for as long as you need to, over time and
through change.
Achieving digital continuity means ensuring
your information assets are complete,
available and usable through the alignment
of business requirements, information assets
and technical environment.
Source: Digital Continuity Project
digital The inability to read a digital object because
obsolescence the software, hardware or systems required
are no longer available or are no longer
supported. Digital obsolescence may result
from the supplier no longer trading, having
ceased support or only supporting newer
versions of its products. Digital obsolescence
may lead to incompatibility or lack of
interoperability. The term can also be applied
to specifically to hardware when it is known
as technical obsolescence.
Source: Wikipedia
digital The long-term archival management of digital
preservation information assets selected for their historical
value, once they have passed out of business
54. ownership.
Source: Digital Continuity Project
The long-term, error-free storage of digital
information, with means for retrieval and
interpretation, for the entire time span the
information is required for.
Source: Wikipedia
Annex B Key roles and
responsibilities
Identifying the right roles and responsibilities
in the organization
Ensuring effective management of information assets requires
the clear allocation of responsibilities within an organization to
provide:
• Strategic ownership and accountability, to secure
commitment and action from the right people, to realize
business benefits, to manage information risk and ensure
good governance throughout the information lifecycle, and
to drive a culture of effective information management
• Ongoing planning and action, and collaboration across the
business, and across information management, information
assurance and IT functions
• Clear business ownership of and accountability for
information assets, to ensure that each one is managed in a
way that is consistent with business need.
The exact shape of this framework will vary for each
organization, but key roles and functions are outlined below.
56. Functions and roles that collaborate to manage
information assets
• Knowledge, information and records managers work
with information asset owners to define how the business
needs to use its information assets, now and over time, and
ensure that information management supports this.
• Information assurance specialists ensure digital
continuity is addressed as part of the spectrum of
information risk.
• IT managers ensure the organization’s technical
environment enables the continuity of information assets in
line with the business requirement, over time and through
change.
• Enterprise architects/strategists ensure that enterprise
architecture and/or IT strategies properly account for the
ongoing business need to use information over time and
through change.
• Business change managers, project and programme
managers ensure that digital continuity is appropriately
taken into account in any business change initiative, through
design, implementation and test phases.
• Procurement, commercial and contract managers
ensure that appropriate responsibility for identifying and
managing continuity issues is clearly defined in supplier
contracts, and that suppliers deliver on their obligations.
Annex C Managing digital
continuity
The key stages shown in Figure 2, which is shown again here,
57. provide a framework of actions your organization can take to
help you assess and improve the management of your digital
information assets. One of the principal ways you can manage
your digital information assets is by adapting your IAR.
Step 1 Understand the issues and take action
• Ensure your corporate board and senior information risk
owner are aware of the need to manage digital information
assets, and understand that risk to digital continuity is a key
information risk.
• Assign a senior responsible owner for managing digital
information assets and their continuity.
• Ensure information technology, information assurance and
information management understand their responsibilities in
managing digital information assets.
• Establish a multi-disciplinary team to take action.
• Engage IT providers on the issues, and their
responsibilities.
• Include managing digital continuity as a driver in relevant
strategies.
• Build a business case for further action.
1. Understand
the issues and
take action
2. Identify your
scope,
59. Step 2 Identify your scope, information assets,
how they are used and their technical
environment
• Identify your information assets in order to understand
what
information you have, and identify the business owner of
each asset.
• Define how your business needs to use the information it
has. Understand how each information asset will be used
through its lifecycle and what value it will provide to the
business.
• Understand the technical environment supporting your
information assets.
• Ensure your information assets have accountable owners.
• Compile an IAR, mapping the relationships and
dependencies between your business needs, information
assets and the technology that supports you in using them in
the way that you need to.
Step 3 Assess your current capability and
implement improvements
• Identify how you will assess and manage risk to digital
continuity within your existing information risk management
procedures, and what additional provision might be
necessary.
• Assess the organization’s capability to manage digital
information assets (using comparisons to internatio nal
standards, ITIL and/or the CESG Information Assurance
Maturity Model).
60. • Assess the risks to digital continuity of your current
approach
to managing information assets and the opportunities that
would be provided by managing them more effectively.
• Create and implement a prioritized action plan to improve
your information asset management.
• Improve your project management, IT service management
and change management processes to assess impact on and
risk to digital continuity as part of their standard procedure.
• Embed ongoing risk assessment and continual
improvement.
• Identify savings and efficiencies. Dispose of the
information
assets and supporting IT that you do not really need and/or
reduce your capability to the required level.
Step 4 Manage information assets over time,
and through business and technological
change
• Reflect digital continuity in business plans and enterprise
architectures to ensure that you are less likely to lose digital
continuity.
• Maintain a good understanding of the business use that
your
information assets support, so that you have the confidence
to make the right decisions on what you can archive or
downgrade to reduce maintenance costs.
• Assess the impact of organizational or business change on
61. digital continuity to ensure your information assets continue
to support your business needs and to avoid getting left with
the cost of legacy data, costly equipment or unexpected
disposal costs.
• Assess the impact of asset, business management or IT
change on digital continuity and the availability of IT services
to ensure your information assets continue to support your
business needs and to reduce the likelihood of continuity
issues arising.
• Where appropriate, aim to standardize your technical
environment to make your technical environment easier to
manage. Ensure that the way you manage metadata, audit
data, accessibility and retrievability of information, and data
quality supports digital continuity.
• Monitor and resolve incidents and problems.
Using ITIL’s IT service continuity management
process to manage digital continuity
This process supports business continuity management (BCM)
and helps you to manage risks that could seriously affect IT
services and the related information assets. It ensures that you
can always provide minimum agreed service levels, by reducing
the risk to an acceptable level and planning for the recovery of
IT services. IT service continuity management (ITSCM)
includes:
• The agreement of the scope of the ITSCM process and the
policies adopted
• Business impact analysis to quantify the impact that loss
of IT
service would have on the business
63. DOD 5015.2 US Government Electronic Records Management
Standard. Available at www.defense.gov/webmasters/
policy/dodd50152p.pdf
See also Electronic Records Management Software Applications
Design Criteria Standard available at www.js.pentagon.mil/
whs/directives/corres/pdf/501502std.pdf and ‘Records
management’ available at www.en.wikipedia.org/wiki/
records_management
Governance Processes and the Management of Organisational
Changes to Provide Appropriate Risk Management and
Continuity Strategies. Available at www.nationalarchives.
gov.uk/digitalcontinuity
UK Cabinet Office Guidance on Mandatory Roles. Available at
www.cabinetoffice.gov.uk/media/ 45149/guidance_on_
mandatory_roles.pdf
ITIL best practice information including ITIL introduction,
publications, qualifications and glossary. Available at
www.itil-officialsite.com
Acknowledgements
Authors
Shirley Lacy, ConnectSphere
Frieda Midgley, Digital Continuity Project
Judith Riley, Digital Continuity Project
Nigel Williamson, Digital Continuity Project
Acknowledgement to Digital Continuity Project