SlideShare a Scribd company logo
Copyright © 2014
Simon Rawson
Principal Consultant, PowerMark Solutions
simon@powermark.net.au
0430 986 682
• Why
• What
• How
• Who
• Feedback
• Characteristics of successful projects
Agenda
“Information governance, or IG, is the set of multi-disciplinary structures, policies,
procedures, processes and controls implemented to manage information at an
enterprise level, supporting an organization's immediate and future regulatory,
legal, risk, environmental and operational requirements.
IG encompasses more than traditional records management. It incorporates
privacy attributes, electronic discovery requirements, storage optimization, and
metadata management.”
- Wikipedia
• Governance, risk and compliance approach – a defensive model
The Purpose of Governance
To Put It Simply…
• Yogesh Bhatt, Arunachalam Thirunavukkarasu, March 2010. “Information Management: A
Key for Creating Business Value.” The Data Administration Newsletter.
http://www.tdan.com/view-articles/12829
Information Management SWOT
• Print
• Transactional documents (invoices, purchase orders etc)
• Learning Management Systems (LMS) content
• Contracts and other legal information
• Procurement information / documentation about products or services
your organisation acquires
• Product / service accreditations
• Human Resource information management (eg. Certifications and
training etc)
• Board and senior management (reports, spreadsheet models etc)
• Internet-based references and resources
• Extranets / partners’ information management systems
How Well Do Your IM Systems Cover
.
Accessibility Security
Privacy
Information and Process Architecture Model
Policies &
Governance
Channels and Audience Infrastructure
Classifying Content and Building
Taxonomies and Information Architecture
Review
Business
Classification
Scheme
Identify Key
Business Processes,
Participants
and Capabilities
Identify Process
Inputs, Outputs and
Support Content
Identify
Metadata
Review
Business
Classification
Scheme
Update
Information
Architecture
Step 1: Desk Review
Step 2: Workshops and Participants
Step 3
Step 4
Update BCS
Quality System Content Relationships
Taxonomies
and metadata
models tie
content together
facilitating
search,
navigation and
content
maintenance
Sample Process Map – Context Maps
Sample Process Flow Diagrams
PROCESS: MAKE OFFER
MEDICAL
REQUIRED?
MAKE OFFER
SOURCE CANDIDATE
PROCESS
LETTER OF OFFER
REQUEST FORM
DOCTOR’S
APPOINTMENT
GM TO APPROVE PAC
CEO/GM
LETTER OF OFFER
POLICE CHECK
HEALTH
DECLARATION
EMPLOYEE
EMPLOYEE DATA
GENERATED
YES
Sample Worksheet Relating Processes to
Transactional and Reference Content
• Note – An Excel-based Benefits Register is available to those who want it
Sample Issues/Recommendations List
Sample Key Document Register
1 • Initial
2 • Repeatable
3 • Managed
4 • Measured and Mapped
5 • Optimised
Process and Information Maturity Model
(Extended from CMMI Model)
• Your Business Case must remain open to new potential benefits
• Strategic benefits are hard to quantify. Operational benefits are easy to
quantify taking a process-centric approach
• Relate IM initiatives to your strategic plan
• Capture the wins – provide a way for these to be identified, measured
and recorded
• Report wins regularly to senior management
• Provide a way to capture feedback and suggestions for improvement
• Establish a Benefits Register, and a process for review and action
taking…
• …with roles and responsibilities in the Governance Plan (naturally)
Process Summation
Sponsor
Strategic
Oversight
IM
Working
Group
Governance Structure – Project 1
• SharePoint internet / intranet
• Executive sponsorship
• Corporate strategy exec led subcommittee owns intranet strategy
• Intranet Working Group
– Responsible for day to day matters
– IT is one of many participants
• Process and lifecycle oriented information architecture
• Operating and active support framework (Working Group)…
• …but departmental responsibility for outcomes
• 3 day governance review focussing on business processes yielded 85
recommendations for substantial process improvement
Key Principles – Project 1
Large ECM/KM Project Structure – Project 2
Current Content Archival and Migration
(J: Drives) to Cloud and ECM
1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013
NumberofFiles
Files Updated by Year
Deletion candidates
Offline
archive
‘Online’
archive
ECM
migration
ECM Primary Outcomes
• Enterprise Content Management platform
– Foundation configuration
• Business content (documents, images, audio-visual)
• Document approval workflow
• Records management and taxonomy
• Document management / retention for business applications
– Extended capability (business intelligence, web content management,
forms and business process workflow, online modelling)
• Organisational change
– More effective and efficient business processes
– Training
– Communications
– Behavioural change
• Support
– Deployment & migration support during implementation
– Governance and support model, processes and tools
– Business and technical support
Deploy
to
Business
Unit
Infrastructure in
production
Content migrated /
archived
Desktop
configured
Tech & bus support
operational
Training complete
Bus Unit
Migrates to
ECM
Business Unit Deployment
BAU
• Sponsor / owner
• Producer / publisher
• Communications – marketing
• Organisational change and culture - HR
• Authors / editors – departmental
• Analyst – process / business requirements
• Records and info management staff – IA, taxonomies BCS etc
• Department representatives
Roles
• Every process can yield feedback
• Feedback may be complaints, compliments,
observations about issues, requests, or suggestions
• Feedback needs to be directed to the right people
for response
• Managing feedback is a process in its own right
• Suggestions for improvement can come from the
mailboy all the way to the MD
• Few organisations have good processes or a culture
for turning feedback into action
Managing Feedback
• Design a process for effective management
of feedback
– Draw a process diagram
– What metadata do you need to support the
process?
– Suggest performance metrics
• Group discussion about organisational /
cultural factors which need to be addressed
Group Exercise: Process Design
Suggested Feedback Process Model
ACTION
Suppliers
Staff
Customers
Business Partners
Business Process Change Request
Benefits Register
Description
of the Benefit
to be
Achieved
Person
Responsi
ble for
Realising
the
Benefit
Description of
Current
Situation/Perform
ance for the
Business
Processes
Current Cost/
Performance
Measure of
the Business
Process
Target
Cost/Perfor
mance
Measure
after the
Planned
Change
Target
Date for
the
Benefit
to be
Realised
Triggers or events
that will cause the
Benefit to be
Realised
Type of
Contribut
ion to the
Business
Assess
ed
Value
of the
Benefit
or
Saving
Comment
about the
Assessed
Value
Strategic
and
Corporate
Objectives
and
Outcomes
supported
by the
Benefit
Contribution
of this
Benefit to
Achieving
the Strategic
and
Corporate
Objectives
and
Outcomes
Value of the Benefit
Realised and Date
Achieved
Reduce the
amount of
paper used to
distribute
information to
staff.
Chief
Informatio
n Officer
All information to
staff is distributed
in hard copy.
2,000 reams of
paper per year
are used to
distribute
information to
staff at a total
cost of
$11,000.
All
information
to staff is
distributed
on the
Intranet and
via e-mail.
June
2002
Intranet and e-mail
systems deployed. All
staff are trained in and
have access to the
Intranet and e-mail
systems. All
information to staff is
published on the
Intranet and
distributed via e-mail.
Financial -
Cost
Reduction
$11,000
pa
Reduce
administrativ
e costs by
10% per
year.
Value of
benefit
contributes a
0.01% p.a.
reduction in
administrativ
e costs.
Satisfy an
increasing
demand for
information
without
increasing
costs
Chief
Informatio
n Officer
Requests for
information taken
by phone are sent
by mail. Requests
are also made in
person over the
counter. Demand
is increasing by
10% per year.
100 items of
information are
requested per
day (26,000 per
year) and cost
$5 per item to
satisfy or
$130,000 per
year.
2,600 items
of
information
accessed
via the
website in
first year.
June
2000
Website established
and documents
published. Availability
of website is
advertised via ‘phone-
hold’ message, and
branch signage.
Financial -
Cost
avoidance
Quatnity -
Increased
productivit
y
$13,000
pa
Increased
demand for
information
satisfied
without
increasing
resources.
Reduce
administrativ
e costs by
10% per
year.
Value of
benefit
avoids
increases in
administrativ
e costs to
satisfy
increasing
demand for
information.
7,800 items of
information accessed
via the website in the
first year with
$39,000 value of
costs avoided.
Benefit achieved
June 2000.
The Common Characteristics of Highly
Successful ECM / KM Projects
• Survey of 90 initiatives in 80 organisations
Production 30%
Product Development 25%
Customer Service 25%
Competitive Intelligence/Strategic Planning 10%
Enterprise-Wide 5%
Sales Processes 5%
Project Management 5%
Intellectual Capital Management 5%
Key Findings
• 65% all projects aimed at revenue
generation or process improvement
• 35% aimed at efficiency and cost reduction
• Of high performing projects, only 5% aimed
at cost reduction
Common Characteristics
• Plan your approach (76% high impact projects
had a detailed strategy. 87% low performing
projects didn’t have a strategy)
• Consistent information architecture and
metadata model, plus key SME’s identified
• Invest in content maintenance (84% high
impact projects)
• Plan for change (no low impact projects had
ongoing change management measures)

More Related Content

What's hot

Bi governance v moulakakis
Bi governance v moulakakisBi governance v moulakakis
Bi governance v moulakakis
Vassilios Moulakakis
 
Intranet content management (webinar)
Intranet content management (webinar)Intranet content management (webinar)
Intranet content management (webinar)
Prescient Digital Media
 
[AIIM16] Content Whack-A-Mole: Keeping up Compliance across Multiple Reposito...
[AIIM16] Content Whack-A-Mole: Keeping up Compliance across Multiple Reposito...[AIIM16] Content Whack-A-Mole: Keeping up Compliance across Multiple Reposito...
[AIIM16] Content Whack-A-Mole: Keeping up Compliance across Multiple Reposito...
AIIM International
 
Whitepaper Practical Information Technology Governance
Whitepaper   Practical Information Technology GovernanceWhitepaper   Practical Information Technology Governance
Whitepaper Practical Information Technology GovernanceAlan McSweeney
 
Structured Approach To Implementing Information And Records Management (Idrm)...
Structured Approach To Implementing Information And Records Management (Idrm)...Structured Approach To Implementing Information And Records Management (Idrm)...
Structured Approach To Implementing Information And Records Management (Idrm)...
Alan McSweeney
 
Webinar: Best Strategies to Get the Most Out of Office 365
Webinar: Best Strategies to Get the Most Out of Office 365Webinar: Best Strategies to Get the Most Out of Office 365
Webinar: Best Strategies to Get the Most Out of Office 365
Alexandra Sasha Tchulkova
 
Health IT Summit Austin 2013 - Closing Keynote "100 Years of Innovation at AC...
Health IT Summit Austin 2013 - Closing Keynote "100 Years of Innovation at AC...Health IT Summit Austin 2013 - Closing Keynote "100 Years of Innovation at AC...
Health IT Summit Austin 2013 - Closing Keynote "100 Years of Innovation at AC...
Health IT Conference – iHT2
 
Ict Vision And Strategy Development
Ict Vision And Strategy DevelopmentIct Vision And Strategy Development
Ict Vision And Strategy DevelopmentAlan McSweeney
 
Staying relevant in todays changing dm environment 09282010
Staying relevant in todays changing dm environment 09282010Staying relevant in todays changing dm environment 09282010
Staying relevant in todays changing dm environment 09282010ERwin Modeling
 
Overcoming Capability Gaps in Information Transparency, Knowledge Management,...
Overcoming Capability Gaps in Information Transparency, Knowledge Management,...Overcoming Capability Gaps in Information Transparency, Knowledge Management,...
Overcoming Capability Gaps in Information Transparency, Knowledge Management,...
Concept Searching, Inc
 
2012 MN Gov IT Symposium - Get Away from SharPoint Nightmares with Governance
2012 MN Gov IT Symposium - Get Away from SharPoint Nightmares with Governance2012 MN Gov IT Symposium - Get Away from SharPoint Nightmares with Governance
2012 MN Gov IT Symposium - Get Away from SharPoint Nightmares with Governance
Don Donais
 
Introduction to Business Process Management
Introduction to Business Process ManagementIntroduction to Business Process Management
Introduction to Business Process Management
Alan McSweeney
 
What is Information Governance
What is Information GovernanceWhat is Information Governance
What is Information Governance
Atle Skjekkeland
 
IT Operating Model - Fundamental
IT Operating Model - FundamentalIT Operating Model - Fundamental
IT Operating Model - Fundamental
Eryk Budi Pratama
 
Stop the madness - Never doubt the quality of BI again using Data Governance
Stop the madness - Never doubt the quality of BI again using Data GovernanceStop the madness - Never doubt the quality of BI again using Data Governance
Stop the madness - Never doubt the quality of BI again using Data Governance
Mary Levins, PMP
 
The Centre Cannot Hold: Making IT Architecture Relevant In A Post IT World
The Centre Cannot Hold: Making IT Architecture Relevant In A Post IT WorldThe Centre Cannot Hold: Making IT Architecture Relevant In A Post IT World
The Centre Cannot Hold: Making IT Architecture Relevant In A Post IT World
Alan McSweeney
 
Enterprise Systems - Real World Perspective
Enterprise Systems - Real World PerspectiveEnterprise Systems - Real World Perspective
Enterprise Systems - Real World Perspective
Shauna_Cox
 
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...
Alan McSweeney
 
Tech strategies keynote final for dc
Tech strategies keynote final for dcTech strategies keynote final for dc
Tech strategies keynote final for dcrickschultz
 
Don’t Mention The “A” Word – Trends In Continuing Business And IT Misalignment
Don’t Mention The “A” Word – Trends In Continuing Business And IT MisalignmentDon’t Mention The “A” Word – Trends In Continuing Business And IT Misalignment
Don’t Mention The “A” Word – Trends In Continuing Business And IT Misalignment
Alan McSweeney
 

What's hot (20)

Bi governance v moulakakis
Bi governance v moulakakisBi governance v moulakakis
Bi governance v moulakakis
 
Intranet content management (webinar)
Intranet content management (webinar)Intranet content management (webinar)
Intranet content management (webinar)
 
[AIIM16] Content Whack-A-Mole: Keeping up Compliance across Multiple Reposito...
[AIIM16] Content Whack-A-Mole: Keeping up Compliance across Multiple Reposito...[AIIM16] Content Whack-A-Mole: Keeping up Compliance across Multiple Reposito...
[AIIM16] Content Whack-A-Mole: Keeping up Compliance across Multiple Reposito...
 
Whitepaper Practical Information Technology Governance
Whitepaper   Practical Information Technology GovernanceWhitepaper   Practical Information Technology Governance
Whitepaper Practical Information Technology Governance
 
Structured Approach To Implementing Information And Records Management (Idrm)...
Structured Approach To Implementing Information And Records Management (Idrm)...Structured Approach To Implementing Information And Records Management (Idrm)...
Structured Approach To Implementing Information And Records Management (Idrm)...
 
Webinar: Best Strategies to Get the Most Out of Office 365
Webinar: Best Strategies to Get the Most Out of Office 365Webinar: Best Strategies to Get the Most Out of Office 365
Webinar: Best Strategies to Get the Most Out of Office 365
 
Health IT Summit Austin 2013 - Closing Keynote "100 Years of Innovation at AC...
Health IT Summit Austin 2013 - Closing Keynote "100 Years of Innovation at AC...Health IT Summit Austin 2013 - Closing Keynote "100 Years of Innovation at AC...
Health IT Summit Austin 2013 - Closing Keynote "100 Years of Innovation at AC...
 
Ict Vision And Strategy Development
Ict Vision And Strategy DevelopmentIct Vision And Strategy Development
Ict Vision And Strategy Development
 
Staying relevant in todays changing dm environment 09282010
Staying relevant in todays changing dm environment 09282010Staying relevant in todays changing dm environment 09282010
Staying relevant in todays changing dm environment 09282010
 
Overcoming Capability Gaps in Information Transparency, Knowledge Management,...
Overcoming Capability Gaps in Information Transparency, Knowledge Management,...Overcoming Capability Gaps in Information Transparency, Knowledge Management,...
Overcoming Capability Gaps in Information Transparency, Knowledge Management,...
 
2012 MN Gov IT Symposium - Get Away from SharPoint Nightmares with Governance
2012 MN Gov IT Symposium - Get Away from SharPoint Nightmares with Governance2012 MN Gov IT Symposium - Get Away from SharPoint Nightmares with Governance
2012 MN Gov IT Symposium - Get Away from SharPoint Nightmares with Governance
 
Introduction to Business Process Management
Introduction to Business Process ManagementIntroduction to Business Process Management
Introduction to Business Process Management
 
What is Information Governance
What is Information GovernanceWhat is Information Governance
What is Information Governance
 
IT Operating Model - Fundamental
IT Operating Model - FundamentalIT Operating Model - Fundamental
IT Operating Model - Fundamental
 
Stop the madness - Never doubt the quality of BI again using Data Governance
Stop the madness - Never doubt the quality of BI again using Data GovernanceStop the madness - Never doubt the quality of BI again using Data Governance
Stop the madness - Never doubt the quality of BI again using Data Governance
 
The Centre Cannot Hold: Making IT Architecture Relevant In A Post IT World
The Centre Cannot Hold: Making IT Architecture Relevant In A Post IT WorldThe Centre Cannot Hold: Making IT Architecture Relevant In A Post IT World
The Centre Cannot Hold: Making IT Architecture Relevant In A Post IT World
 
Enterprise Systems - Real World Perspective
Enterprise Systems - Real World PerspectiveEnterprise Systems - Real World Perspective
Enterprise Systems - Real World Perspective
 
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...
 
Tech strategies keynote final for dc
Tech strategies keynote final for dcTech strategies keynote final for dc
Tech strategies keynote final for dc
 
Don’t Mention The “A” Word – Trends In Continuing Business And IT Misalignment
Don’t Mention The “A” Word – Trends In Continuing Business And IT MisalignmentDon’t Mention The “A” Word – Trends In Continuing Business And IT Misalignment
Don’t Mention The “A” Word – Trends In Continuing Business And IT Misalignment
 

Viewers also liked

Knowlege management governance process
Knowlege management governance processKnowlege management governance process
Knowlege management governance process
Eric VanAuken
 
Six Sigma Quality and IT Governance
Six Sigma Quality and IT GovernanceSix Sigma Quality and IT Governance
Six Sigma Quality and IT Governance
lmgangi
 
From Plan to Process: Governance and Lleadership Implications of RIS3
From Plan to Process: Governance and Lleadership Implications of RIS3From Plan to Process: Governance and Lleadership Implications of RIS3
From Plan to Process: Governance and Lleadership Implications of RIS3
Orkestra
 
A Simple Control Chart Example
A Simple Control Chart ExampleA Simple Control Chart Example
A Simple Control Chart Example
elasharmagroups
 
Control plan overview
Control plan overviewControl plan overview
Control plan overview
Lean Strategies International LLC
 
A working change management framework
A working change management frameworkA working change management framework
A working change management framework
Erja Klemola
 
Information and Records Management in SharePoint - An In-depth Review
Information and Records Management in SharePoint - An In-depth ReviewInformation and Records Management in SharePoint - An In-depth Review
Information and Records Management in SharePoint - An In-depth Review
Simon Rawson
 
Management of Change Process
Management of Change ProcessManagement of Change Process
Management of Change Process
Prosygma
 
Change management theories
Change management theoriesChange management theories
Change management theories
Jo Balucanag - Bitonio
 
8 - Architetture Software - Architecture centric processes
8 - Architetture Software - Architecture centric processes8 - Architetture Software - Architecture centric processes
8 - Architetture Software - Architecture centric processesMajong DevJfu
 
Building Your Own Change Management Framework
Building Your Own Change Management FrameworkBuilding Your Own Change Management Framework
Building Your Own Change Management Framework
Jason Little
 
Program governance Structure
Program governance StructureProgram governance Structure
Program governance Structure
Saurabh Sardesai
 
Unified Process
Unified ProcessUnified Process
Unified Process
guy_davis
 

Viewers also liked (15)

Knowlege management governance process
Knowlege management governance processKnowlege management governance process
Knowlege management governance process
 
Six Sigma Quality and IT Governance
Six Sigma Quality and IT GovernanceSix Sigma Quality and IT Governance
Six Sigma Quality and IT Governance
 
From Plan to Process: Governance and Lleadership Implications of RIS3
From Plan to Process: Governance and Lleadership Implications of RIS3From Plan to Process: Governance and Lleadership Implications of RIS3
From Plan to Process: Governance and Lleadership Implications of RIS3
 
A Simple Control Chart Example
A Simple Control Chart ExampleA Simple Control Chart Example
A Simple Control Chart Example
 
Control plan overview
Control plan overviewControl plan overview
Control plan overview
 
A working change management framework
A working change management frameworkA working change management framework
A working change management framework
 
Information and Records Management in SharePoint - An In-depth Review
Information and Records Management in SharePoint - An In-depth ReviewInformation and Records Management in SharePoint - An In-depth Review
Information and Records Management in SharePoint - An In-depth Review
 
Management of Change Process
Management of Change ProcessManagement of Change Process
Management of Change Process
 
Governance
GovernanceGovernance
Governance
 
Change management theories
Change management theoriesChange management theories
Change management theories
 
8 - Architetture Software - Architecture centric processes
8 - Architetture Software - Architecture centric processes8 - Architetture Software - Architecture centric processes
8 - Architetture Software - Architecture centric processes
 
Building Your Own Change Management Framework
Building Your Own Change Management FrameworkBuilding Your Own Change Management Framework
Building Your Own Change Management Framework
 
Unified process
Unified processUnified process
Unified process
 
Program governance Structure
Program governance StructureProgram governance Structure
Program governance Structure
 
Unified Process
Unified ProcessUnified Process
Unified Process
 

Similar to Process-Centric Governance and Information Architecture

15. Brian Bailey presentation 2 DQ Asia Pacific 2010
15. Brian Bailey presentation 2 DQ Asia Pacific 201015. Brian Bailey presentation 2 DQ Asia Pacific 2010
15. Brian Bailey presentation 2 DQ Asia Pacific 2010Brian Bailey
 
Management Information System
Management Information SystemManagement Information System
Management Information System
Maria Stella Solon
 
Project Fusion Engagement Kick-Off
Project Fusion Engagement Kick-OffProject Fusion Engagement Kick-Off
Project Fusion Engagement Kick-Off
Ralph Hatem
 
Project fusion engagement kick off
Project fusion engagement kick offProject fusion engagement kick off
Project fusion engagement kick offmaxalus
 
my km journey v9
my km journey v9my km journey v9
my km journey v9Lyn Murnane
 
Information Systems in Global Business Today.pptx
Information Systems in Global Business Today.pptxInformation Systems in Global Business Today.pptx
Information Systems in Global Business Today.pptx
Roshni814224
 
Knowledge Management Overview
Knowledge Management OverviewKnowledge Management Overview
Knowledge Management Overview
Rahul Sudame
 
Chap001
Chap001Chap001
It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013James Sutter
 
It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013Jim Sutter
 
Knowledge journeyv7
Knowledge journeyv7Knowledge journeyv7
Knowledge journeyv7
Lyn Murnane
 
Intelligent Compliance to Optimize Energy Sector Enterprise Content Managemen...
Intelligent Compliance to Optimize Energy Sector Enterprise Content Managemen...Intelligent Compliance to Optimize Energy Sector Enterprise Content Managemen...
Intelligent Compliance to Optimize Energy Sector Enterprise Content Managemen...
Concept Searching, Inc
 
OneIS CANHEIT V03 NN
OneIS CANHEIT V03 NNOneIS CANHEIT V03 NN
OneIS CANHEIT V03 NNMark Roman
 
How Application Discovery and Dependency Mapping can stop you from losing cus...
How Application Discovery and Dependency Mapping can stop you from losing cus...How Application Discovery and Dependency Mapping can stop you from losing cus...
How Application Discovery and Dependency Mapping can stop you from losing cus...
ManageEngine
 
module_1_chapter1.management information system
module_1_chapter1.management information systemmodule_1_chapter1.management information system
module_1_chapter1.management information system
israShoukat
 
Information Systems(UNIT 3)
Information Systems(UNIT 3)Information Systems(UNIT 3)
Information Systems(UNIT 3)
SURBHI SAROHA
 
ch1 accounting information system
ch1 accounting information systemch1 accounting information system
ch1 accounting information system
smallbusinessconfren
 
An overview - Enterprise
An overview - EnterpriseAn overview - Enterprise
An overview - Enterprise
Usman Tariq
 
Foundations of information systems in business
Foundations of information systems in businessFoundations of information systems in business
Foundations of information systems in business
Sagar Mainali
 
IT Financial Management Series - Part 1: Defining a Model to Effectively Run ...
IT Financial Management Series - Part 1: Defining a Model to Effectively Run ...IT Financial Management Series - Part 1: Defining a Model to Effectively Run ...
IT Financial Management Series - Part 1: Defining a Model to Effectively Run ...
UMT
 

Similar to Process-Centric Governance and Information Architecture (20)

15. Brian Bailey presentation 2 DQ Asia Pacific 2010
15. Brian Bailey presentation 2 DQ Asia Pacific 201015. Brian Bailey presentation 2 DQ Asia Pacific 2010
15. Brian Bailey presentation 2 DQ Asia Pacific 2010
 
Management Information System
Management Information SystemManagement Information System
Management Information System
 
Project Fusion Engagement Kick-Off
Project Fusion Engagement Kick-OffProject Fusion Engagement Kick-Off
Project Fusion Engagement Kick-Off
 
Project fusion engagement kick off
Project fusion engagement kick offProject fusion engagement kick off
Project fusion engagement kick off
 
my km journey v9
my km journey v9my km journey v9
my km journey v9
 
Information Systems in Global Business Today.pptx
Information Systems in Global Business Today.pptxInformation Systems in Global Business Today.pptx
Information Systems in Global Business Today.pptx
 
Knowledge Management Overview
Knowledge Management OverviewKnowledge Management Overview
Knowledge Management Overview
 
Chap001
Chap001Chap001
Chap001
 
It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013
 
It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013
 
Knowledge journeyv7
Knowledge journeyv7Knowledge journeyv7
Knowledge journeyv7
 
Intelligent Compliance to Optimize Energy Sector Enterprise Content Managemen...
Intelligent Compliance to Optimize Energy Sector Enterprise Content Managemen...Intelligent Compliance to Optimize Energy Sector Enterprise Content Managemen...
Intelligent Compliance to Optimize Energy Sector Enterprise Content Managemen...
 
OneIS CANHEIT V03 NN
OneIS CANHEIT V03 NNOneIS CANHEIT V03 NN
OneIS CANHEIT V03 NN
 
How Application Discovery and Dependency Mapping can stop you from losing cus...
How Application Discovery and Dependency Mapping can stop you from losing cus...How Application Discovery and Dependency Mapping can stop you from losing cus...
How Application Discovery and Dependency Mapping can stop you from losing cus...
 
module_1_chapter1.management information system
module_1_chapter1.management information systemmodule_1_chapter1.management information system
module_1_chapter1.management information system
 
Information Systems(UNIT 3)
Information Systems(UNIT 3)Information Systems(UNIT 3)
Information Systems(UNIT 3)
 
ch1 accounting information system
ch1 accounting information systemch1 accounting information system
ch1 accounting information system
 
An overview - Enterprise
An overview - EnterpriseAn overview - Enterprise
An overview - Enterprise
 
Foundations of information systems in business
Foundations of information systems in businessFoundations of information systems in business
Foundations of information systems in business
 
IT Financial Management Series - Part 1: Defining a Model to Effectively Run ...
IT Financial Management Series - Part 1: Defining a Model to Effectively Run ...IT Financial Management Series - Part 1: Defining a Model to Effectively Run ...
IT Financial Management Series - Part 1: Defining a Model to Effectively Run ...
 

Recently uploaded

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 

Recently uploaded (20)

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 

Process-Centric Governance and Information Architecture

  • 1. Copyright © 2014 Simon Rawson Principal Consultant, PowerMark Solutions simon@powermark.net.au 0430 986 682
  • 2. • Why • What • How • Who • Feedback • Characteristics of successful projects Agenda
  • 3. “Information governance, or IG, is the set of multi-disciplinary structures, policies, procedures, processes and controls implemented to manage information at an enterprise level, supporting an organization's immediate and future regulatory, legal, risk, environmental and operational requirements. IG encompasses more than traditional records management. It incorporates privacy attributes, electronic discovery requirements, storage optimization, and metadata management.” - Wikipedia • Governance, risk and compliance approach – a defensive model The Purpose of Governance
  • 4. To Put It Simply…
  • 5. • Yogesh Bhatt, Arunachalam Thirunavukkarasu, March 2010. “Information Management: A Key for Creating Business Value.” The Data Administration Newsletter. http://www.tdan.com/view-articles/12829 Information Management SWOT
  • 6. • Print • Transactional documents (invoices, purchase orders etc) • Learning Management Systems (LMS) content • Contracts and other legal information • Procurement information / documentation about products or services your organisation acquires • Product / service accreditations • Human Resource information management (eg. Certifications and training etc) • Board and senior management (reports, spreadsheet models etc) • Internet-based references and resources • Extranets / partners’ information management systems How Well Do Your IM Systems Cover
  • 8. Information and Process Architecture Model Policies & Governance Channels and Audience Infrastructure
  • 9.
  • 10. Classifying Content and Building Taxonomies and Information Architecture Review Business Classification Scheme Identify Key Business Processes, Participants and Capabilities Identify Process Inputs, Outputs and Support Content Identify Metadata Review Business Classification Scheme Update Information Architecture Step 1: Desk Review Step 2: Workshops and Participants Step 3 Step 4 Update BCS
  • 11. Quality System Content Relationships Taxonomies and metadata models tie content together facilitating search, navigation and content maintenance
  • 12. Sample Process Map – Context Maps
  • 13. Sample Process Flow Diagrams PROCESS: MAKE OFFER MEDICAL REQUIRED? MAKE OFFER SOURCE CANDIDATE PROCESS LETTER OF OFFER REQUEST FORM DOCTOR’S APPOINTMENT GM TO APPROVE PAC CEO/GM LETTER OF OFFER POLICE CHECK HEALTH DECLARATION EMPLOYEE EMPLOYEE DATA GENERATED YES
  • 14. Sample Worksheet Relating Processes to Transactional and Reference Content
  • 15. • Note – An Excel-based Benefits Register is available to those who want it Sample Issues/Recommendations List
  • 17. 1 • Initial 2 • Repeatable 3 • Managed 4 • Measured and Mapped 5 • Optimised Process and Information Maturity Model (Extended from CMMI Model)
  • 18. • Your Business Case must remain open to new potential benefits • Strategic benefits are hard to quantify. Operational benefits are easy to quantify taking a process-centric approach • Relate IM initiatives to your strategic plan • Capture the wins – provide a way for these to be identified, measured and recorded • Report wins regularly to senior management • Provide a way to capture feedback and suggestions for improvement • Establish a Benefits Register, and a process for review and action taking… • …with roles and responsibilities in the Governance Plan (naturally) Process Summation
  • 20. • SharePoint internet / intranet • Executive sponsorship • Corporate strategy exec led subcommittee owns intranet strategy • Intranet Working Group – Responsible for day to day matters – IT is one of many participants • Process and lifecycle oriented information architecture • Operating and active support framework (Working Group)… • …but departmental responsibility for outcomes • 3 day governance review focussing on business processes yielded 85 recommendations for substantial process improvement Key Principles – Project 1
  • 21. Large ECM/KM Project Structure – Project 2
  • 22. Current Content Archival and Migration (J: Drives) to Cloud and ECM 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 NumberofFiles Files Updated by Year Deletion candidates Offline archive ‘Online’ archive ECM migration
  • 23. ECM Primary Outcomes • Enterprise Content Management platform – Foundation configuration • Business content (documents, images, audio-visual) • Document approval workflow • Records management and taxonomy • Document management / retention for business applications – Extended capability (business intelligence, web content management, forms and business process workflow, online modelling) • Organisational change – More effective and efficient business processes – Training – Communications – Behavioural change • Support – Deployment & migration support during implementation – Governance and support model, processes and tools – Business and technical support
  • 24. Deploy to Business Unit Infrastructure in production Content migrated / archived Desktop configured Tech & bus support operational Training complete Bus Unit Migrates to ECM Business Unit Deployment BAU
  • 25. • Sponsor / owner • Producer / publisher • Communications – marketing • Organisational change and culture - HR • Authors / editors – departmental • Analyst – process / business requirements • Records and info management staff – IA, taxonomies BCS etc • Department representatives Roles
  • 26. • Every process can yield feedback • Feedback may be complaints, compliments, observations about issues, requests, or suggestions • Feedback needs to be directed to the right people for response • Managing feedback is a process in its own right • Suggestions for improvement can come from the mailboy all the way to the MD • Few organisations have good processes or a culture for turning feedback into action Managing Feedback
  • 27. • Design a process for effective management of feedback – Draw a process diagram – What metadata do you need to support the process? – Suggest performance metrics • Group discussion about organisational / cultural factors which need to be addressed Group Exercise: Process Design
  • 28. Suggested Feedback Process Model ACTION Suppliers Staff Customers Business Partners
  • 29.
  • 31. Benefits Register Description of the Benefit to be Achieved Person Responsi ble for Realising the Benefit Description of Current Situation/Perform ance for the Business Processes Current Cost/ Performance Measure of the Business Process Target Cost/Perfor mance Measure after the Planned Change Target Date for the Benefit to be Realised Triggers or events that will cause the Benefit to be Realised Type of Contribut ion to the Business Assess ed Value of the Benefit or Saving Comment about the Assessed Value Strategic and Corporate Objectives and Outcomes supported by the Benefit Contribution of this Benefit to Achieving the Strategic and Corporate Objectives and Outcomes Value of the Benefit Realised and Date Achieved Reduce the amount of paper used to distribute information to staff. Chief Informatio n Officer All information to staff is distributed in hard copy. 2,000 reams of paper per year are used to distribute information to staff at a total cost of $11,000. All information to staff is distributed on the Intranet and via e-mail. June 2002 Intranet and e-mail systems deployed. All staff are trained in and have access to the Intranet and e-mail systems. All information to staff is published on the Intranet and distributed via e-mail. Financial - Cost Reduction $11,000 pa Reduce administrativ e costs by 10% per year. Value of benefit contributes a 0.01% p.a. reduction in administrativ e costs. Satisfy an increasing demand for information without increasing costs Chief Informatio n Officer Requests for information taken by phone are sent by mail. Requests are also made in person over the counter. Demand is increasing by 10% per year. 100 items of information are requested per day (26,000 per year) and cost $5 per item to satisfy or $130,000 per year. 2,600 items of information accessed via the website in first year. June 2000 Website established and documents published. Availability of website is advertised via ‘phone- hold’ message, and branch signage. Financial - Cost avoidance Quatnity - Increased productivit y $13,000 pa Increased demand for information satisfied without increasing resources. Reduce administrativ e costs by 10% per year. Value of benefit avoids increases in administrativ e costs to satisfy increasing demand for information. 7,800 items of information accessed via the website in the first year with $39,000 value of costs avoided. Benefit achieved June 2000.
  • 32. The Common Characteristics of Highly Successful ECM / KM Projects • Survey of 90 initiatives in 80 organisations Production 30% Product Development 25% Customer Service 25% Competitive Intelligence/Strategic Planning 10% Enterprise-Wide 5% Sales Processes 5% Project Management 5% Intellectual Capital Management 5%
  • 33. Key Findings • 65% all projects aimed at revenue generation or process improvement • 35% aimed at efficiency and cost reduction • Of high performing projects, only 5% aimed at cost reduction
  • 34. Common Characteristics • Plan your approach (76% high impact projects had a detailed strategy. 87% low performing projects didn’t have a strategy) • Consistent information architecture and metadata model, plus key SME’s identified • Invest in content maintenance (84% high impact projects) • Plan for change (no low impact projects had ongoing change management measures)