This Powerpoint presentation discusses value management in IT investments (Val IT) and its application to a case study of the police force. It introduces Val IT and its objectives to increase investment success and reduce costs. It outlines the seven principles, major processes, and concept of value in Val IT. The presentation then details a case study of the police force applying Val IT through establishing governance, tracking metrics and benefits, and continually evaluating investments against strategic goals. Overall, Val IT helped the police better align IT projects to priorities, account for benefits realization, and improve operations with reduced staff.
IT Governance – The missing compass in a technology changing worldPECB
The webinar covers:
• Overview of IT Governance
• Benefits of IT Governance
• IT Governance implementation : Approach and Methodology
• Key critical success factors
Presenter:
This webinar was presented by Mr. Oladapo Ogundeji, from Digital Jewels and PECB partner.
Link of the recorded session published on YouTube: https://youtu.be/Ux_Yk4JLy0M
Digital Transformation Toolkit - Framework, Best Practices and TemplatesAurelien Domont, MBA
This Digital Transformation Toolkit was created by ex-McKinsey, Deloitte and BCG Management Consultants, after more than 3,000 hours of work. It is considered the world's best & most comprehensive Digital Transformation Toolkit. It includes all the Frameworks, Tools & Templates required to successfully undertake the Digital Transformation of your organization.This Slideshare Powerpoint presentation is only a small preview of our Toolkit. You can download the entire Toolkit in Powerpoint and Excel at www.slidebooks.com
Almost every business decision requires executives and managers to balance risk and reward, and efficiency in that process is essential to an enterprise’s success. Too often though, IT risk (business risk related to the use of IT) is overlooked.
While other business risks such as market, credit and operational risks have long been incorporated into the decision-making processes, IT risk has usually been relegated to technical specialists outside the boardroom, despite falling under the same risk category as other business risks: failure to achieve strategic objectives.
This session intends to address business risks related to the use of IT, looking at industry standards, frameworks and best practices, as well as focusing on real world examples and specific plans on how to implement IT Risk Management on every level of your company.
IT Governance – The missing compass in a technology changing worldPECB
The webinar covers:
• Overview of IT Governance
• Benefits of IT Governance
• IT Governance implementation : Approach and Methodology
• Key critical success factors
Presenter:
This webinar was presented by Mr. Oladapo Ogundeji, from Digital Jewels and PECB partner.
Link of the recorded session published on YouTube: https://youtu.be/Ux_Yk4JLy0M
Digital Transformation Toolkit - Framework, Best Practices and TemplatesAurelien Domont, MBA
This Digital Transformation Toolkit was created by ex-McKinsey, Deloitte and BCG Management Consultants, after more than 3,000 hours of work. It is considered the world's best & most comprehensive Digital Transformation Toolkit. It includes all the Frameworks, Tools & Templates required to successfully undertake the Digital Transformation of your organization.This Slideshare Powerpoint presentation is only a small preview of our Toolkit. You can download the entire Toolkit in Powerpoint and Excel at www.slidebooks.com
Almost every business decision requires executives and managers to balance risk and reward, and efficiency in that process is essential to an enterprise’s success. Too often though, IT risk (business risk related to the use of IT) is overlooked.
While other business risks such as market, credit and operational risks have long been incorporated into the decision-making processes, IT risk has usually been relegated to technical specialists outside the boardroom, despite falling under the same risk category as other business risks: failure to achieve strategic objectives.
This session intends to address business risks related to the use of IT, looking at industry standards, frameworks and best practices, as well as focusing on real world examples and specific plans on how to implement IT Risk Management on every level of your company.
An overview of The Open Group IT4IT Reference Architecture. It is a vendor and product-agnostic value chain-based operating model for managing the business of IT. While providing guidance on the design, procurement and implementation of the functionality needed to run IT, it also enables the systematic tracking of the state of IT services across the service life-cycle using four value streams - Strategy to Portfolio, Request to Fulfill, Requirement to Deploy, and Detect to Correct.
Download presentation from http://opengroup.co.za/presentations
Understanding IT Governance and Risk Managementjiricejka
Describes IT Governance Holistic Framework for establishing transparent relation between Business and IT environment.
Describes Governance services and Risk Management Methods
Your Challenge
Organizations have to adapt to a growing number of trends, putting increased pressure on IT to move at the same speed as the business.
The business, seeing that IT is slower to react, looks to external solutions to address its challenges and capitalize on opportunities.
IT and business leaders don’t have a clear and unified understanding or definition of an operating model.
Our Advice
Critical Insight
The IT operating model is not a static entity and should evolve according to changing business needs.
However, business needs are diverse, and the IT organization must recognize that the business includes groups that consume technology in different patterns. The IT operating model needs to support and enable multiple groups, while continuously adapting to changing business conditions.
Impact and Result
Determine how each technology consumer group interacts with IT. Use consumer experience maps to determine what kind of services consumer groups use and if there are opportunities to improve the delivery of those services.
Identify how changing business conditions will affect the consumption of technology services. Classify your consumers based on business uncertainty and reliance on IT to plan for the future delivery of services.
Optimize the IT operating model. Create a target IT operating model based on the gathered information about technology service consumers. Select different implementations of common operating model elements: governance, sourcing, process, and structure.
Modern IT Service Management Transformation - ITIL IndonesiaEryk Budi Pratama
Presented at Online ITIL Indonesia Webinar #5.
Content:
> Setting up the context
> Understanding holistic IT Management point of view
> IT Service Management Transformation
> Key Performance Indicator (KPI)
> IT Service Catalogue
> IT Sourcing
> Agile Incident Management
History of IT Service Management Practices and StandardsRob Akershoek
Evolution of IT service management practices and standards from Top Gun 1 (around 1990) to Top Gun Maverick (2022)
How did the IT management evolve since 1990? When were key standards and practices introduced?
The IT management market has significantly evolved over the last few years e.g. introducing DevOps, Continuous Delivery, Agile Development, SRE and IT4IT. Managing this new multi-vendor ecosystem consisting of cloud, containers and micro-services.
Managing this new digital reality requires you to combine various practices into one integrated Digital Operating Model, to optimize end-to-end IT value streams.
This Slideshare presentation is a partial preview of the full business document. To view and download the full document, please go here:
http://flevy.com/browse/business-document/it-strategy-209
This is a comprehensive document on Information Technology (IT) / Management Information Systems (MIS) Strategy.
This document includes IT strategy frameworks, critical success factors, detailed project approach and organizational structure, sample deliverables, and more.
SDM: The Fundamentals of Software Delivery ManagementDevOps.com
Research and experience have proven that breaking down the barriers between Dev and Ops can yield tremendous efficiency, quality and velocity enhancements for software delivery teams.
But, in the spirit of continuous improvement… what’s next? What happens when you break down the barriers between DevOps and other parts of the business?
Join Jay Lyman (Principal Analyst, Cloud Native and DevOps, 451 Research) and Brian Dawson (DevOps Evangelist, CloudBees) as they review research on the current state of Software Delivery Management (SDM), and outline the key practices organizations should adopt to keep ALL teams on the same page about the software delivery function.
We’ll discuss:
How DevOps and SDM are critical for driving digital transformation.
The key stakeholders you need to focus on, beyond development and IT operations.
The role of security and governance, and how organizations can effectively measure and prove their DevOps success.
Global trends in IT
- Process management
- Frameworks with maturity and continual improvements
- Frameworks used in IT for governance, operation and solution
An overview of The Open Group IT4IT Reference Architecture. It is a vendor and product-agnostic value chain-based operating model for managing the business of IT. While providing guidance on the design, procurement and implementation of the functionality needed to run IT, it also enables the systematic tracking of the state of IT services across the service life-cycle using four value streams - Strategy to Portfolio, Request to Fulfill, Requirement to Deploy, and Detect to Correct.
Download presentation from http://opengroup.co.za/presentations
Understanding IT Governance and Risk Managementjiricejka
Describes IT Governance Holistic Framework for establishing transparent relation between Business and IT environment.
Describes Governance services and Risk Management Methods
Your Challenge
Organizations have to adapt to a growing number of trends, putting increased pressure on IT to move at the same speed as the business.
The business, seeing that IT is slower to react, looks to external solutions to address its challenges and capitalize on opportunities.
IT and business leaders don’t have a clear and unified understanding or definition of an operating model.
Our Advice
Critical Insight
The IT operating model is not a static entity and should evolve according to changing business needs.
However, business needs are diverse, and the IT organization must recognize that the business includes groups that consume technology in different patterns. The IT operating model needs to support and enable multiple groups, while continuously adapting to changing business conditions.
Impact and Result
Determine how each technology consumer group interacts with IT. Use consumer experience maps to determine what kind of services consumer groups use and if there are opportunities to improve the delivery of those services.
Identify how changing business conditions will affect the consumption of technology services. Classify your consumers based on business uncertainty and reliance on IT to plan for the future delivery of services.
Optimize the IT operating model. Create a target IT operating model based on the gathered information about technology service consumers. Select different implementations of common operating model elements: governance, sourcing, process, and structure.
Modern IT Service Management Transformation - ITIL IndonesiaEryk Budi Pratama
Presented at Online ITIL Indonesia Webinar #5.
Content:
> Setting up the context
> Understanding holistic IT Management point of view
> IT Service Management Transformation
> Key Performance Indicator (KPI)
> IT Service Catalogue
> IT Sourcing
> Agile Incident Management
History of IT Service Management Practices and StandardsRob Akershoek
Evolution of IT service management practices and standards from Top Gun 1 (around 1990) to Top Gun Maverick (2022)
How did the IT management evolve since 1990? When were key standards and practices introduced?
The IT management market has significantly evolved over the last few years e.g. introducing DevOps, Continuous Delivery, Agile Development, SRE and IT4IT. Managing this new multi-vendor ecosystem consisting of cloud, containers and micro-services.
Managing this new digital reality requires you to combine various practices into one integrated Digital Operating Model, to optimize end-to-end IT value streams.
This Slideshare presentation is a partial preview of the full business document. To view and download the full document, please go here:
http://flevy.com/browse/business-document/it-strategy-209
This is a comprehensive document on Information Technology (IT) / Management Information Systems (MIS) Strategy.
This document includes IT strategy frameworks, critical success factors, detailed project approach and organizational structure, sample deliverables, and more.
SDM: The Fundamentals of Software Delivery ManagementDevOps.com
Research and experience have proven that breaking down the barriers between Dev and Ops can yield tremendous efficiency, quality and velocity enhancements for software delivery teams.
But, in the spirit of continuous improvement… what’s next? What happens when you break down the barriers between DevOps and other parts of the business?
Join Jay Lyman (Principal Analyst, Cloud Native and DevOps, 451 Research) and Brian Dawson (DevOps Evangelist, CloudBees) as they review research on the current state of Software Delivery Management (SDM), and outline the key practices organizations should adopt to keep ALL teams on the same page about the software delivery function.
We’ll discuss:
How DevOps and SDM are critical for driving digital transformation.
The key stakeholders you need to focus on, beyond development and IT operations.
The role of security and governance, and how organizations can effectively measure and prove their DevOps success.
Global trends in IT
- Process management
- Frameworks with maturity and continual improvements
- Frameworks used in IT for governance, operation and solution
In the age of Digital everything, organizations are looking to increase their "speed" and "velocity" which often leads to the integration of more partners rather than less. This presentation delivers an introduction to using the ISACA Publication "Vendor Management: Using COBIT 5" to assist organizations in delivering an effective Vendor solution.
Vendor Management - Compliance Checklist Manifesto SeriesContinuity Control
Regulatory examiners are expecting to see and review your financial institution's vendor management program, which is to include a process for assessing specific vendor risk, vendor selection, contracting, and ongoing oversight. This webinar will demonstrate that implementing a repeatable process will provide consistency and reduce your institution's Compliance Tax by saving you time and resources, including helping to ensure your valuable dollars are spent wisely.
Objectives:
- Understanding of the regulatory requirements for the vendor management program
- High level overview of the key elements
- Provide guidance in developing your program
High-performing organizations achieve results by utilizing portfolio management to select the right projects at the right time with the right resources based on a data-driven selection methodology. Portfolio management adds value to an organization’s bottom line by optimizing the organization’s capacity and capabilities to meet the demands of an ever changing market and technology trends. It does this by providing insight and global visibility of the organizations approved set of strategic criteria against a backdrop of organizational constraints. This presentation provides a few of the value creation processes that implementing a best in class portfolio management solution can provide to your organization.
To learn more: http://developingaculturethatworks.com/
This presentation is intended for security leaders who want to create a business-based security department that provides value, and is valued by the enterprise.
The following recommendations are based on 10+ years of SEC relevancy-based research.
Maximizing Business Value Through Effective IT GovernanceCognizant
Holistic IT governance, aligned with corporate governance and designed to ensure successful IT implementation, yields strategic alignment, value delivery, risk management, resource management and performance management through the governance of architecture, projects and portfolios, application lifecycles, infrastructure and data, vendors and sourcing, service lifecycles and new age technology.
Management model for exploratory investment in IT WGroup
The ability to evaluate these new technologies in a practical environment where their technological value and impact on business and IT operations can be assessed is extremely important. Exploratory efforts should be structured and controlled similarly to other major projects and in addition should be evaluated for use in the production environment. In addition to evaluating the technical capabilities and practical application of the new technology, IT must evaluate the “fit” of the new technology in the existing service portfolio or catalog. In this article, WGroup has developed a new class of IT investment, referred to as “Exploratory,” along with a supporting management model to guide the effort through the evaluation phases and ensure a tight fit within the service catalog.
Presentation delivered by Luis E. Taveras, PhD, Former Senior Vice President, Office of Integration, RWJ Barnabas Health at the marcus evans National Healthcare CIO Summit held in Pasadena CA, March 13-14 2017
The Seven Habits of Highly Effective Portfolio Management ImplementationsUMT
Originally published in 2003, this white paper on portfolio management has stood the test of time and is still relevant in all 7 best practice areas. Although the 7 best practices remain the same, the field of portfolio management has evolved substantially. To follow are some key questions that have been answered in the last few years:
Where should I start: Process or Tools?
For IT portfolios, what is more important: APM or PPM?
Which is the right level to start: Project or Portfolio?
Has portfolio management become more widely accepted as a practice in the last three years?
Are there financial benefits to implementing portfolio management?
This How Does Computer Science Work? mindmap was created based on the “Lecture Notes in The Philosophy of Computer Science” by Matti Tedre of Department of Computer Science and Statistics, University of Joensuu, Finland, as a group project in my final year of the degree.
A Questionnaire for Identify Failures in Business Analysis Phase of ERP ProjectsVaruna Harshana
Identifying business needs and designing solutions is done through the processes of “Business Analysis”. Many solutions are developed to provide the needs of businesses which include the implementation of ERP systems. ERP systems mostly cuts across many business processes hence create many complexities while designing them. The probability rate for these complexities to turn into failures is high. The Business analyst is mostly responsible in handling these issues and reduces them as well. Business analysis includes many phases which can be shown as follows;
Enterprise/Company analysis
Requirements planning and management
Requirements elicitation
Requirements analysis and documentation
Requirements communication
Solution assessment and validation
The above mentioned phases need to be executed in order to do a proper business analysis. Many aspects need to be considered and standards need to be followed in doing this analysis, so as mentioned earlier there is a high probability for these phases not to function in the expected manner. So the identification of the potential process failures needs to be done.
This can be done by preparing a questionnaire which will monitor important elements of each of the above mentioned phases of business analysis. These questions will be addressing many aspects such as standards used, tools used, parties responsible, causes of actions, etc. In this manner this questionnaire could simply identify the failures that could occur while carrying out the Business analysis stage.
The questionnaire that we prepared will clearly indicate how effectively anyone could point out potential failures of “Business analysis” stage.
Statistical methods and analyses are used to communicate research findings and give credibility to research methodology and conclusions. It is important for researchers and also consumers of research to understand statistics so that they can be informed, evaluate the credibility and usefulness of information, and make appropriate decisions.
This presentation is an introduction to Free and Open Source Software Licensing and Business Models. An open-source license is a type of license for computer software and other products that allows the source code, blueprint or design to be used, modified and/or shared under defined terms and conditions. This allows end users to review and modify the source code, blueprint or design for their own customization, curiosity or troubleshooting needs.
This report presents analysis of few companies in Sri Lanka that use marketing 1.0, marketing 2.0 and marketing 3.0 concepts. Furthermore in this report, the causes of the marketing evolution are also discussed. This analysis has been categorized under different marketing concepts for easy comprehension of how companies are following these versions separately and come up with the suggestions for what it could it be the next marketing concept.
This is a complete project plan which is prepared using a given business case. It included determining project scope, schedule, cost, budgeting, communication, risk management & human resource management and etc.
Software Test automation tools are available under several categories such as commercial, free software, open source software and etc. In this paper Open Source Software Testing Tools will be discussed.
Open source software test automation tools may be practical alternatives to popular closed-source commercial applications and some open source tools offers features or performance benefits that exceed their commercial counterparts. The source code is openly published for use and/or modification from its original design, free of charge. And these are usually available under a license defined by the Open Source Initiative.
The interaction between the paper documents and the electronic devices in more integrated and efficient way. Using this computers try to deal with paper documents as they deal with other forms of computer media. So the paper would be as readable by the computer as magnetic and optical disks.
Overview of Computer Games
Personal computer games (PC games) are the games played on a personal computer using interface devices such as keyboard and mouse, a joystick or gamepad. Additionally sound may be provided through speakers or headphones.
The term computer game should not be messed with video games, console games, and arcade games. Video games and console games are usually connected to a TV, while arcade games are available in public spaces. At the outset, games were played at an arcade have evolved to be PC games played at home. This has made it possible to develop games of longer duration, and has done away with the requirement of inserting coins.
Matthew Professional CV experienced Government LiaisonMattGardner52
As an experienced Government Liaison, I have demonstrated expertise in Corporate Governance. My skill set includes senior-level management in Contract Management, Legal Support, and Diplomatic Relations. I have also gained proficiency as a Corporate Liaison, utilizing my strong background in accounting, finance, and legal, with a Bachelor's degree (B.A.) from California State University. My Administrative Skills further strengthen my ability to contribute to the growth and success of any organization.
ALL EYES ON RAFAH BUT WHY Explain more.pdf46adnanshahzad
All eyes on Rafah: But why?. The Rafah border crossing, a crucial point between Egypt and the Gaza Strip, often finds itself at the center of global attention. As we explore the significance of Rafah, we’ll uncover why all eyes are on Rafah and the complexities surrounding this pivotal region.
INTRODUCTION
What makes Rafah so significant that it captures global attention? The phrase ‘All eyes are on Rafah’ resonates not just with those in the region but with people worldwide who recognize its strategic, humanitarian, and political importance. In this guide, we will delve into the factors that make Rafah a focal point for international interest, examining its historical context, humanitarian challenges, and political dimensions.
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
2. Powerpoint Templates
Page 2
Roadmap
• What is Val IT
• Background
• Objectives
• Need of Val IT
• Concept of Value
• Seven Principles
• Major Processes
• The Police Case Study
3. Powerpoint Templates
Page 3
• Waruna Kodituwakku
• Shanika Udeshini
• Dasitha Wijesundara
• Aloka Weerasooriya
• Harshani Wickramarachchi
Group Members
University of Colombo School of Computing
4. Powerpoint Templates
Page 4
What is Val IT?
• A conservation framework which helps
enterprises in investments
• Covers;
• Value governance
• Portfolio management
• Investment management
• Consists with;
• Principles
• Processes
• Best practices
5. Powerpoint Templates
Page 5
Background of Val IT
IT Governance – direct, measure and evaluate
the use of IT resources
Leadership, commitment and support from top
level are necessary for effective governance
Val IT supports the leadership by providing;
Effective processes
Clear understanding of executive, business
and IT roles and responsibilities
Relative information and organizational
structures
6. Powerpoint Templates
Page 6
• COBIT – IT governance framework and supporting
toolset
• Values of COBIT;
– Allows managers to bridge the gap between
control requirements, technical issues and
business risks
– Enables clear policy development and good
practices
– Helps organizations to increase the value attained
from IT
– Ensures effectiveness of IT in technology
investments
Background of Val IT cont.…
7. Powerpoint Templates
Page 7
Objectives of Val IT
Increase the probability of picking winners
Increase the likelihood of IT investment success
Reduce surprises from IT cost and delivery date
overruns
Reduce costs due to inefficient investments
8. Powerpoint Templates
Page 8
The Need of Val IT
• IT investments are not supporting the business
strategy or providing expected value.
• There are too many projects, resulting in efficient
use of recourses.
• Projects often delayed, run over budget, and/or
don not provide the needed benefits.
• It needs to ensure compliance to industry or
governmental regulations.
9. Powerpoint Templates
Page 9
Concept of Value
Total life-cycle benefits net of related costs,
adjusted for risk and for the time value of
money
The nature of value differs for different types of
enterprises
Relies on the relationship between meeting the
expectations of many different stakeholders and
the resources used
10. Powerpoint Templates
Page 10
Concept of Value Contd.
• The aim of value management is to:
– Reconcile the different views (what represent
value)hold by stakeholders.
– Enabling an enterprise to:
• Clearly define and communicate its view of what
constitutes value, and to whom
• Select and execute investments
• Manage its assets and optimize value with an
affordable use of resources and an acceptable level
of risk
11. Powerpoint Templates
Page 11
IT-enabled investments will ,
1. Be managed as a portfolio of
investments.
2. Include the full scope of activities that
are required to achieve business value.
3. Be managed through their full economic
life cycle.
Seven Principles of Val IT
12. Powerpoint Templates
Page 12
Seven Principles of Val IT Contd.
Value delivery practices will:
4. Recognize different categories of investments to be
evaluated and managed differently
5. Define and monitor key metrics and respond quickly
to any changes or deviations
6. Engage all stakeholders and assign appropriate
accountability for delivery of capabilities and
realization of business benefits
7. Be continually monitored, evaluated and improved
14. Powerpoint Templates
Page 14
Value Governance (VG)
The goal of value governance is to optimize the value
of an organization’s IT-enabled investments by:
1. Establish informed and committed leadership.
2. Define and implement processes.
3. Define portfolio characteristics.
4. Align and integrate value management with
enterprise financial planning.
5. Establish effective governance monitoring.
6. Continuously improve value management
practices.
15. Powerpoint Templates
Page 15
Portfolio Management (PM)
The goal of portfolio management is to ensure that an
organization’s overall portfolio of IT-enabled
investments is aligned with and contributing optimal
value to the organization’s strategic objectives by:
1. Establish strategic direction and target
investment mix.
2. Determine the availability and sources of funds.
3. Manage the availability of human resources.
4. Evaluate and select programmes to fund.
5. Monitor and report on investment portfolio
performance.
6. Optimise portfolio performance.
16. Powerpoint Templates
Page 16
Investment Management (IM)
The goal of investment management is to ensure that
an organisation’s individual IT-enabled investment
programmes deliver optimal value at an affordable cost
with a known and acceptable level of risk
Three key components of investment management:
• Business case development
Supporting selection of the right investment programmes
• Programme management
Managing execution of the programmes
• Benefits realization
Actively managing the realisation of benefits from the
programmes
18. Powerpoint Templates
Page 18
Value delivery practices will
4. Recognize that there are different categories of
investments that will be evaluated and managed
differently.
5. Define and monitor key metrics and will respond
quickly to any changes or deviations.
6. Engage all stakeholders and assign appropriate
accountability for the delivery of capabilities and the
realization of business benefits.
7. Be continually monitored, evaluated and improved.
Seven Principles of Val IT Contd.
19. Powerpoint Templates
Page 19
Benefits of Val IT
Increase ROI(Return On Investments) in
projects
Generate business value
Manage IT enabled business investments
Support business growth by increasing value of
technology investments
Reduce cost resulting from inefficient
investments
Better decision making, such as where to invest
in business change
20. Powerpoint Templates
Page 20
Police Case Study
By
IT Governance Institute
Source: http://www.isaca.org/Knowledge-Center/Val-IT-IT-Value-Delivery-/Documents/Value-
Governance-Police-Case-Study.pdf
21. Powerpoint Templates
Page 21
What is value to the Police?
• As government agency, business value is NOT
about financial return on investment (ROI)
• It is about:
– Contribution to strategic outcomes (e.g.,
reduced opportunity to commit crime,
improved resolution of crime, safer driver
behavior, improved community safety)
– Streamlining business processes (i.e., taking
police officers away from administrative tasks
and getting them back to the front line)
– Systems not failing in critical situations (e.g.,
aging infrastructure replaced, unsupportable
applications replaced)
23. Powerpoint Templates
Page 23
Police Strategic Plan cont.
Sequence contributions would not happen by itself.
Required other complementary initiatives to effect
improvements.
i.e.: implementation of the crime management system
made a major contribution to “Better Intelligence”,
however, turning this contribution to “Improved
Investigative Quality” required further initiatives such as
training the investigators in best practice use of the
intelligence.
Each implemented project also contained the
necessary complementary initiatives required to
achieve the benefits of the investment. This included
making changes in management initiatives required
for users, supervisors and managers to adopt system.
26. Powerpoint Templates
Page 26
The cycle is split into three parts:
Pre-project—Where ideas are received, assessed and qualified. If
the idea is approved, it goes into the program schedule, assuming
there is an availability of resources and funds.
Project—Where a project team will design, build and implement
the system. This may include necessary changes within
management and the initiatives that are required to achieve the
business outcomes
Post-project—Where the benefits are realized, and a comparison
of the benefits achieved against the business case is performed
The life cycle is characterized by five ‘stage gates’, at which the
investment is scrutinized and rescrutinized by the value
governance body. At the final gate all information is presented to
the governance body for feedback, forwarding to the government,
and lessons learnt for future projects.
27. Powerpoint Templates
Page 27
Business Case Approval
• In between Gate 1 and Gate 2 there is a very
important
– Business Case Assessment: This assessment involves scoring
the project from 0-5 according to its benefits, cost and risk.
• Benefits are viewed as a positive contribution of the
project to Police strategic outcomes
• Risks are viewed as
– risk of technology (new technology? Dependable?)
– Risk on not delivering the project
– Risk of not delivering the benefits
28. Powerpoint Templates
Page 28
Benefits Realized Tracked
• Key to realizing benefits is active management of the post
implementation phase. This involved the Police setting up a
number of business system owners ( groups of senior officers)
who took full responsibility for achieving the benefits. The
members track progress using the graph above.
29. Powerpoint Templates
Page 29
Results
• Still early to fully realize benefits of the projects.
• Early projects simply laid down infrastructure
• Positive results have been noted:
– Appreciable time and effort savings- equal to 89 staff
– Better targeted patrolling, leading to more crimes prevented
– Better quality court briefs, leading to more successful prosecutions
– More property returned to its rightful owner
– More timely information for officers-in-charge
– More crimes solved and perpetrators dealt with (crime rates dropped)
30. Powerpoint Templates
Page 30
Conclusion
• A new Police culture has been created that respects the
business value of the new system
• Project selection is objective and aligned to agency
strategy
• Relevant affected area of business is accountable for
the delivery of benefits
• Real value to the Police of the new IT system is about
doing things better with fewer staff.