Acquiring IT Applications and Infrastructure

Similar documents
Management Information Systems. B14. Acquiring IT Applications and Infrastructure

Management Information Systems. B13. Information Technology Economics

E-Business and E- Commerce

10-1 McGraw-Hill/Irwin. Copyright 2007 by The McGraw-Hill Companies, Inc. All rights reserved.

Building Information Systems

Chapter. Redesigning The Organization With Information Systems

Chapter 3. Information Systems Development. McGraw-Hill/Irwin. Copyright 2007 by The McGraw-Hill Companies, Inc. All rights reserved.

Introduction to Information Technology

Redesigning the Organization with Information Systems

Turban and Volonino. Information Technologies: Concepts, Types and IT Support

Chapter 13. Building Information Systems

Chapter 14: Systems Development

Managing Systems Development. Definitions. Opening case. Off the Shelf software. Custom software. In house system development.

System Development Life Cycle Fall Introduction to Information and Communication Technologies CSD 102

Information Technologies: Concepts and Management. MIT 21043, Technology Management and Applications

Building Information Systems

Chapter 10. Top-Down Model and NDLC. Network Development Life Cycle. The Network Development Life Cycle

Systems Analysis and Design 8 th Edition. Chapter 1 Introduction to Systems Analysis and Design

Introduction. Figure 1-1

CHAPTER 4 PRODUCT DEVELOPMENT LIFE CYCLE

Enterprise Resource Planning Dr. Ebadati

AQU Information Systems Fundamentals Spring Pg. 10.1

INFORMATION SYSTEMS ANALYSIS AND DESIGN

Introduction. Gauravkumarsingh Gaharwar

Introduction to Systems Analysis and Design

6/29/ Professor Lili Saghafi

2009 McGraw Hill Ryerson Limited. Kwantlen and Richardson Chpt 6 slide number 1

Management Decision Support and Intelligent Systems

1) Introduction to Information Systems

Software Development Life Cycle:

Darshan Institute of Engineering & Technology for Diploma Studies Rajkot Unit-1

The Systems Development Lifecycle

IT Information Systems & Technology. BIT 1 ST YEAR SEMESTER 1 University of Colombo School of Com puting. Student Manual

Module 2: Decision Support and Expert Systems

Data Warehousing provides easy access

Chapter 1 The Systems Development Environment

Harry J. Rosenblatt. (2014). Systems Analysis and Design, 10 th Edition, International Edition. Course Technology, Cengage Learning.

Managing Information Technology 6 th Edition

Chapter 2 Analyzing the Business Case

Managing Data to Improve Business Performance. Information Technology for Management Improving Performance in the Digital Economy.

Program Lifecycle Methodology Version 1.7

Chapter 7: Merchandise Inventory

2 Why is systems development difficult and risky? 3 How do businesses use the systems development life cycle (SDLC) process?

Information Technology Project Management

7. Model based software architecture

Project Management Context Outline

Chapter 8. Systems Development. Ralph M. Stair George W. Reynolds

Why Working with Reference Models Increases Process Innovation

IS 300 Lectures 14/15

Inventories. 2. Explain the accounting for inventories and apply the inventory cost flow methods.

DETERMINING SYSTEM REQUIREMENTS. Systems Analysis and Design

MINGGU Ke 1 Analisa dan Perancangan Sistem Informasi

C H A P T E R 8 VALUATION OF INVENTORIES: A COST-BASIS APPROACH

PREVIEW OF CHAPTER. Intermediate Accounting IFRS 2nd Edition Kieso, Weygandt, and Warfield 8-2

Systems Requirements. Requirements Determination. Learning Objectives. Major part of Systems Analysis

HYBRID APPROACH. Software Development Approaches. Agile. Rapid. Waterfall

12/08/2012 INFO2110. Chapter 3: Project Management. Copyright Warning. Learning Objectives. Introduction. Project Identification

Systems Analysis and Design in a Changing World, Fourth Edition

QAIassist IT Methodology General Context

Project Integration Management

Information Technology Services Project Management Office Operations Guide

STUDENT LEARNING OUTCOMES

INTRANET ADOPTION AND IMPLEMENTATION: A DEVELOPMENT FRAMEWORK

EVALUATION OF ARIS AND ZACHMAN FRAMEWORKS AS ENTERPRISE ARCHITECTURES

CHAPTER 1. Business Process Management & Information Technology

7-1. Prepared by Coby Harmon University of California, Santa Barbara Westmont College

STEP F DESIGN OF A RECORDKEEPING SYSTEM

Projecting, Monitoring and Measuring Business Value

Managing Information Systems Seventh Canadian Edition. Laudon, Laudon and Brabston. CHAPTER 14 Project Management, Business Value, and Managing Change

RAPID ECONOMIC JUSTIFICATION. Building a Business Case

Sample Chapter. Producing Meaningful Metrics

STUDY GUIDE CHAPTER 10

CHAPTER 2 Analyzing the Business Case (Phase 1: System Planning)

Chapter 1. The Context of Systems Analysis and Design Methods. McGraw-Hill/Irwin

Chapter 2: The Project Management and Information Technology Context

7. Project Management

Chapter 13: The Expenditure Cycle

The maturity of the organization. Application domain knowledge. Technical knowledge. Economics

Principles of Information Security, Fourth Edition. Chapter 10 Implementing Information Security

COMM 391. Learning Objective 1. Learning Objectives. Introduction to Management Information Systems

QUALITY ASSURANCE PLAN OKLAHOMA DEPARTMENT OF HUMAN SERVICES ENTERPRISE SYSTEM (MOSAIC PROJECT)

COM W. Arevolo, J. Sinur, C. Mann

INFS 328 Systems Analysis and Design

Office of Human Resources. IT Systems Analyst Associate - LI2213

Modernization of Federal Government Enterprise Assets

ETASS II SKILL LEVEL AND LABOR CATEGORY DESCRIPTIONS. Skill Levels

Lecture 1. In practice, most large systems are developed using a. A software process model is an abstract representation

An Overview of the AWS Cloud Adoption Framework

SYSTEM MODERNIZATION BEST PRACTICES

Los Rios Community College District Adopted: November 2013 Revised: June 2014

Meltem Özturan

Chapter 11: The General Ledger and Financial Reporting Cycle

BIS4430 Web-based Information Systems Management. UNIT 05 Information Systems Strategy Planning [Version 1.0, GA, July 2008]

Chap 1 : Business Process Management & IT

BUILDING INFORMATION SYSTEMS

Office of Human Resources. IT Systems Analyst Senior - LI2373

Chapter 8. Planning and Testing Operating Effectiveness of Internal Control over Financial Reporting. Prepared by Richard J.

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright Chapter 7 1

Security Risks Analysis

Office of Human Resources. IT Systems Analyst Senior

Transcription:

Chapter 15 Acquiring IT Applications and Infrastructure Information Technology For Management 6th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John Wiley & Sons, Inc. Chapter 15 1

Strategies for Acquiring IT Applications Buy the applications (off-the-shelf approach) Lease the applications Developing the applications in-house (Insourcing) Chapter 15 2

The Five Major Steps of Acquisition Chapter 15 3

Constraints in Planning and Acquisition Chapter 15 4

Acquiring IT Applications Option 1 - Buy Chapter 15 5

Acquiring IT Applications Option 2- Lease TYPES OF LEASING VENDORS Leasing can be done in one of two ways. The first way is to lease the application from an outsourcer and install it on the company s premises. The vendor can help with the installation and frequently will offer to also contract for the operation and maintenance of the system. Many conventional applications are leased this way. The second way, using an application system provider (ASP), is becoming more popular. Chapter 15 6

Acquiring IT Applications More Options.. Chapter 15 7

Acquiring IT Applications More Options IN-HOUSE DEVELOPMENT APPROACHES. There are two major approaches to in-house development: building from scratch or building from components. Build from scratch. This option should be considered only for specialized applications for which components are not available. It is an expensive and slow process, but it will provide the best fit. Build from components. Companies with experienced IT staff can use standard components (e.g., a secure Web server), some software languages (e.g., Java, Visual Basic, or Perl), and third-party subroutines to create and maintain applications on their own. (Or, companies can outsource the entire development process to an integrator that assembles the components.) From a software standpoint, using components offers the greatest flexibility and can be the least expensive option in the long run. However, it can also result in a number of false starts and wasted experimentations. For this reason, even those companies with experienced staff are frequently better off modifying and customizing one of the packaged solutions as part of the buy option. Chapter 15 8

Traditional Systems Development Life Cycle Software development life cycle is the traditional systems development method that organizations use for large-scale IT projects. SDLC processes are systems investigation, systems analysis, systems design, programming, testing, implementation, operation and maintenance. Waterfall approach is when tasks in one phase are completed before the work proceeds to the next stage. Chapter 15 9

Applications and INFRASTRUCTURE Chapter 15 10

Selection of Vendors Chapter 15 11

Partner Connections Chapter 15 12

System Development Teams Users are employees from all functional areas and levels of the organization who interact with the system, either directly or indirectly. System analysts are IS professionals who specializing in analyzing and designing ISs. Programmers are IS professionals who modify existing computer programs or write new computer programs to satisfy user requirements. Chapter 15 13

System Development Teams (Continued) Technical specialists are experts on a certain type of technology, such as databases or telecommunications. System stakeholders are all people affected by changes in the information systems. Chapter 15 14

SDLC Major advantages Control Accountability Error detection Major drawbacks Relatively inflexible Time-consuming and expensive Discourages changes once user requirements are done Chapter 15 15

SDLC Systems Investigation Begins with the business problem (or opportunity) followed by the feasibility analysis. Feasibility study Technical Economic Behavioral Organizational Go/No-Go Decision Chapter 15 16

SDLC Systems Analysis Is the examination of the business problem that the organization plans to solve with an information system. Main purpose is to gather information about existing system to determine requirements for the new or improved system. Deliverable is a set of system requirements. Chapter 15 17

SDLC Systems Design Describes how the system will accomplish this task. Deliverable is the technical design that specifies: System outputs, inputs, user interfaces; Hardware, software, databases, telecommunications, personnel & procedures; Blueprint of how these components are integrated. Chapter 15 18

SDLC Systems Design (Continued) Logical system design states what the system will do, using abstract specifications. Physical system design states how the system will perform its functions, with actual physical specifications. Scope creep is caused by adding functions after the project has been initiated. Chapter 15 19

SDLC Programming & Testing Programming involves the translation of a system s design specification into computer code. Testing check to see if the computer code will produce the expected and desired results under certain conditions. Testing is designed to delete errors (bugs) in the computer code. These errors are of two types. Syntax errors ( e.g., misspelled word or a misplaced comma) and logic errors that permit the program to run but result in incorrect output. Chapter 15 20

SDLC Systems Implementation Implementation or deployment is the process of converting from the old system to the new system. Organizations use four major conversion strategies ; parallel, direct, pilot and phased. Parallel conversion. Implementation process in which the old system and the new system operate simultaneously for a period of time. Direct conversion. Implementation process in which the old system is cut off and the new system turned on at a certain point in time. Chapter 15 21

SDLC Systems Implementation (Continued) Pilot conversion. Implementation process that introduces the new system in one part of the organization on a trial basis, when new system is working properly, it is introduced in other parts of the organization. Phased conversion. Implementation process that introduces components of the new system in stages, until the entire new system is operational. Chapter 15 22

SDLC Operation & Maintenance Audits are performed to assess the system s capabilities and to determine if it is being used correctly. Systems need several types of maintenance. Debugging: A process that continues throughout the life of the system. Updating: Updating the system to accommodate changes in business conditions. Maintenance: That adds new functionally to the system adding new features to the existing system without disturbing its operation. Chapter 15 23

Alternative Methods & Tools for Systems Development Prototyping. Approach that defines an initial list of user requirements, builds a prototype system and then improves the system in several iterations based on users feedback. Joint application design (JAD). A group based tool for collecting user requirements and creating system designs. Chapter 15 24

Business Process Redesign (BPR) BPR Business process redesign was preceded by business process reengineering, a methodology in which an organization fundamentally and radically redesigned its business processes to achieve dramatic improvement. Today, BPR can focus on anything from the redesign of an individual process, to redesign of a group of processes, to redesign of the entire enterprise. BPM A new method for restructuring, Business process management (BPM), combines workflow systems and redesign methods. This emerging methodology covers three process categories: people-to-people, systems-tosystems, and systems-to-people interactions. It is a blending of workflow, process management, and applications integration. Chapter 15 25

Outsourcing & Application Service Providers Outsourcing is when an organization acquires IT applications or services from outside contractors or external organizations. Application service provider (ASP) is an agent or vendor who assembles the software needed by enterprises and packages the software with services such as development, operations and maintenance. ASP manages application servers from a centrally controlled location rather than at a customer s site. Chapter 15 26

Evaluating & Justifying IT Investment: Benefits, Costs & Issues Assessing the costs Fixed costs: are those costs that remain the same regardless of change in the activity level. For IT, fixed costs include infrastructure cost, cost of IT services, and IT management cost Total cost of ownership (TCO): Formula for calculating cost of acquiring, operating and controlling an IT system. Assessing the benefits (Values) Intangible benefits. Benefits from IT that may be very desirable but difficult to place an accurate monetary value on. Comparing the two Chapter 15 27

Conducting the Cost-Benefit Analysis Using NPV in cost-benefit Analysis. Using the NPV method, analysts convert future values of benefits to their present-value equivalent by discounting them at the organization s cost of funds. Return on investment. It measure the effectiveness of management in generating profits with its available assets. The business case approach. A business case is one or more specific applications or projects. Its major emphasis is the justification for a specific required investment, but it also provides the bridge between the initial plan and its execution. Chapter 15 28

Cost-Benefit Analysis Methods Method Description Benchmarks Management by maxim Real-option valuation Balanced scorecard method Activity- based costing approach Focuses on objective measures of performance. Metric benchmarks provide numeric measures of performance, bestpractice benchmarks focus on how IS activities are actually performed by successful organization. Brings together corporate executives, business-unit managers, and IT executives to identify IT infrastructure investments that correspond to organizational strategies and objectives. Stems form the field of finance. Looks for projects that create additional opportunities in the future, even if current costs exceed current benefits. Evaluates the overall health of organizations and projects, by looking at the organization s short- and long-term financial metrics, customers, internal business processes and learning and growth (Kaplan and Norton, 1996). Applies principles of activity-based costing (ABC)( which allocates costs based on each product s use of company activities in making the product) to IT investment analysis. EIAC model Methodology for implementing IT payoff initiatives, composed of 9 phases, divided into four categories: exploration (E), involvement (I), analysis (A) and communication (C). Chapter 15 29

Managerial Issues Global and Cultural Issues Ethical and legal issues. User involvement. Change Management Risk Management Chapter 15 30

Chapter 15 Copyright 2008 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein. Chapter 15 31