chapter 11 introduction to information technology turban, rainer and potter john wiley & sons,...

42
Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Upload: erin-allison

Post on 04-Jan-2016

260 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc.Copyright 2005

Page 2: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11

ACQUIRING AND IMPLEMENTING SYSTEMS

Page 3: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 3

Acquiring IT Applications and Infrastructure

Page 4: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 4“ Copyright 2005 John Wiley & Sons Inc.”

Chapter Outline

The landscape and framework of IT application acquisition.Planning for and justifying information system applications.Strategies for acquiring IT applications: available options.Outsourcing and application service providers.Criteria for selecting an acquisition approach.Vendor and software selection and other implementation issues. Connecting to databases and business partners.

Page 5: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 5“ Copyright 2005 John Wiley & Sons Inc.”

Learning Objectives

Describe the progress of IT acquisition or development. Describe the IT planning process. Describe the IT justification process and methods.List the major IT acquisition options and the criteria for options selection. Describe the use of criteria for selecting an acquisition approach.Describe the role of ASPs.Describe the process of vendor and software selection.Understand some major implementation issues .Understand the issue of connecting IT applications to databases, other applications, networks, and business partners.

Page 6: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 6“ Copyright 2005 John Wiley & Sons Inc.”

We include in “acquisition” all approach to obtaining systems: buying, leasing or building.

11.1The Landscape and Framework of IT Application Acquisition

Page 7: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 7“ Copyright 2005 John Wiley & Sons Inc.”

The Acquisition Process

Step 1: planning for and justifying information systems.

Step 2: IT architecture creation-A systems analysis approach.

Step 3: select a development option and acquire the application.

Step 4: installing, connecting, and more. Step 5: operation and maintenance.

Page 8: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 8“ Copyright 2005 John Wiley & Sons Inc.”

The progress of application acquisition

Page 9: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 9“ Copyright 2005 John Wiley & Sons Inc.”

First, It is necessary to explore the need for each systems.

Second , it is necessary to justify it from a cost- benefit point of view.

Application portfolio: The set of recommended applications resulting from the application development.

11.2 Planning for and Justifying Information System Applications

Page 10: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 10“ Copyright 2005 John Wiley & Sons Inc.”

The IS Planning Process

Page 11: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 11“ Copyright 2005 John Wiley & Sons Inc.”

A set of long range goals that describe the IT infrastructure and major IS initiatives needed to achieve the goals of the organization.

The IT plan must meet three objectives::It must be aligned with the organization’s strategic plan

It must provide for an IT architecture

It must efficiently allocate IS development resources among competing projects

The IT Strategic Plan

Page 12: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 12“ Copyright 2005 John Wiley & Sons Inc.”

Three Major Issues of IT Strategic Planning Efficiency Effectiveness Competitiveness

Page 13: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 13“ Copyright 2005 John Wiley & Sons Inc.”

The IT strategic plan must be aligned with overall organizational planning, whenever relevant, so that the IT unit and other organizational personnel are working toword the same goals, using their respective competencies.

IT alignment with organizational plans and IT strategy

Page 14: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 14“ Copyright 2005 John Wiley & Sons Inc.”

The alignment among business and IT strategies and IS operational plan

Page 15: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 15“ Copyright 2005 John Wiley & Sons Inc.”

The IS Operational Plan

The IS operational plan is a clear set of projects that will be executed by the IS department and by functional area managers in support of the IT strategic plan

Mission IS environment Objectives of the IS function Constraints on the IS function The application portfolio Resource allocation and project management

Page 16: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 16“ Copyright 2005 John Wiley & Sons Inc.”

Justifying IT investment includes three aspects: assessment of costs, assessment of benefits (values), and comparison of the two.

Evaluating and justifying IT investment

Page 17: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 17“ Copyright 2005 John Wiley & Sons Inc.”

IT investment categories

Investment in infrastructure and investment in specific applications:

The IT infrastructure: Include the physical facilities, components, services, and management.

The IT applications: are computer programs designed to support a specific task, a business process or another application program.

Page 18: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 18“ Copyright 2005 John Wiley & Sons Inc.”

A Model for Investment Justification

Page 19: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 19“ Copyright 2005 John Wiley & Sons Inc.”

Costing IT Investment

Fixed costs: are those costs that remain the same regardless of change in the activity level. For IT, fixed costs include infrastructure cost of IT services, and IT management cost

Total cost of ownership (TCO): Formula for calculating the cost of acquiring, operating and controlling an IT system.

Page 20: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 20“ Copyright 2005 John Wiley & Sons Inc.”

Intangible benefits. Benefits from IT that may be very desirable but difficult to place an accurate monetary value on.

Evaluating the Benefits

Page 21: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 21“ Copyright 2005 John Wiley & Sons Inc.”

Using NPV in cost-benefit Analysis. Using the NPV method, analysts convert future values of benefits to their present-value equivalent by discounting them at the organization’s cost of funds.

Return on investment. It measure the effectiveness of management in generating profits with its available assets.

The business case approach. A business case is one or more specific applications or projects. Its major emphasis is the justification for a specific required investment, but it also provides the bridge between the initial plan and its execution.

Conducting Cost-Benefit Analysis

Page 22: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 22“ Copyright 2005 John Wiley & Sons Inc.”

Cost-Benefit Analysis Methods

Method Description

Benchmarks Focuses on objective measures of performance. Metric benchmarks provide numeric measures of performance, best-practice benchmarks focus on how IS activities are actually performed by successful organization.

Management by maxim

Brings together corporate executives, business-unit managers, and IT executives to identify IT infrastructure investments that correspond to organizational strategies and objectives.

Real-option valuation

Stems form the field of finance. Looks for projects that create additional opportunities in the future, even if current costs exceed current benefits.

Balanced scorecard method

Evaluates the overall health of organizations and projects, by looking at the organization’s short- and long-term financial metrics, customers, internal business processes and learning and growth (Kaplan and Norton, 1996).

Activity- based costing approach

Applies principles of activity-based costing (ABC)( which allocates costs based on each product’s use of company activities in making the product) to IT investment analysis.

EIAC model Methodology for implementing IT payoff initiatives, composed of 9 phases, divided into four categories: exploration (E), involvement (I), analysis (A) and communication (C).

Page 23: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 23“ Copyright 2005 John Wiley & Sons Inc.”

Buy the applications (off-the-shelf approach)Lease the applicationsDevelop the applications in–house (insourcing)End-user developmentOther acquisition options

11.3 Strategies for Acquiring IT Applications: Available Options

Page 24: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 24“ Copyright 2005 John Wiley & Sons Inc.”

Advantages and Limitations of the “Buy” Option

Advantages of the “Buy” option

Many different types of off-the-shelf software are available

Much time can saved by buying rather than building

The company is not the first and only user

the company can know what it is getting before it invests in the product

Purchased software may avoid the need to hire personnel specifically dedicated to a project.

Limitation of “ Buy” option

Software may not exactly meet the company’s need

Software may be difficult or impossible to modify, or it may require huge business process change to implement.

The company will not have control over software improvement and new versions.

Purchased software can be difficult to integrate with existing systems

Vendors may drop a product or go out of business

Page 25: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 25“ Copyright 2005 John Wiley & Sons Inc.”

Types of Leasing Vendors

to lease the application from an outsourcer and install it on the company’s premise. The vendor can help with the installation and frequency will offer to also contract for the operation and maintenance of the system. Many conventional application are leased this way.

using an application system provider (ASP).

Page 26: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 26“ Copyright 2005 John Wiley & Sons Inc.”

Unlimited computing power and storage capacity that can be obtained on demand and billed on a pay-per use basis.

Utility Computing

Page 27: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 27“ Copyright 2005 John Wiley & Sons Inc.”

Utility Computing

Page 28: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 28“ Copyright 2005 John Wiley & Sons Inc.”

In-House Development Approach

Build from Scratch: used for applications for which components are not available

Build from components. Companies with experienced IT staff can use standard components (e.g., secure Web server), some software languages ( e.g., Java, Visual basic, or Perl), and third-party subroutines to create and maintain application on their own.

Page 29: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 29“ Copyright 2005 John Wiley & Sons Inc.”

Building in-house Methodologies

System development life Cycle (SDLC) Prototyping methodology

Page 30: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 30“ Copyright 2005 John Wiley & Sons Inc.”

Other acquisition options

Join an e-marketplace or an E-Exchange

Join a third –party auction or reverse auction

Engage in joint ventures

Join a public exchange or a consortium

Hybrid approach

Page 31: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 31“ Copyright 2005 John Wiley & Sons Inc.”

11.4 Outsourcing and Application Service Providers Outsourcing: use of outside contractors or

external organizations to acquire IT services Several type of vendors offer services for

creating and operating IT system including e-commerce applications: Software houses Outsourcers and others Telecommunications companies

Page 32: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 32“ Copyright 2005 John Wiley & Sons Inc.”

An agent or vendor who assembles the software needed by enterprises and packages them with outsourced development, operations, maintenance, and other services.

Application Service Providers (ASP)

Page 33: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 33“ Copyright 2005 John Wiley & Sons Inc.”

Database format and portability . Application and data storage Scope of service Support services integration

Additional criteria for selecting an ASP vendor

Page 34: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 34“ Copyright 2005 John Wiley & Sons Inc.”

Criteria for determining which application development approach to use

The functionalities of package

How to measure benefits

Information requirement Personnel needed

User friendless Forecasting and planning for technological evolution

Hardware and software resources

Scaling

Installation Sizing

Maintenance services Performance

Vendor quality and track record Reliability

Estimated costs Security

Page 35: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 35“ Copyright 2005 John Wiley & Sons Inc.”

Advantage and disadvantage of various system acquisition method

Traditional system development (SDLC) force staff to systematically go through every step in a structure process Enforce quality by maintaining standardsHas lower probability of missing important issues in collecting user requirements.

may produce excessive documentation users may be unwilling or unable to study the specifications they approve takes too long to go from the original ideas to a working systemUser have trouble describing requirement for a proposed system.

Prototyping helps clarify user requirements helps verify the feasibility of the design promotes genuine user participation Promotes close working relationship between systems developers and users.Work well for ill-defined problems May produce part of the final system

may encourage inadequate problem analysis Not paractical with large number of usersUser may not give up the prototype when the system is complete. may generate confusion about whether the system is complete and maintainable system may be built quickly, which may result in lower quality

Page 36: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 36“ Copyright 2005 John Wiley & Sons Inc.”

Advantage and disadvantage of various system acquisition method cont…

End user development bypasses the IS department and avoids delaysUser controls the application and can change it as needed directly meets user requirementincreased user acceptance of new systemFrees up IT resourcesMay create lower-quality systems.

may eventually require maintenance assistance from IT department documentation may be inadequate poor quality control System may not have adequate inferences to existing systems

External acquisition (buy or lease) Software can be tried outSoftware has been used for similar problem in other organizationsReduces time spent for analysis, design and programming Has good documentation that will be maintained

controlled by another company with its own priorities and business considerations.Package’s limitations may prevent desired business processesMay be difficult to get needed enhancements. lack of intimate knowledge about how the software work and why it works that way

Page 37: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 37“ Copyright 2005 John Wiley & Sons Inc.”

Martin et al. (2000) identified six step in

selecting software vendor and an application package.

Step 1 : Identify potential vendors Step 2: determine the evaluation criteria Step 3: evaluate vendors and packages Step 4: choose the vendor and package Step 5: negotiate a contract.

11.6 Vendor and software selection and other implementation issues

Page 38: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 38“ Copyright 2005 John Wiley & Sons Inc.”

Criteria for selecting a software application package Cost and financial terms

Upgrade policy and cost

vendor’ reputation and availability for help

System flexibility

ease of Internet interface

Availability and quantity of documentation

Necessary hardware and networking resources

Required training (check if provide be vendor)

Security

Learning (speed of) for developers and users

Graphical presentation

Data handling

System- requirement hardware

Page 39: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 39“ Copyright 2005 John Wiley & Sons Inc.”

In-house or outsource Web site

Consider an ASP

Do a detailed IT architecture study

Security and ethics

Evaluate the alternatives to in-house systems development

Other Implementation Issues

Page 40: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 40“ Copyright 2005 John Wiley & Sons Inc.”

EC application must be connected to internal information systems, infrastructure, ERP, and so on.

They also must be connected and are referred to as “integration.”

11.7 Connecting to Databases and Business Partners

Page 41: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 41“ Copyright 2005 John Wiley & Sons Inc.”

Connecting to database

Page 42: Chapter 11 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 11 42“ Copyright 2005 John Wiley & Sons Inc.”

All rights reserved. Reproduction or translation of this work beyond that permitted in section 117 of the United States Copyright Act without express permission of the copyright owner is unlawful. Request for information should be addressed to the permission department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The publisher assumes no responsibility for error, omissions, or damages caused by the use of these programs or from the use of the information herein.