Information Systems Management

Slides:



Advertisements
Similar presentations
Outsourcing in the 21st Century
Advertisements

Is Outsourcing Fool’s Gold?
Outsourcing and HRM Brian S. Klaas. The Market or the Organization When outsourcing is used, firms are relying on a market-based form of governance to.
© Prentice Hall CHAPTER 15 Managing the IS Function.
Information Systems Management
Information Systems Management
Information Systems Management Chapter "I Don’t Know Anything About Doing Business In India.” Copyright © 2014 Pearson Education, Inc. Publishing.
Information Systems Management Chapter “I Don’t Know Anything About Doing Business in India.” Copyright © 2015 Pearson Education, Inc. PRIDE.
© Pearson Prentice Hall 2009
Chapter 11 Information Systems Management
Marni McSween-Farmer Marco LuzuriagaRoss RyanAnnmarie Yoos Opposing Forces Guide pages
Chapter 05 Human Resource Planning and Recruitment
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Chapter 8 Information Systems Development & Acquisition
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
Chapter Extension 20 Outsourcing © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
Development Processes
Live for today as if it is your last day but plan for tomorrow as if it will last forever!
International MIS Chapter Extension 18. ce18-2 Study Questions Q1: How does the global economy impact organizations and processes? Q2: What are the characteristics.
Management Information Systems, 4 th Edition 1 Chapter 16 Alternative Avenues for Systems Acquisitions.
Copyright © 2006 Pearson Addison-Wesley. All rights reserved. 9-1 Chapter (1) An Overview Of Financial Management.
An Overview of Financial and Multinational Financial Management Corporate Finance Dr. A. DeMaskey.
The future shape of business is being redefined through outsourcing.
Chapter-7 Introduction to Cloud Computing Cloud Computing.
Strategy and Information Systems
13-1 Information Technology Economics Information Technology: Economic and Financial Trends Internal IT versus outsourcing Expanding power / declining.
Chapter 11 Information Systems Management © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Information Systems Development
Computers Are Your Future Tenth Edition Chapter 10: Careers & Certification Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Chapter 15 Systems Development
International MIS International Dimension. ID-2 Study Questions Q1: How does the global economy impact organizations and processes? Q2: What are the characteristics.
Copyright © 2014 Pearson Education, Inc. 1 Managers are facing unique challenges as Digital Technologies permeate the workplace Chapter 1 - Managing in.
Ch. 5-2 Forms of Ownership.
Advantages Cloud Computing. customers only pay for the access and interfaces that they need. The customer buys only the services they need Cost Advantages.
ERP. What is ERP?  ERP stands for: Enterprise Resource Planning systems  This is what it does: attempts to integrate all data and processes of an organization.
Chapter 11 Information Systems Management. Q1:What are the responsibilities of the IS department? Q2:How is the IS department organized? Q3: What are.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Computerized Manufacturing Systems
MGS Group D. TO THE OUTSOURCE VENDOR *Take of control *Obtain expertise *Deliver error free services TO THE ORGANIZATION *Avoid management problems.
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
Chapter 3 Software. Learning Objectives Upon successful completion of this chapter, you will be able to: Define the term software Describe the two primary.
Emerging commodity exchanges UNCTAD, Commodities Branch Olivier Combe, Lamon Rutten, Leonela Santana-Boado.
Gerald DeHondt II Dr. Marvin Troutt Department of Management and Information Systems Kent State University.
Business Driven Technology Unit 5 Transforming Organizations Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Review Exam 2 Chapters 6 – 10. Chapter 6 – Systems Development Systems Development Concepts Challenges in Systems Development Types of System Development.
Chapter 1 The Importance of MIS.
Mindcraft is a registered trademark of Mindcraft, Inc. October 26, 1998Copyright 1998 Mindcraft, Inc. A Strategy for Buying Directory Servers Bruce Weiner.
1 Business Aspects of Software Engineering SWE 513.
Chapter 1 IS in the Life of Business Professionals Chapter 1.
Is Outsourcing Fool’s Gold BY:Violetta Bove and Luis Ayala.
Chapter 11 Information Systems Management. Dee wanted to restrict access to blog –Easiest way was to put it on Emerson’s server –Needed permission and.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter 11 Information Systems Management Read this unit prior to the presentation.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
VDI AND DAAS – SAY WHAT?!? Bob Marshall, MD MPH MISM FAAFP Faculty, Valley Family Medicine Residency Faculty, DoD Clinical Informatics Fellowship.
The evolution of IT Outsourcing - why trusted partnership matters? by Olha Moroz Delivery Director, SoftServe Poland.
Information Technology Part 2. Part2-2 Next Three Chapters Copyright © 2016 Pearson Education, Inc. Chapter 4 discusses hardware, software, and mobile.
April 19, IT Outsourcing overview and training cases.
Lecture 2 The Sources of Software. Copyright © 2011 Pearson Education, Inc. 2 Chapter 2 Introduction There are various sources of software for organizations.
The Information Systems Development Processes Chapter 9.
Information Technology Economics
Using MIS 2e Chapter 11 Information Systems Management
Strategic Outsourcing
Information Systems Management
© Pearson Prentice Hall 2009
System Analysis and Design
System Analysis and Design
Information Systems Management
Chapter 21 Successfully Implementing The Information System
Presentation transcript:

Information Systems Management Chapter 11 Information Systems Management

"I Don't Know Anything About Doing Business in India." PRIDE development team discuss pros and cons of outsourcing to India. Ajit Barid former programmer of SharePoint cloud features. Record of success, personally known by Maggie Started own company that's growing quickly. Don’t know if it's well managed. Goals Use PRIDE to: Illustrate some technical issues dilemma of offshore outsourcing: – It can be considerably cheaper than domestic development. – It is replete with problems and risks. Have students make a list of all the problems they identify in scenario. Copyright © 2016 Pearson Education, Inc.

Copyright © 2016 Pearson Education, Inc. Bottom Line Offshore outsourcing risky, especially for small projects and organizations Decisions need to be made, even without strong evidence—tough for small business or project Only time will tell if decision was good or bad Copyright © 2016 Pearson Education, Inc.

IS Management Must Be Performed Somehow Plan information systems and infrastructure Develop and adapt IS and infrastructure Maintain IS and operate and manage infrastructure Protect infrastructure and data Copyright © 2016 Pearson Education, Inc.

Copyright © 2016 Pearson Education, Inc. Study Questions Q1: What are the functions and organization of the IS department? Q2: How do organizations plan the use of IS? Q3: What are the advantages and disadvantages of outsourcing? Q4: What are your user rights and responsibilities? Q5: 2025? Information systems are critical to organizational success and, like all critical assets, need to be managed responsibly. Copyright © 2016 Pearson Education, Inc.

Q1: What Are the Functions and Organization of the IS Department? Plan use of IS to accomplish organizational goals and strategy Manage outsourcing relationships Protect information assets Develop, operate, and maintain organization’s computing infrastructure Develop, operate, and maintain applications Protection function is topic of Chapter 10. Develop functions important for IS majors, but less so for other business professionals and not considered in this text. To set stage, consider the organization of IS Department. Copyright © 2016 Pearson Education, Inc.

How Is the IS Department Organized? Typical Senior-Level Reporting Relationships Smaller companies may combine some of these departments. Copyright © 2016 Pearson Education, Inc.

What IS-Related Job Positions Exist? Relate to five components of an information system. With exception of computer technician, and possibly PQA test engineer, all these positions require a 4-year degree and business knowledge or business degree, and good verbal communications and writing skills. Copyright © 2016 Pearson Education, Inc.

What IS-Related Job Positions Exist? (cont'd) Copyright © 2016 Pearson Education, Inc.

What IS-Related Job Positions Exist? (cont'd) Copyright © 2016 Pearson Education, Inc.

What IS-Related Job Positions Exist? (cont'd) Copyright © 2016 Pearson Education, Inc.

What IS-Related Job Positions Exist? (cont'd) Copyright © 2016 Pearson Education, Inc.

Q2: How Do Organizations Plan the Use of IS? Maintaining alignment between IS capabilities and organizational strategy is a continual process. Without a strong CIO, IS may be perceived as drag on organization’s opportunities. A steering committee is a group of senior managers from the major business functions that works with CIO to set IS priorities and decide among major IS projects and alternatives. IS department sets up the steering committee’s schedule, agenda and conducts meetings. Copyright © 2016 Pearson Education, Inc.

So What? Why Do You Need to Know About IS Management? Users of IS services, helpful to know the factors driving standards and policies Need to know the responsibilities and organization of your future employment Help you guide your employees behavior Copyright © 2016 Pearson Education, Inc.

Ethics Guide: Using the Corporate Computer Suppose you are a manager at a company with this stated policy. “Computers, email, and the Internet are to be used primarily for official company business. Small amounts of personal email can be exchanged with friends and family, and occasional usage of the Internet is permitted, but such usage should be limited and never interfere with your work.” You learn one of your employees has been engaged in activities listed in the Ethics Guide. GOALS Evaluate ethics of employee activities in terms of a particular computer-use policy. Forewarn students that employers have right to monitor computer usage, and many do. Develop techniques for managing employees’ computer use. Guide focuses on the student’s role as a manager rather than as a computer user. Copyright © 2016 Pearson Education, Inc.

Copyright © 2016 Pearson Education, Inc. Ethics Guide: Wrap Up Employers have right, both legally and ethically, to monitor your computer use. Many do. How to deal with employees who are misusing their computer resources. Know the organization’s official policy. Understand excessive personal computer use by your employees reflects negatively on your managerial ability. Manage positively. Give employees sufficient work. Follow up with schedules and deadlines. Copyright © 2016 Pearson Education, Inc.

Q3: What Are the Advantages and Disadvantages of Outsourcing? Process of hiring another organization to perform services Any value chain business activity can be outsourced Outsourcing done to save costs, gain expertise, and free management time “Your back room is someone else’s front room.” (Drucker) Outsource employee cafeteria to a food services company. It’s their front room operation. Copyright © 2016 Pearson Education, Inc.

Popular Reasons for Outsourcing IS Services Many companies outsource portions of their information systems activities. Figure 11-4 lists popular reasons for doing so. Maggie at AllRoad Parts has skills to manage a new software development project, but may not choose to invest everyone's time. AllRoad Parts has outsourced its new facilities scheduling system to the cloud. Copyright © 2016 Pearson Education, Inc.

Copyright © 2016 Pearson Education, Inc. Risk Reduction Caps financial risk Ensures level of quality or avoids substandard quality Less likely to pick wrong hardware, software, network protocol, or implementing tax law changes incorrectly Risk management vendor’s responsibility Easier to hire another vendor than fire and rehire internal staff Copyright © 2016 Pearson Education, Inc.

International Outsourcing India Large, well-educated, English-speaking, labor cost 70-80% less than US China and other countries Modern telephone technology and Internet-enabled service databases Customer support and other functions operational 24/7 With modern telephone technology and Internet-enabled service databases, a single customer service call can be initiated in United States, partially processed in India, then Singapore, and finalized in Ireland. Amazon.com operates customer service centers in the United States, India, and Ireland. Copyright © 2016 Pearson Education, Inc.

What Are Outsourcing Alternatives? Categories of alternatives according to information systems components and outsourcing of hardware to the cloud. Electronic Data Systems (EDS) successful for more than 30 years as outsource vendor of hardware infrastructure. Software as a service (SaaS) an outsourcing alternative that provides hosted applications and data storage. Salesforce.com is a typical example of a SaaS provider. Outsource an entire system: Oracle provides entire payroll function as an outsourced service. Client company only provides employee and work information, while payroll outsource vendor does the rest. Web storefront is a form of application outsourcing. Amazon.com provides a Web storefront for product vendors and distributors who choose not to develop their own Web presence. Some organizations choose to outsource an entire business function. Many companies outsource to travel agencies the function of arranging for employee travel. Some outsource vendors operate offices within other company’s facilities. Copyright © 2016 Pearson Education, Inc.

Copyright © 2016 Pearson Education, Inc. Risks of Outsourcing Outsourcing presents significant risks. Loss of control over important business functions, loss of human capital and important management resources Difficulty in identifying or realizing benefits Difficulty in ending outsourcing dependencies Copyright © 2016 Pearson Education, Inc.

Benefits Outweighed by Long-Term Costs Unit fixed cost contract may prevent benefits of economies of scale Vendor defacto sole source Changing pricing strategy No easy exit Difficult to know if vendor well managed Vendor becomes defacto sole source and might increase its prices. Vendor becomes tightly integrated such that parting company can be exceedingly risky. Outsource vendor’s employees have gained significant knowledge of the company. Vendor knows the server requirements in customer support, patterns of usage, and best procedures for downloading operational data into the data warehouse. Consequently, your lack of knowledge make it difficult to bring outsourced service back in-house. Company must invest considerable work, duplication of effort, management time, and expense to change to another vendor. Copyright © 2016 Pearson Education, Inc.

Q4: What Are Your IS Rights and Responsibilities? If you process huge files for data-mining applications, you have a right to the huge disks and fast processor that you need. However, if you merely receive email and access corporate Web portal, then your right is for more modest requirements. Reliable means you can process without problems. Organization should protect your computer and files, and you should not normally need to think about security. Participate in requirements meetings for new applications you will use and for major changes to applications currently used. Receive prompt attention to your problems, concerns, and complaints about information services. Right to have means to report problems, and to know your problem has been received and registered with IS department. Right to have your problem resolved, consistent with established priorities. Training convenient to you, easy to understand and enables you to use systems to perform your job. Copyright © 2016 Pearson Education, Inc.

What Are Your IS Rights and Responsibilities? (cont’d) Your responsibilities toward IS department and organization. Do not expect hand-holding for basic operations. Nor expect to receive repetitive training and support for same issue. Responsible for protecting your password(s), computer, your organization’s networks and databases. Unauthorized modifications could interfere with automated maintenance programs for upgrading your computer and cause problems the IS department will have to fix. Responsibility to treat information systems professionals professionally. One form of professional behavior is to learn basic computer skills to avoid reporting trivial problems. Copyright © 2016 Pearson Education, Inc.

Copyright © 2016 Pearson Education, Inc. Q5: 2025? Internal hardware infrastructure moved to the cloud Rise in use of mobile devices at work BYOD policies that meet employer needs and strategies Use of social media inside the organization in true Enterprise 2.0 style Organizational knowledge management will be done using social media Copyright © 2016 Pearson Education, Inc.

Copyright © 2016 Pearson Education, Inc. Q5: 2025? (cont'd) Social media sites will have a project component SDLC will be a thing of the past BYOD policies are doomed as employees move off the company network Copyright © 2016 Pearson Education, Inc.

Security Guide: Are We Protecting Them from Me or Me from Them? Illustration of a company in the process of setting a BYOD policy Risk of data loss isn’t new Thumb drives and laptops make it easier Why would an employee steal data? GOALS Showcase one way IS Departments work with users to set policy. Demonstrate that data security risk is not new. Review major risks of employee mobile device at work. Distinguish between risks of taking data out and bringing malware in. Encourage students to participate as users on technical committees. Copyright © 2016 Pearson Education, Inc.

Copyright © 2016 Pearson Education, Inc. Security Guide: Are We Protecting Them from Me or Me from Them? (cont'd) Wrap Up Get involved in IS committees as a user to increase your personal social capital while learning BYOD policy is leading edge of organizational IT use In a job interview, ask if the company has a BYOD policy. If so, what does he or she think of it? Copyright © 2016 Pearson Education, Inc.

Guide: Is Outsourcing Fool’s Gold? Outsourcing computer infrastructure has advantages and disadvantages Pay premium for services of former employees, now managed by strangers and paid by vendor Vendor managers evaluated on how well they follow vendor’s profit- generating procedures Turn your operation into a clone of their other clients All critical knowledge in vendor’s employees, prohibited from going to work for you Expensive leap away from responsibility GOAL Investigate advantages and disadvantages of computer infrastructure outsourcing. Note: This guide differs from the opening scenario because it doesn’t necessarily assume offshore outsourcing. Background Outsourcers get their first-level employees by hiring the ones you had. What you’re really outsourcing is middle-level management of same IT personnel you had. No way of knowing whether the managers they supply are any better. Paying a premium for services of former employees, now managed by strangers and paid by outsource vendor, who evaluates those managers on how well they follow outsource vendor’s profit-generating procedures. Copyright © 2016 Pearson Education, Inc.

Copyright © 2016 Pearson Education, Inc. Active Review Copyright © 2016 Pearson Education, Inc.

Copyright © 2016 Pearson Education, Inc. Case Study 11: iApp$$$$ 4 U Ideas are only as good as their implementation How can you go about getting your iOS application developed? Average cost of creating an iPhone app $6453 Programming time cost excluding time for specifying requirements, designing user interface, testing, Apple review process What is value of that idea? According to Raven Zachary, no professional iPhone developer will take equity or promise of future revenue sharing in exchange for cash. There is too much cash-paying work. Ideas are only as good as their implementation. Copyright © 2016 Pearson Education, Inc.

Copyright © 2016 Pearson Education, Inc. What Are Your Options? Do as much as you can yourself Determine how many SDLC stages you can do yourself Design user-interface and specify ways users will employ it Develop a test plan skeleton Perform some testing tasks yourself Outsource to US or EU programmer ($10k) Goal: Give students some understanding options for real-world outsourcing iOS app development. How can you go about getting your iOS application developed? Copyright © 2016 Pearson Education, Inc.

What Are Your Options? (cont’d) Outsource off-shore or hire a computer-science student Students may be undependable. Elance.com – clearing house for iOS development experts Lists developers, their locations, typical costs and ratings of previous customers Hire developers in India, Russia, the Ukraine, Romania, and other countries ($2000+) Break big app into smaller, easily doable smaller apps Check Elance.com a clearing house for iOS development experts. Lists developers, their locations, typical costs, and ratings of previous customers Copyright © 2016 Pearson Education, Inc.

Copyright © 2016 Pearson Education, Inc.