Visualizing the Value of IT …People, Technology, Services, and Processes Donna Liss Associate Vice Provost Beth Forrest Warner Assistant Vice Provost EDUCAUSE.

Slides:



Advertisements
Similar presentations
Technology Across the Curriculum Programs Keys to Success Beth Secrist, TAC Coordinator Copyright Beth Secrist, This work is the intellectual property.
Advertisements

DSpace: the MIT Libraries Institutional Repository MacKenzie Smith, MIT EDUCAUSE 2003, November 5 th Copyright MacKenzie Smith, This work is the.
HR SCORECARD Presented By ADEEL TARIQ MOBASHIR ALI.
Internal Analysis.
Using MIS 2e Chapter 3 Information Systems for
Using MIS 2e Chapter 3 Information Systems for
The Academic Computing Assessment Data Repository: A New (Free) Tool for Program Assessment Heather Stewart, Director, Institute for Technology Development,
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Using Value Disciplines in Organizational Change Peter D. Nordgren University of Wisconsin-Superior Educause Midwest Regional Conference March 13 th, 2007.
Copyright Dickinson College This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Copyright © 2012 Pearson Canada Inc. 0 Chapter 3 The Internal Environment: Resources, Capabilities, and Activities.
Do You Know ???.
Visualizing the Value of IT …People, Technology, Services, and Processes Donna Liss Beth Forrest Warner Associate Vice ProvostAssistant Vice Provost October.
Q2 – What five forces determine industry structure?
Academic Data Research Services Alliance Bridging the Gap between Data and Discovery Beth Forrest Warner Director, Digital Library Initiatives, University.
CHAPTER ONE OVERVIEW SECTION 1.1 – BUSINESS DRIVEN MIS
CHAPTER ONE MANAGEMENT INFORMATION SYSTEMS BUSINESS DRIVEN MIS
Ahmed Mohammed Bostan The Value Chain Analysis Miss: Yassmen Al- Bubo.
UWM CIO Office A Collaborative Process for IT Training and Development Copyright UW-Milwaukee, This work is the intellectual property of the author.
INSTITUTE FOR DISTANCE AND DISTRIBUTED LEARNING Three Approaches to Distance Learning Support Services EDUCAUSE 2002 Copyright Bridget Moore and Mark Raby,
Copyright Statement © Jason Rhode and Carol Scheidenhelm This work is the intellectual property of the authors. Permission is granted for this material.
Chatham College Community and Computers Pervasive Computing at a Liberal Arts College Charlotte E. Lott, Ph. D. Lynda Barner West, Ed. D. Copyright Charlotte.
Assessing the Internal Environment of the Firm
CS&T Strategy Articulation Project Results Summary June 2006 “CS&T will be the recognized leader for high quality and innovative Enterprise Information.
National Research Agenda to Support Transformation National Learning Infrastructure Initiative Focus Session June, 2003 Copyright Jillian Kinzie, 2003.
NLII Mapping the Learning Space New Orleans, LA Colleen Carmean NLII Fellow Information Technology Director, ASU West Editor, MERLOT Faculty Development.
1 sm Using E-Business Solutions to Meet Management Challenges: Interoperability & Flexibility Bring Success to the Implementation of Specialized Components.
Copyright Copyright Chris Byrd and Jeff Farnham, This work is the intellectual property of the author. Permission is granted for this material to.
Copyright Marilyn Drury, Darrell Fremont, Doreen Hayek, This work is the intellectual property of the authors. Permission is granted for this material.
SUPPLY CHAIN MANAGEMENT Brian Gillespie May 19, 2010.
Electronic Business (MGT-485)
1 Institutions as Allies in the Security Challenge Wayne Donald, Virginia Tech Cathy Hubbs, George Mason University Darlene Quackenbush, James Madison.
Information Security Governance in Higher Education Policy2004 The EDUCAUSE Policy Conference Gordon Wishon EDUCAUSE/Internet 2 Security Task Force This.
Funding Strategic Initiatives in Academic Technology A Process for Identifying, Cataloging, and Categorizing IT Needs Campuswide Copyright© D. Tebbetts,
Copyright Statement Copyright William F. Hogue, This work is the intellectual property of the author. Permission is granted for this material to.
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
MGT-555 PERFORMANCE AND CAREER MANAGEMENT
Lynette Olson, Assessment & Effectiveness Director & Gary Langer, Associate Vice Chancellor, Office of the Chancellor, Minnesota State Colleges and Universities.
Serving MERLOT on Your Campus Gerry Hanley California State University and MERLOT Seminars on Academic Computing August 7, 2002 Snowmass CO Copyright Gerard.
3 YEAR IT MANAGEMENT AND BUDGET PLANS Enterprise Value Chain and Application Maps 1 8/22/2015.
1 Focus on Quality and the Academic Quality Improvement Program At Cuyahoga Community College.
Securing the High Ground – Strategies & Technologies for a Comprehensive Assessment Program Copyright Rod Henshaw & Teri Koch, This work is the intellectual.
SECTION 2: Digital Value Chain, E-Business Models Teemu Hakolahti
Enterprise IT Decision Making
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Value & Excitement University Technology Services Oakland University Information Technology Strategic Planning Theresa Rowe October 2004 Copyright Theresa.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER ONE MANAGEMENT INFORMATION SYSTEMS: BUSINESS DRIVEN.
Copyright © 2011 The McGraw-Hill Companies All Rights ReservedMcGraw-Hill/Irwin Chapter 1 Strategic Planning and the Marketing Management Process.
INTRODUCTORY COMMENTS MANAGEMENT OF INFORMATION TECHNOLOGY.
© Pearson Prentice Hall David Kroenke Using MIS 2e Chapter 3 Information Systems for Competitive Advantage.
Center for Planning and Information Technology T HE C ATHOLIC U NIVERSITY of A MERICA ERP Systems: Ongoing Support Challenges and Opportunities Copyright.
Logistics and supply chain strategy planning
Management of Information Technology
Value of chain Analysis Creating valuable product or service
Value chain. Introduction Value Chain Analysis helped identify a firm's core competencies and distinguish those activities that drive competitive advantage.
Identifying the Value Chain Using value stream mapping to identify and link the organization’s core processes.
By Hollander, Denna, Cherrington PowerPoint slides by: Bruce W. MacLean, Faculty of Management, Dalhousie University Accounting, Information Technology,
Tough Times and Hard Decisions – Thinking Strategically About IT The CIO – What Lies Ahead? Gordon Wishon, CIO, University of Notre Dame 2003 SAC Executive.
Robert J. Robbins (206) MEDIT 115 Competitive Advantage Mini Lecture Series.
A Strategy for Moving from Commercial to an Open Source Environment Jeshua Pacifici, GEDI Assistant Director and Learning Systems Consultant.
Chapter 1 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
1 Top 10 Challenges of the Academic Technology Community John P. Campbell & Dennis A. Trinkle EDUCAUSE Live! Monday, May 21, :00-2:00 PM Copyright.
UTA/ARRI. Enterprise Engineering for The Agile Enterprise Don Liles The University of Texas at Arlington.
ERP and Related Technologies
Top 10 Challenges of the Academic Technology Community Veronica Diaz, John Campbell, Dennis Trinkle Wednesday, October 24, :50 p.m. - 4:40 p.m.
Using MIS 2e Chapter 3 Information Systems for
An electronic presentation by Douglas Cloud Pepperdine University
14 Summary Management of Operations
Chapter 2 Planning, Implementing, and Controlling Marketing Strategies
Defining an IT Workflow, from Request to Support
Presentation transcript:

Visualizing the Value of IT …People, Technology, Services, and Processes Donna Liss Associate Vice Provost Beth Forrest Warner Assistant Vice Provost EDUCAUSE Southwest Conference 2007

EDUCAUSE Southwest Conference2 February 21, 2007 Copyright Beth Forrest Warner and Donna Liss, This work is the intellectual property of the authors. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the authors. To disseminate otherwise or to republish requires written permission from the authors.

EDUCAUSE Southwest Conference3 February 21, 2007 The Spellings Commission “What we have learned over the last year makes clear that American higher education has become what, in the business world, would be called a mature enterprise: increasingly risk-averse, at times self- satisfied, and unduly expensive.” A Test of Leadership: Charting the future of US Higher Education

EDUCAUSE Southwest Conference4 February 21, 2007 Perceptions of IT…  Is information technology…  A solution to the challenges that higher education faces;  A contributor to the needed answers; or  Just another cost and yet another cost center? EDUCAUSE “Grand Challenges” Initiative Brian L. Hawkins, Annual Conference, 2006

EDUCAUSE Southwest Conference5 February 21, 2007 KU Provost’s Challenge  Questions posed to all KU departments:  Who are you?  What do you do?  Why is it important to KU?

EDUCAUSE Southwest Conference6 February 21, 2007 Finding the Answers for IT… Strategic Planning Project Portfolios IS Division / Unit Planning University Budget Request Mission / Vision Statements Project Planning Vendor Products / Changes Open Source Standards / Projects ITMBP State Project Plan Filings University Mission / Vision Dept. / School Plans & Projects State Regs / Oversight Board of Regents State Technical Architecture ITIL IS IdentitySecurity Planning Assessment What do we do? Why are we important? Who are we?

EDUCAUSE Southwest Conference7 February 21, 2007 Where to Begin? Finding Models  Need a systematic approach to answering questions about who, what, why, how, and where?  Many models are available, but how can they work together to give a more complete picture? “You can’t redesign your system by dividing it into parts; everyone must look at the whole together.” Peter Senge (1994), The Fifth Discipline Fieldbook

EDUCAUSE Southwest Conference8 February 21, 2007 Models for Higher Education & IT Who are we working with?Business Partners Model Why are we doing it?Value Chain Model What are we doing? Application Maps, Service Catalogs How do we manage the process? ITIL Services Model Where are we going?Strategic Planning How do we assess our progress? Assessment (TechQual+)

EDUCAUSE Southwest Conference9 February 21, 2007 Who Are We Working With? Enterprise Business Partners Model  Business Partners Model identifies the different organizations, groups, and individuals that the organization interfaces with during normal business operations.  It articulates the different inputs that each organization receives from each business partner, and …  …the outputs that each business partner receives from the organization. Who are we working with?

EDUCAUSE Southwest Conference10 February 21, 2007 Why Use a Business Partners Model  Simple, usable model  Shows communication streams  Looks at communication in relation to the business  who are the contacts during normal business operations  what information is important to each group Who are we working with?

EDUCAUSE Southwest Conference11 February 21, 2007 KU Enterprise Business Partners Model Who are we working with?

EDUCAUSE Southwest Conference12 February 21, 2007 Models: What’s Next? Who are we working with?Business Partners model Why are we doing it?Value Chain Model What are we doing? Application Maps, Service Catalogs How do we manage the process? ITIL Services Model Where are we going?Strategic Planning How do we assess our progress? Assessment (TechQual+)

EDUCAUSE Southwest Conference13 February 21, 2007 Why Are We Doing It?  Need a practical model to determine how IT adds value to:  Higher Education in general  Our University in particular  Need a model that provides a:  High Level Business Model Focus  View University’s business goals as one enterprise  View overall processes rather than units & departments  Way to rationalize / prioritize applications and services  Performance Feedback / Assessment Model Why are we doing it?

EDUCAUSE Southwest Conference14 February 21, 2007 Enterprise Value Chain Model  Porter’s Value Chain Model  Created by M.E. Porter  Competitive Strategy, New York:The Free Press (1980)  Competitive advantage is based on cost or differentiation or both  Breaks down an industry or organization into a series of value-generating activities culminating in the total value delivered by an organization Why are we doing it?

EDUCAUSE Southwest Conference15 February 21, 2007 Enterprise Value Chain Model  Uniform way of looking at all organizations, i.e. universities  Gives organizations a better understanding of how different units function together  Good starting point to think about how to meet goals  Can show how IT enhances each link of the value chain  Acts as a framework for Application Maps & Service Catalogs  Parts of the Value Chain:  Primary Activities  Support Activities  Close to universal for every organization Why are we doing it?

EDUCAUSE Southwest Conference16 February 21, 2007 Value Chain: Porter’s Model Why are we doing it?

EDUCAUSE Southwest Conference17 February 21, 2007 Primary Activity Components Porter’s ModelHigher Education Model Inbound logistics: receiving & warehousing of raw materials; distribution to manufacturing as needed Admissions Research Proposals Enrollment Grants Operations: process of transforming inputs into finished products and services Instruction Research Counseling Research Admin. Outbound logistics: warehousing and distribution of finished goods Graduation Publication Placement Performance Marketing and Sales: identification of customer needs and generation of sales Recruitment Technology Transfer Service: support of customers after products and services are sold to them Academic support Service to Community Alumni support Why are we doing it?

EDUCAUSE Southwest Conference18 February 21, 2007 Primary Activities: Other Aspects  Process Management  Core Activities:  Teaching  Research  Service  Quality Management (of Core Activities)  Product Information (University Infrastructure Assets) Why are we doing it?

EDUCAUSE Southwest Conference19 February 21, 2007 Support Activity Components Porter’s ModelHigher Education Model Firm Infrastructure: organizational structure, control systems, company culture, etc. Administration Management Financial Management Human Resource Management: employee recruiting, hiring, training, development, and compensation. HR Management Technology Development: technologies to support value-creating activities. IT Management Classroom Management Research Resources Management Procurement: purchasing inputs such as materials, supplies, and equipment. Procurement Management Physical Plant Management Support Asset Information Why are we doing it?

EDUCAUSE Southwest Conference20 February 21, 2007 Value Chain: Template Why are we doing it?

EDUCAUSE Southwest Conference21 February 21, 2007 Value Chain: Higher Education (KU) Why are we doing it?

EDUCAUSE Southwest Conference22 February 21, 2007 Models: Next Steps? Who are we working with?Business Partners model Why are we doing it?Value Chain Model What are we doing? Application Maps, Service Catalogs How do we manage the process? ITIL Services Model Where are we going?Strategic Planning How do we assess our progress? Assessment (TechQual+) DL

EDUCAUSE Southwest Conference23 February 21, 2007 What Are We Doing? Technology and the Value Chain  Overall, technology is playing an ever greater role in business strategy  Technology is embedded at every link of the value chain – but not always apparent  How do we show technology’s importance to the value-generating activities of our organization?? How do we concretely show the value? An Enterprise Application Map

EDUCAUSE Southwest Conference24 February 21, 2007 Enterprise Application Map  Enterprise Application Map - an extension of the value chain  The Application Map seeks to categorize the applications and systems in an organization with links on the value chain.  It is:  A business and technology hybrid model  High-level What are we doing?

EDUCAUSE Southwest Conference25 February 21, 2007  Each application / system / etc. is placed on the appropriate area of the value chain  If it is used in multiple different functions, then put it in all of them that apply  Really not much more to it than that - creating the value chain is the biggest hurdle What are we doing?

EDUCAUSE Southwest Conference26 February 21, 2007 Why an Application Map?  Allows units to see where each specific application fits in relation to the high-level business areas in the organization  Helps find gaps where IT does not have any / adequate applications in a particular business area  Helps show how pervasive technology is in the organization  Can be used to illustrate justification for IT spending  Starts the process to visually see IT / Business alignment What are we doing?

EDUCAUSE Southwest Conference27 February 21, 2007 Models: Where to Next? Who are we working with?Business Partners model Why are we doing it?Value Chain Model What are we doing? Application Maps, Service Catalogs How do we manage the process? ITIL Services Model Where are we going?Strategic Planning How do we assess our progress? Assessment (TechQual+)

EDUCAUSE Southwest Conference28 February 21, 2007 Application Lists and Service Catalogs  Historical approach to meeting individual / unit needs  separate applications (Application lists)  ITIL Process Models  Recognizing interconnections between applications across the organization  ITIL Service Catalog concept  Moving from Applications lists  Services lists  Merges value to campus with application groups through operational and service level contracts What are we doing?

EDUCAUSE Southwest Conference29 February 21, 2007 How Do We Manage It?  ITIL service management concepts  IT Portfolio management concepts How do we manage it?

EDUCAUSE Southwest Conference30 February 21, 2007 Models: Almost There… Who are we working with?Business Partners model Why are we doing it?Value Chain Model What are we doing? Application Maps, Service Catalogs How do we manage the process? ITIL Services Model Where are we going?Strategic Planning How do we assess our progress? Assessment (TechQual+)

EDUCAUSE Southwest Conference31 February 21, 2007 Where Are We Going? Strategic Planning Process  Using these models, it becomes easier to focus on core institutional services and how IT can contribute  Highlights gaps in services  Provides foundation for strategic directions  Provides basis for new service proposals Where are we going?

EDUCAUSE Southwest Conference32 February 21, 2007 Models: The Final Step Who are we working with?Business Partners model Why are we doing it?Value Chain Model What are we doing? Application Maps, Service Catalogs How do we manage the process? ITIL Services Model Where are we going?Strategic Planning How do we assess our progress? Assessment (TechQual+)

EDUCAUSE Southwest Conference33 February 21, 2007 How Do We Assess Progress?  When planning any assessment activity, start by considering these four guiding questions:  What do we need to know?  Who can tell us?  How can we get the information?  What will it enable us to do?  The models discussed position IT well to answer these questions How do we assess it?

EDUCAUSE Southwest Conference34 February 21, 2007 Why Do Assessment?  Benchmark current services and use data to improve efficiency and effectiveness.  Measure users’ perceptions and satisfactions with services.  Establish what services and resources are needed and desired.  Increase dialogue with users. How do we assess it?

EDUCAUSE Southwest Conference35 February 21, 2007 Assessment Tools?  EDUCAUSE Core Data Service (  Provides comparison data about campus information technology environments and practices to help benchmark, plan for, and make decisions about campus IT services  TechQual+ (  Project to develop a scientifically reliable and valid instrument that can be adopted by all institutions of higher education to conduct assessments of technology services on their own campuses.  Modeled on the existing SERVQUAL, IS SERVQUAL, and LibQual+ approaches How do we assess it?

EDUCAUSE Southwest Conference36 February 21, 2007 Bringing It All Into Focus… People / Technology / Services / Processes Where We Want To Be Strategic Planning Project Portfolios IS Division / Unit Planning University Budget Request Mission / Vision Statements Project Planning Vendor Products / Changes Open Source Standards / Projects ITMBP State Project Plan Filings University Mission / Vision Dept. / School Plans & Projects State Regs / Oversight Board of Regents State Technical Architecture ITIL IS Identity Security Planning Assessment Business Partners ITIL Services Overlay Value Chain Application Maps, Service Catalogs Assessment Core Data Service TechQual+ Other Qualitative and Quantitative Methods Where We Are Strat egic Plan ning Projec t Portfol ios IS Division / Unit Planning University Budget Request Mission / Vision Stateme nts Projec t Planni ng Vendo r Produ cts / Chang es Open Source Standards / Projects ITM BP State Project Plan Filings University Mission / Vision Dept. / School Plans & Projects State Regs / Oversight Board of Regents State Technical Architecture ITIL Etc.… IS Identity Security Planning Assessment

EDUCAUSE Southwest Conference37 February 21, 2007 For More Information…  Elloumi, Fathi, Value Chain Analysis: a strategic approach to online learning, in Theory and Practice of Online Learning, Chapter 3, Athabasca University.  Hawkins, Brian, The EDUCAUSE “Grand Challenges” Initiative, EDUCAUSE Annual Conference,  ITIL Infrastructure Library, Office of Government Commerce, UK,  Martin, J. and J. Leben, Strategic information planning methodologies, NJ:Prentice-Hall  Porter, M.E., Competitive Strategy, New York:The Free Press  Sison, Raymund, et.al., Value chain framework and support system for higher education. Proceedings of the Philippine Computing Science Congress.  van der Merwe, A. and Cronje, J The educational value chain as a modelling tool in re- engineering efforts. In Proceedings of the 2004 international Symposium on information and Communication Technologies (Las Vegas, Nevada, June , 2004). ACM International Conference Proceeding Series, vol. 90. Trinity College Dublin, part=Proceedings&WantType=Proceedings&title=ACM%20International%20Conference%20Proce eding%20Series&CFID= &CFTOKEN= # part=Proceedings&WantType=Proceedings&title=ACM%20International%20Conference%20Proce eding%20Series&CFID= &CFTOKEN= #  Zielinski, Wojciech, ICT and competive advantage in higher education: applying value chain model and Balanced Scorecard for university, Proceedings of the 11 th International Conference of European University Information Systems, University of Manchester,

EDUCAUSE Southwest Conference38 February 21, 2007 Donna LissBeth Forrest Warner Associate Vice ProvostAssistant Vice Provost Thoughts? Questions?