ICT6221 Chapter 6 Planning Related IT Processes Paula Goulding.

Slides:



Advertisements
Similar presentations
TACTICAL/OPERATIONAL PLANNING
Advertisements

IBM Corporate Environmental Affairs and Product Safety
Copyright 2009  Develop the project charter: working with stakeholders to create the document that formally authorizes a project—the charter  Develop.
Tax Risk Management Keeping Up with the Ever-Changing World of Corporate Tax March 27, 2007 Tax Services Bryan Slone March 27, 2007.
2-1 The Organizational Context: Strategy, Structure, and Culture Chapter 2 © 2007 Pearson Education.
Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 2-1 The Organizational Context: Strategy, Structure, and Culture Chapter 2.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
AUDIT COMMITTEE FORUM TM ACF Roundtable IT Governance – what does it mean to you as an audit committee member July 2010 The AUDIT COMMITTEE FORUM TM is.
Chapter 2.
A framework for describing IT Project Management Processes and Tool Set Features Enterprise Project Management Framework.
Planning and Strategic Management
Chapter 6 Planning Related IT Processes
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Chapter 5 IT Processes Presented by Dr. Mohamed Sammouda.
Managing the Information Technology Resource Jerry N. Luftman
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
1 July 23, 2002 Strategic Technology Plan Briefing to LOT Committee.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Building and Sustaining Total Quality Organizations
The Information Systems Planning Process
Planning and Strategic Management
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Change Management Chris Colomb Trish Fullmer Jordan Bloodworth Veronica Beichner.
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
4. Quality Management System (QMS)
The future shape of business is being redefined through outsourcing.
MGT-555 PERFORMANCE AND CAREER MANAGEMENT
Internal Auditing and Outsourcing
© 2010 Plexent – All rights reserved. 1 Change –The addition, modification or removal of approved, supported or baselined CIs Request for Change –Record.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
PRODUCTS Existing New Existing MARKETS New
Software Project Management Lecture # 8. Outline Chapter 25 – Risk Management  What is Risk Management  Risk Management Strategies  Software Risks.
Continual Service Improvement Process
Copyright © 2011 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Planning and Strategic Management Chapter 04.
Software Project Management Lecture # 8. Outline Earned Value Analysis (Chapter 24) Topics from Chapter 25.
Information ITIL Technology Infrastructure Library ITIL.
© 2013 Cengage Learning. All Rights Reserved. 1 Part Four: Implementing Business Ethics in a Global Economy Chapter 9: Managing and Controlling Ethics.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Service Transition & Planning Service Validation & Testing
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
An Integrated Control Framework & Control Objectives for Information Technology – An IT Governance Framework COSO and COBIT 4.0.
IT Requirements Management Balancing Needs and Expectations.
McGraw-Hill/Irwin Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 3 Identification and Selection of Development Projects.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Bank Audit. Internal Audit Internal audit is an independent, objective assurance activity and can give valuable insight in providing assurance that major.
Service Level Agreements Service Level Statements NO YES The process of negotiating and defining the levels of user service (service levels) required.
4-1 Week 3 – Introduction to Management. 4-2 Topics Planning Process Planning Steps Levels of Planning Strategic Planning Strategic Planning Process.
Chapter 3 Strategic Information Systems Planning.
A Guide for Management. Overview Benefits of entity-level controls Nature of entity-level controls Types of entity-level controls, control objectives,
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Foundations of Information Systems in Business. System ® System  A system is an interrelated set of business procedures used within one business unit.
Project Management Project Integration Management Minder Chen, Ph.D. CSU Channel Islands
Information Technology Services Strategic Directions Approach and Proposal “Charting Our Course”
Audit Committee Presentation Annual Audit Plan
1 PRESENTATION TO THE PORTFOLIO COMMITTEE OF MINERAL RESOURCES. STATEGIC PLAN 2014/19 DATE: 8 JULY 2014 Programme Financial Administration.
12-CRS-0106 REVISED 8 FEB 2013 APO (Align, Plan and Organise)
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Information Technology Assessment Findings Presented to the colleges of the State Center Community College District.
Info-Tech Research Group1 Manage IT Budgets & Cost World Class Operations - Impact Workshop.
Company LOGO. Company LOGO PE, PMP, PgMP, PME, MCT, PRINCE2 Practitioner.
Alex Ezrakhovich Process Approach for an Integrated Management System Change driven.
Organizations of all types and sizes face a range of risks that can affect the achievement of their objectives. Organization's activities Strategic initiatives.
FHF Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Changing IT Managing Networks in a New Reality Alex Bakman Founder and CEO Ecora Software.
Information ITIL Technology Infrastructure Library ITIL.
Fundamentals of Information Systems, Sixth Edition
Transforming IT Management
The Organizational Context
Presentation transcript:

ICT6221 Chapter 6 Planning Related IT Processes Paula Goulding

ICT6222 Chapter Outline  Importance of planning to management  Levels of IT planning and implications  Strategic-level IT planning  Tactical-level IT planning  Operational-level IT planning  Global considerations in IT planning

ICT6223 Importance of IT  Must look across all other functions in enterprise  Must integrate business perspectives of other functions  Support specific business requirements at all levels  Deal with turbulent and dynamic environments

ICT6224 Layers of Management Focus

ICT6225 Components of Business Strategic Planning  Define IT mission  Define IT policies to carry out mission  Define business processes, information, and information flows  Define enterprise requirements for information throughout strategic time period

ICT6226 IT Strategy Planning  Evaluate alternate implementation of services, applications, and infrastructure  Define and prioritize strategic objectives with IS policies  Obtain approval for IS strategic plan  Control information systems strategic plan against tactical performance

ICT6227 Application Planning  Schedule of applications to be built or modified within set period of time  Address key functions of enterprise  Review existing and proposed applications –Emerging technologies –Integrated processes –Improved standards in development or maintenance

ICT6228 Considerations in Applications Planning  Abandon traditional approaches based on long-term stability of business environment  Alignment with strategic business objectives is paramount  Applications being considered should demonstrate: –Salience –Worth

ICT6229 Dimensions of Application Portfolio  Organization’s dependence upon the application  Strategic impact of the application

ICT62210 Application Portfolio Matrix

ICT62211 Application Prioritization Matrix

ICT62212 Application Prioritization Matrix  Business impact –Ability of the application to deliver a business benefit  Ease of execution –How many resources the application will consume –How difficult it will be for organization to implement application

ICT62213 Data Planning  Dependent on outcome of application plan  Data architecture may change to include: –Merging data storage technologies –Changes to the database architectures by vendor –Integrated data processes –Improved standards in development or maintenance of data

ICT62214 Objectives of Data Planning  Facilitate cost-effective and timely transformation of raw data into productive information  Facilitate reuse of data and information across the organization  Protect organization's data and information assets

ICT62215 Success Factors of Data Plan  Develop data models of key processes  Define underlying shared data used by key processes  Develop common definitions of “core” data and share with functional groups  Develop common information/data models for key processes  Identify how proposed applications identified in application plan affect data  Apply appropriate governance for data management

ICT62216 System Planning Objectives  Document which systems are planned for development  Document the justification for developing those systems  Identify time frames for developing those systems  Document impact on IT architecture of developing those systems  Document any implications on organization's disaster recovery plan

ICT62217 Network Planning Considerations  Impacts of recent mergers on network capacity  Impact of current network capacity and infrastructure of proposed applications  Opportunities to standardize components/services  Opportunities to consolidate existing services and infrastructure to enhance network: –Reliability –Availability –Service responsiveness –Security –Scalability

ICT62218 Network Planning Considerations  Security of network against threats  Recovery of network from catastrophes  Identification and repair of network performance issues  Customer services  Vendor management and service agreements  Cross-border issues  Hardware upgrade plan  Software upgrade plan  Capital investment plan

ICT62219 Project Planning  Uses results from application, data, network, and systems planning processes  Define technically feasible and manageable projects  Reflect strategic goals and direction  Plans include –Specification of resources –Time frames –Service level requirements

ICT62220 Service Level Planning and Management  Negotiates individual service agreements  Identifies individual requests for recovery, security, and audit ability  Forecasting level and volume of service agreements  Develops preventive maintenance plan

ICT62221 Recovery Planning and Management  Ensures continuation of business operations in event of failure/disaster  Multiple contingency plans  Consolidate recovery requirements for all service agreements  Define business and IT recovery-operating environment  Identify variances between operating environments and agreements  Develop overall recovery plan

ICT62222

ICT62223 Disaster Recovery Plan Elements  Data recovery  Technology recovery  Business-process recovery  Crisis management  Customer-support operations  Facilities  Human resources  Procedures for key suppliers and partners  Public relations and damage control  Protection of intellectual property

ICT62224 Elements of a Business-Continuity Plan

ICT Steps to Promote Continuity  Visualize  Itemize  Prioritize  Categorize  Minimize  Organize  Rehearse  Sponsor/Champion  Vigilant Monitoring

ICT62226 Security Issues  Unauthorized access to systems  Unauthorized access to confidential data  Virus attack  Denial of service attacks on Web sites and  Illegal/unwanted use of computer systems/equipment  Illegal use or monitoring of /Internet  Possible physical or virtual destruction of financial/administrative information

ICT62227 Top 10 Triggers of Unethical Employee Behavior 1.Efforts to balance work and family 2.Poor internal communications 3.Poor leadership 4.Work hours, work load 5.Lack of mgmt. support 6.Need to meet sales, budget, profit goals 7.Little recognition of achievements 8.Company politics 9.Personal financial worries 10.Insufficient resources

ICT62228 Audit Planning and Management  Ensures agreed levels of audit and compliance for systems, application, and services will be met  Evaluate and ensure adequacy of internal systems of control  Securities and Exchange Act of 1934

ICT62229 Fair Information Practices 1.NO personal record systems with secret existence 2.Rights of access, inspection, review, and amendment to systems that contain information about individuals 3.No use of personal information for purposes other than for intent it was gathered 4.Managers are responsible for reliability and security and can be held accountable 5.Governments have right to intervene

ICT62230 Corporate Responsibility Audit Steps  Gain CEO commitment  Appoint steering committee to guide  Appoint auditing team to develop questions  Diagnose corporate culture and investigate functional areas  Analyze mission statement  Seek reasons for inconsistent performance  Collect relevant industry information, benchmark studies, competitor’s information  Interview stakeholders involved in functional areas  Compare internal data and external perceptions  Write final report for managers and audit steering committee

ICT62231 Capacity Planning Importance  Reduces customer dissatisfaction –Identify potential bottlenecks  Reduces productivity decline –Ensures systems can handle peak times  Reduces budgetary constraints –Upgrades budgeted ahead of time  Improves stability –Can identify problems ahead of time and avoid or predict them

ICT62232 Organizational IT Capacity Planning Capacity planning process maturity level Characteristics Level 1 Reactive; firefighting Level 2 Efficient: professional and sophisticated firefighting Level 3 Fewer fires; analysis of problems, start of process improvement Level 4 Process includes procedural improvement Level 5 Process becomes self-correcting

ICT62233 Skills Planning Process  Define manpower requirements  Consolidate manpower required to support project and system plans  Identify existing and planned manpower skills  Establish and evaluate alternate manpower plans  Define effective education plan  Document manpower and education plans

ICT62234

ICT62235 Budget Planning and Value Management  Converts systems plans into financial terms  Identifies how funds will be obtained  Identifies how funds will be allocated  Decouple budget planning process from strategic planning process

ICT62236 Vendor Planning and Management  Outsourcing of services and other IT processes  Measure and monitor performance  Determine corrective action if necessary  Make readjustments if necessary

ICT62237 Management Systems Planning and Monitoring  Collect and summarize IT organization data  Compare results to IT organizational objectives and standards  Diagnose deviation or substandard performance  Analyze variance and initiate effectiveness/efficiency improvements

ICT62238 Management Systems Planning and Monitoring  Define detailed requirements based on enterprise policies  Evaluate alternative standards, procedures, methodologies  Design solutions  Publish instructions for use of standards, procedures, and methodologies  Installing solutions

ICT62239 Operational Level IT Planning  Day-to-day administration and execution of processes and plans  Project-related plans  Effective implementation of requirements at strategic and tactical levels  PMBOK