IT Project Governance - ETH - DMTEC

advertisement
IT Project Governance
Prof. Dr. Juliana Sutanto
Chair of Management Information Systems (MIS)
Scope of Work
Strategic
Portfolio Management The continuous process of identifying, selecting, and managing the optimum set of Portfolio investments to realize maximum business value.
Tactical
Project management
The application of knowledge, skills, tools, and techniques to Project activities to meet the Project requirements
Sources: • Chevron
• Gartner Group • PMI Combined Standards Glossary (2nd ed.)
Scope of Initiatives
IT
Business/IT
Jsutanto©
Enterprise
2
Agenda
• IT Development
• IT Implementation
• IT Outsourcing
– Vendor Selection
• IT Offshoring
Jsutanto©
3
IT Project Phases
Jsutanto©
4
5
Jsutanto©
5
Alternative IT Development Approaches
Approaches
Description
Focus
Traditional System Life Cycle
Go‐through a fixed sequence of steps with sign‐offs after each step and careful documentation.
Prototyping
Quickly develop a working model of the system; use the model to gain experience and decide how the final system should operate.
Application Packages
Purchase application software from a vendor; customize the software if necessary.
End‐User Development
Provide tools and support that make it practical for end users to develop their own information systems.
Jsutanto©
6
Comparison
Approach
Traditional
System Life
Cycle
Prototyping
Advantages
„
„
„
„
„
„
„
Application
Packages
„
„
„
„
End-User
Development
„
„
Disadvantages
Systematic development processes
Enforces quality by maintaining standards
Less likely to make mistakes or have
Omissions
„
Helps clarify user requirements
Helps verify design feasibility
Promotes user participation
May produce part of the final system
„
Software exists (& can be tried out)
Software has been used for similar problems
elsewhere
Shortcuts delay for system development
Documentation Available
„
By pass the IT Dept and avoids delays
User controls the application & can change it
as needed
„
„
„
„
„
„
„
„
„
„
„
Excess documentation
Problematic Sign-offs
Long Process
(Unclear user requirements)
Inadequate problem analysis
User may not give up the prototype
May require “super-programmers”
Confusion completion
Controlled by vendor
Package’s limitations may prevent desired
business processes
May be difficult to customize
Lack of intimate knowledge of the system
System Quality
May eventually require more consulting &
maintenance effort from the IT Dept.
(Alter, 2002)
7
Jsutanto©
Hybrid Approaches
• Examples:
–
Use a Prototype as part of the Traditional System Life
Cycle
–
Use a small Application Package as a Prototype
–
Adopt aspects of a Traditional System Life Cycle to
purchasing an Application Package
–
Add End-User Development component to Traditional
System Life Cycle
Jsutanto©
8
Two Antithetical Development
Approaches
1. MDA (Model Driven Architecture)
2. XP (eXtreme Programming)
• Both of them can lower development costs?
(Alter, 2002)
Jsutanto©
9
1. MDA
• Yet another architectural scheme
• Start with a Platform Independent Model (PIM)
which lives forever
• Then translate it (using automated tools) to a
Platform Specific Model (PSM)
(Alter, 2002)
Jsutanto©
10
1. MDA
• Sponsored by the OMG
• Its underlying technologies, XML and UML are
widely accepted standards
• In practice, very tool dependent
(Alter, 2002)
Jsutanto©
11
2. XP
• Assume:
“organizations evolve so rapidly that bothering to
set up a highly detailed architecture (prior to
beginning coding) is a waste of time”
(Alter, 2002)
Jsutanto©
12
2. XP
• Can be viewed as a form of rationalized RAD
• No requirements/design effort can anticipate
change. It’s inevitable – embrace it, prepare to
support it.
(Alter, 2002)
Jsutanto©
13
2. XP
• OO Languages and development methodologies
have been successful in allowing big projects to
be composed from modular components
• Allow each component to be an RAD project,
– Quick initial development
– Constantly evolving as inevitable changes are
discovered
(Alter, 2002)
Jsutanto©
14
2. XP
• Program in pairs (continuous mutual code review)
• No specialization
– Programmers = architects = designers = analysts
– Continuous changes (toward simplification) are
encouraged at any level (code to architecture) at
any time
• Development is driven by tests
• Integrate immediately after development and
successful unit testing
Jsutanto©
(Alter, 2002)
15
Both techniques have success stories?
• XP works for extraordinarily talented and flexible
development teams in highly volatile
environments
• MDA works in more stable environments with
more traditional “big shop” development teams
(Alter, 2002)
Jsutanto©
16
Agenda
• IT Development
• IT Implementation
• IT Outsourcing
– Vendor Selection
• IT Offshoring
Jsutanto©
17
IT Implementation
Conversion Strategy
• Direct Cutover (Big Bang)
• Parallel Strategy
• Phased Approach
Jsutanto©
18
Tektronix Case Example
• Spent around 2 months ensuring that Oracle could do what
Tektronix needed
• Phased implementation approach
– 5 major sub-projects
1. Implement financial management system (FINANCIALS)
2. Implement order management/accounts receivable (OMAR) in the
1st division
3. Implement OMAR in the 2nd division
4. Implement OMAR in the 3rd division
5. Global rollout
– Financials were implemented in parallel with OMAR at the 1st division
– Implement in the US first
(Harvard Business School, 1999)
Jsutanto©
19
Tektronix Case Example
(Harvard Business School, 1999)
Jsutanto©
20
Tektronix Case Example
• Total costs: approx. $55 million
• Total time taken: around 6 years
• Results:
– Finished goods inventory visibility regardless of where
in the world it was located
– Same day shipments rise from 15% to nearly 75%
– Cycle time expended in obtaining credit approvals,
from over 24 hours to virtually 0 hour
(Harvard Business School, 1999)
Jsutanto©
21
Cisco Case Example
• Spent 10 days writing RFP, giving vendors 2 weeks to
respond. After a 75-day selection process, Oracle won
• Big bang implementation approach:
1.
2.
3.
4.
Demonstrate software’s capacity to take a Cisco order all
the way “from quote to cash”
Make the system works: generate detailed scripts of
procedures used to complete a business process
Test the system
Test the full system & Assess readiness to “go live”
(Harvard Business School, 2002)
Jsutanto©
22
Cisco Case Example
• Total costs: approx. $15 million
• Total time taken: around 9 months
• Results?
(Harvard Business School, 2002)
Jsutanto©
23
Agenda
• IT Development
• IT Implementation
• IT Outsourcing
– Vendor Selection
• IT Offshoring
Jsutanto©
24
Why Outsourcing IT?
• Vendor Economics of Scale
– Cost Reduction
– To Increase Shareholder’s Value
• Vendor Specialization
– Improve Performance
– To Focus on Core Competence
• To Provide IT Professionals Better Career Prospects
25
Types of IT Outsourcing
Why Finding the Right Vendor is Important?
• To ensure continuity
• To potentially gain a strategic partner
(Bogue 2005)
Jsutanto©
27
Vendor Selection Process
(NPower Network)
Jsutanto©
28
Vendor’s Competencies
(Willcocks et al. 2009)
Jsutanto©
29
Some Criteria for Vendor Selection
• People Fit
• Cost
–
–
–
–
–
–
• Technical Fit
–
–
–
–
–
Completeness
Ease of Use
Documentation
Transportability
Expandability
Purchase Price
Customization Cost
Training Cost
Maintenance Cost
Consulting Charges
Conversion Costs
• Financial Strength
• Track Record
Jsutanto©
30
Sample Evaluation Matrix
(NPower Network)
Jsutanto©
31
Hidden Costs of IT Outsourcing
Vendor Search
&
Contracting
Costs
Original Idea
to Outsource
•
Initial
Transition
Costs
Cost of Managing the
IT‐Outsourcing
Effort
Post‐IT‐
Outsourcing
Transition
Costs
Time
Change of IT Vendor or
Reintegration of IT
Beginning of the
IT‐Outsourcing
Relationship
Reducing Hidden Costs
–
–
–
–
–
–
Choose activities that are safe to outsource
Spend some time researching vendors
Contract or hire people with outsourcing experience
Draft tight contracts
Cultivate the vendor relationship
Keep key IT people in-house
(Barthélemy, 2001)
Jsutanto©
The Golden Triangle
Time
Time
Budget
Quality/Scope
Budget
Time
Budget
Quality/Scope
Quality/Scope
Quality
& Scope
Budget
Time
33
Jsutanto©
IT Outsourcing Management
• Relationship with vendor must be
aligned with the strategic intents
underlying outsourcing initiative
– IT improvement
• Do IT better
– Business impact
• Use IT to achieve better business
results
– Commercial exploitation
• Exploit IT assets externally
(DiRomualdo & Gurbaxani, 1998)
Jsutanto©
Eastman Kodak Case
•
Best-of-Breed IT Outsourcing Strategy with 4 Main Suppliers
•
Relationships with vendors
– Collaborative; not adversarial
– Long-term mutual benefits; not short-term
– Making systemic improvements on a global basis; not local
•
Results
– IT capital costs dropped 90%
– PC support costs dropped 5-10%
– Mainframe operations costs were cut 10-15%
Jsutanto©
35
Agenda
• IT Development
• IT Implementation
• IT Outsourcing
– Vendor Selection
• IT Offshoring
Jsutanto©
36
Offshoring Trends
•
Rising spend on offshore outsourcing for IT and business services
– > $55 billion in 2008
– Annual growth rate of 20% over the next 5 years
•
Multi-sourcing
•
India’s changing role and China’s promise
– India and China are increasing their own offshoring work to other
countries
•
Emerging country competition (non-BRIC)
– Shared language, culture and/or history continue to influence
purchasing decisions (e.g. France to Northern Africa, UK to South
Africa, USA to the Philippines)
•
Near-shoring vs long-run “bestshoring”
(Willcocks et al. 2009)
Jsutanto©
37
Offshoring Trends
(Willcocks et al. 2009)
Jsutanto©
38
Countries Attractiveness – Key Factors
1. Costs
– Labor costs
– Infrastructure costs
– Corporate taxes
(Willcocks et al. 2009)
Jsutanto©
39
Countries Attractiveness – Key Factors
2. Skills availability
(Willcocks et al. 2009)
Jsutanto©
40
Countries Attractiveness – Key Factors
3. Environment
–
–
–
–
Government support
Business environment
Living environment
Accessibility
(Willcocks et al. 2009)
Jsutanto©
41
Countries Attractiveness – Key Factors
4. Infrastructure quality
–
–
–
–
Telecoms and IT
Real estate
Transportation
Power supply
(Willcocks et al. 2009)
Jsutanto©
42
Countries Attractiveness – Key Factors
5. Risk Profile
–
–
–
–
–
Security
Disruptive events
Regulatory risks
Macroeconomic risks
Intellectual property risk
(Willcocks et al. 2009)
Jsutanto©
43
Where will you offshore your IT?
Jsutanto©
44
Takeaways
• IT development approaches (traditional & hybrid)
• IT implementation approaches
– “One-size does not fit all”
• IT vendor selection processes and criteria
• IT offshore
– Countries attractiveness
Jsutanto©
45
References
•
Alter, S. Information Systems, Prentice Hall, 2002
•
Barthélemy, J. The Hidden Costs of IT Outsourcing, Sloan Management Review, 2001,
pp.60-69
•
Bogue, R.L. Three keys to selecting the right vendor for your next project, TechRepublic,
2005
•
Cisco Systems, Inc.: Implementing ERP, HBS, 2002
•
DiRomualdo, A. & Gurbaxani, V. Strategic Intent for IT Outsourcing, Sloan Management
Review, 1998, pp.67-80
•
NPower Network, Selecting the Right Technology Vendor
•
Tektronix, Inc.: Global ERP Implementation, HBS, 1999
•
Willcocks, L., Griffiths, C., Kotlarsky, J. Beyond BRIC: Offshoring in non-BRIC countries:
Egypt – a new growth market, LSE Outsourcing Unit report, 2009
Jsutanto©
46
Next Week Group Presentation
Harley
1. Based on the information in the case, which
provider would you select (and why)?
2. What is your overall assessment of Harley’s
approach to enterprise software selection?
What (if anything) would you have done
differently?
Jsutanto©
47
Download