Management Information Systems, Sixth Edition Chapter 13: Choices in Systems Acquisition Objectives • Explain the differences among the alternatives to tailored system development: outsourcing, licensing ready-made software, using software as a service, and encouraging users to develop their own applications • List the business trade-offs in the various methods of acquiring systems Management Information Systems, Sixth Edition 2 Objectives (continued) • Describe which systems acquisition approach is appropriate for a particular set of circumstances • Discuss organizational policies on employee computer use Management Information Systems, Sixth Edition 3 Options and Priorities • There are four alternatives to in-house development: – – – – Outsourcing Licensing Using software as a service (SaaS) Having users develop the system • The deciding factor is usually cost when the desired application is available from multiple sources • Licensing is preferred due to low cost and immediate availability Management Information Systems, Sixth Edition 4 Options and Priorities (continued) • If licensing is not available: – Application service provider (ASP) is the next best choice – System is immediately available for a small startup fee • Third best choice is allowing users to develop their system • Last choice is to outsource, if non-IT employees cannot develop IS Management Information Systems, Sixth Edition 5 Options and Priorities (continued) • Many factors must be considered in addition to cost and quality • Alternatives are not fully comparable, and often cannot be simply prioritized Management Information Systems, Sixth Edition 6 Options and Priorities (continued) Management Information Systems, Sixth Edition 7 Outsourcing • Outsourcing has two meanings in the IT arena: – To commission the development of an application to another organization – To hire the services of another company to manage all or parts of the services usually rendered by an IT unit in the organization • May not include development of new applications Management Information Systems, Sixth Edition 8 Outsourcing Custom-Designed Applications • Custom-designed (tailored) software: software developed specifically for the needs of an organization • Several advantages: – – – – – – Good fit to need Good fit to culture Dedicated maintenance Smooth interface Specialized security Potential for strategic advantage Management Information Systems, Sixth Edition 9 Outsourcing Custom-Designed Applications (continued) • Disadvantages: – – – – High cost The organization must fund all development costs Staff may be diverted from other projects Software is less likely to be compatible with other organizations’ systems Management Information Systems, Sixth Edition 10 Outsourcing Custom-Designed Applications (continued) Management Information Systems, Sixth Edition 11 Outsourcing Custom-Designed Applications (continued) • Must deal with an inherent conflict when outsourcing software development: – Client wants a firm contract and set of requirements – Specific requirements may mean that no deviation is allowed if changes are needed later as development progresses • Changes may involve hefty additional charges • Offshoring: outsourcing to other countries such as India, China, Philippines, etc. Management Information Systems, Sixth Edition 12 Outsourcing IT Services • Many businesses turn to IT companies for longterm services, including: – – – – – – – Purchasing and maintaining hardware Developing, licensing, and maintaining software Installing communications networks Maintaining and operating Web sites Staffing help desks Running IT daily operations Managing customer and supplier relations • Business process outsourcing: outsourcing routine processes, such as order entry or HR Management Information Systems, Sixth Edition 13 Outsourcing IT Services (continued) • Some companies realize IT is not their core competency and should not be a focus of their efforts • Pace of development in IT requires a high level of expertise • A growing portion of IS budgets are being allocated for outsourced services • Popular IT service providers include: – – – – IBM EDS Accenture Unisys Management Information Systems, Sixth Edition 14 Outsourcing IT Services (continued) Management Information Systems, Sixth Edition 15 Outsourcing IT Services (continued) • Outsourcing companies are known as vendors • IT outsourcing contracts are typically long-term contractual relationships, usually for seven to 10 years • Clients sometimes find themselves bound by obsolete contracts, and must renegotiate Management Information Systems, Sixth Edition 16 Advantages of Outsourcing IT Services • Several advantages of outsourcing: – Improved financial planning • Client knows the exact cost of IS functions – Reduced license and maintenance fees • IS professional firms pay discounted prices for tools and can pass on the savings to their clients – Increased attention to core business • Executives can concentrate on their company’s core business Management Information Systems, Sixth Edition 17 Advantages of Outsourcing IT Services (continued) • Advantages of outsourcing – Shorter implementation cycles • IT vendors can complete new applications faster – Reduction of personnel and fixed costs – Increased access to highly qualified know-how – Availability of ongoing consulting as part of standard support • Sometimes outsourcing does not save the client money Management Information Systems, Sixth Edition 18 Advantages of Outsourcing IT Services (continued) Management Information Systems, Sixth Edition 19 Risks of Outsourcing IT Services • Disadvantages of outsourcing: – Loss of control • High risk in a quickly changing industry – Loss of experienced employees • Usually involves transferring employees to vendor – Risks of losing a competitive advantage • May disclose trade secrets – High price • Can be more expensive than keeping the tasks inhouse • Important to clearly define contract terms Management Information Systems, Sixth Edition 20 Risks of Outsourcing IT Services (continued) Management Information Systems, Sixth Edition 21 Risks of Outsourcing IT Services (continued) • Service-level agreement – The most important element of an outsourcing agreement – Lists all services expected of the vendor – Defines the metrics to be used to measure vendor performance • The client must develop the service level and metrics list, not the vendor Management Information Systems, Sixth Edition 22 Licensing Applications • Purchasing software usually means purchasing licenses to use the software • There is a large selection of high-quality packaged software available • Two groups of ready-made software: – Relatively inexpensive software that helps in the workplace, such as office suites – Large applications that support entire organizational functions, such as HR or financial management • Typically cost millions of dollars Management Information Systems, Sixth Edition 23 Software Licensing Benefits • Licensing benefits include: – – – – Immediate system availability High quality Low price (license fee) Available support • Beta version: a prerelease version of software to be tested by companies who want to use it • Often includes a period of up to one year of free service • Large applications require installation specialists Management Information Systems, Sixth Edition 24 Software Licensing Risks • Software licensing has risks including: – Loose fit between needs and features • Must determine if the software will comply with company needs and organizational culture – Difficulties in undertaking custom modifications – Dissolution of the vendor • May be left without support and maintenance – High turnover of vendor personnel • Turnover among IS professionals is high • May result in lowered support expertise from vendor Management Information Systems, Sixth Edition 25 Steps in Licensing Ready-Made Software • Selecting software involves a large money investment and a long-term commitment • Project management team responsibilities: – Identify problem or opportunity • Define functional requirements – Identify potential vendors – Solicit vendor information • Request for information (RFI): request for informal information about a vendor’s product – Define system requirements Management Information Systems, Sixth Edition 26 Steps in Licensing Ready-Made Software (continued) • Project management team responsibilities (continued): – Request vendor proposals • Request for proposal (RFP): a document that specifies all requirements and solicits a proposal – – – – Review proposals and screen vendors Visit sites where the application is in use Select a vendor Benchmark the application by comparing actual performance against specific quantifiable criteria Management Information Systems, Sixth Edition 27 Steps in Licensing Ready-Made Software (continued) • Project management team responsibilities (continued): – Negotiate a contract • Should define performance expectations and penalties for failure to meet expectations – Implement the new system – Manage postimplementation support Management Information Systems, Sixth Edition 28 Steps in Licensing Ready-Made Software (continued) Management Information Systems, Sixth Edition 29 Steps in Licensing Ready-Made Software (continued) Management Information Systems, Sixth Edition 30 Software as a Service • Application service provider (ASP): an organization that offers software through communication lines (such as the Web) • Software as a service (SaaS): applications available through the Web – No software is installed on a client’s computers – Files may be stored on local storage devices • ASPs may rent the software they offer Management Information Systems, Sixth Edition 31 Software as a Service (continued) • Renting software has benefits: – – – – – – No need to learn how to maintain the software No large start-up fee Storage hardware is unnecessary Software is usually available sooner A good option for small companies Is considered a “software on demand” approach Management Information Systems, Sixth Edition 32 Software as a Service (continued) • Renting software also has risks: – Lack of control may be an issue, as the client’s data is managed by the vendor – Vendor is unlikely to make many customized changes to the software – Response time is impacted by traffic levels – May be security risks through a public network • Many clients used leased lines instead of the Internet to limit security risks Management Information Systems, Sixth Edition 33 Software as a Service (continued) Management Information Systems, Sixth Edition 34 Caveat Emptor • ASP may be disappointing in some areas: – Scope of services provided – Level of reliability • Manager guidelines when selecting an ASP: – – – – – Check the ASP’s history: get references Check the ASP’s financial strength Ensure you understand the price scheme Get a list of the provider’s infrastructure Craft the service contract carefully Management Information Systems, Sixth Edition 35 Caveat Emptor (continued) • Uptime: proportion of time that the ASP’s systems and communications links are up – No ASP has 100% uptime – 99.9 % uptime = up to 500 minutes/year of downtime – 99.999% uptime = less than 5 minutes/year of downtime • Recommended for critical applications Management Information Systems, Sixth Edition 36 Caveat Emptor (continued) • Four categories of typical users of ASP services: – Rapidly growing companies that rely on software for deployment of their operations – Small companies without cash to pay up-front costs for software – Medium-sized companies that need expensive software – Organizational units at remote locations • Storage service provider (SSP): rents storage space for remote storage of client files Management Information Systems, Sixth Edition 37 User Application Development • User application development: nonprogrammer users write their own business applications • User-developed software is usually: – Simple and limited in scope – Small applications developed for immediate or brief needs – Maintained by end users Management Information Systems, Sixth Edition 38 User Application Development (continued) Management Information Systems, Sixth Edition 39 Managing User-Developed Applications • Challenges of user-developed applications include: – – – – Managing the reaction of IT professionals Providing support Compatibility Managing access Management Information Systems, Sixth Edition 40 Managing User-Developed Applications (continued) Management Information Systems, Sixth Edition 41 Advantages and Risks • Advantages of user development of applications: – – – – – – Shortened lead times Good fit to needs Compliance with culture Efficient utilization of resources Acquisition of skills Freeing up IS staff time Management Information Systems, Sixth Edition 42 Advantages and Risks (continued) • Disadvantages of user-developed applications: – – – – – Poorly developed applications Islands of information Duplication Security problems Poor or no documentation Management Information Systems, Sixth Edition 43 Summary • Several alternatives to having applications developed in-house include outsourcing, licensing ready-made software, using software as a service, and allowing users to develop their own software • Outsourcing can mean commissioning development or assigning services to vendor • Outsourcing custom-designed applications might afford the organization a good fit of software to need Management Information Systems, Sixth Edition 44 Summary (continued) • Outsourcing IT services has great benefits, such as reduced cost and allowing the organization to focus on its core competency • Outsourcing IT services has potential risks, such as loss of control, loss of experienced employees, and loss of competitive advantage • Licensing software advantages include software being immediately available and low-priced • Disadvantage of licensing software is often a loose fit to the organization’s needs Management Information Systems, Sixth Edition 45 Summary (continued) • Software as a service, from an ASP, is a popular method of obtaining software for a monthly fee • User application development advantages include short lead time, good fit, freeing IT staff • User application development disadvantages include poor quality, islands of information, security problems, and poor documentation • Over half of America’s office workers have rich computer resources • Policies must be established to prevent computer abuse by employees Management Information Systems, Sixth Edition 46