kumpulan 2 a closer look 13.4 & a closer look13.5 name : matrik no : nor melissa bt azlan...

20
KUMPULAN 2 A CLOSER LOOK 13.4 & A CLOSER LOOK13.5 NAME : NAME : MATRIK MATRIK NO : NO : NOR MELISSA BT AZLAN NOR MELISSA BT AZLAN D20072030862 D20072030862 AZIZAH BT SADELI AZIZAH BT SADELI D20072030866 D20072030866 ZARINA BT SULEIMAN ZARINA BT SULEIMAN D20072030867 D20072030867 NUR HIDAYATI BT ISMAIL NUR HIDAYATI BT ISMAIL D20072031737 D20072031737 ROSE DIANI BT ZAINI ROSE DIANI BT ZAINI D20072031738 D20072031738

Upload: anton-luman

Post on 15-Dec-2015

217 views

Category:

Documents


1 download

TRANSCRIPT

KUMPULAN 2A CLOSER LOOK 13.4

& A CLOSER LOOK13.5

NAME : NAME : MATRIK NO MATRIK NO ::NOR MELISSA BT AZLAN NOR MELISSA BT AZLAN D20072030862D20072030862AZIZAH BT SADELIAZIZAH BT SADELI D20072030866D20072030866ZARINA BT SULEIMANZARINA BT SULEIMAND20072030867D20072030867NUR HIDAYATI BT ISMAILNUR HIDAYATI BT ISMAIL D20072031737D20072031737ROSE DIANI BT ZAINIROSE DIANI BT ZAINI D20072031738D20072031738

13.4 - Identifying High-Payoff 13.4 - Identifying High-Payoff Projects Projects

WFF (Wing Fat Foods) – wholesaler, delivering perishable and nonperishable foodstuffs as well as hardware, kitchenware and household to restaurants, groceries and similar business along the Atlantic Coast of the United States.

CSC MethodCSC MethodStep 1 Pre-study preparation : Determine scope and participants and

collect project idea stimuli. The analyst invited 25 IT users to participate in an in-depth

interview Collected project ideas to serve as stimuli.

Step 2 Participant interviews : Elicit personal constructs from

organization members. Conducted 25-50 minute interviews with each participant Showing the participant three system description Asking him or her to rank the system attributes and explain their

importance to the organization (a line of questions was asked until the

participant suggested a concrete feature or attribute) The analyst collect about 8 chains of suggestions per participant.

Step 3 Analysis : Aggregate personal constructs into CSC models

Clustered the interview statements into constructs and mapped it into a matrix.

Mapping each cluster into CSC map Represented the the construct as nodes and the links in the chains as

lines connecting the nodes.

Clustered the chains using the Ward and Peppard strategic planning framework.

The depicts an organization-specific CSC model consists : From left to right Descriptions of desired system attributes Resulting expected performance outcomes Associated organizational goals

Step 4 Idea workshops : Elicit feasible strategic IT from technical and

business experts and customers CSC maps were used by both IT professionals from within WFF and

non-IT customers as starting point for developing a portfolio of IT proposals.

Yield 14 project ideas including decision support system for scheduling, routing and loading trucks for delivery as well as the support activities for existing systems including training and updated equipement and maintenance support.

Resource Allocation Consists of developing the plans for hardware, software, data

communications and networks, facilities, personnel and financial – to execute the master development plan.

A contentious process in most organizations because opportunities and requests for spending far exceed the available funds – can lead to intense, highly political competition among organizational units.

Requests for funding approval from the steering committee fall into 2 categories :

1st category : consists of projects and infrastructure that are critical for the organization to stay in business. Example : it may imperative to purchase or upgrade hardware if the network or disk drives or the processor on the main computer are approaching capacity limits.

2nd category : consists of less-critical items such as new projects, maintenance or upgrades of existing systems and infrastructure to support systems and future needs.

Outsourcing, Offshore Outsourcing and IT Outsourcing, Offshore Outsourcing and IT as a Subsidyas a Subsidy Outsourcing is contracting work to be completed by an outside

vendor. The major reasons for outsourcing, cited by a survey of large

US companies are : Desire to focus on core competency (36%) Cost reduction (36%) Improve quality (13%) Increase speed to market (10%) Faster innovation (4%) CIOs are now focusing more on outsourcing to deliver business

value beyond the traditional areas of cost savings and operational efficiencies in response to increasingly dynamic environment.

Over 45% of the firms that expect to be involved in outsourcing reported applications development is likely to lead all other IT functions outsourced followed by applications maintenance (35%), telecommunications/LAN (33%) and PC maintenance (33%).

Since the late 1980s, many organizations have outsourced the majority of their IT functions rather than just incidental parts.

The trend became classic in 1989 when Eastman Kodak transferred its data centers to IBM under 10 year, $500 million contract.

Advantages and Advantages and DisadvantagesDisadvantages

Advantages Transactional outsourcing agreements – company outsources

discrete processes that have well-defined business rules, have a success rate of 90%.

Co-sourcing alliances – client company outsourcer vendor jointly manage projects such as application development or maintenance work, have a success rate of 63%.

Strategic partnerships – a single outsourcer takes responsibility for the majority of a client company’s IT services, has a success rate of about 50%.

Potential outsourcing benefits : Financial

Avoidance of heavy capital investment, thereby releasing funds for other uses.

Improved cash flow and cost accountability Improved cost benefits from economies of scale and from sharing

computer housing, hardware, software and personnel.

Less need for expensive office space. Reduction and control of operating costs. Technical Access to new information technologies Greater freedom to choose software due to a wider range of hardware Ability to achieve technological improvements more easily Greater access to technical skills not available internally Faster application development and placement of IT applications into

service. Management Concentration on developing and running core business activity.

Improved company focus. Delegation of IT development (design, production and acquisition) and

operational responsibility to suppliers Elimination of need to recruit and retain competent IT staff Reduced risk of bad software. Human Resources Opportunity to draw on specialist skills available from a pool of expertise

when needed. Enriched career development and opportunities for remaining

staff.

Quality Clearly defined service levels Improved performance accountability Improved quality accreditation Flexibility Quick response to business demands (agility) Ability to handle IT peaks and valleys more effectively (flexibility).

Disadvantages shirking occurs when a vendor deliberately underperforms while

claiming

full payment. poaching occurs when a vendor develops a strategic application for a

client and then uses it for other clients. opportunistic repricing (“”holdup”) occurs when a client enters into a

long

term contract with a vendor and the vendor changes financial terms at

some point or over-charges for unanticipated enhancements and contract

extensions.

Irreversibility of the outsourcing decision possible breach of contract by the vendor or its inability to deliver Loss of control over IT decisions Loss of critical IT skills Vendor lock-in Loss of control over data Loss of employee morale and productivity Uncontrollable contract growth Failure to consider all of costs

In making a decision to outsource, executives should In making a decision to outsource, executives should consider 5 major risk areas :consider 5 major risk areas :

i.i. Higher developmental or operational costs than anticipatedHigher developmental or operational costs than anticipated

ii.ii. Inability to provide the expected service levels at Inability to provide the expected service levels at implementationimplementation

iii.iii. Exceeding the time to continueExceeding the time to continue

iv.iv. Neglecting to navigate the internal politics of the Neglecting to navigate the internal politics of the outsourcing companyoutsourcing company

Strategies For Strategies For OutsourcingOutsourcing

There have 6 Strategies :There have 6 Strategies :

1. Understand the project•have a high degree of understanding of the project.

2. Divide and conquer•Dividing a large project into smaller and more manageable pieces.

3. Align incentives•Designing contractual incentives based on activities that can be measured accurately can result in achieving desired performance.

4. Write short-period contracts• Contract may be written for 5-10 year terms.

5. Control subcontracting• Vendors may subcontract some of the services to other

vendors.

6. Do selective outsourcing• Cramm (2001) suggests than an organization insource

important work, such as strategic applications, investments and HRM.

Continue…Continue…

Is outsourcing with a vendor located in a country other than the one in which the client company is based.

This trend is primarily due to :

i) global markets

ii) lower cost

iii) increased access to skilled labor

Aspray (2006)

Worldwide : Regional divisions of labor

India – US

Eastern Europe, Russia – Western Europe

China – Asia Pacific, Japan

Offshore OutsourcingOffshore Outsourcing

Outsourcing can be done in many countries with various outsourcers.

Factor : cost, technical capabilities, business and political environment, quality infrastructure, risk

About one-third of Fortune 500 companies outsource software development to software companies in India.

It can reduce IT expenditures by 15% - 25% within the first year and in long term, outsourcing can help reduce cost and improve the quality of IT services delivered. (Davison, 2004)

Continue…Continue…

However, organizations must balance the risks and fears involved in offshore outsourcing including :

• Cost-reduction expectations• Data/security and protection• Process discipline which is the use of the same process

repeatedly without innovation• Loss of business knowledge• Vendor failure to deliver• Scope creep, which is the request for additional services

not included in the outsourcing agreement• Government oversight/regulation• Differences in culture• Knowledge transfer

Continue…Continue…

Based on cased study, the types of work that are not readily offshore outsourced including :

• Work that has not been routinized

• Work that if offshored would result in the client company losing too much control over critical operations

• Situations in which offshoring would place the client company at too great a risk to its data security, data privacy or intellectual property and proprietary information

• Business activities that rely on an uncommon combination of specific application-domain knowledge and IT knowledge in order to do the work properly.

Continue…Continue…

Evaluating Evaluating OutsourcingOutsourcing

In a survey of senior IT managers in the US and Europe, undertaken by IDG Research Services, the majority rated their ability to measure the business value of outsourcing relationships as “fair” or “poor”.

For outsourcing, the balance scorecard (described in section 13.3 and table 13.6) can be applied to assess value creation in the outsourcing relationship.

Software applications such as dashboard for tracking specific measures can provide metrics.

The balance scorecard can also be used to provide periodic feedback of the value of the outsourcing agreement.