Chapter 4_ Information Technology Development Risks
Chapter 4_ Information Technology Development Risks
Example:
Developing Strategic Plans
Ben & Jerry’s Mission Statement
▸Strategic planning begins with a vision,
Ben & Jerry’s is dedicated to the
or an image of the future.
creation & demonstration of a new
▸The vision is translated into mission,
corporate concept of linked prosperity.
which serves as the guiding light for
Our mission consists of three
developing a set of objectives.
interrelated parts. Underlying the three-part mission
mission is the determination to seek statement—comprised of product,
new and creative ways of addressing economic and social components.
all three parts while holding a deep
respect for individuals inside and IT Objectives might be:
outside the company, and for the 1.Create an atmosphere that embraces
communities of which they are a part. innovation and change.
2.Apply computer hardware and
▸Product: To make, distribute, and sell software technologies to opportunities
the finest quality all natural ice cream that promote prosperity.
and related products in a wide variety of 3.Incorporate an enterprise-wide
innovative flavors from Vermont dairy information system to facilitate the
products. intra-company coordination of business
▸Economic: To operate the Company activities.
on a sound financial basis of profitable 4.Develop a technology-based
growth, increasing value for our communications network capable of
shareholders, and creating career linking suppliers, customers, and
opportunities and financial rewards for employees into a seamless, virtual and
our employees. extended enterprise.
▸Social: To operate the company in a
way that actively recognizes the central IT Objectives might be:
role that business plays in the structure 1.Create an atmosphere that embraces
of society by initiating innovative ways innovation and change.
to improve the quality of life of a broad 2.Apply computer hardware and
community—local, national, and software technologies to opportunities
international. that promote prosperity.
3.Incorporate an enterprise-wide
Ben & Jerry’s IT Mission Statement information system to facilitate the
Might Be: intra-company coordination of business
The Information Systems function activities.
intends to offer high-quality, innovative 4.Develop a technology-based
information processing and communications network capable of
management services to internal and linking suppliers, customers, and
external information consumers, while employees into a seamless, virtual and
providing a reliable, responsive, and extended enterprise.
leading-edge technology infrastructure
throughout the entire organization IT Strategy might be:
aimed at supporting new and creative The IT function will utilize a
ways of addressing the company’s decentralized, organic form of
organization that is adaptable and A. Structure (what is the
responsive to the dynamic nature of organizational form of the IT
the Company. The IT function will function?)
include a Chief Information Officer B. Information Architecture (is the
(CIO) who, in coordination with other infrastructure aligned with the
executive officers throughout the firm’s mission?)
Company, will determine the precise C. Communication (are the IT
structure of the IT function, which is strategy and policies known by all
expected to change over time affected parties?)
depending on Company needs. The D. Compliance (are all external
CIO, along with his/her delegates, will regulations and laws being
strive to cooperate and coordinate with addressed?)
all internal information consumers to E. Risk assessment (are IT risks
ensure that the Company’s information identified, measured and
system is fully integrated on an controlled?)
entity-wide basis, as well as listen and 3.Human Resource Policies
respond to external constituents to A. Training (what kind of training is
ensure that the Company’s business provided and to whom?)
processes and related information B. Travel (what are the travel
technology infrastructure meet the guidelines and priorities?)
ever-changing needs of the broader C. Hiring (who determines needs
community of information consumers. and who screens applicants?)
D. Promotion (what are the
Important Policy Areas for IT guidelines and how does the
Functions process work?)
1.Planning Policies E. Termination (what are voluntary
A. Responsibility (who is involved and involuntary termination
with planning?) guidelines?)
B. Timing (when does planning take 4.Software Policies
place?) A. Acquisition (how is software
C. Process (how should planning be acquired from outside vendors?)
conducted?) B. Standards (what are the software
D. Deliverables (what planning compatibility standards?)
documents are produced?) C. Outside contractors (should
E. Priorities (what are the most to contractors be used for software
least critical planning issues?) development?)
2.Organizational Policies D. Changes (how to control and
monitor the software change
process?)
E. Implementation (how to handle D. Firewalls (are they effectively
conversions, interfaces, and utilized?)
users?) E. Violations (what happens if an
5.Hardware Policies employee violates security?)
A. Acquisition (how is hardware 8.Operations Policies
acquired from outside vendors?) A. Structure (how is the operations
B. Standards (what are the function structured?)
hardware compatibility B. Responsibilities (who is
standards?) responsible for transaction
C. Performance (how to test processing?)
computing capabilities?) C. Input (how does data enter into
D. Configuration (where to use the information system?)
client-servers, personal D. Processing (what processing
computers, and so on?) modes are used?)
E. Service Providers (should E. Error Handling (who should
third-party service bureaus be correct erroneous
used?) input/processing items?)
6.Network Policies 9.Contingency Policies
A. Acquisition (how is network A. Backup (what are the backup
technology acquired from outside procedures?)
vendors?) B. Recovery (what is the recovery
B. Standards (compatibility of local process?)
area networks, intranets, C. .Disasters (who is in charge and
extranets, and so on?) what is the plan?)
C. Performance (how much D. Alternate Sites (what types of
bandwidth is needed and is the sites are available for off-site
network fast enough?) processing?)
D. Configuration (use of servers, 10.Financial and Accounting
firewalls, routers, hubs, and other Policies
technology?) A. Project Management (are IT
E. Adaptability (capability to support projects prioritized, managed,
emerging e-business models?) and monitored?)
7.Security Policies B. Revenue Generation (should
A. Testing (how is security tested?) services be sold inside or outside
B. Access (who can have access to the organization?)
what information and C. Technology Investments (are the
applications?) investment returns being properly
C. Monitoring (who monitors evaluated?)
security?)
D. Funding Priorities (where to most 7.Software applications do not support
effectively allocate resources?) business processes.
E. Budgets (are budgets aligned 8.The technology infrastructure is
with funding levels and inadequate.
priorities?) 9.The user community is unhappy with
the level of support.
10.Management’s information needs are
Planning Process not met.
CobiT Guidelines
▸Guidelines suggest eleven processes
should be incorporated into IT strategic
plans.
▸Each process is integrated throughout
IT policy areas.
▸Processes designed to manage the key
▸Planning Process increases the IT risks.
likelihood that the company is making
the most efficient & effective use of IT Professional Guidance
throughout the organization As suggested by CobiT, the IT function
should:
Key Planning Risk Indicators: “Red 1.Develop a strategic IT plan.
Flags” for IT Auditors 2.Articulate the information architecture
The following are planning risks 3.Find an optimal fit between IT and the
indicators, which should trigger red flags company’s strategy
for the IT auditor. 4.Design the IT function to match the
1.A strategic planning process is not company's needs.
used. 5.Maximize the IT investment.
2.Information technology risks are not 6.Communicate IT policies to the user
assessed. community.
3.Investment analyses are not 7.Manage IT workforce.
performed. 8.Comply with external regulations,
4.Quality assurance reviews are not laws, and contracts.
concluded. 9.Conduct IT risk assessment.
5.Plans and goals are not 10.Maintain a high-quality systems
communicated. development process.
6.Information technology personnel are 11.Incorporate sound project
disgruntled. management techniques.
Important Policy Areas for IT 4.Organizational Learning and Growth
Function
IT FUNCTION SCORECARD - the Three Layered Structure
balanced scorecard used to plan and ▸3-Layered Structure was devised for
monitor the performance of the IT each of the 4 perspectives:
function.
1.Mission
USER SATISFACTION – customer
satisfaction perspective of the balanced 2.Objectives
scorecard which could be assessed by
3.Measures
periodically surveying user’s attitude.
OPERATIONAL PERFORMANCE –
third balanced scorecard perspective. More than Performance Measure
Measured using indicators such as ▸Scorecard evolved into an
number of security breaches, number of intra-organizational management
backlogged requests, and percentage of system to:
downtime. ● Facilitate the establishment of
long-term strategic goals.
Balanced Scorecard ● Communicate the goals
▸Concept introduced in 1996 by Kaplan throughout the firm.
& Norton ● Align the initiatives and incentives
▸Scorecard measures financial and to the goals.
non-financial performances ● Allocate resources to match the
goals.
Kaplan’s Balanced Scorecard ● Gain feedback and learn about
the strategy.
IT Function Scorecard
▸Use the balanced scorecard to plan &
monitor IT performance:
IT Function Scorecard
Changing Software
TRAINING & DOCUMENTATION
▸Change Request
▹Training should:
▹Specifies the change
■Take place early
▹Justifies the need
■Be all-encompassing
▹Approvals given
■Continue throughout project life
■All parties agree change is
cycle
necessary
▹Documentation should:
■Change is congruent with
■Be complete for entire project Strategic Plan
and all programs
▹Submitted to IT
■Include user manuals
Change Requests
▸IT logs in the requests & assigns
▸Key Development Risk Indicators
tracking number
1.Development projects are not aligned
▸Software Change Committee reviews
with the strategic plan
and prioritizes
2.Feasibility studies do not consider the
following areas: ▹May refer to a feasibility group
▸Change is assign to IT staff person(s)
•Technical feasibility
Change design & programming ▸Strategy must be chosen that best fits
▸Follow same structure as in new the situation.
development ▸Consider risks of business interruption,
costs, time, ability of legacy system to
▹Secured procedure of separate
function.
development, test, and
production libraries
Implementing Software
▹Incorporated security & control Applications
procedures Types of Implementation:
▹Answer questions
▹Fix Problems
▹Monitor performance
▹Performance Tuning
▹User Acceptance
▸Prepare a Post-implementation report
a)Parallel
b)Big-Bang
c)Partial
d)Focused
2.Formal implementation plans are not
followed.
3.All affected parties are not involved.
4.Implementation teams are
uncoordinated.
5.Implementation processes are rushed.
6.Change management procedures are
not developed.
7.System users are inadequately
trained.
8.Security and control issues are
slighted.
9.Final testing is insufficient.
10.Post-implementation reviews are not
conducted.