Wednesday, May 22, 2019

Ms2 Course Review

2013 contribute Review Session CGA MS2 Information Systems Strategy 1 agendum Agenda will change as needed to suit your needs 2 pm Start. Introduction & Feedback Solicitation 210 230 Fundamentals of Business Case Analysis 230 345. Business Case Example/s Break 10 mins 355 5pm Review of key items from all modules 5pm Finish. 2 Nine-step approach to case analysis Spend ab reveal 40% of your time on the case 90 minutes. 1. 2. 3. 4. 5. 6. 7. 8. 9. shave the case. run down the case closely. Identify problems, threats, and opportuni standoffs. Analyze the information. Generate alternatives.Select the decision criteria. Analyze and evaluate the alternatives. Make a recommendation or decision. Determine Implementation move & associated put on the lines. 3 Executive Summary (3 marks) Objective of the report Key problems/threats/opportunities identified State Alternatives (briefly) Recommendations Include completion date & Implementation strategy Key find and moderat eness (briefly) It should suffice as a Stand alone report REVIEW YOUR CASE 4 Current Situation (10 marks) List some of the strengths/ strategical advantages Is there an existing remains? What is wrong? List & briefly explain the problems Categorize them if possible Determine Root attempt, if there is one single cause? Business fundamental shortcomings? Conflicts? Does the technology used align / support the business model? Organizational misfits? Strategic misfits? 5 Current Situation contd What is the Impact? equal quantified in $$ Does it meet current or future business needs? Intangible impacts Strategic Threats Opportunities Competitive Technological 6 Criteria (5 marks) What is Criteria?What is it used for? State it at a high level where you end Prioritize the criteria and show that you have done so. Explain why you chose apiece monetary standard Measuring each criterion? ($, market sh are/Sales, other goals) Does it meet current or future busi ness needs? $ savings Intangible benefits Strategic Threats Opportunities Competitive Technological 7 Alternatives & Recommendation (15 marks) Improvise & use your imagination (just be logical). Each alternative should be a mostly complete Solution. Each alternative should be feasible.Assess each alternative based upon the criteria show this analysis in your work. Other pros & cons (other than in the criteria) Alternatives dont have to be mutually exclusive. They can be a combination of the options identified. Why did you choose the recommended alternative/s? Benefits Explain how it achieves the objective/resolves the problem Limitations / risks 8 Alternatives & Recommendation (Continued) Make a recommendation (use a autocratic voice ) Do not just suggest something Do not say it weakly or ambiguously I believe / In my flavor / My thoughts are Clearly recommend an action and explain what it is and why it fits the criteria. (if you have not already in the ana lysis). 9 Risk Management Plan (15 marks) Read Carefully the requirements of this section. Does it require an Implementation / Action plan as well? Narrative explanation Implementation Strategy/Approach (at a high level)? Assumptions / Requirements high-pitched level Risks, Ethical, Privacy issues? (Probability & Impact) Mitigation Strategies Plan B Actual implementation steps and, within each step Step Risk if any and mitigation plan if any Time Lines / Time Frame / Schedule Detail Costs Responsibilities calculate Phases, if any short term, long term 10 Exam Review Session Go over Business Case Tonys Auto Services Inc. from 2010 June exam 11 Some multiple choice tips When say a straightforward and false question on the Exam simply break down complex sentences into smaller phrases. Each phrase has to be true or the entire sentence is false. And, for multiple choice questions try to answer the question before looking at the answer choices. Remember that a staring( a) answer may not be given as a choice.Choose the best answer. Source Certified Fraud Examiners (CFE) Exam Coach. 12 Strategic junction Look for IT Strategy to support Business strategy. IT to differentiate from competition IT to reduce costs IT to bring business Quick to market IT to create new markets / products IT to tie suppliers and customers 13 Porters five forces threat of new entrants bargaining power of customers bargaining power of suppliers threat of substitute products or services rivalry among existing competitors 14 Threat of New Entrants Mitigation Strategies High entry cost. Equipment, buildings, infrastructure, etc. Mature Information Systems Expertise & Knowledge Compete aggressively on Price plight in partners for a competitive edge Brand recognition. Product Differentiation. Focus on a Market niche Operating Efficiencies Pace of change IT 16 Moores Law & Metcalfes Law Dropping price of computer Storage Dropping cost of processing (mips ) Double the power any 18 months Metcalfes Law The value of the network is the square of the sum of the nodes. Therefore stick with popular technology 17 Strategic cookery for IS How is Planning done? Top Down / Strategic Analysis Bottom Up / Enterprise Analysis Scenario Planning / What if Analysis When is Planning done? Short name Long Term Mergers & Acquistions Economic downturns As part of a Budgeting Exercise After a major disaster. 18 Planning Issues Scalability Capacity planning standardization vs. differentiation Legacy systems Upgrade to new system or integrate with new technology but old core. 9 Total Cost of self-command Hardware Software Installation Training Support Ongoing Maintenance & S/W Upgrades Infrastructure costs Data Backups, Business Continuity, Insurance Downtime Space, Energy, protective covering 20 Six IT Decisions IT should not make 1. 2. 3. 4. 5. 6. How much to spend Allocation amongst Business Processes Firm-wide IT capab ilities How much IT Security & Privacy issues Blame over failure 21 IT Governance 22 10. 3 OVERVIEW OF SYSTEMS DEVELOPMENT 23 Achieving Success in IS Projects clearly defined goals excellent communication centering involvement definitive timelines Project management skills S. M. A. R. T Objectives. Why do they Fail? lack of understanding of the desired results (imprecise targets) poor estimating techniques for budgeting and scheduling small, unadjusted schedule slippage, which cumulatively results in a major delivery delay lack of project management skills or leadership poorly trained analysts and programmers conflicting goals and objectives among the project team members and users use of foreign software or hardware beam of lights 25 Make Vs. Buy Issues Cost Specialized functionality Ability to integrate with other existing Systems Ability to change the s/w Maintenance / Service Contract Update / Upgrade Speed of delivery KNOWLEDGE Business vs. Industry vs. Functional Responsibility vs. Control vs. Risk Conversion 27 Parallel Pros Least risk of not meeting objectives Compare results to ensure correctness Gentle weaning off of the old system Resilient to errors. Cons Duplication of effort Requires additional computing resources Not possible in every situation 28 Pilot Pros Allows for a small, low risk, controlled try out bed Allows for a Go-NoGo decision w/o large investment Limits rumpus & harm Helps overcome user resistance Cons Still Costly to run 2 systems even if scaled down Results may not extrapolate to full install Choice of Pilot site is critical 29 Phased Pros incremental approach with functional Phase-in Allows for Phased Systems Development Allows time for orientation of the new technology Usually easier to manage the change Cons Still running 2 systems, Longer disruption 30 Direct Cutover Pros Quick Easy on resource utilization (only 1 system running) Low cost Cons Risky Requires full training & prep Requires all hands on deck for Implementation Causes spike in Help desk calls Creates disruption, uncertainty, confusion Errors can cause Business Loss / interruption 31Internet as a business tool Advantages Wider Market exposure New ways to communicate (text, voice, video) Economical (ISP, programming, Shipping) 24x7x365 Anywhere, Anytime Off loads work to the customer Convenient for the customer if well designed. Quick & Easy to update / Change Real time Consistent Information / Prices 32 Internet as a business tool Disadvantages Not everybody has access & high speed Impersonal & not so interactive No touch & feel of the goods Replacement for good business give?Lack of consumer trust Legal challenges Socio-economic factors (availability of access) Privacy Challenges Groupware & Collaborative s/w MS NetMeeting / Communicator / Remote PC support Rolling out s/w updates and self healing s/w IBM Lotus Notes & Domino EMC Documentum Virtual Meetin g, avatars , e-Rooms (SDLC Project Mgmt) Private Cloud computing VPN Storage space Applications Virtualization Data memory Data Mining Business Intelligence s/w Strategic use of the Internet Cost Reduction Strategic Alliances Differentiation of products & services customer Loyalty (custom mass production) Value Chains To take advantage of Internet Technologies Keep focused on Business Strategy (Internet doesnt compensate for braggart(a) or missing strategy) Simplify & Integrate your customer facing processes to enable self service Adhere to evolving IT standards Rationale for E-Business Diminished Information Asymmetry profuseness vs. Reach Reduced transaction costs Ways to Reduce Costs Customer Self serve Eliminate middle person Customer data entry Self research and reduced consultation time Reduced Staffing levels Reduced Re-work Streamlined communication Faster 37 Securing online transactions The key issues in a transaction processing environment are identification (Who are you? ) authentication (How can I be sure you are who you say you are? ) authorization (What authority do you have to make whatever transaction you seek? ) privacy (How can we be sure our transaction is private? nonrepudiation (How can we each be assured that the other will not later deny the transaction? ). Benefits / Limitations of Networking Sharing Printers, Drives, Scanners, etc e-mail Centralized Administration Distribution of S/W, Policies, Patches, A/V Tracking, monitoring, Backing up data Remote repair & Support Groupware Limitations Cost, Security, Vulnerability 39 Client Server compute Centralized Computing Distributed Computing Advantages Data Security & Centralization Administration Off Loads processing to Clients Disadvantages extra complexity Cost 40 Advantages of Outsourcing cost savings with economies of scale and scope infusion of cash through liquidation of computer assets facilitate transition of data centre fro m cost centre to profit/ injustice centre ability to rapidly introduce new technology and access IT talent Better Scalability focus on core competencies Allows an objective look at process improvement by O/S 41 Limitations of Outsourcing loss of direct managerial control difficulty in reversing decision outsourcers viability (financial strength, responsiveness, service, and so on) dilutes the strength of in-house staff Unique, one of a kind application support? Will key staff stay permanent or be turn? vendor doesnt know your business lack of flexibility untenable long-term contracts fixed price versus service trade-off requires skills in partnership management strategic factors Privacy issues Monitoring / Managing Outsourcers 42 Risk Mitigation Strategies Risk Assessment Restrict Physical access Log all visitors in/out Cameras, Card Readers, Security Guards Alarms & monitoring Intrusion Detection Systems (network) Firewalls Restricted Network access Polici es, signoff, and Security Awareness training 43 Risk Mitigation Strategies Cont hallmark (know, have, and are) Password Strategies, Single quality-on, Pass Phrase Authorization (Open / need to know) Access invocation / revocation procedures Hiring / Firing / Promotion Segregation of Duties Adequate Supervision & Sign offs Monitoring, Logging, Reporting, and Acting on Information. 44 Good Luck 45

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.