Saturday, August 31, 2019
Ms2 Course Review
2013 Exam Review Session CGA MS2 Information Systemsââ¬â¢ Strategy 1 Agenda Agenda will change as needed to suit your needs â⬠¢ 2 pm Start. â⬠¢ Introduction & Feedback Solicitation â⬠¢ 2:10 ââ¬â 2:30: Fundamentals of Business Case Analysis â⬠¢ 2:30 ââ¬â 3:45. Business Case Example/s â⬠¢ Break 10 mins â⬠¢ 3:55 ââ¬â 5pm Review of key items from all modules â⬠¢ 5pm Finish. 2 Nine-step approach to case analysis Spend about 40% of your time on the case ââ¬â 90 minutes. 1. 2. 3. 4. 5. 6. 7. 8. 9. Skim the case. Read the case closely. Identify problems, threats, and opportunities. Analyze the data. Generate alternatives.Select the decision criteria. Analyze and evaluate the alternatives. Make a recommendation or decision. Determine Implementation steps & associated Risks. 3 Executive Summary (3 marks) â⬠¢ â⬠¢ â⬠¢ â⬠¢ Objective of the report Key problems/threats/opportunities identified State Alternatives (briefly) Recommendation s ââ¬â Include completion date & Implementation strategy ââ¬â Key Risk and mitigation (briefly) â⬠¢ It should suffice as a Stand alone report REVIEW YOUR CASEâ⬠¦ 4 Current Situation (10 marks) â⬠¢ List some of the strengths/ Strategic advantages â⬠¢ Is there an existing system? What is wrong? ââ¬â ââ¬â ââ¬â ââ¬â ââ¬â List & briefly explain the problems Categorize them if possible Determine Root cause, if there is one single cause? Business fundamental shortcomings? Conflicts? â⬠¢ Does the technology used align / support the business model? â⬠¢ Organizational misfits? â⬠¢ Strategic misfits? 5 Current Situation contdâ⬠¦ â⬠¢ What is the Impact? ââ¬â Cost: quantified in $$ ââ¬â Does it meet current or future business needs? ââ¬â Intangible impacts ââ¬â Strategic â⬠¢ Threats â⬠¢ Opportunities ââ¬â Competitive ââ¬â Technological 6 Criteria (5 marks) â⬠¢ What is Criteria?What is it used for? â⬠¢ State it at a high level where you can â⬠¢ Prioritize the criteria ââ¬â and show that you have done so. â⬠¢ Explain why you chose each criterion â⬠¢ Measuring each criterion? ($, market share/Sales, other goals) ââ¬â Does it meet current or future business needs? ââ¬â $ savings ââ¬â Intangible benefits ââ¬â Strategic â⬠¢ Threats â⬠¢ Opportunities ââ¬â Competitive ââ¬â Technological 7 Alternatives & Recommendation (15 marks) â⬠¢ â⬠¢ â⬠¢ â⬠¢ Improvise & use your imagination (just be logical). Each alternative should be a mostly complete Solution. Each alternative should be feasible.Assess each alternative based upon the criteria ââ¬â show this analysis in your work. â⬠¢ Other pros & cons (other than in the criteria) â⬠¢ Alternatives donââ¬â¢t have to be mutually exclusive. They can be a combination of the options identified. â⬠¢ Why did you choose the recommended alternative/s? ââ¬â Benefit s ââ¬â Explain how it achieves the objective/resolves the problem ââ¬â Limitations / risks 8 Alternatives & Recommendation (Continuedâ⬠¦) â⬠¢ Make a recommendation (use a positive voice! ) ââ¬â Do not just suggest something ââ¬â Do not say it weakly or ambiguously â⬠¢ I believeâ⬠¦ / In my opinionâ⬠¦ / My thoughts areâ⬠¦ Clearly recommend an action and explain â⬠¢ what it is and â⬠¢ why it fits the criteria. (if you have not already in the analysis). 9 Risk Management Plan (15 marks) Read Carefully the requirements of this section. Does it require an Implementation / Action plan as well? â⬠¢ Narrative explanation ââ¬â Implementation Strategy/Approach (at a high level)? ââ¬â Assumptions / Requirements â⬠¢ High level Risks, Ethical, Privacy issues? (Probability & Impact) â⬠¢ Mitigation Strategies â⬠¢ Plan ââ¬ËBââ¬â¢ â⬠¢ Actual implementation steps and, within each step ââ¬â Step Risk if any and mitiga tion plan if any â⬠¢ â⬠¢ â⬠¢ Time Lines / Time Frame / Schedule Detail Costs Responsibilities Project Phases, if anyâ⬠¦ short term, long term 10 Exam Review Session â⬠¢ Go over Business Case ââ¬â Tonyââ¬â¢s Auto Services Inc. from 2010 June exam 11 Some multiple choice tipsâ⬠¦ â⬠¢ When answering a true and false question on the Exam simply break down complex sentences into smaller phrases. Each phrase has to be true or the entire sentence is false. â⬠¢ And, for multiple choice questions try to answer the question before looking at the answer choices. Remember that a perfect answer may not be given as a choice.Choose the best answer. ââ¬â Source Certified Fraud Examiners (CFE) Exam Coach. 12 Strategic Alignment â⬠¢ Look for IT Strategy to support Business strategy. â⬠¢ IT to differentiate from competition â⬠¢ IT to reduce costs â⬠¢ IT to bring business ââ¬Å"Quick to marketâ⬠â⬠¢ IT to create new markets / products â⬠¢ IT to tie suppliers and customers 13 Porter's five forces â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ threat of new entrants bargaining power of customers bargaining power of suppliers threat of substitute products or services rivalry among existing competitors 14 Threat of New Entrants Mitigation Strategies: ââ¬â High entry cost. Equipment, buildings, infrastructure, etc. ââ¬â Mature Information Systems ââ¬â Expertise & Knowledge ââ¬â Compete aggressively on Price ââ¬â Lock in partners for a competitive edge ââ¬â Brand recognition. Product Differentiation. ââ¬â Focus on a Market niche ââ¬â Operating Efficiencies Pace of change ââ¬â IT 16 Mooreââ¬â¢s Law & Metcalfeââ¬â¢s Law â⬠¢ â⬠¢ â⬠¢ â⬠¢ Dropping price of computer Storage Dropping cost of processing (ââ¬Å"mipsâ⬠) Double the power every 18 months Metcalfeââ¬â¢s Law ââ¬â The value of the network is the square of the sum of the nodes. Therefore stick with po pular technology 17 Strategic Planning for IS â⬠¢ How is Planning done? ââ¬â Top Down / Strategic Analysis ââ¬â Bottom Up / Enterprise Analysis ââ¬â Scenario Planning / ââ¬Å"What ifââ¬â¢Ã¢â¬ Analysis â⬠¢ When is Planning done? ââ¬â ââ¬â ââ¬â ââ¬â ââ¬â ââ¬â Short Term Long Term Mergers & Acquistions Economic downturns As part of a Budgeting Exercise After a major disaster. 18 Planning Issues â⬠¢ â⬠¢ â⬠¢ â⬠¢ Scalability Capacity planning Standardization vs. differentiation Legacy systems ââ¬â Upgrade to new system or integrate with new technology but old core. 9 Total Cost of Ownership â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ Hardware Software Installation Training Support Ongoing Maintenance & S/W Upgrades Infrastructure costs Data Backups, Business Continuity, Insurance Downtime Space, Energy, Security 20 Six IT Decisions ââ¬â IT should not make 1. 2. 3. 4. 5. 6. How mu ch to spend Allocation amongst Business Processes Firm-wide IT capabilities How much IT Security & Privacy issues Blame over failure 21 IT Governance 22 10. 3 OVERVIEW OF SYSTEMS DEVELOPMENT 23 Achieving Success in IS Projects â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ clearly defined goals excellent communication management involvement definitive timelines Project management skills S. M. A. R. T Objectives. Why do they Fail? â⬠¢ lack of understanding of the desired results (imprecise targets) â⬠¢ poor estimating techniques for budgeting and scheduling â⬠¢ small, unadjusted schedule slippage, which cumulatively results in a major delivery delay â⬠¢ lack of project management skills or leadership â⬠¢ poorly trained analysts and programmers â⬠¢ conflicting goals and objectives among the project team members and users use of inappropriate software or hardware tools 25 Make Vs. Buy ââ¬â Issues ââ¬â ââ¬â ââ¬â ââ¬â ââ¬â ââ¬â ââ¬â ââ¬â ââ¬â Cost Specialized functionality Ability to integrate with other existing Systems Ability to change the s/w Maintenance / Service Contract Update / Upgrade Speed of delivery KNOWLEDGE ââ¬â Business vs. Industry vs. Functional Responsibility vs. Control vs. Risk Conversion 27 Parallel â⬠¢ Pros â⬠¢ â⬠¢ â⬠¢ â⬠¢ Least risk of not meeting objectives Compare results to ensure correctness Gentle weaning off of the ââ¬Ëoldââ¬â¢ system Resilient to errors. Cons â⬠¢ Duplication of effort â⬠¢ Requires additional computing resources â⬠¢ Not possible in every situation 28 Pilot â⬠¢ Pros ââ¬â ââ¬â ââ¬â ââ¬â Allows for a small, low risk, controlled test bed Allows for a Go-NoGo decision w/o large investment Limits disruption & harm Helps overcome user resistance â⬠¢ Cons ââ¬â Still Costly to run 2 systems ââ¬â even if scaled down ââ¬â Results may not extrapolate to ââ¬Ëfull installââ¬â¢ ââ¬â Choice of Pilot site is critical 29 Phased â⬠¢ Pros ââ¬â ââ¬â ââ¬â Incremental approach with functional Phase-in Allows for Phased Systemsââ¬â¢ Development Allows time for orientation of the new technology Usually easier to manage the change â⬠¢ Cons ââ¬â Still running 2 systems, ââ¬â Longer disruption 30 Direct Cutover â⬠¢ Pros ââ¬â Quick ââ¬â Easy on resource utilization (only 1 system running) ââ¬â Low cost â⬠¢ Cons ââ¬â ââ¬â ââ¬â ââ¬â ââ¬â ââ¬â Risky Requires full training & preparation Requires ââ¬Ëall handsââ¬â¢ on deck for Implementation Causes spike in Help desk calls Creates disruption, uncertainty, confusion Errors can cause Business Loss / interruption 31Internet as a business tool Advantages â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ Wider Market exposure New ways to communicate (text, voice, video) Economical (ISP, programming, Shipping) 24x7x365 Anywhere, Anytime Off loads work to the customer Convenient for the customer if well designed. Quick & Easy to update / Change ââ¬â Real time Consistent Information / Prices 32 Internet as a business tool Disadvantages â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ Not everybody has access & high speed Impersonal & not so interactive No touch & feel of the goods Replacement for good business practice?Lack of consumer trust Legal challenges Socio-economic factors (availability of access) Privacy Challenges Groupware & Collaborative s/w â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ MS NetMeeting / Communicator / Remote PC support Rolling out s/w updates and self healing s/w IBM Lotus Notes & Domino EMC Documentum Virtual Meeting, avatars , e-Rooms (SDLC Project Mgmt) Private Cloud computing ââ¬â ââ¬â ââ¬â ââ¬â VPN Storage space Applications Virtualization â⬠¢ Data Warehousing â⬠¢ Data Mining â⬠¢ Business Intelligence s/w Strategic use of the Internet â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ Cost Reduction Strategic Alliances Differentiation of products & services Customer Loyalty (custom mass production) Value Chains To take advantage of Internet Technologies: ââ¬â Keep focused on Business Strategy (Internet doesnââ¬â¢t compensate for bad or missing strategy) ââ¬â Simplify & Integrate your customer facing processes ââ¬â to enable self service ââ¬â Adhere to evolving IT standards Rationale for E-Business â⬠¢ Diminished Information Asymmetry â⬠¢ Richness vs. Reach â⬠¢ Reduced transaction costs Ways to Reduce Costs Customer Self serve ââ¬â Eliminate middle person ââ¬â Customer data entry ââ¬â Self research and reduced consultation time â⬠¢ â⬠¢ â⬠¢ â⬠¢ Reduced Staffing levels Reduced Re-work Streamlined communication Faster 37 Securing online transactions The key issues in a transaction processing environment are â⬠¢ identification (Who are you? ) â⬠¢ authentication (How can I be sure you a re who you say you are? ) â⬠¢ authorization (What authority do you have to make whatever transaction you seek? ) â⬠¢ privacy (How can we be sure our transaction is private? â⬠¢ nonrepudiation (How can we each be assured that the other will not later deny the transaction? ). Benefits / Limitations of Networking â⬠¢ Sharing ââ¬â Printers, Drives, Scanners, etc â⬠¢ e-mail â⬠¢ Centralized Administration ââ¬â Distribution of S/W, Policies, Patches, A/V ââ¬â Tracking, monitoring, Backing up data ââ¬â Remote repair & Support â⬠¢ Groupware â⬠¢ Limitations ââ¬â Cost, Security, Vulnerability 39 Client ââ¬â Server Computing â⬠¢ Centralized Computing â⬠¢ Distributed Computing â⬠¢ Advantages ââ¬â Data Security & Centralization ââ¬â Administration ââ¬â Off Loads processing to Clients Disadvantages ââ¬â extra complexity ââ¬â Cost 40 Advantages of Outsourcing â⬠¢ cost savings through economies of scale and s cope â⬠¢ infusion of cash through liquidation of computer assets â⬠¢ facilitate transition of data centre from cost centre to profit/loss centre â⬠¢ ability to rapidly introduce new technology and access IT talent â⬠¢ Better Scalability â⬠¢ focus on core competencies â⬠¢ Allows an objective look at process improvement by O/S 41 Limitations of Outsourcing loss of direct managerial control â⬠¢ difficulty in reversing decision â⬠¢ outsourcerââ¬â¢s viability (financial strength, responsiveness, service, and so on) â⬠¢ dilutes the strength of in-house staff ââ¬â Unique, one of a kind application support? ââ¬â Will key staff stay permanent or be rotated? â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ vendor doesnââ¬â¢t know your business lack of flexibility untenable long-term contracts; fixed price versus service trade-off requires skills in partnership management strategic factors Privacy issues Monitoring / Managing Outsourcers 42 Risk Mitigation Strategies â⬠¢ Risk Assessment â⬠¢ Restrict Physical access Log all visitors ââ¬â in/out â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ Cameras, Card Readers, Security Guards Alarms & monitoring Intrusion Detection Systems (network) Firewalls Restricted Network access Policies, signoff, and Security Awareness training 43 Risk Mitigation Strategies Contâ⬠¦ â⬠¢ Authentication (know, have, and are) ââ¬â Password Strategies, Single Sign-on, Pass Phrase â⬠¢ Authorization (Open / need to know) â⬠¢ Access invocation / revocation procedures ââ¬â Hiring / Firing / Promotion â⬠¢ Segregation of Duties â⬠¢ Adequate Supervision & Sign offs â⬠¢ Monitoring, Logging, Reporting, and Acting on Information. 44 Good Luck!! 45
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.