کامپیوتر و IT و اینترنتعلوم مهندسی

Acquiring IT Applications and Infrastructure

صفحه 1:
Ckoupter IS Acquiring IT Applications and Infrastructure ‘kPorwatos Terkoby Por Ounnewed Of 20۰ urban, betdaer, Opvecd, Detherbe: Lecture Glider by L. @ecubiew, Provideure Ovlece oko Otley & Goo, ‘tev.

صفحه 2:
Learciag Objectives © Oesurbe the provess ‏خان‎ 141١ ‏+ملاعفوحه‎ اع 7 5 ۲۹ ۱ ان ‎AD project i‏ 1 )4 89 .كك كدوام © List the war VP ‏وه تج‎ ced the criteria Por © Oise veins VDP ‏اوه تمه‎ © Oesorbe the criteria Por selection a vecdor

صفحه 3:
Learciag Objertives (Ovatcued) © Oesuribe the oriterta Por seleviiog a veudor © Oesurbe the provess oP veoder ocd soPiwore ‏.امامو‎ ها ماو وت و طولب( © ©) Ocderstodd the issue oP ‏موه 1۱ شم‎ thitcbases, viker ‏له ,اوه راومه‎ busicess purtters. ۶ Oesuribe the weed Por busicess process redesign ocd

صفحه 4:
‎Por (rquiriay alas (ppicaivas‏ زره ظ) ‎®w the upphoctions (oPP-tkhe-skelP approak)‏ © ‎ beuse the upphoctives‏ ‎© Developing the ‏اه اوه‎ (Iasvurvicr) ‎ ‎ ‎

صفحه 5:
9 The Pive Oujor Gteps ve Orquisiioa 0 0 il 1 Management Yendor management ct managomsst raion Businoss Partners Project identification, Justification, and Planning Step 1) Tan nab ‘gen projec ‏موی و کش و‎ Sey trent System-tequlted tunctionalties Need to soWve problems 1 Tr Architecture (Step 2) Information ‏ااه اميه‎ ۱ ‏و‎ Organization architecture ‘Application arenitecture Foastoitty t 1 ‘equisition (Development) Options Steps) Hoi, whieh methodology Wht, rom whom Wht, rom whom Which partner, how to partnor 1 Testing, Installation, and Integration (Siew 4) ‏وراد‎ instellaion. integration, wana, escurky, conversation, deployment, et. 1 ‘Operations, Maintenance, and Updating (Step 6) ‘Operations elnienarce and updating Replacement Business prosase ۳ ‏رن‎ Bushose ‏تس‎ سوه ‎Parts‏

صفحه 6:
bos ‏بو‎ A: AnIT project B: An IT project is managed stumbles on crises ‏مه امه‎ Asan IT project is developed Time Cost Time Cost Performance Performance Underun A. Deviations trom original estimate

صفحه 7:
ee mene Disadvantages of the “Buy” Option + Software may not exactly meet the company’s needs + Software may be difficult or impossible to modiy, or it may require huge bus ess process changes to implement. ‘+ The company will not have control over software improvements and new versions. (Usually it may only recommend.) + Purchased software can he difficult to integrate with czisting systems. * Vendors may drop a product or go out of business ۳۳2 Advantages of the "Buy” Option + Many diferent types of off-the-sbell software are available. + Much time ean be saved by buying rather than building, + The company can know what itis getting before It invests in the software, + The company is not the first and only Purchased software may avoid the need to hire personnel specifically dedicated toaproject. + The vendor updates the software frequently. + The price is usually much lower fora buy option. Cheyer 05, 8

صفحه 8:
@vquidey 17 @pplicaices Optioa ‏سره‎ © ۳۷۵۵ 0۵6 ۵۵۵106 0020000000 ‏مورا‎ ‎want be door io coe oP too wos. OD ke First way ip to lease the opphooiog Proce oct puteourcer ued fasta too the cowpouy's prewises. The veador cod kely wits the tostolaiog cod Prequeciy ‏وی ماه و له ارت‎ Po the vpercdice cod woicteocae oP the systew. Daa vowedtivcd uppicoicgs ure feused this way. O De seooed way, ustay oo uppicaivg sysiew provider (®G@), is bevowiey wore popular.

صفحه 9:
9 ۰ عنم و() عشسنمم ‎@vquiday IP‏ Potential Ricks Loss of control and high level of dependence on ASP Inability of ASP to deliver qualty of service; lack ofeklle andl expenence Level of customization and legacy application intograton offered! by ASP is inaufficient Low reliablity and spoed of delivery due to bandwidth limvations Low capabilty of ASP to deal with secumy and confidential Issues Pricing changes by ASP unpredictable for application updates and services ‘Modificaton may not fit our neece exactly Becoming the vietim of pass-the-buck syn ‘drome when you call for tochnical support ASP may not contol all these processes of a system failure Bonefite Reduces tho need to attract and retain skied IT professionals Enables companiss to concentrate on strategic use of IT Enables smal-and medum-sizedl companies to use tie-t applications (©... BL ERP, SCM, ard CRM) Application scalability enables rapid gronth of ‘companies Fast and casy application deployment Higher dearce of application standardization ‘Accass to wide range of applications ‘Apolication mantenance simplified and performed by ASP. ‘Sinaliied user support and training Low total cost of ownership Low up-Font investments in hardware and softwere Improved cost control as result of predictable subscription costs Maintenance is done by vendor to many customers ‘Can select another application from the ASP to mest changing needs Not 20 further invest In upgrading the existing pe Business Technical Economic Maintenance

صفحه 10:
@vguiday IP Bpplicaicas Dore Optio ... ۰ ‏را دم‎ ۱06۵۵ 006/۱۳0۵۵ ۵۵۵۵0۵۵0۲9۸۵۵۰ here ary tw ۱ ۳ © @ull Brow soraick. Dhis option should be covekdered oy Por spevtikzed Lopphouiows Por whick pesopoceus are wl wvdkibke. Ue os ‏سوه لجی سوه‎ process, but it wd provide the best Pa. © @ukl Brow opxoproedis. Oowpanies wil expericaed 1D stoPP rac use stacked property (rch, a semure Deb server), some soPivare keeneney (ex, dart, Otrrd Bese, or Perl), oad thicchpany sdbrouices to ‏مدب لمت صصح‎ ‏او‎ on herr mu. (Or, sxpies ‏صقت جه سمحت جمد‎ process ‏و با موه با و مه وا‎ ( (Prow ‏مه و‎ ‏بط اه مرت نج موه‎ reais! Mesdbity ol act be the ‏اس‎ ‎sarees ova ‏ع جا جيه 5 © قحب سبط ی مرها مد مسا‎ ون ‎othe “bu”‏ ی ی Chat 08 0

صفحه 11:
Trodiiccd Gystews Develppwerd bPe Opole © CoPwware developed IPe opel ‏جز‎ the trentiircral © COLO processes we sysiews iwesitaiod, systews wnsis, systews desiqa, prowranwicny, testis, iwplewerutaiod, pperoicd cod ‏جحو وص كدص‎ © OcterPul upprowk is wheo techs fe coe phos ore vowpleted beRore the work proceeds to the cext stage.

صفحه 12:
م د ما

صفحه 13:
0 ۲ سوه | | 11 جر موی ‎Pott Vendo ha Eton Cr‏ ‎Citoia‏ مه | سید ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎

صفحه 14:

صفحه 15:
Gpstew Oevelppwed ٩۳۵ © Oxers we ewpbpees Prow of Puantivod areas oad levels oP the ‏او مرب تمه‎ wits the systew, vier direviy o- ‏.م سل‎ © Opstew unbsts we 6 proPessioads who ‏راو‎ ١ ody ziogy cod desiqnicgy Is. © Cropecwers ore 5 probessiocds who wodPy exotic ‏عاج 75ك سوماج عاصاك 7إجكصص‎ Lurie ‏صا ككس ممم عصان دمج ننج‎ scisPy Ser requireweuts.

صفحه 16:
Gpstew Oeveltppwedt Meas (Ovaicued) © Deckard speciiists ure experts va o certad upe oP teckulowp, suck us databases or ‏موس‎ © Gpstew stukeholers oe ofl people oPPevted by ‏ارو ماه لا و كام‎

صفحه 17:
Cheyer 05, 9

صفحه 18:
سس مه رو تاو( ‎problew (or opporturity)‏ ع‌صا ما اب مهو ۶ .كاد دده راصي مه رای © وی 0 ‎O Crowe‏ ‎®rkaord‏ © م0 06 ‎ColOv-Bv Devivion‏ ©

صفحه 19:
GOLC — Cpstews Ouapsis 845 the exacvicstiog oP the busicess problecn that the ‏رو موه و كتانب جسامج صا جكدوام تومیر‎ © Die purpose is to yother iePorevotica ‏اعوج لحك‎ spstew to deterwice requireweuts Por the aew or improved systew. © Oelvercble is a set oP spstew requreweus.

صفحه 20:
GOLC = Cpstews Design © Desoribes how the syste will wocowplsk this task. © Delverable is the techutrd! destya tho! species: OGpstew vupus, tapus, user toterPaces} O1berdwore, soPwore, dotobuses, teleoooeicativcs, persowet & procedures; O@leprtat of how these cowpoursis une ‏باه‎

صفحه 21:
GOLC = Cpstews Desicn: (Cvcticned) © bowed spstew design states whut he syotew wil do, ‏سنجمه اوه روص‎ © @hysied spstew desiqa states Aow the systew wil perfor its Puactioas, with usted physicd ‏تمه‎ © Goope creep is coused by ‏عمط رل‎ oPter the

صفحه 22:
Ce HY Cregg & ‏وه‎ ۶ ‏م۳‎ wolves the trocstaiva oP ot systew's desiqa spevificuiva ito cowpuier code. © Destag check to see Phe cowputer ode wil produce Opxtex errors ( x), wisopeled word oro wisplared pow) ont bye errors thot peri the prograc to rot but result ic fpr ert pulpal.

صفحه 23:
GOLC — Gpstews | ‏تاك ساورب‎ ۳ deploysedt is the provess oP pouweriog Proow the oll systesv to the ue systew. 0 ‏و‎ Rik ar a ies | pordlel , ‏تحص‎ , pilot cord phased. © Cadel cowersins. ‘hoplewectaiva provess ia Which the ol systes ued the ue systew vpercie ‏و رام ومد‎ uo period oP tice. © Orest po wersios. ‘Ieopleweutaiva process fa Wwhick the od systew is vat PP ocd the ue spotew turced po oto ‏ار مه‎ ۱

صفحه 24:
GOLC — Gystews Ieplewentaiza (Ovcitcrurd) ۶ ‏بلق‎ wwersis. ‘oplewesicivs provers thet itroduces the vew spstew ia vor port oF the orxocizaiod ‏مط د ك7‎ busts, wheo uew syste is working property, it i> fotcoduced io ther pars oF the orcosizaticd. ‎thet‏ و ماوت جوم لو( ای ره و مرو تیوه لوط ۲ ‎is pperciocl.‏ ویو تنوه وی ‎the‏ ‎ ‎ ‎ ‎

صفحه 25:
موجه 6 من - ر0ظ8) © Buds of perPorwed to ussess the spstew's vapubiities ud i ‏مس‎ #P it is beta used vorrenty. © Gpstews oeed severd types of wordteanae. ODebuggtay: 0 process thot cvotcues throughout the the oP the spstew. ‏ب لمم ميك لجو وسو جر رصم ود عجار وطسرا ممم(‎ ‏حدس اسه سسصصاص جا‎ 1 ‏و‎ Phot odds ‏مصورو ع و مومت ره‎ - ۱ ‏و‎ systew without disturbicgy its Dperatioc.

صفحه 26:
Otercaive Dethods & Pools Por Opstews © Prowppiey. ‏امس‎ thot dePices oc inital fist DP user requireweus, builds 0 prototype systesw ocd thea iwwproves the syste ia severd iteraivas bused va were’ Peedbuck. © ott oppiodion design (UBD). © group —based tool Por designe.

صفحه 27:
BPR ‏روص ما بولطم ی روط‎ ‏اما او لوصو مه ای و الوا‎ tt Pures processes to ‏همع مه 60۲ ,هوجو حرط‎ Pro the redesiga of oa ieduiked process, to ‏مور و مج و همطل‎ to ‏مت‎ of ‏با با‎ BPM © ew waked Por resincturkny, (Dusiuess process ‏موم‎ (PPO), cobs workAow systems ond nedesia wehods. This ewer ‏وه الاو‎ tree ‏و و‎ preplen-prepk, qyarerie-nyaarerns, srt sprmecracieprrple ‏و‎ ٩ ‏وه اون موی مور اوه ما و‎ ‏و‎ ‎ee‏ مت ‎ ‎

صفحه 28:
‎Oppicatioa Genive‏ & توب ن) ‎(Providers ‎۶ ‏شوه مه مه مان وا بووین‎ IT ‏مرن‎ or ‏هت لول وشوو‎ or ‏امه مره‎ ‎© @pplcuiva service provider (PG) is ca agent or ‎locutica rotker thoc ofa mustower’s site. ‎ ‎ ‎

صفحه 29:
vaksatiacy & ‏عجر فصل‎ 4161١ Ievestwedt! @ruechits, Costs & Issues © @ssesstay the costs OP red posts: ore those cots thot rewoin he sue regardiess oP chocye fo the urtviy level. Por 19, Pixed costs tockide foProstructure post, vost oP VD services, ood ID ‏ل‎ ‎10/2 ‏كسامت عونا ودرمسى<) :(1"00/) وجاو مه خم اومن لو‎ vost oP ‏مه یی له وه روص‎ ٩۳ ‏.اوه‎ ‎© @svevsien the beurPits (Octuer) Ofgtarible bewePis. Brurhis Prow VP thot way be very desirable but diPPicul to place oo ‏دون تیصو‎ ۰ © Cowpartay the tu Chat 08 ‏هه‎

صفحه 30:
6 the Cost-Oeuetit ‏عنصررد)‎ © ‏.جادرراب 3)) اتأصمصنا- توصت جز 00080 يجو(‎ Osiay he DPO weed, ‏جاور رادجو‎ pouwvert Puture volues oP beueP its to their preseo-volue equivdedt by discountiag thes of he or<seizaticd’s cost oP Puerds. © Returns va nweskved. Ut weasue the ePPevivedrss oP woye wed it yeceraticg proPits with its available ussets. © Dhe bekess vee wprowk. 0 business vase is vo or wore spevitic upplicuives or proievis. ls wujor ewphusis is the ivetPicativg Por o specific required iestved, but tse provides the bridge beter the foital pro ocd its exerutivd.

صفحه 31:
عا ججياتيجها جوف ,متعجوويه جم له سحي جمعجوياة د ۳ ] ‎bee pare bear‏ بلجا ل تمصت ‎rol ose‏ ‎eke meee by neces‏ سمت لاسا ع لجسم ابيردت دسح ود ۳ [0 ‘Ones Raw be Pe Pe inks hr popes nore old ‏سسوم‎ le Race, eve ‏اسان مها سر تسه‎ با را هو موادت میم اف ی سا صقر ام ‎Prone‏ میج لسن ماه تمه مب proce walleye eras (eps leva, 3) ao (DOO) uke dora ome ‏رن‎ poset) 2 (Deberbny Po mpl TD pet na, cpa 6 ‏ما‎ ‏مو لقم‎ ۰ raccoons (0) od ‏لمم‎ ىا عوج 0029-06 جح اس لاس0

صفحه 32:
01 ۲ هه © Blob cord ‏حصحوا ان‎ © Gtkicd aed leqal issues. © Over iwobewedt. © Chkeee Oocngewent ۰ Risk Oucrgeweut Cheyer 05, ‏6ه‎

صفحه 33:
ome 4( ‎Oley & Grew, er. Ol righty rewerved. Reproductive or‏ طایل 009 ۵ ناو ‎oP hts work beyoud thal perwated t Orrin UP oP he ISPS Dotted Ores‏ متسود ‎Copyrht Oot wahout he express writes perwissica oP ‏جما‎ copyright over ‏سنوی‎ ‎(Rexnest Por Parker ‏و6 عم ) سبط با لمجطلی تما تاه نم‎ ‎loka Diey & Gow, lar. Nhe purckuser way woke buck-up copes ‏منت سا‎ woe aly und ‏امد‎ Por dinates or ‏.صصص‎ Pky Publbher wexneey oy repre Por ‎error, owen, ‏سس سا را تج سمل سر‎ oP theme prograsp Pro the use of ‎hye Poros canned here, ‏هه ‎ ‎ ‎

Chapter 15 Acquiring IT Applications and Infrastructure Information Technology For Management 6th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John Wiley & Sons, Inc. Chapter 15 1 Learning Objectives Describe the process of IT acquisition Describe IT project identification, justification, and planning.  List the major IT acquisition options and the criteria for option selection.  Discuss various IT outsourcing options  Describe the criteria for selecting a vendor Chapter 15 2 Learning Objectives (Continued) Describe the criteria for selecting a vendor  Describe the process of vendor and software selection.  Understand some major implementation issues.  Understand the issue of connecting IT applications to databases, other applications, networks, and business partners.  Describe the need for business process redesign and the methodologies for doing it. Chapter 15 3 Strategies for Acquiring IT Applications Buy the applications (off-the-shelf approach) Lease the applications Developing the applications in-house (Insourcing) Chapter 15 4 The Five Major Steps of Acquisition Chapter 15 5 Constraints in Planning and Acquisition Chapter 15 6 Acquiring IT Applications Option 1 - Buy Chapter 15 7 Acquiring IT Applications Option 2- Lease TYPES OF LEASING VENDORS Leasing can be done in one of two ways.  The first way is to lease the application from an outsourcer and install it on the company’s premises. The vendor can help with the installation and frequently will offer to also contract for the operation and maintenance of the system. Many conventional applications are leased this way.  The second way, using an application system provider (ASP), is becoming more popular. Chapter 15 8 Acquiring IT Applications More Options .. Chapter 15 9 Acquiring IT Applications More Options …  IN-HOUSE DEVELOPMENT APPROACHES. There are two major approaches to in-house development: building from scratch or building from components.  Build from scratch. This option should be considered only for specialized applications for which components are not available. It is an expensive and slow process, but it will provide the best fit.  Build from components. Companies with experienced IT staff can use standard components (e.g., a secure Web server), some software languages (e.g., Java, Visual Basic, or Perl), and third-party subroutines to create and maintain applications on their own. (Or, companies can outsource the entire development process to an integrator that assembles the components.) From a software standpoint, using components offers the greatest flexibility and can be the least expensive option in the long run. However, it can also result in a number of false starts and wasted experimentations. For this reason, even those companies with experienced staff are frequently better off modifying and customizing one of the packaged solutions as part of the “buy” option. Chapter 15 10 Traditional Systems Development Life Cycle Software development life cycle is the traditional systems development method that organizations use for large-scale IT projects. SDLC processes are systems investigation, systems analysis, systems design, programming, testing, implementation, operation and maintenance. Waterfall approach is when tasks in one phase are completed before the work proceeds to the next stage. Chapter 15 11 Applications and INFRASTRUCTURE Chapter 15 12 Selection of Vendors Chapter 15 13 Partner Connections Chapter 15 14 System Development Teams  Users are employees from all functional areas and levels of the organization who interact with the system, either directly or indirectly.  System analysts are IS professionals who specializing in analyzing and designing ISs.  Programmers are IS professionals who modify existing computer programs or write new computer programs to satisfy user requirements. Chapter 15 15 System Development Teams (Continued) Technical specialists are experts on a certain type of technology, such as databases or telecommunications. System stakeholders are all people affected by changes in the information systems. Chapter 15 16 SDLC  Major advantages  Control  Accountability  Error detection  Major drawbacks  Relatively inflexible  Time-consuming and expensive  Discourages changes once user requirements are done Chapter 15 17 SDLC – Systems Investigation  Begins with the business problem (or opportunity) followed by the feasibility analysis.  Feasibility study  Technical  Economic  Behavioral  Organizational  Go/No-Go Decision Chapter 15 18 SDLC – Systems Analysis Is the examination of the business problem that the organization plans to solve with an information system. Main purpose is to gather information about existing system to determine requirements for the new or improved system. Deliverable is a set of system requirements. Chapter 15 19 SDLC – Systems Design Describes how the system will accomplish this task. Deliverable is the technical design that specifies: System outputs, inputs, user interfaces; Hardware, software, databases, telecommunications, personnel & procedures; Blueprint of how these components are integrated. Chapter 15 20 SDLC – Systems Design (Continued) Logical system design states what the system will do, using abstract specifications. Physical system design states how the system will perform its functions, with actual physical specifications. Scope creep is caused by adding functions after the project has been initiated. Chapter 15 21 SDLC – Programming & Testing Programming involves the translation of a system’s design specification into computer code. Testing check to see if the computer code will produce the expected and desired results under certain conditions. Testing is designed to delete errors (bugs) in the computer code. These errors are of two types . Syntax errors ( e.g., misspelled word or a misplaced comma) and logic errors that permit the program to run but result in incorrect output. Chapter 15 22 SDLC – Systems Implementation Implementation or deployment is the process of converting from the old system to the new system. Organizations use four major conversion strategies ; parallel , direct , pilot and phased. Parallel conversion. Implementation process in which the old system and the new system operate simultaneously for a period of time. Direct conversion. Implementation process in which the old system is cut off and the new system turned on at a certain point in time. Chapter 15 23 SDLC – Systems Implementation (Continued) Pilot conversion. Implementation process that introduces the new system in one part of the organization on a trial basis, when new system is working property, it is introduced in other parts of the organization. Phased conversion. Implementation process that introduces components of the new system in stages, until the entire new system is operational. Chapter 15 24 SDLC – Operation & Maintenance  Audits are performed to assess the system’s capabilities and to determine if it is being used correctly.  Systems need several types of maintenance.  Debugging: A process that continues throughout the life of the system.  Updating: Updating the system to accommodate changes in business conditions.  Maintenance: That adds new functionally to the system – adding new features to the existing system without disturbing its operation. Chapter 15 25 Alternative Methods & Tools for Systems Development Prototyping. Approach that defines an initial list of user requirements, builds a prototype system and then improves the system in several iterations based on users’ feedback. Joint application design (JAD). A group –based tool for collecting user requirements and creating system designs. Chapter 15 26 Business Process Redesign (BPR) BPR Business process redesign was preceded by business process reengineering, a methodology in which an organization fundamentally and radically redesigned its business processes to achieve dramatic improvement. Today, BPR can focus on anything from the redesign of an individual process, to redesign of a group of processes, to redesign of the entire enterprise. BPM A new method for restructuring, Business process management (BPM), combines workflow systems and redesign methods. This emerging methodology covers three process categories: people-to-people, systems-to-systems, and systems-to-people interactions. It is a blending of workflow, process management, and applications integration. Chapter 15 27 Outsourcing & Application Service Providers Outsourcing is when an organization acquires IT applications or services from outside contractors or external organizations. Application service provider (ASP) is an agent or vendor who assembles the software needed by enterprises and packages the software with services such as development, operations and maintenance.  ASP manages application servers from a centrally controlled location rather than at a customer’s site. Chapter 15 28 Evaluating & Justifying IT Investment: Benefits, Costs & Issues  Assessing the costs  Fixed costs: are those costs that remain the same regardless of change in the activity level. For IT, fixed costs include infrastructure cost, cost of IT services, and IT management cost  Total cost of ownership (TCO): Formula for calculating cost of acquiring, operating and controlling an IT system.  Assessing the benefits (Values)  Intangible benefits. Benefits from IT that may be very desirable but difficult to place an accurate monetary value on.  Comparing the two Chapter 15 29 Conducting the Cost-Benefit Analysis  Using NPV in cost-benefit Analysis. Using the NPV method, analysts convert future values of benefits to their present-value equivalent by discounting them at the organization’s cost of funds.  Return on investment. It measure the effectiveness of management in generating profits with its available assets.  The business case approach. A business case is one or more specific applications or projects. Its major emphasis is the justification for a specific required investment, but it also provides the bridge between the initial plan and its execution. Chapter 15 30 Cost-Benefit Analysis Methods Method Description Benchmarks Focuses on objective measures of performance. Metric benchmarks provide numeric measures of performance, best-practice benchmarks focus on how IS activities are actually performed by successful organization. Management by maxim Brings together corporate executives, business-unit managers, and IT executives to identify IT infrastructure investments that correspond to organizational strategies and objectives. Real-option valuation Stems form the field of finance. Looks for projects that create additional opportunities in the future, even if current costs exceed current benefits. Balanced scorecard method Evaluates the overall health of organizations and projects, by looking at the organization’s short- and long-term financial metrics, customers, internal business processes and learning and growth (Kaplan and Norton, 1996). Activity- based costing approach Applies principles of activity-based costing (ABC)( which allocates costs based on each product’s use of company activities in making the product) to IT investment analysis. EIAC model Methodology for implementing IT payoff initiatives, composed of 9 phases, divided into four categories: exploration (E), involvement (I), analysis (A) and communication (C). Chapter 15 31 Managerial Issues Global and Cultural Issues Ethical and legal issues. User involvement. Change Management Risk Management Chapter 15 32 Chapter 15 Copyright © 2008 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein. Chapter 15 33

51,000 تومان