Introduction to Information Technology
Turban, Rainer and Potter
John Wiley & Sons, Inc.
Copyright 2005
Chapter 11
ACQUIRING AND
IMPLEMENTING SYSTEMS
Chapter 11
Acquiring IT Applications and
Infrastructure
Chapter 11 3
Chapter Outline
The landscape and framework of IT application
acquisition.
Planning for and justifying information system
applications.
Strategies for acquiring IT applications: available
options.
Outsourcing and application service providers.
Criteria for selecting an acquisition approach.
Vendor and software selection and other
implementation issues.
Connecting to databases and business partners.
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 4
Learning Objectives
Describe the progress of IT acquisition or development.
Describe the IT planning process.
Describe the IT justification process and methods.
List the major IT acquisition options and the criteria for options
selection.
Describe the use of criteria for selecting an acquisition
approach.
Describe the role of ASPs.
Describe the process of vendor and software selection.
Understand some major implementation issues .
Understand the issue of connecting IT applications to
databases, other applications, networks, and business partners.
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 5
11.1The Landscape and Framework
of IT Application Acquisition
We include in “acquisition” all approach to
obtaining systems: buying, leasing or
building.
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 6
The Acquisition Process
Step 1: planning for and justifying information
systems.
Step 2: IT architecture creation-A systems
analysis approach.
Step 3: select a development option and
acquire the application.
Step 4: installing, connecting, and more.
Step 5: operation and maintenance.
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 7
The progress of application acquisition
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 8
11.2 Planning for and Justifying
Information System Applications
First, It is necessary to explore the need for
each systems.
Second , it is necessary to justify it from a
cost- benefit point of view.
Application portfolio: The set of
recommended applications resulting from the
application development.
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 9
The IS Planning Process
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 10
The IT Strategic Plan
A set of long range goals that describe the IT
infrastructure and major IS initiatives needed
to achieve the goals of the organization.
The IT plan must meet three objectives::
It must be aligned with the organization’s
strategic plan
It must provide for an IT architecture
It must efficiently allocate IS development
resources among competing projects
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 11
Three Major Issues of IT Strategic
Planning
Efficiency
Effectiveness
Competitiveness
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 12
IT alignment with organizational
plans and IT strategy
The IT strategic plan must be aligned with overall
organizational planning, whenever relevant, so
that the IT unit and other organizational
personnel are working toword the same goals,
using their respective competencies.
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 13
The alignment among business and IT
strategies and IS operational plan
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 14
The IS Operational Plan
The IS operational plan is a clear set of projects that
will be executed by the IS department and by
functional area managers in support of the IT
strategic plan
Mission
IS environment
Objectives of the IS function
Constraints on the IS function
The application portfolio
Resource allocation and project management
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 15
Evaluating and justifying IT investment
Justifying IT investment includes three aspects:
assessment of costs,
assessment of benefits (values), and
comparison of the two.
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 16
IT investment categories
Investment in infrastructure and investment in
specific applications:
The IT infrastructure: Include the physical
facilities, components, services, and
management.
The IT applications: are computer programs
designed to support a specific task, a
business process or another application
program.
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 17
A Model for Investment Justification
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 18
Costing IT Investment
Fixed costs: are those costs that remain the
same regardless of change in the activity
level. For IT, fixed costs include infrastructure
cost of IT services, and IT management cost
Total cost of ownership (TCO): Formula for
calculating the cost of acquiring, operating
and controlling an IT system.
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 19
Evaluating the Benefits
Intangible benefits. Benefits from IT that may
be very desirable but difficult to place an
accurate monetary value on.
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 20
Conducting Cost-Benefit Analysis
Using NPV in cost-benefit Analysis. Using the NPV
method, analysts convert future values of benefits to
their present-value equivalent by discounting them at
the organization’s cost of funds.
Return on investment. It measure the effectiveness of
management in generating profits with its available
assets.
The business case approach. A business case is one
or more specific applications or projects. Its major
emphasis is the justification for a specific required
investment, but it also provides the bridge between
the initial plan and its execution.
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 21
Cost-Benefit Analysis Methods
Method Description
Benchmarks Focuses on objective measures of performance. Metric benchmarks provide
numeric measures of performance, best-practice benchmarks focus on how IS
activities are actually performed by successful organization.
Management by Brings together corporate executives, business-unit managers, and IT executives
maxim to identify IT infrastructure investments that correspond to organizational
strategies and objectives.
Real-option Stems form the field of finance. Looks for projects that create additional
valuation opportunities in the future, even if current costs exceed current benefits.
Balanced Evaluates the overall health of organizations and projects, by looking at the
scorecard method organization’s short- and long-term financial metrics, customers, internal business
processes and learning and growth (Kaplan and Norton, 1996).
Activity- based Applies principles of activity-based costing (ABC)( which allocates costs based on
costing approach each product’s use of company activities in making the product) to IT investment
analysis.
EIAC model Methodology for implementing IT payoff initiatives, composed of 9 phases, divided
into four categories: exploration (E), involvement (I), analysis (A) and
communication (C).
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 22
11.3 Strategies for Acquiring IT
Applications: Available Options
Buy the applications (off-the-shelf approach)
Lease the applications
Develop the applications in–house
(insourcing)
End-user development
Other acquisition options
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 23
Advantages and Limitations of the
“Buy” Option
Advantages of the “Buy” option
Many different types of off-the-shelf software are available
Much time can saved by buying rather than building
The company is not the first and only user
the company can know what it is getting before it invests in the product
Purchased software may avoid the need to hire personnel specifically dedicated to a project.
Limitation of “ Buy” option
Software may not exactly meet the company’s need
Software may be difficult or impossible to modify, or it may require huge business process
change to implement.
The company will not have control over software improvement and new versions.
Purchased software can be difficult to integrate with existing systems
Vendors may drop a product or go out of business
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 24
Types of Leasing Vendors
to lease the application from an outsourcer
and install it on the company’s premise. The
vendor can help with the installation and
frequency will offer to also contract for the
operation and maintenance of the system.
Many conventional application are leased this
way.
using an application system provider (ASP).
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 25
Utility Computing
Unlimited computing power and storage
capacity that can be obtained on demand and
billed on a pay-per use basis.
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 26
Utility Computing
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 27
In-House Development Approach
Build from Scratch: used for applications for
which components are not available
Build from components. Companies with
experienced IT staff can use standard
components (e.g., secure Web server), some
software languages ( e.g., Java, Visual basic,
or Perl), and third-party subroutines to create
and maintain application on their own.
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 28
Building in-house Methodologies
System development life Cycle (SDLC)
Prototyping methodology
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 29
Other acquisition options
Join an e-marketplace or an E-Exchange
Join a third –party auction or reverse
auction
Engage in joint ventures
Join a public exchange or a consortium
Hybrid approach
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 30
11.4 Outsourcing and Application
Service Providers
Outsourcing: use of outside contractors or
external organizations to acquire IT services
Several type of vendors offer services for
creating and operating IT system including e-
commerce applications:
Software houses
Outsourcers and others
Telecommunications companies
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 31
Application Service Providers (ASP)
An agent or vendor who assembles the
software needed by enterprises and
packages them with outsourced development,
operations, maintenance, and other services.
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 32
Additional criteria for selecting an ASP
vendor
Database format and portability .
Application and data storage
Scope of service
Support services
integration
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 33
Criteria for determining which application
development approach to use
The functionalities of package How to measure benefits
Information requirement Personnel needed
User friendless Forecasting and planning for
technological evolution
Hardware and software Scaling
resources
Installation Sizing
Maintenance services Performance
Vendor quality and track record Reliability
Estimated costs Security
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 34
Advantage and disadvantage of various
system acquisition method
Traditional system development (SDLC) may produce excessive documentation
force staff to systematically go through users may be unwilling or unable to study
every step in a structure process the specifications they approve
Enforce quality by maintaining standards takes too long to go from the original ideas
Has lower probability of missing important to a working system
issues in collecting user requirements. User have trouble describing requirement for
a proposed system.
Prototyping may encourage inadequate problem
helps clarify user requirements analysis
helps verify the feasibility of the design Not paractical with large number of users
promotes genuine user participation User may not give up the prototype when the
Promotes close working relationship system is complete.
between systems developers and users. may generate confusion about whether the
Work well for ill-defined problems system is complete and maintainable
May produce part of the final system system may be built quickly, which may
result in lower quality
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 35
Advantage and disadvantage of various
system acquisition method cont…
End user development
bypasses the IS department and avoids may eventually require maintenance
delays assistance from IT department
User controls the application and can documentation may be inadequate
change it as needed poor quality control
directly meets user requirement System may not have adequate inferences to
increased user acceptance of new system existing systems
Frees up IT resources
May create lower-quality systems.
External acquisition (buy or lease) controlled by another company with its own
Software can be tried out priorities and business considerations.
Software has been used for similar problem Package’s limitations may prevent desired
in other organizations business processes
Reduces time spent for analysis, design and May be difficult to get needed
programming enhancements.
Has good documentation that will be lack of intimate knowledge about how the
maintained software work and why it works that way
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 36
11.6 Vendor and software selection
and other implementation issues
Martin et al. (2000) identified six step in
selecting software vendor and an application
package.
Step 1 : Identify potential vendors
Step 2: determine the evaluation criteria
Step 3: evaluate vendors and packages
Step 4: choose the vendor and package
Step 5: negotiate a contract.
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 37
Criteria for selecting a software
application package
Cost and financial terms
Upgrade policy and cost
vendor’ reputation and availability for help
System flexibility
ease of Internet interface
Availability and quantity of documentation
Necessary hardware and networking resources
Required training (check if provide be vendor)
Security
Learning (speed of) for developers and users
Graphical presentation
Data handling
System- requirement hardware
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 38
Other Implementation Issues
In-house or outsource Web site
Consider an ASP
Do a detailed IT architecture study
Security and ethics
Evaluate the alternatives to in-house systems
development
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 39
11.7 Connecting to Databases and
Business Partners
EC application must be connected to internal
information systems, infrastructure, ERP,
and so on.
They also must be connected and are
referred to as “integration.”
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 40
Connecting to database
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 41
All rights reserved. Reproduction or translation of
this work beyond that permitted in section 117 of the
United States Copyright Act without express
permission of the copyright owner is unlawful.
Request for information should be addressed to the
permission department, John Wiley & Sons, Inc. The
purchaser may make back-up copies for his/her own
use only and not for distribution or resale. The
publisher assumes no responsibility for error,
omissions, or damages caused by the use of these
programs or from the use of the information herein.
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 11 42