Benefits Management: How to Increase the Business Value of Your IT Projects, Edition 2

Sold by John Wiley & Sons
Free sample

The second edition of Benefits Management has been updated with current examples, further insights from experience and recent research. It shows how the enduring challenges achieving business value from information systems and technology projects can be addressed successfully. The approach, which is synthesized from best practices, sound theories and proven techniques from a range of management disciplines, is exemplified from the authors' extensive experience of working with a wide range of organizations. The book includes examples from a wide variety of projects including non-IT projects. The book is written in an accessible style, ideal for practicing managers, and includes check lists and templates for using the processes, tools and techniques and real-life case studies of their application and impacts.

The book now also includes:

  • International survey results that reinforce the importance of the topic, the key management issues and evidence of how the more successful organizations' practices are closely aligned with those described in the book.
  • A Benefits Management Maturity diagnostic which enables organizations to understand the reasons for their current investment success levels and then how to increase them.
  • Discussion of the role and contribution Project Management Offices (PMOs): how they can improve the delivery of value IT projects.
  • Further practical advice and guidance on Program and Portfolio Management, including findings from the authors’ recent research in several large organizations.
Read more
Collapse

About the author

John Ward is Emeritus Professor at Cranfield University, School of Management. He was previously Professor of Strategic Information Systems and Director of the Information Systems Research Centre. Prior to joining Cranfield, he worked in industry for 15 years and continues to be a consultant to a number of major organizations. As well as publishing many papers and articles, he is co-author of the book Strategic Planning for Information Systems. He is a Fellow of the Chartered Institute of Management Accountants and has served two terms as President of the UK Academy for Information Systems.

Elizabeth Daniel is Professor of Information Management and Associate Dean of Research and Scholarship at the Open University Business School (OUBS). Prior to joining OUBS in 2005, she worked in the IS Research Centre at Cranfield School of Management. Elizabeth’s research has addressed a number of areas including benefits management and IS in marketing and supply chains. Recent work has included studies of home-based online businesses and the uses of consumer and employee data. She has published many papers in leading academic journals and a number of management reports.

Read more
Collapse
Loading...

Additional Information

Publisher
John Wiley & Sons
Read more
Collapse
Published on
Jul 18, 2012
Read more
Collapse
Pages
368
Read more
Collapse
ISBN
9781118381601
Read more
Collapse
Read more
Collapse
Read more
Collapse
Language
English
Read more
Collapse
Genres
Business & Economics / General
Business & Economics / Information Management
Read more
Collapse
Content Protection
This content is DRM protected.
Read more
Collapse
Read Aloud
Available on Android devices
Read more
Collapse

Reading information

Smartphones and Tablets

Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.

Laptops and Computers

You can read books purchased on Google Play using your computer's web browser.

eReaders and other devices

To read on e-ink devices like the Sony eReader or Barnes & Noble Nook, you'll need to download a file and transfer it to your device. Please follow the detailed Help center instructions to transfer the files to supported eReaders.
"Despite spending more than $600 billion on information technology over the past decade, the Federal Government has achieved little of the productivity improvements that private industry has realized from IT" according to the 25 Point Implementation Plan to Reform Federal Information Technology Management published by the White House in late 2010. "Too often, Federal IT projects run over budget, behind schedule, or fail to deliver promised functionality." This book argues that the Federal Government needs a new approach. Introducing a novel five-step process called performance-driven management (PDM), author Ira Sachs explains in detail how to reduce risk on large IT programs and projects.

This book walks through the five steps of the PDM process:
conducting a high-level strategic review of what an organization does, who it serves, what it wants to do, and how it is going to do it;instituting performance measures to gauge success for the organization;completing comprehensive business cases for projects and using them to mitigate risk and manage projects throughout the project life cycle;performing benefits realization on completed projects; and establishing these best practices to achieve successful results in the future.

This is an essential tool for all IT and business managers in government and contractors doing business with the government, and it has much useful and actionable information for anyone who is interested in helping their business save money and take on effective, successful practices.
Architecture for the Intelligent Enterprise: Powerful New Ways to Maximize the Real-time Value of Information

Tomorrow’s winning “Intelligent Enterprises” will bring together far more diverse sources of data, analyze it in more powerful ways, and deliver immediate insight to decision-makers throughout the organization. Today, however, most companies fail to apply the information they already have, while struggling with the complexity and costs of their existing information environments.

In this book, a team of IBM’s leading information management experts guide you on a journey that will take you from where you are today toward becoming an “Intelligent Enterprise.”

Drawing on their extensive experience working with enterprise clients, the authors present a new, information-centric approach to architecture and powerful new models that will benefit any organization. Using these strategies and models, companies can systematically unlock the business value of information by delivering actionable, real-time information in context to enable better decision-making throughout the enterprise–from the “shop floor” to the “top floor.”

Coverage Includes

Highlighting the importance of Dynamic Warehousing Defining your Enterprise Information Architecture from conceptual, logical, component, and operational views Using information architecture principles to integrate and rationalize your IT investments, from Cloud Computing to Information Service Lifecycle Management Applying enterprise Master Data Management (MDM) to bolster business functions, ranging from compliance and risk management to marketing and product management Implementing more effective business intelligence and business performance optimization, governance, and security systems and processes Understanding “Information as a Service” and “Info 2.0,” the information delivery side of Web 2.0

For courses in MIS.


Help your students master the most important business course they'll take

Technology is rapidly changing the way organizations do business–and knowledge of MIS is critical to keeping up. Comprehensive and up-to-date, Using MIS shows students how organizations use information systems to solve business problems every day. The tenth edition now includes new content on using virtual reality and artificial intelligence, along with 11 new Career Guides, five new Ethics Guides, and five new Security Guides.


Also available with MyLab MIS

MyLabTM MIS is an online homework, tutorial, and assessment program designed to work with this text to engage students and improve results. Within its structured environment, students practice what they learn, test their understanding, and pursue a personalized study plan that helps them better absorb course material and understand difficult concepts.


Note: You are purchasing a standalone product; MyLab does not come packaged with this content. Students, if interested in purchasing this title with MyLab, ask your instructor for the correct package ISBN and Course ID. Instructors, contact your Pearson representative for more information.


If you would like to purchase both the physical text and MyLab, search for:


0134745965 / 9780134745961 Using MIS Plus MyLab MIS with Pearson eText -- Access Card Package
This package contains:
013460699X / 9780134606996 Using MIS 0134658930 / 9780134658933 MyLab MIS with Pearson eText -- Access Card -- for Using MIS
Strategic Security Management supports data driven security that is measurable, quantifiable and practical. Written for security professionals and other professionals responsible for making security decisions as well as for security management and criminal justice students, this text provides a fresh perspective on the risk assessment process. It also provides food for thought on protecting an organization’s assets, giving decision makers the foundation needed to climb the next step up the corporate ladder.

Strategic Security Management fills a definitive need for guidelines on security best practices. The book also explores the process of in-depth security analysis for decision making, and provides the reader with the framework needed to apply security concepts to specific scenarios. Advanced threat, vulnerability, and risk assessment techniques are presented as the basis for security strategies. These concepts are related back to establishing effective security programs, including program implementation, management, and evaluation. The book also covers metric-based security resource allocation of countermeasures, including security procedures, personnel, and electronic measures.

Strategic Security Management contains contributions by many renowned security experts, such as Nick Vellani, Karl Langhorst, Brian Gouin, James Clark, Norman Bates, and Charles Sennewald.

Provides clear direction on how to meet new business demands on the security professionalGuides the security professional in using hard data to drive a security strategy, and follows through with the means to measure success of the programCovers threat assessment, vulnerability assessment, and risk assessment - and highlights the differences, advantages, and disadvantages of each
©2019 GoogleSite Terms of ServicePrivacyDevelopersArtistsAbout Google|Location: United StatesLanguage: English (United States)
By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.