SlideShare a Scribd company logo
(eBook PDF) IT Strategy Issues and
PracticesIssues and Practices 3rd download
https://ebookluna.com/product/ebook-pdf-it-strategy-issues-and-
practicesissues-and-practices-3rd/
Download full version ebook from https://ebookluna.com
We believe these products will be a great fit for you. Click
the link to download now, or visit ebookluna.com
to discover even more!
IT Strategy: Issues and Practices 3rd Edition (eBook PDF)
https://ebookluna.com/product/it-strategy-issues-and-practices-3rd-edition-
ebook-pdf/
(eBook PDF) Foundation Design Principles and Practices 3rd Edition
https://ebookluna.com/product/ebook-pdf-foundation-design-principles-and-
practices-3rd-edition/
(eBook PDF) IT Strategy & Innovation 4th Edition By James D. McKeen
https://ebookluna.com/product/ebook-pdf-it-strategy-innovation-4th-edition-
by-james-d-mckeen/
Bioethics: Principles, Issues, and Cases 3rd Edition (eBook PDF)
https://ebookluna.com/product/bioethics-principles-issues-and-cases-3rd-
edition-ebook-pdf/
(eBook PDF) Reading and Writing About Contemporary Issues 3rd Edition
https://ebookluna.com/product/ebook-pdf-reading-and-writing-about-
contemporary-issues-3rd-edition/
Global Health Care: Issues and Policies 3rd Edition (eBook PDF)
https://ebookluna.com/product/global-health-care-issues-and-policies-3rd-
edition-ebook-pdf/
(eBook PDF) Corporate Governance: Principles, Policies, and Practices 3rd
Canadian Edition
https://ebookluna.com/product/ebook-pdf-corporate-governance-principles-
policies-and-practices-3rd-canadian-edition/
(eBook PDF) Managing Information Systems: Strategy and Organisation 3rd
Edition
https://ebookluna.com/product/ebook-pdf-managing-information-systems-
strategy-and-organisation-3rd-edition/
(eBook PDF) Behavior Modification: What It Is and How To Do It 11th Edition
https://ebookluna.com/product/ebook-pdf-behavior-modification-what-it-is-
and-how-to-do-it-11th-edition/
(eBook PDF) IT Strategy Issues and PracticesIssues and Practices 3rd
(eBook PDF) IT Strategy Issues and PracticesIssues and Practices 3rd
Contents vii
Section II   IT Governance 87
Chapter 7 Creating IT Shared Services 88
IT Shared Services: An Overview 89
IT Shared Services: Pros and Cons 92
IT Shared Services: Key Organizational Success Factors 93
Identifying Candidate Services 94
An Integrated Model of IT Shared Services 95
Recommmendations for Creating Effective IT
Shared Services 96
Conclusion 99 • References 99
Chapter 8 A Management Framework for
IT Sourcing 100
A Maturity Model for IT Functions 101
IT Sourcing Options: Theory Versus Practice 105
The “Real” Decision Criteria 109
Decision Criterion #1: Flexibility 109
Decision Criterion #2: Control 109
Decision Criterion #3: Knowledge Enhancement 110
Decision Criterion #4: Business Exigency 110
A Decision Framework for Sourcing IT Functions 111
Identify Your Core IT Functions 111
Create a “Function Sourcing” Profile 111
Evolve Full-Time IT Personnel 113
Encourage Exploration of the Whole Range
of Sourcing Options 114
Combine Sourcing Options Strategically 114
A Management Framework for Successful
Sourcing 115
Develop a Sourcing Strategy 115
Develop a Risk Mitigation Strategy 115
Develop a Governance Strategy 116
Understand the Cost Structures 116
Conclusion 117 • References 117
Chapter 9 The IT Budgeting Process 118
Key Concepts in IT Budgeting 119
The Importance of Budgets 121
The IT Planning and Budget Process 123
viii Contents
Corporate Processes 123
IT Processes 125
Assess Actual IT Spending 126
IT Budgeting Practices That Deliver Value 127
Conclusion 128 • References 129
Chapter 10 Managing IT- Based Risk 130
A Holistic View of IT-Based Risk 131
Holistic Risk Management: A Portrait 134
Developing a Risk Management Framework 135
Improving Risk Management Capabilities 138
Conclusion 139 • References 140
Appendix A A Selection of Risk Classification
Schemes 141
Chapter 11 Information Management: The Nexus
of Business and IT 142
Information Management: How Does It Fit? 143
A Framework For IM 145
Stage One: Develop an IM Policy 145
Stage Two: Articulate the Operational
Components 145
Stage Three: Establish Information Stewardship 146
Stage Four: Build Information Standards 147
Issues In IM 148
Culture and Behavior 148
Information Risk Management 149
Information Value 150
Privacy 150
Knowledge Management 151
The Knowing–Doing Gap 151
Getting Started in IM 151
Conclusion 153 • References 154
Appendix A Elements of IM Operations 155
		 Mini Cases
Building Shared Services at RR Communications 156
Enterprise Architecture at Nationstate Insurance 160
IT Investment at North American Financial 165
Contents ix
Section III   IT-Enabled Innovation 169
Chapter 12 Innovation with IT 170
The Need for Innovation: An Historical
Perspective 171
The Need for Innovation Now 171
Understanding Innovation 172
The Value of Innovation 174
Innovation Essentials: Motivation, Support,
and Direction 175
Challenges for IT leaders 177
Facilitating Innovation 179
Conclusion 180 • References 181
Chapter 13 Big Data and Social Computing 182
The Social Media/Big Data Opportunity 183
Delivering Business Value with Big Data 185
Innovating with Big Data 189
Pulling in Two Different Directions: The Challenge
for IT Managers 190
First Steps for IT Leaders 192
Conclusion 193 • References 194
Chapter 14 Improving the Customer Experience:
An IT Perspective 195
Customer Experience and Business value 196
Many Dimensions of Customer Experience 197
The Role of Technology in Customer Experience 199
Customer Experience Essentials for IT 200
First Steps to Improving Customer Experience 203
Conclusion 204 • References 204
Chapter 15 Building Business Intelligence 206
Understanding Business Intelligence 207
The Need for Business Intelligence 208
The Challenge of Business Intelligence 209
The Role of IT in Business Intelligence 211
Improving Business Intelligence 213
Conclusion 216 • References 216
x Contents
Chapter 16 Enabling Collaboration with IT 218
Why Collaborate? 219
Characteristics of Collaboration 222
Components of Successful Collaboration 225
The Role of IT in Collaboration 227
First Steps for Facilitating Effective Collaboration 229
Conclusion 231 • References 232
		 Mini Cases
Innovation at International Foods 234
Consumerization of Technology at IFG 239
CRM at Minitrex 243
Customer Service at Datatronics 246
Section IV  
IT Portfolio Development and Management 251
Chapter 17 Application Portfolio Management 252
The Applications Quagmire 253
The Benefits of a Portfolio Perspective 254
Making APM Happen 256
Capability 1: Strategy and Governance 258
Capability 2: Inventory Management 262
Capability 3: Reporting and Rationalization 263
Key Lessons Learned 264
Conclusion 265 • References 265
Appendix A Application Information 266
Chapter 18 Managing IT Demand 270
Understanding IT Demand 271
The Economics of Demand Management 273
Three Tools for Demand management 273
Key Organizational Enablers for Effective Demand
Management 274
Strategic Initiative Management 275
Application Portfolio Management 276
Enterprise Architecture 276
Business–IT Partnership 277
Governance and Transparency 279
Conclusion 281 • References 281
Contents xi
Chapter 19 Creating and Evolving a Technology
Roadmap 283
What is a Technology Roadmap? 284
The Benefits of a Technology Roadmap 285
External Benefits (Effectiveness) 285
Internal Benefits (Efficiency) 286
Elements of the Technology Roadmap 286
Activity #1: Guiding Principles 287
Activity #2: Assess Current Technology 288
Activity #3: Analyze Gaps 289
Activity #4: Evaluate Technology
Landscape 290
Activity #5: Describe Future Technology 291
Activity #6: Outline Migration Strategy 292
Activity #7: Establish Governance 292
Practical Steps for Developing a Technology
Roadmap 294
Conclusion 295 • References 295
Appendix A Principles to Guide a Migration
Strategy 296
Chapter 20 Enhancing Development
Productivity 297
The Problem with System Development 298
Trends in System Development 299
Obstacles to Improving System Development
Productivity 302
Improving System Development Productivity: What we
know that Works 304
Next Steps to Improving System Development
Productivity 306
Conclusion 308 • References 308
Chapter 21 Information Delivery: IT’s Evolving Role 310
Information and IT: Why Now? 311
Delivering Value Through Information 312
Effective Information Delivery 316
New Information Skills 316
New Information Roles 317
New Information Practices 317
xii Contents
New Information Strategies 318
The Future of Information Delivery 319
Conclusion 321 • References 322
		 Mini Cases
Project Management at MM 324
Working Smarter at Continental Furniture International 328
Managing Technology at Genex Fuels 333
Index 336
Preface
Today, with information technology (IT) driving constant business transformation,
overwhelming organizations with information, enabling 24/7 global operations, and
undermining traditional business models, the challenge for business leaders is not
simply to manage IT, it is to use IT to deliver business value. Whereas until fairly recently,
decisions about IT could be safely delegated to technology specialists after a business
strategy had been developed, IT is now so closely integrated with business that, as one
CIO explained to us, “We can no longer deliver business solutions in our company
without using technology so IT and business strategy must constantly interact with
each other.”
What’s New in This Third Edition?
• Six new chapters focusing on current critical issues in IT management, including
IT shared services; big data and social computing; business intelligence; manag-
ing IT demand; improving the customer experience; and enhancing development
productivity.
• Two significantly revised chapters: on delivering IT functions through different
resourcing options; and innovating with IT.
• Two new mini cases based on real companies and real IT management situations:
Working Smarter at Continental Furniture and Enterprise Architecture at Nationstate
Insurance.
• A revised structure based on reader feedback with six chapters and two mini cases
from the second edition being moved to the Web site.
All too often, in our efforts to prepare future executives to deal effectively with
the issues of IT strategy and management, we lead them into a foreign country where
they encounter a different language, different culture, and different customs. Acronyms
(e.g., SOA, FTP/IP, SDLC, ITIL, ERP), buzzwords (e.g., asymmetric encryption, proxy
servers, agile, enterprise service bus), and the widely adopted practice of abstraction
(e.g., Is a software monitor a person, place, or thing?) present formidable “barriers to
entry” to the technologically uninitiated, but more important, they obscure the impor-
tance of teaching students how to make business decisions about a key organizational
resource. By taking a critical issues perspective, IT Strategy: Issues and Practices treats IT
as a tool to be leveraged to save and/or make money or transform an organization—not
as a study by itself.
As in the first two editions of this book, this third edition combines the experi-
ences and insights of many senior IT managers from leading-edge organizations with
thorough academic research to bring important issues in IT management to life and
demonstrate how IT strategy is put into action in contemporary businesses. This new
edition has been designed around an enhanced set of critical real-world issues in IT
management today, such as innovating with IT, working with big data and social media,
xiii
xiv Preface
enhancing customer experience, and designing for business intelligence and introduces
students to the challenges of making IT decisions that will have significant impacts on
how businesses function and deliver value to stakeholders.
IT Strategy: Issues and Practices focuses on how IT is changing and will continue to
change organizations as we now know them. However, rather than learning concepts
“free of context,” students are introduced to the complex decisions facing real organi-
zations by means of a number of mini cases. These provide an opportunity to apply
the models/theories/frameworks presented and help students integrate and assimilate
this material. By the end of the book, students will have the confidence and ability to
tackle the tough issues regarding IT management and strategy and a clear understand-
ing of their importance in delivering business value.
Key Features of This Book
• A focus on IT management issues as opposed to technology issues
• Critical IT issues explored within their organizational contexts
• Readily applicable models and frameworks for implementing IT strategies
• Mini cases to animate issues and focus classroom discussions on real-world deci-
sions, enabling problem-based learning
• Proven strategies and best practices from leading-edge organizations
• Useful and practical advice and guidelines for delivering value with IT
• Extensive teaching notes for all mini cases
A Different Approach to Teaching IT Strategy
The real world of IT is one of issues—critical issues—such as the following:
• How do we know if we are getting value from our IT investment?
• How can we innovate with IT?
• What specific IT functions should we seek from external providers?
• How do we build an IT leadership team that is a trusted partner with the business?
• How do we enhance IT capabilities?
• What is IT’s role in creating an intelligent business?
• How can we best take advantage of new technologies, such as big data and social
media, in our business?
• How can we manage IT risk?
However, the majority of management information systems (MIS) textbooks are orga-
nized by system category (e.g., supply chain, customer relationship ­
management, enterprise
resource planning), by system component (e.g., hardware, software, ­
networks), by system
function (e.g., marketing, financial, human resources), by ­
system type (e.g., transactional,
decisional, strategic), or by a combination of these. Unfortunately, such an organization
does not promote an understanding of IT management in practice.
IT Strategy: Issues and Practices tackles the real-world challenges of IT manage-
ment. First, it explores a set of the most important issues facing IT managers today, and
second, it provides a series of mini cases that present these critical IT issues within the
context of real organizations. By focusing the text as well as the mini cases on today’s
critical issues, the book naturally reinforces problem-based learning.
Preface xv
IT Strategy: Issues and Practices includes thirteen mini cases—each based on a real
company presented anonymously.1
Mini cases are not simply abbreviated versions of
standard, full-length business cases. They differ in two significant ways:
1. A horizontal perspective. Unlike standard cases that develop a single issue within
an organizational setting (i.e., a “vertical” slice of organizational life), mini cases
take a “horizontal” slice through a number of coexistent issues. Rather than looking
for a solution to a specific problem, as in a standard case, students analyzing a mini
case must first identify and prioritize the issues embedded within the case. This mim-
ics real life in organizations where the challenge lies in “knowing where to start” as
opposed to “solving a predefined problem.”
2. Highly relevant information. Mini cases are densely written. Unlike standard
cases, which intermix irrelevant information, in a mini case, each sentence exists for
a reason and reflects relevant information. As a result, students must analyze each
case very carefully so as not to miss critical aspects of the situation.
Teaching with mini cases is, thus, very different than teaching with standard cases.
With mini cases, students must determine what is really going on within the organiza-
tion. What first appears as a straightforward “technology” problem may in fact be a
political problem or one of five other “technology” problems. Detective work is, there-
fore, required. The problem identification and prioritization skills needed are essential
skills for future managers to learn for the simple reason that it is not possible for organi-
zations to tackle all of their problems concurrently. Mini cases help teach these skills to
students and can balance the problem-solving skills learned in other classes. Best of all,
detective work is fun and promotes lively classroom discussion.
Toassistinstructors,extensiveteachingnotesareavailableforallminicases.Developed
by the authors and based on “tried and true” in-class experience, these notes include case
summaries, identify the key issues within each case, present ancillary ­
information about the
company/industry represented in the case, and offer guidelines for organizing the class-
room discussion. Because of the structure of these mini cases and their embedded issues, it
is common for teaching notes to exceed the length of the actual mini case!
This book is most appropriate for MIS courses where the goal is to understand how
IT delivers organizational value. These courses are frequently labeled “IT Strategy” or
“IT Management” and are offered within undergraduate as well as MBA programs. For
undergraduate juniors and seniors in business and commerce programs, this is usually
the “capstone” MIS course. For MBA students, this course may be the compulsory core
course in MIS, or it may be an elective course.
Each chapter and mini case in this book has been thoroughly tested in a variety
of undergraduate, graduate, and executive programs at Queen’s School of Business.2
1
We are unable to identify these leading-edge companies by agreements established as part of our overall
research program (described later).
2
Queen’s School of Business is one of the world’s premier business schools, with a faculty team renowned
for its business experience and academic credentials. The School has earned international recognition for
its innovative approaches to team-based and experiential learning. In addition to its highly acclaimed MBA
programs, Queen’s School of Business is also home to Canada’s most prestigious undergraduate business
program and several outstanding graduate programs. As well, the School is one of the world’s largest and
most respected providers of executive education.
xvi Preface
These materials have proven highly successful within all programs because we adapt
how the material is presented according to the level of the students. Whereas under-
graduate students “learn” about critical business issues from the book and mini cases
for the first time, graduate students are able to “relate” to these same critical issues
based on their previous business experience. As a result, graduate students are able to
introduce personal experiences into the discussion of these critical IT issues.
Organization of This Book
One of the advantages of an issues-focused structure is that chapters can be approached
in any order because they do not build on one another. Chapter order is immaterial; that
is, one does not need to read the first three chapters to understand the fourth. This pro-
vides an instructor with maximum flexibility to organize a course as he or she sees fit.
Thus, within different courses/programs, the order of topics can be changed to focus on
different IT concepts.
Furthermore, because each mini case includes multiple issues, they, too, can be
used to serve different purposes. For example, the mini case “Building Shared Services
at RR Communications” can be used to focus on issues of governance, organizational
structure, and/or change management just as easily as shared services. The result is a
rich set of instructional materials that lends itself well to a variety of pedagogical appli-
cations, particularly problem-based learning, and that clearly illustrates the reality of IT
strategy in action.
The book is organized into four sections, each emphasizing a key component of
developing and delivering effective IT strategy:
• Section I: Delivering Value with IT is designed to examine the complex ways that
IT and business value are related. Over the past twenty years, researchers and prac-
titioners have come to understand that “business value” can mean many ­
different
things when applied to IT. Chapter 1 (Developing and Delivering on the IT Value
Proposition) explores these concepts in depth. Unlike the simplistic value propo-
sitions often used when implementing IT in organizations, this ­
chapter ­
presents
“value” as a multilayered business construct that must be effectively ­
managed at
several levels if technology is to achieve the benefits expected. Chapter 2 (Developing
IT Strategy for Business Value) examines the dynamic ­
interrelationship between
business and IT strategy and looks at the processes and critical ­
success ­
factors
used by organizations to ensure that both are well aligned. Chapter 3 (Linking IT
to Business Metrics) discusses new ways of measuring IT’s ­
effectiveness that pro-
mote closer business–IT alignment and help drive greater business value. Chapter
4 (Building a Strong Relationship with the Business) examines the nature of the
business–IT relationship and the characteristics of an effective relationship that
delivers real value to the enterprise. Chapter 5 (Communicating with Business
Managers) explores the business and interpersonal competencies that IT staff will
need in order to do their jobs effectively over the next five to seven years and what
companies should be doing to develop them. Finally, Chapter 6 (Building Better IT
Leaders from the Bottom Up) tackles the increasing need for improved leadership
skills in all IT staff and examines the expectations of the business for strategic and
innovative guidance from IT.
Preface xvii
In the mini cases associated with this section, the concepts of delivering
value with IT are explored in a number of different ways. We see business and
IT ­
executives at Hefty Hardware grappling with conflicting priorities and per-
spectives and how best to work together to achieve the company’s strategy. In
“Investing in TUFS,” CIO Martin Drysdale watches as all of the work his IT depart-
ment has put into a major new system fails to deliver value. And the “IT Planning
at ModMeters” mini case follows CIO Brian Smith’s efforts to create a strategic
IT plan that will align with business strategy, keep IT running, and not increase
IT’s budget.
• Section II: IT Governance explores key concepts in how the IT organization is
structured and managed to effectively deliver IT products and services to the orga-
nization. Chapter 7 (IT Shared Services) discusses how IT shared services should be
selected, organized, managed, and governed to achieve improved organizational
performance. Chapter 8 (A Management Framework for IT Sourcing) examines
how organizations are choosing to source and deliver different types of IT functions
and presents a framework to guide sourcing decisions. Chapter 9 (The IT Budgeting
Process) describes the “evil twin” of IT strategy, discussing how budgeting mecha-
nisms can significantly undermine effective business strategies and suggesting
practices for addressing this problem while maintaining traditional fiscal account-
ability. Chapter 10 (Managing IT-based Risk) describes how many IT organizations
have been given the responsibility of not only managing risk in their own activities
(i.e., project development, operations, and delivering business strategy) but also
of managing IT-based risk in all company activities (e.g., mobile computing, file
sharing, and online access to information and software) and the need for a holistic
framework to understand and deal with risk effectively. Chapter 11 (Information
Management: The Nexus of Business and IT) describes how new organizational
needs for more useful and integrated information are driving the development of
business-oriented functions within IT that focus specifically on information and
knowledge, as opposed to applications and data.
The mini cases in this section examine the difficulties of managing com-
plex IT issues when they intersect substantially with important business issues.
In “Building Shared Services at RR Communications,” we see an IT organiza-
tion in transition from a traditional divisional structure and governance model
to a more centralized enterprise model, and the long-term challenges experi-
enced by CIO Vince Patton in changing both business and IT practices, includ-
ing information management and delivery, to support this new approach. In
“Enterprise Architecture at Nationstate Insurance,” CIO Jane Denton endeavors
to make IT more flexible and agile, while incorporating new and emerging tech-
nologies into its strategy. In “IT Investment at North American Financial,” we
show the opportunities and challenges involved in prioritizing and resourcing
enterprisewide IT projects and monitoring that anticipated benefits are being
achieved.
• Section III: IT-Enabled Innovation discusses some of the ways technology is
being used to transform organizations. Chapter 12 (Innovation with IT) examines
the nature and importance of innovation with IT and describes a typical inno-
vation life cycle. Chapter 13 (Big Data and Social Computing) discusses how IT
leaders are incorporating big data and social media concepts and technologies
xviii Preface
to successfully deliver business value in new ways. Chapter 14 (Improving the
Customer Experience: An IT Perspective) explores the IT function’s role in creating
and improving an organization’s customer experiences and the role of technology
in helping companies to understand and learn from their customers’ experiences.
Chapter 15 (Building Business Intelligence) looks at the nature of business intelli-
gence and its relationship to data, information, and knowledge and how IT can be
used to build a more intelligent organization. Chapter 16 (Enabling Collaboration
with IT) identifies the principal forms of collaboration used in organizations, the
primary business drivers involved in them, how their business value is measured,
and the roles of IT and the business in enabling collaboration.
The mini cases in this section focus on the key challenges companies face in
innovating with IT. “Innovation at International Foods” contrasts the need for pro-
cess and control in corporate IT with the strong push to innovate with technology
and the difficulties that ensue from the clash of style and culture. “Consumerization
of Technology at IFG” looks at issues such as “bring your own device” (BYOD) to
the workplace. In “CRM at Minitrex,” we see some of the internal technological and
political conflicts that result from a strategic decision to become more customercen-
tric. Finally, “Customer Service at Datatronics” explores the importance of present-
ing unified, customer-facing IT to customers.
• Section IV: IT Portfolio Development and Management looks at how the IT
function must transform itself to be able to deliver business value effectively in
the future. Chapter 17 (Application Portfolio Management) describes the ongoing
management process of categorizing, assessing, and rationalizing the IT application
portfolio. Chapter 18 (Managing IT Demand) looks at the often neglected issue of
demand management (as opposed to supply management), explores the root causes
of the demand for IT services, and identifies a number of tools and enablers to
facilitate more effective demand management. Chapter 19 (Creating and Evolving
a Technology Roadmap) examines the challenges IT managers face in implement-
ing new infrastructure, technology standards, and types of technology in their real-
world business and technical environments, which is composed of a huge variety of
hardware, software, applications, and other technologies, some of which date back
more than thirty years. Chapter 20 (Enhancing Development Productivity) explores
how system development practices are changing and how managers can create
an environment to promote improved development productivity. And Chapter 21
(Information Delivery: IT’s Evolving Role) examines the fresh challenges IT faces in
managing the exponential growth of data and digital assets; privacy and account-
ability concerns; and new demands for access to information on an anywhere, any-
time basis.
The mini cases associated with this section describe many of these themes
embedded within real organizational contexts. “Project Management at MM” mini
case shows how a top-priority, strategic project can take a wrong turn when proj-
ect management skills are ineffective. “Working Smarter at Continental Furniture”
mini case follows an initiative to improve the company’s analytics so it can reduce
its environmental impact. And in the mini case “Managing Technology at Genex
Fuels,” we see CIO Nick Devlin trying to implement enterprisewide technology for
competitive advantage in an organization that has been limping along with obscure
and outdated systems.
Preface xix
Supplementary Materials
Online Instructor Resource Center
The following supplements are available online to adopting instructors:
• PowerPoint Lecture Notes
• Image Library (text art)
• Extensive Teaching Notes for all Mini cases
• Additional chapters including Developing IT Professionalism; IT Sourcing; Master
DataManagement;DevelopingITCapabilities;TheIdentityManagementChallenge;
Social Computing; Managing Perceptions of IT; IT in the New World of Corporate
Governance Reforms; Enhancing Customer Experiences with Technology; Creating
Digital Dashboards; and Managing Electronic Communications.
• Additional mini cases, including IT Leadership at MaxTrade; Creating a Process-Driven
Organization at Ag-Credit; Information Management at Homestyle Hotels; Knowledge
Management at Acme Consulting; Desktop Provisioning at CanCredit; and Leveraging
IT Vendors at SleepSmart.
For detailed descriptions of all of the supplements just listed, please visit http://
www.pearsonhighered.com/mckeen.
CourseSmart eTextbooks Online
CourseSmart is an exciting new choice for students looking to save money. As an alter-
native to purchasing the print textbook, students can purchase an electronic version of
the same content and save up to 50 percent off the suggested list price of the print text.
With a CourseSmart etextbook, students can search the text, make notes online, print
out reading assignments that incorporate lecture notes, and bookmark important pas-
sages for later review. www.coursesmart.com.
The Genesis of This Book
Since 1990 we have been meeting quarterly with a group of senior IT managers from
a number of leading-edge organizations (e.g., Eli Lilly, BMO, Honda, HP, CIBC, IBM,
Sears, Bell Canada, MacDonalds, and Sun Life) to identify and discuss critical IT manage-
ment issues. This focus group represents a wide variety of industry sectors (e.g., retail,
­
manufacturing, pharmaceutical, banking, telecommunications, insurance, media, food
processing, government, and automotive). Originally, it was established to meet the com-
panies’ needs for well-balanced, thoughtful, yet practical information on emerging IT
management topics, about which little or no research was available. However, we soon
recognized the value of this premise for our own research in the rapidly evolving field
of IT management. As a result, it quickly became a full-scale research program in which
we were able to use the focus group as an “early warning system” to document new IT
management issues, develop case studies around them, and explore more collaborative
approaches to identifying trends, challenges, and effective practices in each topic area.3
3
This now includes best practice case studies, field research in organizations, multidisciplinary qualitative
and quantitative research projects, and participation in numerous CIO research consortia.
xx Preface
As we shared our materials with our business students, we realized that this issues-
based approach resonated strongly with them, and we began to incorporate more of our
research into the classroom. This book is the result of our many years’ work with senior
IT managers, in organizations, and with students in the classroom.
Each issue in this book has been selected collaboratively by the focus group after
debate and discussion. As facilitators, our job has been to keep the group’s focus on IT
management issues, not technology per se. In preparation for each meeting, focus group
members researched the topic within their own organization, often involving a number
of members of their senior IT management team as well as subject matter experts in
the process. To guide them, we provided a series of questions about the issue, although
members are always free to explore it as they see fit. This approach provided both struc-
ture for the ensuing discussion and flexibility for those members whose ­
organizations
are approaching the issue in a different fashion.
The focus group then met in a full-day session, where the members discussed all
aspects of the issue. Many also shared corporate documents with the group. We ­facilitated
the discussion, in particular pushing the group to achieve a common understanding of
the dimensions of the issue and seeking examples, best practices, and guidelines for deal-
ing with the challenges involved. Following each session, we wrote a report based on the
discussion, incorporating relevant academic and practitioner materials where these were
available. (Because some topics are “bleeding edge,” there is often little traditional IT
research available on them.)
Each report has three parts:
1. A description of the issue and the challenges it presents for both business and IT
managers
2. Models and concepts derived from the literature to position the issue within a con-
textual framework
3. Near-term strategies (i.e., those that can be implemented immediately) that have
proven successful within organizations for dealing with the specific issue
Each chapter in this book focuses on one of these critical IT issues. We have learned
over the years that the issues themselves vary little across industries and organizations,
even in enterprises with unique IT strategies. However, each organization tackles the
same issue somewhat differently. It is this diversity that provides the richness of insight
in these chapters. Our collaborative research approach is based on our belief that when
dealing with complex and leading-edge issues, “everyone has part of the solution.”
Every focus group, therefore, provides us an opportunity to explore a topic from a
­
variety of perspectives and to integrate different experiences (both successful and oth-
erwise) so that collectively, a thorough understanding of each issue can be developed
and strategies for how it can be managed most successfully can be identified.
About the Authors
James D. McKeen is Professor Emeritus at the Queen’s School of Business. He has been
working in the IT field for many years as a practitioner, researcher, and consultant. In
2011, he was named the “IT Educator of the Year” by ComputerWorld Canada. Jim has
taught at universities in the United Kingdom, France, Germany, and the United States.
His research is widely published in a number of leading journals and he is the coau-
thor (with Heather Smith) of five books on IT management. Their most recent book—IT
Strategy: Issues and Practices (2nd ed.)—was the best-selling business book in Canada
(Globe and Mail, April 2012).
Heather A. Smith has been named the most-published researcher on IT management
issues in two successive studies (2006, 2009). A senior research associate with Queen’s
University School of Business, she is the author of five books, the most recent being IT
Strategy: Issues and Practices (Pearson Prentice Hall, 2012). She is also a senior research
associate with the American Society for Information Management’s Advanced Practices
Council. Aformer senior IT manager, she is codirector of the IT Management Forum and
the CIO Brief, which facilitate interorganizational learning among senior IT executives.
In addition, she consults and collaborates with organizations worldwide.
xxi
Acknowledgments
The work contained in this book is based on numerous meetings with many senior IT
managers. We would like to acknowledge our indebtedness to the following individuals
who willingly shared their insights based on their experiences “earned the hard way”:
Michael Balenzano, Sergei Beliaev, Matthias Benfey, Nastaran Bisheban, Peter
Borden, Eduardo Cadena, Dale Castle, Marc Collins, Diane Cope, Dan Di Salvo,
Ken Dschankilic, Michael East, Nada Farah, Mark Gillard, Gary Goldsmith, Ian
Graham, Keiko Gutierrez, Maureen Hall, Bruce Harding, Theresa Harrington,
Tom Hopson, Heather Hutchison, Jim Irich, Zeeshan Khan, Joanne Lafreniere,
Konstantine Liris, Lisa MacKay, Mark O’Gorman, Amin Panjwani, Troy Pariag,
Brian Patton, Marius Podaru, Helen Restivo, Pat Sadler, A. F. Salam, Ashish
Saxena, Joanne Scher, Stewart Scott, Andy Secord, Marie Shafi, Helen Shih, Trudy
Sykes, Bruce Thompson, Raju Uppalapati, Len Van Greuning, Laurie Schatzberg,
Ted Vincent, and Bond Wetherbe.
We would also like to recognize the contribution of Queen’s School of Business
to this work. The school has facilitated and supported our vision of better integrat-
ing academic research and practice and has helped make our collaborative approach
to the study of IT management and strategy an effective model for interorganizational
learning.
James D. McKeen
Kingston, Ontario
Heather A. Smith
School of Business
June 2014
xxii
S ect ion I
Delivering Value with IT
Chapter 1 Developing and Delivering on the IT Value Proposition
Chapter 2 Developing IT Strategy for Business Value
Chapter 3 Linking IT to Business Metrics
Chapter 4 Building a Strong Relationship with the Business
Chapter 5 Communicating with Business Managers
Chapter 6 Building Better IT Leaders from the Bottom Up
Mini Cases
■ Delivering Business Value with IT at Hefty Hardware
■ Investing in TUFS
■ IT Planning at ModMeters
2
C h a p t e r
1 Developing and Delivering
on the IT Value Proposition1
1
This chapter is based on the authors’ previously published article, Smith, H. A., and J. D. McKeen.
“Developing and Delivering on the IT Value Proposition.” Communications of the Association for Information
Systems 11 (April 2003): 438–50. Reproduced by permission of the Association for Information Systems.
I
t’s déjà vu all over again. For at least twenty years, business leaders have been
­
trying to figure out exactly how and where IT can be of value in their organizations.
And IT managers have been trying to learn how to deliver this value. When IT was
used mainly as a productivity improvement tool in small areas of a business, this was
a ­
relatively straightforward process. Value was measured by reduced head counts—
usually in clerical areas—and/or the ability to process more transactions per person.
However, as systems grew in scope and complexity, unfortunately so did the risks. Very
few companies escaped this period without making at least a few disastrous invest-
ments in systems that didn’t work or didn’t deliver the bottom-line benefits executives
thought they would. Naturally, fingers were pointed at IT.
With the advent of the strategic use of IT in business, it became even more difficult
to isolate and deliver on the IT value proposition. It was often hard to tell if an invest-
ment had paid off. Who could say how many competitors had been deterred or how
many customers had been attracted by a particular IT initiative? Many companies can
tell horror stories of how they have been left with a substantial investment in new forms
of technology with little to show for it. Although over the years there have been many
improvements in where and how IT investments are made and good controls have been
established to limit time and cost overruns, we are still not able to accurately articulate
and deliver on a value proposition for IT when it comes to anything other than simple
productivity improvements or cost savings.
Problems in delivering IT value can lie with how a value proposition is conceived
or in what is done to actually implement an idea—that is, selecting the right project and
doing the project right (Cooper et al. 2000; McKeen and Smith 2003; Peslak 2012). In
addition, although most firms attempt to calculate the expected payback of an IT invest-
ment before making it, few actually follow up to ensure that value has been achieved or
to question what needs to be done to make sure that value will be delivered.
Discovering Diverse Content Through
Random Scribd Documents
kupeita ja korkeuksien huippuja. Kaukana heidän takanaan näkyi jo
korpi, jonka läpi he olivat tulleet, ja keltakylkiseen männikköön
paistoi päivä kuin kullattuun onnelaan. Kevättä henki ympäristö ja
sen tuoksu lemusi ilmassa.
Kanerva oli koko talven tätä retkeä mielessään miettinyt, oli
kuvitellut sen niin äärettömän suurenmoiseksi ja ihanaksi, ja uniensa
himmeässä maailmassa hän vaelsi usein näitä samoja saloja, joita
nytkin kulkivat. Täällä hän olisi toivonut voivansa sanoa sen, mitä
tunsi, kertoa rajattoman rakkautensa ja ilmaista aavistelevat ilonsa.
Löytäisikö hän vastineen lemmelleen? Löytäisikö Irjan syvällisten
silmien loistosta sen satumaailman, jonka luuli niissä olevan?
Ymmärtäisikö sielu sielua?
Hän silmäsi Irjaan, joka kulki hänen vierellään hohtavan kauniina
ja aamuvirkkuna, mutta niin surullisen haaveilevana ja
kaihomielisenä. Irjan katse näytti tähtäävän johonkin hyvin kauas ja
mieli kuvailevan jotakin muuta kuin mitä edessä näki. Oi, oliko tuon
hennon poven alla sykkivä sydän, joka tuntisi, uskoisi ja luottaisi
niinkuin hän!
He olivat tulleet aukealle suolle, jonka laidasta Karhuvaara alkoi
kohota. Ensin oli loivaa myötälettä, mutta vähitellen nousu jyrkkeni,
muuttui louhikkoiseksi, satumaiseksi. Hyvin kaukana jo heidän
takanaan siinti Vasuharju ja muilla suunnilla suunnattomia
valkopäisiä kukkuloita. Kuta korkeammalle ehtivät, sitä enemmän
nousu viehätti ja sitä korkeammalle mieli teki.
Onko teistä tämä retkemme hauska?… Me läksimme maailmasta,
tulimme tänne kevään henkeen emmekä ikänä kaipaa takaisin,
sanoi Kanerva hurmaantuneena.
On, on. Tämä on suurenmoista ja muistoja virkistävää, sanoi Irja
ja riensi edellä.
Villi riemu tapasi Kanervan. Hänestä tuntui kuin taivaan portit
aukenisivat… näki edellään rakastettunsa hentona, notkeana ja
verevänä kiipeilevän tuttuja louhikoita, näki kuin enkelin, jota
keväisen aamuauringon säteet hyväilivät. Hän riensi puolihulluna
perässä, päätti suoria Irjan syliinsä ja puristaa sydämelleen niin, että
sen autio tyhjyys täyttyisi ja tuskat loppuisivat…
Mutta Irjan katse oli niin omituisen outo, niin kaihon ja surun
voittama, että Kanerva säpsähti, ojennettu käsi putosi takaisin…
Ja samalla he pääsivätkin perille Karhuvaaran korkeimmalle
huipulle. Irja hyppäsi kivelle ja silmäili kaukaisia maailmoja. Kanerva
seisoi vieressä. Mitä hän sanoisi? Miten ilmoittaisi? Hän oli kuin
kadottanut oman itsensä. Hän näki koko avaruuden kuin
kultameressä säkenöivän, näki vierivieressä korkeita valkopää-
kukkuloita kuin lumilinnoja, niiden välissä soita ja jänkkiä ja repaleita
palaneista saloista…
Hän seurasi Irjan katsetta, joka liiteli taivaanrannasta toiseen, kävi
pohjoisella, levähti lännellä, mutta lopulta asettui etelälle…
Etelääkö te rakastatte? kysyi hän hiljaa.
Niin, etelää, tuota kaukaista ja siintävää, vastasi Irja yhtä hiljaa.
He katselivat kauan äänettöminä, kuinka keväinen, avara maailma
kiertyi kultaisen aamuauringon loistoon, kuinka taivaanrannat olivat
kummallisen hienon harson peitossa. Idässä näkyi silmänsiintämiin
tummaa saloa ja kaljupäitä kukkuloita. Eteläinen taivaanranta oli
keveän pilven peitossa, mutta hyvin kaukana siinti muiden pitäjien
kirkontorneja ja vilahti vaarojen välistä leveän joen polveuksia. Mutta
pohjoinen taivas oli niin kalsean ja kylmän näköinen.
Ettekö rakasta pohjolaani? kysyi Kanerva kuin houreissaan.
Hän näki Irjan kääntävän katseensa pohjalle ja kuuli hetken
kuluttua hänen vastaavan:
Pohjolanne on niin kylmän sinervä ja riemuton…
Kanerva luuli siinä olevan vastineen hänen haaveilleen, toiveilleen
ja lemmelleen. Hän tunsi kuin puristuvansa kokoon, likistyvänsä
vasten vaaran lakea ja laskeuvansa maahan. Tunsi toivonsa
loppuvan, lempensä sammuvan ja ilonsa katoavan, näki taivaan
sinen muuttuvan mustaksi; kuului kuin koko avaruudessa soitettaisiin
hänen kuolinkellojaan, ja hänestä näytti kuin korvet olisivat aidatuita
kalmistoja ja korkeat vaarojen laet hautapatsaita…
Ja näki Irjan tähtäävän etelälle, niinkuin tahtoisi nähdä etelän
usvain taakse… nähdä jonkun, jota ikävöi. Ja onton kolkosti soi nyt
hänen korvissaan Irjan lempilaulu.
Lempi kestää iäti… iäti!
9.
Touon aika oli tullut.
Puolen peltoa on Kanerva kyntänyt ja istahtaa nyt pientareelle…
Hän istuu hartiat kumarassa, posket kämmeniä vasten. Hän on
laihtunut niin että silmät ovat syvällä kuopissa; niissä leimahtaa
vähäväliä omituinen, synkkä tuli, ja väliin kuolon kalpeus peittää
kasvot. Hän näyttää väsyneeltä ja rasitetulta, niin uupuneelta kuin ei
olisi levähtänyt kuukausiin.
Ilta on lämmin ja suloinen. Piennar työntää ävärtä, ja ruispelto on
tummanvihreä. Kuuluu käen kukuntaa Vasuharjun alta kuusikosta ja
vesilintujen kaakatusta joelta.
Kanerva istuu ajatuksissaan, ei kuule käkien kukuntaa, ei mieli
iloitse siitä, että kylvön aika näyttää niin lupaavalta. Hänen suuri
keväinen unelmansa on loppunut, sammunut on toivo kaikesta siitä,
jota oli ihannoinut ja jumaloinut. Se suuri, synkkä erämaa, jonka
laitaan hän lapsena jäi, oli nyt vasta puoliväliin taivallettu, eikä enää
jaksanut uskoa, että löytyisi kosteikkoa tulevillakaan taipaleilla.
Alakuloinen mieli synnyttää ikävän toisensa perästä, ja pettyneet
toiveet hakkaavat sydäntä kuin rautavasaralla.
Hän on taistellut, ja nyt hän luulee olevansa voitolla. Mutta ankara
on hänen taistelunsa ollut, kovempi kuin hän oli osannut koskaan
aavistaa. Sillä hän on kadottanut kaiken toivon elämänsä onnesta,
uskon siihen, että on olemassa todellista, puhdasta, kaikki kestävää
rakkautta, ja luottamuksen ihmisiin. Yksi ainoa toivo on vielä, hänen
lapsuutensa vankka usko, että ruumiillinen työ pelastaa kaikesta
pahasta.
Oi, että hänen täytyi kadottaa ihana satumaailmansa ja tuntea ja
nähdä, että se unissa kuvailtu, kirkastettu morsian ei ollutkaan
muuta kuin saastainen, likainen varjokuva hänen ihannemaailmansa
ystävästä.
Hän vaipuu yhä syvempiin mietteisiin siitä, mitä hän on elänyt
kuluneena talvena, mitä tuntenut kevätöinä ja kuinka raivonnut yksin
valvoessaan. Ja kummastellen hän näkee, että hän elää vielä, ettei
ole tehnyt hullun töitä, ja että hän vieläkin luottaa lapsuutensa
uskoon. Kummallisia, outoja kysymyksiä herää hänen mielessään ja
kamaloita aavistuksia omasta elämästään.
Hän muistaa niin selvään joka tapauksen Irjan seurassa, ja
varsinkin heidän viimeisen retkensä Karhuvaaralle. Se retki oli kuin
suuren suuri satumaailma, johon elävänä pääsi ja jota hän unissaan
oli kuvitellut. Oli juuri semmoinen kevätaamu, jona hän oli toivonut
voivansa viettää lempensä pyhää sunnuntaita…
Mutta hän ei jaksa ajatella loppuun sitä retkeä… se ikäänkuin
päättyy siihen, kun näki Irjan kivellä seisovan ja etelän ilmoille
katselevan. Eikä hän edemmäksi pyrikään, sillä se, mitä hän sitten
jäljestä tunsi ja tiesi, oli repivää ja raatelevaa tappelua, joka tahtoi
kiskoa sielun ruumiista ja viedä viimeisen luottamuksen…
Hän sattuu silmäämään tielle ja näkee Irjan kävelevän nuoren
metsäherran kanssa. Hän kuulee, kuinka Irja nauraa… näkee herran
kepillään viuhtovan…
Tumma puna nousee poskille, silmissä leimahtaa hirvittävä tuli,
kämmenet käyvät nyrkkiin ja hän höpisee…
Kavala, kaunis helvetin lapsi… noin minä sinut raatelisin…
Mutta äkkiä hän herpoaa, kalvava ikävä tunkee sydämeen, ja hän
purskahtaa itkuun… kuin lapsi…
Ja herää siitä, kun Musta hirnuu ja tahtoo illalliselle.
*** END OF THE PROJECT GUTENBERG EBOOK IRJA: KUVAUS ***
Updated editions will replace the previous one—the old editions will
be renamed.
Creating the works from print editions not protected by U.S.
copyright law means that no one owns a United States copyright in
these works, so the Foundation (and you!) can copy and distribute it
in the United States without permission and without paying
copyright royalties. Special rules, set forth in the General Terms of
Use part of this license, apply to copying and distributing Project
Gutenberg™ electronic works to protect the PROJECT GUTENBERG™
concept and trademark. Project Gutenberg is a registered trademark,
and may not be used if you charge for an eBook, except by following
the terms of the trademark license, including paying royalties for use
of the Project Gutenberg trademark. If you do not charge anything
for copies of this eBook, complying with the trademark license is
very easy. You may use this eBook for nearly any purpose such as
creation of derivative works, reports, performances and research.
Project Gutenberg eBooks may be modified and printed and given
away—you may do practically ANYTHING in the United States with
eBooks not protected by U.S. copyright law. Redistribution is subject
to the trademark license, especially commercial redistribution.
START: FULL LICENSE
THE FULL PROJECT GUTENBERG LICENSE
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK
To protect the Project Gutenberg™ mission of promoting the free
distribution of electronic works, by using or distributing this work (or
any other work associated in any way with the phrase “Project
Gutenberg”), you agree to comply with all the terms of the Full
Project Gutenberg™ License available with this file or online at
www.gutenberg.org/license.
Section 1. General Terms of Use and
Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand, agree
to and accept all the terms of this license and intellectual property
(trademark/copyright) agreement. If you do not agree to abide by all
the terms of this agreement, you must cease using and return or
destroy all copies of Project Gutenberg™ electronic works in your
possession. If you paid a fee for obtaining a copy of or access to a
Project Gutenberg™ electronic work and you do not agree to be
bound by the terms of this agreement, you may obtain a refund
from the person or entity to whom you paid the fee as set forth in
paragraph 1.E.8.
1.B. “Project Gutenberg” is a registered trademark. It may only be
used on or associated in any way with an electronic work by people
who agree to be bound by the terms of this agreement. There are a
few things that you can do with most Project Gutenberg™ electronic
works even without complying with the full terms of this agreement.
See paragraph 1.C below. There are a lot of things you can do with
Project Gutenberg™ electronic works if you follow the terms of this
agreement and help preserve free future access to Project
Gutenberg™ electronic works. See paragraph 1.E below.
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright law
in the United States and you are located in the United States, we do
not claim a right to prevent you from copying, distributing,
performing, displaying or creating derivative works based on the
work as long as all references to Project Gutenberg are removed. Of
course, we hope that you will support the Project Gutenberg™
mission of promoting free access to electronic works by freely
sharing Project Gutenberg™ works in compliance with the terms of
this agreement for keeping the Project Gutenberg™ name associated
with the work. You can easily comply with the terms of this
agreement by keeping this work in the same format with its attached
full Project Gutenberg™ License when you share it without charge
with others.
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside the
United States, check the laws of your country in addition to the
terms of this agreement before downloading, copying, displaying,
performing, distributing or creating derivative works based on this
work or any other Project Gutenberg™ work. The Foundation makes
no representations concerning the copyright status of any work in
any country other than the United States.
1.E. Unless you have removed all references to Project Gutenberg:
1.E.1. The following sentence, with active links to, or other
immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project Gutenberg™
work (any work on which the phrase “Project Gutenberg” appears,
or with which the phrase “Project Gutenberg” is associated) is
accessed, displayed, performed, viewed, copied or distributed:
This eBook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it away
or re-use it under the terms of the Project Gutenberg License
included with this eBook or online at www.gutenberg.org. If you
are not located in the United States, you will have to check the
laws of the country where you are located before using this
eBook.
1.E.2. If an individual Project Gutenberg™ electronic work is derived
from texts not protected by U.S. copyright law (does not contain a
notice indicating that it is posted with permission of the copyright
holder), the work can be copied and distributed to anyone in the
United States without paying any fees or charges. If you are
redistributing or providing access to a work with the phrase “Project
Gutenberg” associated with or appearing on the work, you must
comply either with the requirements of paragraphs 1.E.1 through
1.E.7 or obtain permission for the use of the work and the Project
Gutenberg™ trademark as set forth in paragraphs 1.E.8 or 1.E.9.
1.E.3. If an individual Project Gutenberg™ electronic work is posted
with the permission of the copyright holder, your use and distribution
must comply with both paragraphs 1.E.1 through 1.E.7 and any
additional terms imposed by the copyright holder. Additional terms
will be linked to the Project Gutenberg™ License for all works posted
with the permission of the copyright holder found at the beginning
of this work.
1.E.4. Do not unlink or detach or remove the full Project
Gutenberg™ License terms from this work, or any files containing a
part of this work or any other work associated with Project
Gutenberg™.
1.E.5. Do not copy, display, perform, distribute or redistribute this
electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
with active links or immediate access to the full terms of the Project
Gutenberg™ License.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if you
provide access to or distribute copies of a Project Gutenberg™ work
in a format other than “Plain Vanilla ASCII” or other format used in
the official version posted on the official Project Gutenberg™ website
(www.gutenberg.org), you must, at no additional cost, fee or
expense to the user, provide a copy, a means of exporting a copy, or
a means of obtaining a copy upon request, of the work in its original
“Plain Vanilla ASCII” or other form. Any alternate format must
include the full Project Gutenberg™ License as specified in
paragraph 1.E.1.
1.E.7. Do not charge a fee for access to, viewing, displaying,
performing, copying or distributing any Project Gutenberg™ works
unless you comply with paragraph 1.E.8 or 1.E.9.
1.E.8. You may charge a reasonable fee for copies of or providing
access to or distributing Project Gutenberg™ electronic works
provided that:
• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You provide a full refund of any money paid by a user who
notifies you in writing (or by e-mail) within 30 days of receipt
that s/he does not agree to the terms of the full Project
Gutenberg™ License. You must require such a user to return or
destroy all copies of the works possessed in a physical medium
and discontinue all use of and all access to other copies of
Project Gutenberg™ works.
• You provide, in accordance with paragraph 1.F.3, a full refund of
any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.E.9. If you wish to charge a fee or distribute a Project Gutenberg™
electronic work or group of works on different terms than are set
forth in this agreement, you must obtain permission in writing from
the Project Gutenberg Literary Archive Foundation, the manager of
the Project Gutenberg™ trademark. Contact the Foundation as set
forth in Section 3 below.
1.F.
1.F.1. Project Gutenberg volunteers and employees expend
considerable effort to identify, do copyright research on, transcribe
and proofread works not protected by U.S. copyright law in creating
the Project Gutenberg™ collection. Despite these efforts, Project
Gutenberg™ electronic works, and the medium on which they may
be stored, may contain “Defects,” such as, but not limited to,
incomplete, inaccurate or corrupt data, transcription errors, a
copyright or other intellectual property infringement, a defective or
damaged disk or other medium, a computer virus, or computer
codes that damage or cannot be read by your equipment.
1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except for
the “Right of Replacement or Refund” described in paragraph 1.F.3,
the Project Gutenberg Literary Archive Foundation, the owner of the
Project Gutenberg™ trademark, and any other party distributing a
Project Gutenberg™ electronic work under this agreement, disclaim
all liability to you for damages, costs and expenses, including legal
fees. YOU AGREE THAT YOU HAVE NO REMEDIES FOR
NEGLIGENCE, STRICT LIABILITY, BREACH OF WARRANTY OR
BREACH OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH
1.F.3. YOU AGREE THAT THE FOUNDATION, THE TRADEMARK
OWNER, AND ANY DISTRIBUTOR UNDER THIS AGREEMENT WILL
NOT BE LIABLE TO YOU FOR ACTUAL, DIRECT, INDIRECT,
CONSEQUENTIAL, PUNITIVE OR INCIDENTAL DAMAGES EVEN IF
YOU GIVE NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.
1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you
discover a defect in this electronic work within 90 days of receiving
it, you can receive a refund of the money (if any) you paid for it by
sending a written explanation to the person you received the work
from. If you received the work on a physical medium, you must
return the medium with your written explanation. The person or
entity that provided you with the defective work may elect to provide
a replacement copy in lieu of a refund. If you received the work
electronically, the person or entity providing it to you may choose to
give you a second opportunity to receive the work electronically in
lieu of a refund. If the second copy is also defective, you may
demand a refund in writing without further opportunities to fix the
problem.
1.F.4. Except for the limited right of replacement or refund set forth
in paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.
1.F.5. Some states do not allow disclaimers of certain implied
warranties or the exclusion or limitation of certain types of damages.
If any disclaimer or limitation set forth in this agreement violates the
law of the state applicable to this agreement, the agreement shall be
interpreted to make the maximum disclaimer or limitation permitted
by the applicable state law. The invalidity or unenforceability of any
provision of this agreement shall not void the remaining provisions.
1.F.6. INDEMNITY - You agree to indemnify and hold the Foundation,
the trademark owner, any agent or employee of the Foundation,
anyone providing copies of Project Gutenberg™ electronic works in
accordance with this agreement, and any volunteers associated with
the production, promotion and distribution of Project Gutenberg™
electronic works, harmless from all liability, costs and expenses,
including legal fees, that arise directly or indirectly from any of the
following which you do or cause to occur: (a) distribution of this or
any Project Gutenberg™ work, (b) alteration, modification, or
additions or deletions to any Project Gutenberg™ work, and (c) any
Defect you cause.
Section 2. Information about the Mission
of Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new computers.
It exists because of the efforts of hundreds of volunteers and
donations from people in all walks of life.
Volunteers and financial support to provide volunteers with the
assistance they need are critical to reaching Project Gutenberg™’s
goals and ensuring that the Project Gutenberg™ collection will
remain freely available for generations to come. In 2001, the Project
Gutenberg Literary Archive Foundation was created to provide a
secure and permanent future for Project Gutenberg™ and future
generations. To learn more about the Project Gutenberg Literary
Archive Foundation and how your efforts and donations can help,
see Sections 3 and 4 and the Foundation information page at
www.gutenberg.org.
Section 3. Information about the Project
Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-profit
501(c)(3) educational corporation organized under the laws of the
state of Mississippi and granted tax exempt status by the Internal
Revenue Service. The Foundation’s EIN or federal tax identification
number is 64-6221541. Contributions to the Project Gutenberg
Literary Archive Foundation are tax deductible to the full extent
permitted by U.S. federal laws and your state’s laws.
The Foundation’s business office is located at 809 North 1500 West,
Salt Lake City, UT 84116, (801) 596-1887. Email contact links and up
to date contact information can be found at the Foundation’s website
and official page at www.gutenberg.org/contact
Section 4. Information about Donations to
the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission of
increasing the number of public domain and licensed works that can
be freely distributed in machine-readable form accessible by the
widest array of equipment including outdated equipment. Many
small donations ($1 to $5,000) are particularly important to
maintaining tax exempt status with the IRS.
The Foundation is committed to complying with the laws regulating
charities and charitable donations in all 50 states of the United
States. Compliance requirements are not uniform and it takes a
considerable effort, much paperwork and many fees to meet and
keep up with these requirements. We do not solicit donations in
locations where we have not received written confirmation of
compliance. To SEND DONATIONS or determine the status of
compliance for any particular state visit www.gutenberg.org/donate.
While we cannot and do not solicit contributions from states where
we have not met the solicitation requirements, we know of no
prohibition against accepting unsolicited donations from donors in
such states who approach us with offers to donate.
International donations are gratefully accepted, but we cannot make
any statements concerning tax treatment of donations received from
outside the United States. U.S. laws alone swamp our small staff.
Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.
Section 5. General Information About
Project Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could be
freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose network of
volunteer support.
Project Gutenberg™ eBooks are often created from several printed
editions, all of which are confirmed as not protected by copyright in
the U.S. unless a copyright notice is included. Thus, we do not
necessarily keep eBooks in compliance with any particular paper
edition.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.
This website includes information about Project Gutenberg™,
including how to make donations to the Project Gutenberg Literary
Archive Foundation, how to help produce our new eBooks, and how
to subscribe to our email newsletter to hear about new eBooks.
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
Let us accompany you on the journey of exploring knowledge and
personal growth!
ebookluna.com

More Related Content

PDF
(eBook PDF) IT Strategy Issues and PracticesIssues and Practices 3rd
PDF
(eBook PDF) IT Strategy Issues and PracticesIssues and Practices 3rd
PDF
(eBook PDF) IT Strategy Issues and PracticesIssues and Practices 3rd
PDF
IT Strategy: Issues and Practices 3rd Edition (eBook PDF)
PDF
IT Strategy: Issues and Practices 3rd Edition (eBook PDF)
PDF
IT Strategy: Issues and Practices 3rd Edition (eBook PDF)
PDF
IT Strategy: Issues and Practices 3rd Edition (eBook PDF)
PDF
IT Strategy: Issues and Practices 3rd Edition (eBook PDF)
(eBook PDF) IT Strategy Issues and PracticesIssues and Practices 3rd
(eBook PDF) IT Strategy Issues and PracticesIssues and Practices 3rd
(eBook PDF) IT Strategy Issues and PracticesIssues and Practices 3rd
IT Strategy: Issues and Practices 3rd Edition (eBook PDF)
IT Strategy: Issues and Practices 3rd Edition (eBook PDF)
IT Strategy: Issues and Practices 3rd Edition (eBook PDF)
IT Strategy: Issues and Practices 3rd Edition (eBook PDF)
IT Strategy: Issues and Practices 3rd Edition (eBook PDF)

Similar to (eBook PDF) IT Strategy Issues and PracticesIssues and Practices 3rd (20)

PDF
IT Strategy: Issues and Practices 3rd Edition (eBook PDF)
PDF
(eBook PDF) IT Strategy Issues and PracticesIssues and Practices 3rd
PDF
IT Strategy: Issues and Practices 3rd Edition (eBook PDF)
DOCX
IT STraTegyISSueS and PracTIceSThis page intent.docx
DOCX
IT STraTegyISSueS and PracTIceSThis page intent.docx
DOCX
IT STraTegyISSueS and PracTIceSThis page intent.docx
DOCX
IT STraTegyISSueS and PracTIceSThis page intent.docx
DOCX
IT STraTegyISSueS and PracTIceSThis page intent.docx
DOCX
IT STraTegyISSueS and PracTIceSThis page intent.docx
DOCX
Research Problem AssignmentInstructions For completing th.docx
DOCX
Research Problem AssignmentInstructions For completing th.docx
DOCX
Chapter 4 discussed the alternative techniques for building classi.docx
DOCX
Robotic System Upgrade Analysis and PresentationFor this a.docx
DOCX
Example Leadership ModelsTransformational Servant Leadership V.docx
DOCX
Question #4, 300-wordsReference Staff, B. O. (2020, May 12)..docx
PDF
(eTextbook PDF) for IT Strategy & Innovation 4th Edition By James D. McKeen
DOCX
MGMT 501Satterlee Chapters 1 – 2 OverviewsChapter One provide
DOCX
Review chapter 4 in the course text.1. Discuss only one of the.docx
DOCX
Discussion 1Review chapter 21 in the course text.In your own .docx
DOCX
Scan2Scan20001Scan20002Scan20003Scan2000.docx
IT Strategy: Issues and Practices 3rd Edition (eBook PDF)
(eBook PDF) IT Strategy Issues and PracticesIssues and Practices 3rd
IT Strategy: Issues and Practices 3rd Edition (eBook PDF)
IT STraTegyISSueS and PracTIceSThis page intent.docx
IT STraTegyISSueS and PracTIceSThis page intent.docx
IT STraTegyISSueS and PracTIceSThis page intent.docx
IT STraTegyISSueS and PracTIceSThis page intent.docx
IT STraTegyISSueS and PracTIceSThis page intent.docx
IT STraTegyISSueS and PracTIceSThis page intent.docx
Research Problem AssignmentInstructions For completing th.docx
Research Problem AssignmentInstructions For completing th.docx
Chapter 4 discussed the alternative techniques for building classi.docx
Robotic System Upgrade Analysis and PresentationFor this a.docx
Example Leadership ModelsTransformational Servant Leadership V.docx
Question #4, 300-wordsReference Staff, B. O. (2020, May 12)..docx
(eTextbook PDF) for IT Strategy & Innovation 4th Edition By James D. McKeen
MGMT 501Satterlee Chapters 1 – 2 OverviewsChapter One provide
Review chapter 4 in the course text.1. Discuss only one of the.docx
Discussion 1Review chapter 21 in the course text.In your own .docx
Scan2Scan20001Scan20002Scan20003Scan2000.docx
Ad

Recently uploaded (20)

PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Presentation on HIE in infants and its manifestations
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Institutional Correction lecture only . . .
PDF
01-Introduction-to-Information-Management.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Computing-Curriculum for Schools in Ghana
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Cell Structure & Organelles in detailed.
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
Final Presentation General Medicine 03-08-2024.pptx
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Presentation on HIE in infants and its manifestations
O5-L3 Freight Transport Ops (International) V1.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Microbial diseases, their pathogenesis and prophylaxis
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Complications of Minimal Access Surgery at WLH
Institutional Correction lecture only . . .
01-Introduction-to-Information-Management.pdf
human mycosis Human fungal infections are called human mycosis..pptx
Anesthesia in Laparoscopic Surgery in India
Computing-Curriculum for Schools in Ghana
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Cell Structure & Organelles in detailed.
O7-L3 Supply Chain Operations - ICLT Program
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Final Presentation General Medicine 03-08-2024.pptx
Ad

(eBook PDF) IT Strategy Issues and PracticesIssues and Practices 3rd

  • 1. (eBook PDF) IT Strategy Issues and PracticesIssues and Practices 3rd download https://ebookluna.com/product/ebook-pdf-it-strategy-issues-and- practicesissues-and-practices-3rd/ Download full version ebook from https://ebookluna.com
  • 2. We believe these products will be a great fit for you. Click the link to download now, or visit ebookluna.com to discover even more! IT Strategy: Issues and Practices 3rd Edition (eBook PDF) https://ebookluna.com/product/it-strategy-issues-and-practices-3rd-edition- ebook-pdf/ (eBook PDF) Foundation Design Principles and Practices 3rd Edition https://ebookluna.com/product/ebook-pdf-foundation-design-principles-and- practices-3rd-edition/ (eBook PDF) IT Strategy & Innovation 4th Edition By James D. McKeen https://ebookluna.com/product/ebook-pdf-it-strategy-innovation-4th-edition- by-james-d-mckeen/ Bioethics: Principles, Issues, and Cases 3rd Edition (eBook PDF) https://ebookluna.com/product/bioethics-principles-issues-and-cases-3rd- edition-ebook-pdf/
  • 3. (eBook PDF) Reading and Writing About Contemporary Issues 3rd Edition https://ebookluna.com/product/ebook-pdf-reading-and-writing-about- contemporary-issues-3rd-edition/ Global Health Care: Issues and Policies 3rd Edition (eBook PDF) https://ebookluna.com/product/global-health-care-issues-and-policies-3rd- edition-ebook-pdf/ (eBook PDF) Corporate Governance: Principles, Policies, and Practices 3rd Canadian Edition https://ebookluna.com/product/ebook-pdf-corporate-governance-principles- policies-and-practices-3rd-canadian-edition/ (eBook PDF) Managing Information Systems: Strategy and Organisation 3rd Edition https://ebookluna.com/product/ebook-pdf-managing-information-systems- strategy-and-organisation-3rd-edition/ (eBook PDF) Behavior Modification: What It Is and How To Do It 11th Edition https://ebookluna.com/product/ebook-pdf-behavior-modification-what-it-is- and-how-to-do-it-11th-edition/
  • 6. Contents vii Section II   IT Governance 87 Chapter 7 Creating IT Shared Services 88 IT Shared Services: An Overview 89 IT Shared Services: Pros and Cons 92 IT Shared Services: Key Organizational Success Factors 93 Identifying Candidate Services 94 An Integrated Model of IT Shared Services 95 Recommmendations for Creating Effective IT Shared Services 96 Conclusion 99 • References 99 Chapter 8 A Management Framework for IT Sourcing 100 A Maturity Model for IT Functions 101 IT Sourcing Options: Theory Versus Practice 105 The “Real” Decision Criteria 109 Decision Criterion #1: Flexibility 109 Decision Criterion #2: Control 109 Decision Criterion #3: Knowledge Enhancement 110 Decision Criterion #4: Business Exigency 110 A Decision Framework for Sourcing IT Functions 111 Identify Your Core IT Functions 111 Create a “Function Sourcing” Profile 111 Evolve Full-Time IT Personnel 113 Encourage Exploration of the Whole Range of Sourcing Options 114 Combine Sourcing Options Strategically 114 A Management Framework for Successful Sourcing 115 Develop a Sourcing Strategy 115 Develop a Risk Mitigation Strategy 115 Develop a Governance Strategy 116 Understand the Cost Structures 116 Conclusion 117 • References 117 Chapter 9 The IT Budgeting Process 118 Key Concepts in IT Budgeting 119 The Importance of Budgets 121 The IT Planning and Budget Process 123
  • 7. viii Contents Corporate Processes 123 IT Processes 125 Assess Actual IT Spending 126 IT Budgeting Practices That Deliver Value 127 Conclusion 128 • References 129 Chapter 10 Managing IT- Based Risk 130 A Holistic View of IT-Based Risk 131 Holistic Risk Management: A Portrait 134 Developing a Risk Management Framework 135 Improving Risk Management Capabilities 138 Conclusion 139 • References 140 Appendix A A Selection of Risk Classification Schemes 141 Chapter 11 Information Management: The Nexus of Business and IT 142 Information Management: How Does It Fit? 143 A Framework For IM 145 Stage One: Develop an IM Policy 145 Stage Two: Articulate the Operational Components 145 Stage Three: Establish Information Stewardship 146 Stage Four: Build Information Standards 147 Issues In IM 148 Culture and Behavior 148 Information Risk Management 149 Information Value 150 Privacy 150 Knowledge Management 151 The Knowing–Doing Gap 151 Getting Started in IM 151 Conclusion 153 • References 154 Appendix A Elements of IM Operations 155 Mini Cases Building Shared Services at RR Communications 156 Enterprise Architecture at Nationstate Insurance 160 IT Investment at North American Financial 165
  • 8. Contents ix Section III   IT-Enabled Innovation 169 Chapter 12 Innovation with IT 170 The Need for Innovation: An Historical Perspective 171 The Need for Innovation Now 171 Understanding Innovation 172 The Value of Innovation 174 Innovation Essentials: Motivation, Support, and Direction 175 Challenges for IT leaders 177 Facilitating Innovation 179 Conclusion 180 • References 181 Chapter 13 Big Data and Social Computing 182 The Social Media/Big Data Opportunity 183 Delivering Business Value with Big Data 185 Innovating with Big Data 189 Pulling in Two Different Directions: The Challenge for IT Managers 190 First Steps for IT Leaders 192 Conclusion 193 • References 194 Chapter 14 Improving the Customer Experience: An IT Perspective 195 Customer Experience and Business value 196 Many Dimensions of Customer Experience 197 The Role of Technology in Customer Experience 199 Customer Experience Essentials for IT 200 First Steps to Improving Customer Experience 203 Conclusion 204 • References 204 Chapter 15 Building Business Intelligence 206 Understanding Business Intelligence 207 The Need for Business Intelligence 208 The Challenge of Business Intelligence 209 The Role of IT in Business Intelligence 211 Improving Business Intelligence 213 Conclusion 216 • References 216
  • 9. x Contents Chapter 16 Enabling Collaboration with IT 218 Why Collaborate? 219 Characteristics of Collaboration 222 Components of Successful Collaboration 225 The Role of IT in Collaboration 227 First Steps for Facilitating Effective Collaboration 229 Conclusion 231 • References 232 Mini Cases Innovation at International Foods 234 Consumerization of Technology at IFG 239 CRM at Minitrex 243 Customer Service at Datatronics 246 Section IV   IT Portfolio Development and Management 251 Chapter 17 Application Portfolio Management 252 The Applications Quagmire 253 The Benefits of a Portfolio Perspective 254 Making APM Happen 256 Capability 1: Strategy and Governance 258 Capability 2: Inventory Management 262 Capability 3: Reporting and Rationalization 263 Key Lessons Learned 264 Conclusion 265 • References 265 Appendix A Application Information 266 Chapter 18 Managing IT Demand 270 Understanding IT Demand 271 The Economics of Demand Management 273 Three Tools for Demand management 273 Key Organizational Enablers for Effective Demand Management 274 Strategic Initiative Management 275 Application Portfolio Management 276 Enterprise Architecture 276 Business–IT Partnership 277 Governance and Transparency 279 Conclusion 281 • References 281
  • 10. Contents xi Chapter 19 Creating and Evolving a Technology Roadmap 283 What is a Technology Roadmap? 284 The Benefits of a Technology Roadmap 285 External Benefits (Effectiveness) 285 Internal Benefits (Efficiency) 286 Elements of the Technology Roadmap 286 Activity #1: Guiding Principles 287 Activity #2: Assess Current Technology 288 Activity #3: Analyze Gaps 289 Activity #4: Evaluate Technology Landscape 290 Activity #5: Describe Future Technology 291 Activity #6: Outline Migration Strategy 292 Activity #7: Establish Governance 292 Practical Steps for Developing a Technology Roadmap 294 Conclusion 295 • References 295 Appendix A Principles to Guide a Migration Strategy 296 Chapter 20 Enhancing Development Productivity 297 The Problem with System Development 298 Trends in System Development 299 Obstacles to Improving System Development Productivity 302 Improving System Development Productivity: What we know that Works 304 Next Steps to Improving System Development Productivity 306 Conclusion 308 • References 308 Chapter 21 Information Delivery: IT’s Evolving Role 310 Information and IT: Why Now? 311 Delivering Value Through Information 312 Effective Information Delivery 316 New Information Skills 316 New Information Roles 317 New Information Practices 317
  • 11. xii Contents New Information Strategies 318 The Future of Information Delivery 319 Conclusion 321 • References 322 Mini Cases Project Management at MM 324 Working Smarter at Continental Furniture International 328 Managing Technology at Genex Fuels 333 Index 336
  • 12. Preface Today, with information technology (IT) driving constant business transformation, overwhelming organizations with information, enabling 24/7 global operations, and undermining traditional business models, the challenge for business leaders is not simply to manage IT, it is to use IT to deliver business value. Whereas until fairly recently, decisions about IT could be safely delegated to technology specialists after a business strategy had been developed, IT is now so closely integrated with business that, as one CIO explained to us, “We can no longer deliver business solutions in our company without using technology so IT and business strategy must constantly interact with each other.” What’s New in This Third Edition? • Six new chapters focusing on current critical issues in IT management, including IT shared services; big data and social computing; business intelligence; manag- ing IT demand; improving the customer experience; and enhancing development productivity. • Two significantly revised chapters: on delivering IT functions through different resourcing options; and innovating with IT. • Two new mini cases based on real companies and real IT management situations: Working Smarter at Continental Furniture and Enterprise Architecture at Nationstate Insurance. • A revised structure based on reader feedback with six chapters and two mini cases from the second edition being moved to the Web site. All too often, in our efforts to prepare future executives to deal effectively with the issues of IT strategy and management, we lead them into a foreign country where they encounter a different language, different culture, and different customs. Acronyms (e.g., SOA, FTP/IP, SDLC, ITIL, ERP), buzzwords (e.g., asymmetric encryption, proxy servers, agile, enterprise service bus), and the widely adopted practice of abstraction (e.g., Is a software monitor a person, place, or thing?) present formidable “barriers to entry” to the technologically uninitiated, but more important, they obscure the impor- tance of teaching students how to make business decisions about a key organizational resource. By taking a critical issues perspective, IT Strategy: Issues and Practices treats IT as a tool to be leveraged to save and/or make money or transform an organization—not as a study by itself. As in the first two editions of this book, this third edition combines the experi- ences and insights of many senior IT managers from leading-edge organizations with thorough academic research to bring important issues in IT management to life and demonstrate how IT strategy is put into action in contemporary businesses. This new edition has been designed around an enhanced set of critical real-world issues in IT management today, such as innovating with IT, working with big data and social media, xiii
  • 13. xiv Preface enhancing customer experience, and designing for business intelligence and introduces students to the challenges of making IT decisions that will have significant impacts on how businesses function and deliver value to stakeholders. IT Strategy: Issues and Practices focuses on how IT is changing and will continue to change organizations as we now know them. However, rather than learning concepts “free of context,” students are introduced to the complex decisions facing real organi- zations by means of a number of mini cases. These provide an opportunity to apply the models/theories/frameworks presented and help students integrate and assimilate this material. By the end of the book, students will have the confidence and ability to tackle the tough issues regarding IT management and strategy and a clear understand- ing of their importance in delivering business value. Key Features of This Book • A focus on IT management issues as opposed to technology issues • Critical IT issues explored within their organizational contexts • Readily applicable models and frameworks for implementing IT strategies • Mini cases to animate issues and focus classroom discussions on real-world deci- sions, enabling problem-based learning • Proven strategies and best practices from leading-edge organizations • Useful and practical advice and guidelines for delivering value with IT • Extensive teaching notes for all mini cases A Different Approach to Teaching IT Strategy The real world of IT is one of issues—critical issues—such as the following: • How do we know if we are getting value from our IT investment? • How can we innovate with IT? • What specific IT functions should we seek from external providers? • How do we build an IT leadership team that is a trusted partner with the business? • How do we enhance IT capabilities? • What is IT’s role in creating an intelligent business? • How can we best take advantage of new technologies, such as big data and social media, in our business? • How can we manage IT risk? However, the majority of management information systems (MIS) textbooks are orga- nized by system category (e.g., supply chain, customer relationship ­ management, enterprise resource planning), by system component (e.g., hardware, software, ­ networks), by system function (e.g., marketing, financial, human resources), by ­ system type (e.g., transactional, decisional, strategic), or by a combination of these. Unfortunately, such an organization does not promote an understanding of IT management in practice. IT Strategy: Issues and Practices tackles the real-world challenges of IT manage- ment. First, it explores a set of the most important issues facing IT managers today, and second, it provides a series of mini cases that present these critical IT issues within the context of real organizations. By focusing the text as well as the mini cases on today’s critical issues, the book naturally reinforces problem-based learning.
  • 14. Preface xv IT Strategy: Issues and Practices includes thirteen mini cases—each based on a real company presented anonymously.1 Mini cases are not simply abbreviated versions of standard, full-length business cases. They differ in two significant ways: 1. A horizontal perspective. Unlike standard cases that develop a single issue within an organizational setting (i.e., a “vertical” slice of organizational life), mini cases take a “horizontal” slice through a number of coexistent issues. Rather than looking for a solution to a specific problem, as in a standard case, students analyzing a mini case must first identify and prioritize the issues embedded within the case. This mim- ics real life in organizations where the challenge lies in “knowing where to start” as opposed to “solving a predefined problem.” 2. Highly relevant information. Mini cases are densely written. Unlike standard cases, which intermix irrelevant information, in a mini case, each sentence exists for a reason and reflects relevant information. As a result, students must analyze each case very carefully so as not to miss critical aspects of the situation. Teaching with mini cases is, thus, very different than teaching with standard cases. With mini cases, students must determine what is really going on within the organiza- tion. What first appears as a straightforward “technology” problem may in fact be a political problem or one of five other “technology” problems. Detective work is, there- fore, required. The problem identification and prioritization skills needed are essential skills for future managers to learn for the simple reason that it is not possible for organi- zations to tackle all of their problems concurrently. Mini cases help teach these skills to students and can balance the problem-solving skills learned in other classes. Best of all, detective work is fun and promotes lively classroom discussion. Toassistinstructors,extensiveteachingnotesareavailableforallminicases.Developed by the authors and based on “tried and true” in-class experience, these notes include case summaries, identify the key issues within each case, present ancillary ­ information about the company/industry represented in the case, and offer guidelines for organizing the class- room discussion. Because of the structure of these mini cases and their embedded issues, it is common for teaching notes to exceed the length of the actual mini case! This book is most appropriate for MIS courses where the goal is to understand how IT delivers organizational value. These courses are frequently labeled “IT Strategy” or “IT Management” and are offered within undergraduate as well as MBA programs. For undergraduate juniors and seniors in business and commerce programs, this is usually the “capstone” MIS course. For MBA students, this course may be the compulsory core course in MIS, or it may be an elective course. Each chapter and mini case in this book has been thoroughly tested in a variety of undergraduate, graduate, and executive programs at Queen’s School of Business.2 1 We are unable to identify these leading-edge companies by agreements established as part of our overall research program (described later). 2 Queen’s School of Business is one of the world’s premier business schools, with a faculty team renowned for its business experience and academic credentials. The School has earned international recognition for its innovative approaches to team-based and experiential learning. In addition to its highly acclaimed MBA programs, Queen’s School of Business is also home to Canada’s most prestigious undergraduate business program and several outstanding graduate programs. As well, the School is one of the world’s largest and most respected providers of executive education.
  • 15. xvi Preface These materials have proven highly successful within all programs because we adapt how the material is presented according to the level of the students. Whereas under- graduate students “learn” about critical business issues from the book and mini cases for the first time, graduate students are able to “relate” to these same critical issues based on their previous business experience. As a result, graduate students are able to introduce personal experiences into the discussion of these critical IT issues. Organization of This Book One of the advantages of an issues-focused structure is that chapters can be approached in any order because they do not build on one another. Chapter order is immaterial; that is, one does not need to read the first three chapters to understand the fourth. This pro- vides an instructor with maximum flexibility to organize a course as he or she sees fit. Thus, within different courses/programs, the order of topics can be changed to focus on different IT concepts. Furthermore, because each mini case includes multiple issues, they, too, can be used to serve different purposes. For example, the mini case “Building Shared Services at RR Communications” can be used to focus on issues of governance, organizational structure, and/or change management just as easily as shared services. The result is a rich set of instructional materials that lends itself well to a variety of pedagogical appli- cations, particularly problem-based learning, and that clearly illustrates the reality of IT strategy in action. The book is organized into four sections, each emphasizing a key component of developing and delivering effective IT strategy: • Section I: Delivering Value with IT is designed to examine the complex ways that IT and business value are related. Over the past twenty years, researchers and prac- titioners have come to understand that “business value” can mean many ­ different things when applied to IT. Chapter 1 (Developing and Delivering on the IT Value Proposition) explores these concepts in depth. Unlike the simplistic value propo- sitions often used when implementing IT in organizations, this ­ chapter ­ presents “value” as a multilayered business construct that must be effectively ­ managed at several levels if technology is to achieve the benefits expected. Chapter 2 (Developing IT Strategy for Business Value) examines the dynamic ­ interrelationship between business and IT strategy and looks at the processes and critical ­ success ­ factors used by organizations to ensure that both are well aligned. Chapter 3 (Linking IT to Business Metrics) discusses new ways of measuring IT’s ­ effectiveness that pro- mote closer business–IT alignment and help drive greater business value. Chapter 4 (Building a Strong Relationship with the Business) examines the nature of the business–IT relationship and the characteristics of an effective relationship that delivers real value to the enterprise. Chapter 5 (Communicating with Business Managers) explores the business and interpersonal competencies that IT staff will need in order to do their jobs effectively over the next five to seven years and what companies should be doing to develop them. Finally, Chapter 6 (Building Better IT Leaders from the Bottom Up) tackles the increasing need for improved leadership skills in all IT staff and examines the expectations of the business for strategic and innovative guidance from IT.
  • 16. Preface xvii In the mini cases associated with this section, the concepts of delivering value with IT are explored in a number of different ways. We see business and IT ­ executives at Hefty Hardware grappling with conflicting priorities and per- spectives and how best to work together to achieve the company’s strategy. In “Investing in TUFS,” CIO Martin Drysdale watches as all of the work his IT depart- ment has put into a major new system fails to deliver value. And the “IT Planning at ModMeters” mini case follows CIO Brian Smith’s efforts to create a strategic IT plan that will align with business strategy, keep IT running, and not increase IT’s budget. • Section II: IT Governance explores key concepts in how the IT organization is structured and managed to effectively deliver IT products and services to the orga- nization. Chapter 7 (IT Shared Services) discusses how IT shared services should be selected, organized, managed, and governed to achieve improved organizational performance. Chapter 8 (A Management Framework for IT Sourcing) examines how organizations are choosing to source and deliver different types of IT functions and presents a framework to guide sourcing decisions. Chapter 9 (The IT Budgeting Process) describes the “evil twin” of IT strategy, discussing how budgeting mecha- nisms can significantly undermine effective business strategies and suggesting practices for addressing this problem while maintaining traditional fiscal account- ability. Chapter 10 (Managing IT-based Risk) describes how many IT organizations have been given the responsibility of not only managing risk in their own activities (i.e., project development, operations, and delivering business strategy) but also of managing IT-based risk in all company activities (e.g., mobile computing, file sharing, and online access to information and software) and the need for a holistic framework to understand and deal with risk effectively. Chapter 11 (Information Management: The Nexus of Business and IT) describes how new organizational needs for more useful and integrated information are driving the development of business-oriented functions within IT that focus specifically on information and knowledge, as opposed to applications and data. The mini cases in this section examine the difficulties of managing com- plex IT issues when they intersect substantially with important business issues. In “Building Shared Services at RR Communications,” we see an IT organiza- tion in transition from a traditional divisional structure and governance model to a more centralized enterprise model, and the long-term challenges experi- enced by CIO Vince Patton in changing both business and IT practices, includ- ing information management and delivery, to support this new approach. In “Enterprise Architecture at Nationstate Insurance,” CIO Jane Denton endeavors to make IT more flexible and agile, while incorporating new and emerging tech- nologies into its strategy. In “IT Investment at North American Financial,” we show the opportunities and challenges involved in prioritizing and resourcing enterprisewide IT projects and monitoring that anticipated benefits are being achieved. • Section III: IT-Enabled Innovation discusses some of the ways technology is being used to transform organizations. Chapter 12 (Innovation with IT) examines the nature and importance of innovation with IT and describes a typical inno- vation life cycle. Chapter 13 (Big Data and Social Computing) discusses how IT leaders are incorporating big data and social media concepts and technologies
  • 17. xviii Preface to successfully deliver business value in new ways. Chapter 14 (Improving the Customer Experience: An IT Perspective) explores the IT function’s role in creating and improving an organization’s customer experiences and the role of technology in helping companies to understand and learn from their customers’ experiences. Chapter 15 (Building Business Intelligence) looks at the nature of business intelli- gence and its relationship to data, information, and knowledge and how IT can be used to build a more intelligent organization. Chapter 16 (Enabling Collaboration with IT) identifies the principal forms of collaboration used in organizations, the primary business drivers involved in them, how their business value is measured, and the roles of IT and the business in enabling collaboration. The mini cases in this section focus on the key challenges companies face in innovating with IT. “Innovation at International Foods” contrasts the need for pro- cess and control in corporate IT with the strong push to innovate with technology and the difficulties that ensue from the clash of style and culture. “Consumerization of Technology at IFG” looks at issues such as “bring your own device” (BYOD) to the workplace. In “CRM at Minitrex,” we see some of the internal technological and political conflicts that result from a strategic decision to become more customercen- tric. Finally, “Customer Service at Datatronics” explores the importance of present- ing unified, customer-facing IT to customers. • Section IV: IT Portfolio Development and Management looks at how the IT function must transform itself to be able to deliver business value effectively in the future. Chapter 17 (Application Portfolio Management) describes the ongoing management process of categorizing, assessing, and rationalizing the IT application portfolio. Chapter 18 (Managing IT Demand) looks at the often neglected issue of demand management (as opposed to supply management), explores the root causes of the demand for IT services, and identifies a number of tools and enablers to facilitate more effective demand management. Chapter 19 (Creating and Evolving a Technology Roadmap) examines the challenges IT managers face in implement- ing new infrastructure, technology standards, and types of technology in their real- world business and technical environments, which is composed of a huge variety of hardware, software, applications, and other technologies, some of which date back more than thirty years. Chapter 20 (Enhancing Development Productivity) explores how system development practices are changing and how managers can create an environment to promote improved development productivity. And Chapter 21 (Information Delivery: IT’s Evolving Role) examines the fresh challenges IT faces in managing the exponential growth of data and digital assets; privacy and account- ability concerns; and new demands for access to information on an anywhere, any- time basis. The mini cases associated with this section describe many of these themes embedded within real organizational contexts. “Project Management at MM” mini case shows how a top-priority, strategic project can take a wrong turn when proj- ect management skills are ineffective. “Working Smarter at Continental Furniture” mini case follows an initiative to improve the company’s analytics so it can reduce its environmental impact. And in the mini case “Managing Technology at Genex Fuels,” we see CIO Nick Devlin trying to implement enterprisewide technology for competitive advantage in an organization that has been limping along with obscure and outdated systems.
  • 18. Preface xix Supplementary Materials Online Instructor Resource Center The following supplements are available online to adopting instructors: • PowerPoint Lecture Notes • Image Library (text art) • Extensive Teaching Notes for all Mini cases • Additional chapters including Developing IT Professionalism; IT Sourcing; Master DataManagement;DevelopingITCapabilities;TheIdentityManagementChallenge; Social Computing; Managing Perceptions of IT; IT in the New World of Corporate Governance Reforms; Enhancing Customer Experiences with Technology; Creating Digital Dashboards; and Managing Electronic Communications. • Additional mini cases, including IT Leadership at MaxTrade; Creating a Process-Driven Organization at Ag-Credit; Information Management at Homestyle Hotels; Knowledge Management at Acme Consulting; Desktop Provisioning at CanCredit; and Leveraging IT Vendors at SleepSmart. For detailed descriptions of all of the supplements just listed, please visit http:// www.pearsonhighered.com/mckeen. CourseSmart eTextbooks Online CourseSmart is an exciting new choice for students looking to save money. As an alter- native to purchasing the print textbook, students can purchase an electronic version of the same content and save up to 50 percent off the suggested list price of the print text. With a CourseSmart etextbook, students can search the text, make notes online, print out reading assignments that incorporate lecture notes, and bookmark important pas- sages for later review. www.coursesmart.com. The Genesis of This Book Since 1990 we have been meeting quarterly with a group of senior IT managers from a number of leading-edge organizations (e.g., Eli Lilly, BMO, Honda, HP, CIBC, IBM, Sears, Bell Canada, MacDonalds, and Sun Life) to identify and discuss critical IT manage- ment issues. This focus group represents a wide variety of industry sectors (e.g., retail, ­ manufacturing, pharmaceutical, banking, telecommunications, insurance, media, food processing, government, and automotive). Originally, it was established to meet the com- panies’ needs for well-balanced, thoughtful, yet practical information on emerging IT management topics, about which little or no research was available. However, we soon recognized the value of this premise for our own research in the rapidly evolving field of IT management. As a result, it quickly became a full-scale research program in which we were able to use the focus group as an “early warning system” to document new IT management issues, develop case studies around them, and explore more collaborative approaches to identifying trends, challenges, and effective practices in each topic area.3 3 This now includes best practice case studies, field research in organizations, multidisciplinary qualitative and quantitative research projects, and participation in numerous CIO research consortia.
  • 19. xx Preface As we shared our materials with our business students, we realized that this issues- based approach resonated strongly with them, and we began to incorporate more of our research into the classroom. This book is the result of our many years’ work with senior IT managers, in organizations, and with students in the classroom. Each issue in this book has been selected collaboratively by the focus group after debate and discussion. As facilitators, our job has been to keep the group’s focus on IT management issues, not technology per se. In preparation for each meeting, focus group members researched the topic within their own organization, often involving a number of members of their senior IT management team as well as subject matter experts in the process. To guide them, we provided a series of questions about the issue, although members are always free to explore it as they see fit. This approach provided both struc- ture for the ensuing discussion and flexibility for those members whose ­ organizations are approaching the issue in a different fashion. The focus group then met in a full-day session, where the members discussed all aspects of the issue. Many also shared corporate documents with the group. We ­facilitated the discussion, in particular pushing the group to achieve a common understanding of the dimensions of the issue and seeking examples, best practices, and guidelines for deal- ing with the challenges involved. Following each session, we wrote a report based on the discussion, incorporating relevant academic and practitioner materials where these were available. (Because some topics are “bleeding edge,” there is often little traditional IT research available on them.) Each report has three parts: 1. A description of the issue and the challenges it presents for both business and IT managers 2. Models and concepts derived from the literature to position the issue within a con- textual framework 3. Near-term strategies (i.e., those that can be implemented immediately) that have proven successful within organizations for dealing with the specific issue Each chapter in this book focuses on one of these critical IT issues. We have learned over the years that the issues themselves vary little across industries and organizations, even in enterprises with unique IT strategies. However, each organization tackles the same issue somewhat differently. It is this diversity that provides the richness of insight in these chapters. Our collaborative research approach is based on our belief that when dealing with complex and leading-edge issues, “everyone has part of the solution.” Every focus group, therefore, provides us an opportunity to explore a topic from a ­ variety of perspectives and to integrate different experiences (both successful and oth- erwise) so that collectively, a thorough understanding of each issue can be developed and strategies for how it can be managed most successfully can be identified.
  • 20. About the Authors James D. McKeen is Professor Emeritus at the Queen’s School of Business. He has been working in the IT field for many years as a practitioner, researcher, and consultant. In 2011, he was named the “IT Educator of the Year” by ComputerWorld Canada. Jim has taught at universities in the United Kingdom, France, Germany, and the United States. His research is widely published in a number of leading journals and he is the coau- thor (with Heather Smith) of five books on IT management. Their most recent book—IT Strategy: Issues and Practices (2nd ed.)—was the best-selling business book in Canada (Globe and Mail, April 2012). Heather A. Smith has been named the most-published researcher on IT management issues in two successive studies (2006, 2009). A senior research associate with Queen’s University School of Business, she is the author of five books, the most recent being IT Strategy: Issues and Practices (Pearson Prentice Hall, 2012). She is also a senior research associate with the American Society for Information Management’s Advanced Practices Council. Aformer senior IT manager, she is codirector of the IT Management Forum and the CIO Brief, which facilitate interorganizational learning among senior IT executives. In addition, she consults and collaborates with organizations worldwide. xxi
  • 21. Acknowledgments The work contained in this book is based on numerous meetings with many senior IT managers. We would like to acknowledge our indebtedness to the following individuals who willingly shared their insights based on their experiences “earned the hard way”: Michael Balenzano, Sergei Beliaev, Matthias Benfey, Nastaran Bisheban, Peter Borden, Eduardo Cadena, Dale Castle, Marc Collins, Diane Cope, Dan Di Salvo, Ken Dschankilic, Michael East, Nada Farah, Mark Gillard, Gary Goldsmith, Ian Graham, Keiko Gutierrez, Maureen Hall, Bruce Harding, Theresa Harrington, Tom Hopson, Heather Hutchison, Jim Irich, Zeeshan Khan, Joanne Lafreniere, Konstantine Liris, Lisa MacKay, Mark O’Gorman, Amin Panjwani, Troy Pariag, Brian Patton, Marius Podaru, Helen Restivo, Pat Sadler, A. F. Salam, Ashish Saxena, Joanne Scher, Stewart Scott, Andy Secord, Marie Shafi, Helen Shih, Trudy Sykes, Bruce Thompson, Raju Uppalapati, Len Van Greuning, Laurie Schatzberg, Ted Vincent, and Bond Wetherbe. We would also like to recognize the contribution of Queen’s School of Business to this work. The school has facilitated and supported our vision of better integrat- ing academic research and practice and has helped make our collaborative approach to the study of IT management and strategy an effective model for interorganizational learning. James D. McKeen Kingston, Ontario Heather A. Smith School of Business June 2014 xxii
  • 22. S ect ion I Delivering Value with IT Chapter 1 Developing and Delivering on the IT Value Proposition Chapter 2 Developing IT Strategy for Business Value Chapter 3 Linking IT to Business Metrics Chapter 4 Building a Strong Relationship with the Business Chapter 5 Communicating with Business Managers Chapter 6 Building Better IT Leaders from the Bottom Up Mini Cases ■ Delivering Business Value with IT at Hefty Hardware ■ Investing in TUFS ■ IT Planning at ModMeters
  • 23. 2 C h a p t e r 1 Developing and Delivering on the IT Value Proposition1 1 This chapter is based on the authors’ previously published article, Smith, H. A., and J. D. McKeen. “Developing and Delivering on the IT Value Proposition.” Communications of the Association for Information Systems 11 (April 2003): 438–50. Reproduced by permission of the Association for Information Systems. I t’s déjà vu all over again. For at least twenty years, business leaders have been ­ trying to figure out exactly how and where IT can be of value in their organizations. And IT managers have been trying to learn how to deliver this value. When IT was used mainly as a productivity improvement tool in small areas of a business, this was a ­ relatively straightforward process. Value was measured by reduced head counts— usually in clerical areas—and/or the ability to process more transactions per person. However, as systems grew in scope and complexity, unfortunately so did the risks. Very few companies escaped this period without making at least a few disastrous invest- ments in systems that didn’t work or didn’t deliver the bottom-line benefits executives thought they would. Naturally, fingers were pointed at IT. With the advent of the strategic use of IT in business, it became even more difficult to isolate and deliver on the IT value proposition. It was often hard to tell if an invest- ment had paid off. Who could say how many competitors had been deterred or how many customers had been attracted by a particular IT initiative? Many companies can tell horror stories of how they have been left with a substantial investment in new forms of technology with little to show for it. Although over the years there have been many improvements in where and how IT investments are made and good controls have been established to limit time and cost overruns, we are still not able to accurately articulate and deliver on a value proposition for IT when it comes to anything other than simple productivity improvements or cost savings. Problems in delivering IT value can lie with how a value proposition is conceived or in what is done to actually implement an idea—that is, selecting the right project and doing the project right (Cooper et al. 2000; McKeen and Smith 2003; Peslak 2012). In addition, although most firms attempt to calculate the expected payback of an IT invest- ment before making it, few actually follow up to ensure that value has been achieved or to question what needs to be done to make sure that value will be delivered.
  • 24. Discovering Diverse Content Through Random Scribd Documents
  • 25. kupeita ja korkeuksien huippuja. Kaukana heidän takanaan näkyi jo korpi, jonka läpi he olivat tulleet, ja keltakylkiseen männikköön paistoi päivä kuin kullattuun onnelaan. Kevättä henki ympäristö ja sen tuoksu lemusi ilmassa. Kanerva oli koko talven tätä retkeä mielessään miettinyt, oli kuvitellut sen niin äärettömän suurenmoiseksi ja ihanaksi, ja uniensa himmeässä maailmassa hän vaelsi usein näitä samoja saloja, joita nytkin kulkivat. Täällä hän olisi toivonut voivansa sanoa sen, mitä tunsi, kertoa rajattoman rakkautensa ja ilmaista aavistelevat ilonsa. Löytäisikö hän vastineen lemmelleen? Löytäisikö Irjan syvällisten silmien loistosta sen satumaailman, jonka luuli niissä olevan? Ymmärtäisikö sielu sielua? Hän silmäsi Irjaan, joka kulki hänen vierellään hohtavan kauniina ja aamuvirkkuna, mutta niin surullisen haaveilevana ja kaihomielisenä. Irjan katse näytti tähtäävän johonkin hyvin kauas ja mieli kuvailevan jotakin muuta kuin mitä edessä näki. Oi, oliko tuon hennon poven alla sykkivä sydän, joka tuntisi, uskoisi ja luottaisi niinkuin hän! He olivat tulleet aukealle suolle, jonka laidasta Karhuvaara alkoi kohota. Ensin oli loivaa myötälettä, mutta vähitellen nousu jyrkkeni, muuttui louhikkoiseksi, satumaiseksi. Hyvin kaukana jo heidän takanaan siinti Vasuharju ja muilla suunnilla suunnattomia valkopäisiä kukkuloita. Kuta korkeammalle ehtivät, sitä enemmän nousu viehätti ja sitä korkeammalle mieli teki. Onko teistä tämä retkemme hauska?… Me läksimme maailmasta, tulimme tänne kevään henkeen emmekä ikänä kaipaa takaisin, sanoi Kanerva hurmaantuneena.
  • 26. On, on. Tämä on suurenmoista ja muistoja virkistävää, sanoi Irja ja riensi edellä. Villi riemu tapasi Kanervan. Hänestä tuntui kuin taivaan portit aukenisivat… näki edellään rakastettunsa hentona, notkeana ja verevänä kiipeilevän tuttuja louhikoita, näki kuin enkelin, jota keväisen aamuauringon säteet hyväilivät. Hän riensi puolihulluna perässä, päätti suoria Irjan syliinsä ja puristaa sydämelleen niin, että sen autio tyhjyys täyttyisi ja tuskat loppuisivat… Mutta Irjan katse oli niin omituisen outo, niin kaihon ja surun voittama, että Kanerva säpsähti, ojennettu käsi putosi takaisin… Ja samalla he pääsivätkin perille Karhuvaaran korkeimmalle huipulle. Irja hyppäsi kivelle ja silmäili kaukaisia maailmoja. Kanerva seisoi vieressä. Mitä hän sanoisi? Miten ilmoittaisi? Hän oli kuin kadottanut oman itsensä. Hän näki koko avaruuden kuin kultameressä säkenöivän, näki vierivieressä korkeita valkopää- kukkuloita kuin lumilinnoja, niiden välissä soita ja jänkkiä ja repaleita palaneista saloista… Hän seurasi Irjan katsetta, joka liiteli taivaanrannasta toiseen, kävi pohjoisella, levähti lännellä, mutta lopulta asettui etelälle… Etelääkö te rakastatte? kysyi hän hiljaa. Niin, etelää, tuota kaukaista ja siintävää, vastasi Irja yhtä hiljaa. He katselivat kauan äänettöminä, kuinka keväinen, avara maailma kiertyi kultaisen aamuauringon loistoon, kuinka taivaanrannat olivat kummallisen hienon harson peitossa. Idässä näkyi silmänsiintämiin tummaa saloa ja kaljupäitä kukkuloita. Eteläinen taivaanranta oli
  • 27. keveän pilven peitossa, mutta hyvin kaukana siinti muiden pitäjien kirkontorneja ja vilahti vaarojen välistä leveän joen polveuksia. Mutta pohjoinen taivas oli niin kalsean ja kylmän näköinen. Ettekö rakasta pohjolaani? kysyi Kanerva kuin houreissaan. Hän näki Irjan kääntävän katseensa pohjalle ja kuuli hetken kuluttua hänen vastaavan: Pohjolanne on niin kylmän sinervä ja riemuton… Kanerva luuli siinä olevan vastineen hänen haaveilleen, toiveilleen ja lemmelleen. Hän tunsi kuin puristuvansa kokoon, likistyvänsä vasten vaaran lakea ja laskeuvansa maahan. Tunsi toivonsa loppuvan, lempensä sammuvan ja ilonsa katoavan, näki taivaan sinen muuttuvan mustaksi; kuului kuin koko avaruudessa soitettaisiin hänen kuolinkellojaan, ja hänestä näytti kuin korvet olisivat aidatuita kalmistoja ja korkeat vaarojen laet hautapatsaita… Ja näki Irjan tähtäävän etelälle, niinkuin tahtoisi nähdä etelän usvain taakse… nähdä jonkun, jota ikävöi. Ja onton kolkosti soi nyt hänen korvissaan Irjan lempilaulu. Lempi kestää iäti… iäti! 9. Touon aika oli tullut. Puolen peltoa on Kanerva kyntänyt ja istahtaa nyt pientareelle…
  • 28. Hän istuu hartiat kumarassa, posket kämmeniä vasten. Hän on laihtunut niin että silmät ovat syvällä kuopissa; niissä leimahtaa vähäväliä omituinen, synkkä tuli, ja väliin kuolon kalpeus peittää kasvot. Hän näyttää väsyneeltä ja rasitetulta, niin uupuneelta kuin ei olisi levähtänyt kuukausiin. Ilta on lämmin ja suloinen. Piennar työntää ävärtä, ja ruispelto on tummanvihreä. Kuuluu käen kukuntaa Vasuharjun alta kuusikosta ja vesilintujen kaakatusta joelta. Kanerva istuu ajatuksissaan, ei kuule käkien kukuntaa, ei mieli iloitse siitä, että kylvön aika näyttää niin lupaavalta. Hänen suuri keväinen unelmansa on loppunut, sammunut on toivo kaikesta siitä, jota oli ihannoinut ja jumaloinut. Se suuri, synkkä erämaa, jonka laitaan hän lapsena jäi, oli nyt vasta puoliväliin taivallettu, eikä enää jaksanut uskoa, että löytyisi kosteikkoa tulevillakaan taipaleilla. Alakuloinen mieli synnyttää ikävän toisensa perästä, ja pettyneet toiveet hakkaavat sydäntä kuin rautavasaralla. Hän on taistellut, ja nyt hän luulee olevansa voitolla. Mutta ankara on hänen taistelunsa ollut, kovempi kuin hän oli osannut koskaan aavistaa. Sillä hän on kadottanut kaiken toivon elämänsä onnesta, uskon siihen, että on olemassa todellista, puhdasta, kaikki kestävää rakkautta, ja luottamuksen ihmisiin. Yksi ainoa toivo on vielä, hänen lapsuutensa vankka usko, että ruumiillinen työ pelastaa kaikesta pahasta. Oi, että hänen täytyi kadottaa ihana satumaailmansa ja tuntea ja nähdä, että se unissa kuvailtu, kirkastettu morsian ei ollutkaan muuta kuin saastainen, likainen varjokuva hänen ihannemaailmansa ystävästä.
  • 29. Hän vaipuu yhä syvempiin mietteisiin siitä, mitä hän on elänyt kuluneena talvena, mitä tuntenut kevätöinä ja kuinka raivonnut yksin valvoessaan. Ja kummastellen hän näkee, että hän elää vielä, ettei ole tehnyt hullun töitä, ja että hän vieläkin luottaa lapsuutensa uskoon. Kummallisia, outoja kysymyksiä herää hänen mielessään ja kamaloita aavistuksia omasta elämästään. Hän muistaa niin selvään joka tapauksen Irjan seurassa, ja varsinkin heidän viimeisen retkensä Karhuvaaralle. Se retki oli kuin suuren suuri satumaailma, johon elävänä pääsi ja jota hän unissaan oli kuvitellut. Oli juuri semmoinen kevätaamu, jona hän oli toivonut voivansa viettää lempensä pyhää sunnuntaita… Mutta hän ei jaksa ajatella loppuun sitä retkeä… se ikäänkuin päättyy siihen, kun näki Irjan kivellä seisovan ja etelän ilmoille katselevan. Eikä hän edemmäksi pyrikään, sillä se, mitä hän sitten jäljestä tunsi ja tiesi, oli repivää ja raatelevaa tappelua, joka tahtoi kiskoa sielun ruumiista ja viedä viimeisen luottamuksen… Hän sattuu silmäämään tielle ja näkee Irjan kävelevän nuoren metsäherran kanssa. Hän kuulee, kuinka Irja nauraa… näkee herran kepillään viuhtovan… Tumma puna nousee poskille, silmissä leimahtaa hirvittävä tuli, kämmenet käyvät nyrkkiin ja hän höpisee… Kavala, kaunis helvetin lapsi… noin minä sinut raatelisin… Mutta äkkiä hän herpoaa, kalvava ikävä tunkee sydämeen, ja hän purskahtaa itkuun… kuin lapsi… Ja herää siitä, kun Musta hirnuu ja tahtoo illalliselle.
  • 30. *** END OF THE PROJECT GUTENBERG EBOOK IRJA: KUVAUS *** Updated editions will replace the previous one—the old editions will be renamed. Creating the works from print editions not protected by U.S. copyright law means that no one owns a United States copyright in these works, so the Foundation (and you!) can copy and distribute it in the United States without permission and without paying copyright royalties. Special rules, set forth in the General Terms of Use part of this license, apply to copying and distributing Project Gutenberg™ electronic works to protect the PROJECT GUTENBERG™ concept and trademark. Project Gutenberg is a registered trademark, and may not be used if you charge for an eBook, except by following the terms of the trademark license, including paying royalties for use of the Project Gutenberg trademark. If you do not charge anything for copies of this eBook, complying with the trademark license is very easy. You may use this eBook for nearly any purpose such as creation of derivative works, reports, performances and research. Project Gutenberg eBooks may be modified and printed and given away—you may do practically ANYTHING in the United States with eBooks not protected by U.S. copyright law. Redistribution is subject to the trademark license, especially commercial redistribution. START: FULL LICENSE
  • 31. THE FULL PROJECT GUTENBERG LICENSE
  • 32. PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK To protect the Project Gutenberg™ mission of promoting the free distribution of electronic works, by using or distributing this work (or any other work associated in any way with the phrase “Project Gutenberg”), you agree to comply with all the terms of the Full Project Gutenberg™ License available with this file or online at www.gutenberg.org/license. Section 1. General Terms of Use and Redistributing Project Gutenberg™ electronic works 1.A. By reading or using any part of this Project Gutenberg™ electronic work, you indicate that you have read, understand, agree to and accept all the terms of this license and intellectual property (trademark/copyright) agreement. If you do not agree to abide by all the terms of this agreement, you must cease using and return or destroy all copies of Project Gutenberg™ electronic works in your possession. If you paid a fee for obtaining a copy of or access to a Project Gutenberg™ electronic work and you do not agree to be bound by the terms of this agreement, you may obtain a refund from the person or entity to whom you paid the fee as set forth in paragraph 1.E.8. 1.B. “Project Gutenberg” is a registered trademark. It may only be used on or associated in any way with an electronic work by people who agree to be bound by the terms of this agreement. There are a few things that you can do with most Project Gutenberg™ electronic works even without complying with the full terms of this agreement. See paragraph 1.C below. There are a lot of things you can do with Project Gutenberg™ electronic works if you follow the terms of this agreement and help preserve free future access to Project Gutenberg™ electronic works. See paragraph 1.E below.
  • 33. 1.C. The Project Gutenberg Literary Archive Foundation (“the Foundation” or PGLAF), owns a compilation copyright in the collection of Project Gutenberg™ electronic works. Nearly all the individual works in the collection are in the public domain in the United States. If an individual work is unprotected by copyright law in the United States and you are located in the United States, we do not claim a right to prevent you from copying, distributing, performing, displaying or creating derivative works based on the work as long as all references to Project Gutenberg are removed. Of course, we hope that you will support the Project Gutenberg™ mission of promoting free access to electronic works by freely sharing Project Gutenberg™ works in compliance with the terms of this agreement for keeping the Project Gutenberg™ name associated with the work. You can easily comply with the terms of this agreement by keeping this work in the same format with its attached full Project Gutenberg™ License when you share it without charge with others. 1.D. The copyright laws of the place where you are located also govern what you can do with this work. Copyright laws in most countries are in a constant state of change. If you are outside the United States, check the laws of your country in addition to the terms of this agreement before downloading, copying, displaying, performing, distributing or creating derivative works based on this work or any other Project Gutenberg™ work. The Foundation makes no representations concerning the copyright status of any work in any country other than the United States. 1.E. Unless you have removed all references to Project Gutenberg: 1.E.1. The following sentence, with active links to, or other immediate access to, the full Project Gutenberg™ License must appear prominently whenever any copy of a Project Gutenberg™ work (any work on which the phrase “Project Gutenberg” appears, or with which the phrase “Project Gutenberg” is associated) is accessed, displayed, performed, viewed, copied or distributed:
  • 34. This eBook is for the use of anyone anywhere in the United States and most other parts of the world at no cost and with almost no restrictions whatsoever. You may copy it, give it away or re-use it under the terms of the Project Gutenberg License included with this eBook or online at www.gutenberg.org. If you are not located in the United States, you will have to check the laws of the country where you are located before using this eBook. 1.E.2. If an individual Project Gutenberg™ electronic work is derived from texts not protected by U.S. copyright law (does not contain a notice indicating that it is posted with permission of the copyright holder), the work can be copied and distributed to anyone in the United States without paying any fees or charges. If you are redistributing or providing access to a work with the phrase “Project Gutenberg” associated with or appearing on the work, you must comply either with the requirements of paragraphs 1.E.1 through 1.E.7 or obtain permission for the use of the work and the Project Gutenberg™ trademark as set forth in paragraphs 1.E.8 or 1.E.9. 1.E.3. If an individual Project Gutenberg™ electronic work is posted with the permission of the copyright holder, your use and distribution must comply with both paragraphs 1.E.1 through 1.E.7 and any additional terms imposed by the copyright holder. Additional terms will be linked to the Project Gutenberg™ License for all works posted with the permission of the copyright holder found at the beginning of this work. 1.E.4. Do not unlink or detach or remove the full Project Gutenberg™ License terms from this work, or any files containing a part of this work or any other work associated with Project Gutenberg™. 1.E.5. Do not copy, display, perform, distribute or redistribute this electronic work, or any part of this electronic work, without prominently displaying the sentence set forth in paragraph 1.E.1
  • 35. with active links or immediate access to the full terms of the Project Gutenberg™ License. 1.E.6. You may convert to and distribute this work in any binary, compressed, marked up, nonproprietary or proprietary form, including any word processing or hypertext form. However, if you provide access to or distribute copies of a Project Gutenberg™ work in a format other than “Plain Vanilla ASCII” or other format used in the official version posted on the official Project Gutenberg™ website (www.gutenberg.org), you must, at no additional cost, fee or expense to the user, provide a copy, a means of exporting a copy, or a means of obtaining a copy upon request, of the work in its original “Plain Vanilla ASCII” or other form. Any alternate format must include the full Project Gutenberg™ License as specified in paragraph 1.E.1. 1.E.7. Do not charge a fee for access to, viewing, displaying, performing, copying or distributing any Project Gutenberg™ works unless you comply with paragraph 1.E.8 or 1.E.9. 1.E.8. You may charge a reasonable fee for copies of or providing access to or distributing Project Gutenberg™ electronic works provided that: • You pay a royalty fee of 20% of the gross profits you derive from the use of Project Gutenberg™ works calculated using the method you already use to calculate your applicable taxes. The fee is owed to the owner of the Project Gutenberg™ trademark, but he has agreed to donate royalties under this paragraph to the Project Gutenberg Literary Archive Foundation. Royalty payments must be paid within 60 days following each date on which you prepare (or are legally required to prepare) your periodic tax returns. Royalty payments should be clearly marked as such and sent to the Project Gutenberg Literary Archive Foundation at the address specified in Section 4, “Information
  • 36. about donations to the Project Gutenberg Literary Archive Foundation.” • You provide a full refund of any money paid by a user who notifies you in writing (or by e-mail) within 30 days of receipt that s/he does not agree to the terms of the full Project Gutenberg™ License. You must require such a user to return or destroy all copies of the works possessed in a physical medium and discontinue all use of and all access to other copies of Project Gutenberg™ works. • You provide, in accordance with paragraph 1.F.3, a full refund of any money paid for a work or a replacement copy, if a defect in the electronic work is discovered and reported to you within 90 days of receipt of the work. • You comply with all other terms of this agreement for free distribution of Project Gutenberg™ works. 1.E.9. If you wish to charge a fee or distribute a Project Gutenberg™ electronic work or group of works on different terms than are set forth in this agreement, you must obtain permission in writing from the Project Gutenberg Literary Archive Foundation, the manager of the Project Gutenberg™ trademark. Contact the Foundation as set forth in Section 3 below. 1.F. 1.F.1. Project Gutenberg volunteers and employees expend considerable effort to identify, do copyright research on, transcribe and proofread works not protected by U.S. copyright law in creating the Project Gutenberg™ collection. Despite these efforts, Project Gutenberg™ electronic works, and the medium on which they may be stored, may contain “Defects,” such as, but not limited to, incomplete, inaccurate or corrupt data, transcription errors, a copyright or other intellectual property infringement, a defective or
  • 37. damaged disk or other medium, a computer virus, or computer codes that damage or cannot be read by your equipment. 1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except for the “Right of Replacement or Refund” described in paragraph 1.F.3, the Project Gutenberg Literary Archive Foundation, the owner of the Project Gutenberg™ trademark, and any other party distributing a Project Gutenberg™ electronic work under this agreement, disclaim all liability to you for damages, costs and expenses, including legal fees. YOU AGREE THAT YOU HAVE NO REMEDIES FOR NEGLIGENCE, STRICT LIABILITY, BREACH OF WARRANTY OR BREACH OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE THAT THE FOUNDATION, THE TRADEMARK OWNER, AND ANY DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE LIABLE TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE OR INCIDENTAL DAMAGES EVEN IF YOU GIVE NOTICE OF THE POSSIBILITY OF SUCH DAMAGE. 1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you discover a defect in this electronic work within 90 days of receiving it, you can receive a refund of the money (if any) you paid for it by sending a written explanation to the person you received the work from. If you received the work on a physical medium, you must return the medium with your written explanation. The person or entity that provided you with the defective work may elect to provide a replacement copy in lieu of a refund. If you received the work electronically, the person or entity providing it to you may choose to give you a second opportunity to receive the work electronically in lieu of a refund. If the second copy is also defective, you may demand a refund in writing without further opportunities to fix the problem. 1.F.4. Except for the limited right of replacement or refund set forth in paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
  • 38. INCLUDING BUT NOT LIMITED TO WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PURPOSE. 1.F.5. Some states do not allow disclaimers of certain implied warranties or the exclusion or limitation of certain types of damages. If any disclaimer or limitation set forth in this agreement violates the law of the state applicable to this agreement, the agreement shall be interpreted to make the maximum disclaimer or limitation permitted by the applicable state law. The invalidity or unenforceability of any provision of this agreement shall not void the remaining provisions. 1.F.6. INDEMNITY - You agree to indemnify and hold the Foundation, the trademark owner, any agent or employee of the Foundation, anyone providing copies of Project Gutenberg™ electronic works in accordance with this agreement, and any volunteers associated with the production, promotion and distribution of Project Gutenberg™ electronic works, harmless from all liability, costs and expenses, including legal fees, that arise directly or indirectly from any of the following which you do or cause to occur: (a) distribution of this or any Project Gutenberg™ work, (b) alteration, modification, or additions or deletions to any Project Gutenberg™ work, and (c) any Defect you cause. Section 2. Information about the Mission of Project Gutenberg™ Project Gutenberg™ is synonymous with the free distribution of electronic works in formats readable by the widest variety of computers including obsolete, old, middle-aged and new computers. It exists because of the efforts of hundreds of volunteers and donations from people in all walks of life. Volunteers and financial support to provide volunteers with the assistance they need are critical to reaching Project Gutenberg™’s goals and ensuring that the Project Gutenberg™ collection will
  • 39. remain freely available for generations to come. In 2001, the Project Gutenberg Literary Archive Foundation was created to provide a secure and permanent future for Project Gutenberg™ and future generations. To learn more about the Project Gutenberg Literary Archive Foundation and how your efforts and donations can help, see Sections 3 and 4 and the Foundation information page at www.gutenberg.org. Section 3. Information about the Project Gutenberg Literary Archive Foundation The Project Gutenberg Literary Archive Foundation is a non-profit 501(c)(3) educational corporation organized under the laws of the state of Mississippi and granted tax exempt status by the Internal Revenue Service. The Foundation’s EIN or federal tax identification number is 64-6221541. Contributions to the Project Gutenberg Literary Archive Foundation are tax deductible to the full extent permitted by U.S. federal laws and your state’s laws. The Foundation’s business office is located at 809 North 1500 West, Salt Lake City, UT 84116, (801) 596-1887. Email contact links and up to date contact information can be found at the Foundation’s website and official page at www.gutenberg.org/contact Section 4. Information about Donations to the Project Gutenberg Literary Archive Foundation Project Gutenberg™ depends upon and cannot survive without widespread public support and donations to carry out its mission of increasing the number of public domain and licensed works that can be freely distributed in machine-readable form accessible by the widest array of equipment including outdated equipment. Many
  • 40. small donations ($1 to $5,000) are particularly important to maintaining tax exempt status with the IRS. The Foundation is committed to complying with the laws regulating charities and charitable donations in all 50 states of the United States. Compliance requirements are not uniform and it takes a considerable effort, much paperwork and many fees to meet and keep up with these requirements. We do not solicit donations in locations where we have not received written confirmation of compliance. To SEND DONATIONS or determine the status of compliance for any particular state visit www.gutenberg.org/donate. While we cannot and do not solicit contributions from states where we have not met the solicitation requirements, we know of no prohibition against accepting unsolicited donations from donors in such states who approach us with offers to donate. International donations are gratefully accepted, but we cannot make any statements concerning tax treatment of donations received from outside the United States. U.S. laws alone swamp our small staff. Please check the Project Gutenberg web pages for current donation methods and addresses. Donations are accepted in a number of other ways including checks, online payments and credit card donations. To donate, please visit: www.gutenberg.org/donate. Section 5. General Information About Project Gutenberg™ electronic works Professor Michael S. Hart was the originator of the Project Gutenberg™ concept of a library of electronic works that could be freely shared with anyone. For forty years, he produced and distributed Project Gutenberg™ eBooks with only a loose network of volunteer support.
  • 41. Project Gutenberg™ eBooks are often created from several printed editions, all of which are confirmed as not protected by copyright in the U.S. unless a copyright notice is included. Thus, we do not necessarily keep eBooks in compliance with any particular paper edition. Most people start at our website which has the main PG search facility: www.gutenberg.org. This website includes information about Project Gutenberg™, including how to make donations to the Project Gutenberg Literary Archive Foundation, how to help produce our new eBooks, and how to subscribe to our email newsletter to hear about new eBooks.
  • 42. Welcome to our website – the ideal destination for book lovers and knowledge seekers. With a mission to inspire endlessly, we offer a vast collection of books, ranging from classic literary works to specialized publications, self-development books, and children's literature. Each book is a new journey of discovery, expanding knowledge and enriching the soul of the reade Our website is not just a platform for buying books, but a bridge connecting readers to the timeless values of culture and wisdom. With an elegant, user-friendly interface and an intelligent search system, we are committed to providing a quick and convenient shopping experience. Additionally, our special promotions and home delivery services ensure that you save time and fully enjoy the joy of reading. Let us accompany you on the journey of exploring knowledge and personal growth! ebookluna.com