...rP os t op yo Vendor Partnering Important Considerations When IT Outsources IT E xc e r p t e d fro m tC The Adventures of an IT Leader By Do No Robert D. Austin, Richard L. Nolan, and Shannon O’Donnell Buy the book: Amazon Barnes & Noble HarvardBusiness.org Harvard Business Press Boston, Massachusetts ISBN-13: 978-1-4221-3046-9 3028BC This document is authorized for use only by Paolo Neirotti until September 2011. Copying or posting is an infringement of copyright. Permissions@hbsp.harvard.edu or 617.783.7860. rP os t op yo Copyright 2009 Harvard Business School Publishing Corporation All rights reserved Printed in the United States of America This chapter was originally published as chapter 14 of The Adventures of an IT Leader, copyright 2009 Harvard Business School Publishing Corporation. No part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form, or by any means (electronic, mechanical, photocopying, recording, or otherwise), without the prior permission of the publisher. Requests for permission should be directed to permissions@harvardbusiness.org, or mailed to Permissions, Harvard Business School Publishing, 60 Harvard Way, Boston, Massachusetts 02163. Do No tC You can purchase Harvard Business Press books at booksellers worldwide. You can order Harvard Business Press books and book chapters online at www.harvardbusiness...
Words: 6256 - Pages: 26
...In order to better advise Jim Barton on how to proceed with the iPhone decision, we used the “SWOT” Analysis Model and the Value Center Concept Model. Strengths: 1. All the critical IVK Sales Department applications can be easily transmitted to become an iPhone “app”. 2. Optimal security features favorable to IVK: a. Encryption. b. Support for Virtual Private Networks (VPN). c. “Remote Wipe” that allows users to remotely erase data on the phone. d. Wi-Fi and Internet transport security standards are available. e. iPhone can be locked down and individual functions of the iPhone can be individually disabled. f. Overall trust with Apple and App Store security protocols. g. “Sandboxing” allows isolation of phone data from “apps”. 3. Compared to Notebooks and Personal Computers, the iPhone is cheaper, portable and accessible. Weakness: 1. The IVK IT Department will have less control over what the users download onto the iPhone in terms of “apps” and any malicious code associated with them. 2. Increased IT resources’ level of effort in regards to adhering iPhone use to current IVK technical policies (some current IT projects must be deferred or even cancelled). 3. Open-Source technology is not available on the iPhone to make customized applications, security code, and quality control processes. Opportunities: 1. The Sales Department and their iPhone use may increase their job efficiency leading to more revenue...
Words: 746 - Pages: 3
...procedures on a regular basis, and renewed emphasis on change control) ; once approved by Carl Williams should be shared by Jim Barton with his peers and a regular weekly update should be provided at leadership meetings to manager of various business groups. Based on “IT transformation at Intel” article a yearly IT performance report will be helpful in addition to weekly newsletter b) Jim Barton should use the “Architecture Stakeholder map” to involve key stakeholders in IT strategy and transformation decisions, both in the short run and long run. This will ensure there is buy in from all business units that will be impacted and also provide credibility to his decisions. c) Looks like Carl Williams does not want to shut down operations so IVK has to go with Plan B. Jim Barton should clearly communicate the implementation details and the impacts it will have to his peers. d) Jim Barton should follow the principles from “The doctrine of completed staff work” to communicate with the CEO. Although Carl Williams seems to be showing interest in IT, Jim Barton is not sure whether IT decisions made by Carl Williams would be appropriate. 2. Should Barton reorganize the IT function...
Words: 676 - Pages: 3
...CIO leadership – IS/IT for Managers Core D – Group 4 Q.1. If you were Jim Barton, how are you going to address the 3 questions raised by Bernie Ruben about blogging and other emerging technologies in the company? Bernie Ruben raises three questions about blogging and emerging technologies at IVK. What, if anything, should we do about this blog entry? As Jim Barton, we don’t want Carl Williams to know anything about the blog about IVK. He will be mad if he learns that a description of June 28 events are available on the Internet. As it seems to be a blog not read by a big amount of people, we should just don’t talk about it and try to make the blogger turn off his page indirectly. Do nothing. What should be our general policy about blogging based on inside information from within the company? Jim Barton has to settle a policy to prevent people putting stuff about IVK on their computer or online. IVK’s employees have to know that they cannot talk about work outside of work. We, as the CIO, have to work with the compliance department to design the confidentiality policy. If we build this policy in a way that the blogger understands that he is out of compliance it should make him correct his blog by himself without any action of the company. The policy should not be only about blogs but about also about Web 2.0 technologies. It has to be acute enough to avoid to blindside IVK’s IT department again. A good way to get Williams understand the issue could be to enlighten...
Words: 1347 - Pages: 6
...CIO Challenges – Preparing for IT Leadership ITM T 6:00pm-9:30pm SPRING 2012 Date: 03/28/2012 ------------------------------------------------- INTRODUCTION (5 Points) Jim Barton, the former head of Loan Operations, is appointed the new CIO of the IVK Corporation as the new CEO is attempting a turnaround following a period of slowing business performance1. Barton has no IT background and the serious challenges gave him very little time to learn what effective IT management is all about. The story narrated to us three events Barton had experienced in the weekend before he entered the new office. On Friday evening, in the bar, he mysteriously encountered a wise kid who gave him a surprisingly good advice and inspiration by telling him it is important to know what you don’t know. On Sunday morning, during his jogging, Barton met with Bill Davies, the former CIO ad IVK. Bill told Jim that he “won’t last one year” in the job of CIO, which reminded Jim of the harsh truth that he would be judged on his performance, regardless of the lack of experience in the area that was his starting point. On the afternoon of the same day, Barton’s consultant and girlfriend Maggie made a very good suggestion that Barton should arrange meetings with CIOs, analysts, investors, customers, and other IT movers and shakers to help him better understand the role of a CIO. ------------------------------------------------- ISSUES/PROBLEMS (20 Points) * In taking on a new assignment, how can...
Words: 1363 - Pages: 6
...ASSESSING GRADUATE EMPLOYMENT IN THE PRESENCE OF ENDOGENEITY AND SAMPLE SELECTION BIAS V1.2 Paul Blacklow* School of Economics and Finance, University of Tasmania, Private Bag 85, Hobart, TAS 7000 Paul.Blacklow@utas.edu.au *Presenting Author JEL Codes: I21, J23, C25 Keywords: Graduate Employment, Self Selection Bias, Sample Selection Bias Aaron Nicholas Department of Economics, Monash University, Wellington Road, Clayton, VIC 3800 Aaron.Nicholas@buseco.monash.edu.au ABSTRACT This paper examines the probability of a recent university graduate obtaining full-time employment by degree of study. It allows for degree choice to be endogenous (self-selection bias) and adjusts for those graduates not in the labour force who are not typically considered in graduate outcome studies (sample-selection bias). The self-selection problem is able to be identified by using a unique data set that combines data from the 2005 and 2006 Australian Graduate Destination Survey with data from the University of Tasmania’s (UTAS) student administration database, which includes students’ pre-tertiary school results. Degree choice is modelled using a Nested Logit, while labour force participation is modelled using a Probit. Using a ‘Heckit’ type methodology, the Inverse Mills Ratios (pseudo-residuals) from the Nested Logit and the modified Inverse Mills Ratios from the Probit are included in the final Probit model for Employment. Both correction terms are statistically significant at 5% in the employment...
Words: 8542 - Pages: 35