scholarly journals Processes for Ex-ante Evaluation of IT Projects - Case Studies in Brazilian Companies

10.28945/897 ◽  
2006 ◽  
Vol 3 ◽  
pp. 355-369
Author(s):  
Fernando José Barbin Laurindo ◽  
Renato Oliveira Moraes
Keyword(s):  
10.28945/3025 ◽  
2006 ◽  
Author(s):  
Fernando Jose Barbin Laurindo ◽  
Renato de Oliveira Moraes

In the highly competitive nowadays markets, many companies actions assume the project form. In special, Information Technology (IT) projects assume great importance, enabling the dynamic actions that organisations need (Porter, 2001; Tapscott, 2001). However, IT applications assume different roles, from operational support to strategic, according to companies’ strategies and operations, besides the peculiarities of the industry in which they compete (McFarlan, 1984; Porter & Millar, 1985). According to this role (appraised by McFarlan’s Strategic Grid), ex-ante evaluation practices for selecting IT projects to be implemented can vary (Jiang & Klein, 1999). The objective of this paper is to analyse practices for selecting IT projects in Brazilian companies classified in different quadrants of the Strategic Grid and to observe any differences in ex-ante evaluation practices among them. The adopted methodological approach was qualitative research, more specifically case study (Claver, Gonzalez & Llopis, 2000; Yin, 1991) performed in four companies.


Author(s):  
Margreet B. Michel-Verkerke ◽  
Roel W. Schuring ◽  
Ton A.M. Spil

In the previous two chapters, the determinants and theoretical background of the USE IT model is discussed. In this chapter, the application of the USE IT model in three cases are described to show the value and benefits of the USE IT model in practice. The USE IT model has four determinants: resistance, relevance, requirements, and resources. It can be used ex ante and ex post. The USE IT model is applied ex ante to find relevance and appropriate choices to overcome resistance for an ICT support of the multiple sclerosis (MS) healthcare chain and the rheumatism care guide, and as well ex ante as ex post in a local stroke service to measure the feasibility of a mobile device for general practitioners. The USE IT model proved to be very helpful not only in revealing the most urgent and relevant problems but also in discovering the crucial obstacles and prerequisites for implementing a solution to these problems. By that, the USE IT model served as a strong tool to decide whether healthcare processes should be supported by ICT and, if so, what processes should be used and how.


Symmetry ◽  
2019 ◽  
Vol 11 (8) ◽  
pp. 1032 ◽  
Author(s):  
Rola ◽  
Kuchta

The paper is basically dedicated to the problem of effort estimation for the Product Backlog items of IT projects led accordingly to the Scrum framework. The effort estimation issue is important, because low quality estimation decreases the efficiency of project implementation. The paper proposes an estimation method for the Product Backlog items of Scrum-based IT projects (which can be adapted also to other projects), which has two original elements with respect to the state of art in Scrum estimation: the usage of fuzzy numbers and strict rules for consensus forming, combined with a space for human interaction. The assumptions of the method should be complied with and were formulated on the basis of literature and authors experience. Two case studies were used for an initial method validation. The case studies confirmed a high potential of the method to increase estimation quality in Scrum-based projects, as well as in other project types. The case studies were conducted using research methods fulfilling the symmetry principle. The paper is thus an example of symmetry in management research.


Author(s):  
Richard Susskind

One of the most compelling objections to the development and delivery of public online courts is precisely that the state needs to be involved in putting the systems in place. Governments around the world have a woeful track record of implementing technology projects. Case studies abound which tell of untold wastage, wanton incompetence, and scant supervision. We know that most major public IT projects fail. As a rule of thumb, technology professionals often say that only 15–20 per cent of large public sector technology projects are successful, that is, on time, within budget, with systems that do what was wanted and was expected.


2016 ◽  
pp. 277-298
Author(s):  
One-Ki (Daniel) Lee ◽  
Roger Blake ◽  
Deepa Varghese Baby

Global Information Technology (IT) projects span multiple locations that are typically employing different practices, adhering to different standards, and using different technologies – at the same time operating in highly diverse cultures. Differences such as these are prevalent factors that increase risk on global IT projects. Further, they are prone to changing continuously over the course of a project, with the consequence that risk becomes highly unpredictable and dynamic. This chapter proposes a framework to characterize risks within the people-process-technology-external elements of a global IT project. The framework gives particular consideration to risks that arise from interactions of multiplicities within and between those elements (i.e. dynamic risks). The principles of Service-Oriented Architecture (SOA) are adopted to propose specific strategies for mitigation of these dynamic risks. Two case studies further illustrate how those strategies can mitigate the risks.


Author(s):  
One-Ki (Daniel) Lee ◽  
Roger Blake ◽  
Deepa Varghese Baby

Global Information Technology (IT) projects span multiple locations that are typically employing different practices, adhering to different standards, and using different technologies – at the same time operating in highly diverse cultures. Differences such as these are prevalent factors that increase risk on global IT projects. Further, they are prone to changing continuously over the course of a project, with the consequence that risk becomes highly unpredictable and dynamic. This chapter proposes a framework to characterize risks within the people-process-technology-external elements of a global IT project. The framework gives particular consideration to risks that arise from interactions of multiplicities within and between those elements (i.e. dynamic risks). The principles of Service-Oriented Architecture (SOA) are adopted to propose specific strategies for mitigation of these dynamic risks. Two case studies further illustrate how those strategies can mitigate the risks.


Author(s):  
Hanten Mathias

This chapter analyses the German Deposit Protection landscape and provides three short case studies which reveals how deposit protection is structured. It also assesses the impact of the Deposit Protection Directive (DPD 3) and the Bank Recovery and Resolution Directive (BRRD) on this landscape. DPD 3 aims to enable the institutions to bear the risk of depositor compensation and to avoid state aid. On this basis the Directive specifies that all Deposit Guarantee Schemes (DGS) must be financed ex ante. On the other hand, the BRRD, through the Restructuring and Resolution Act, gives the resolution authority the power to bail-in a bank’s shareholders and creditors in the event of resolution.


1997 ◽  
Vol 12 (2) ◽  
pp. 131-143 ◽  
Author(s):  
Malcolm King ◽  
Laurie Mcaulay

Structures are important to the practice of information technology (IT) evaluation. Structures, as evidenced by 14 case studies and the words of six financial directors, are defined here as organizational responses, including user committees and responsibility accounting, quantitative assessments of IT projects, such as financial appraisals, and qualitative assessments. Structures in practice seem to allow for a changing world in which projects are accepted according to business needs and subsequent actions lead accepted projects to be adapted and managed as time passes. In order to manage IT technology in this way, structures alone are important but not sufficient. Active individuals have an important role to play and credibility becomes an important factor in evaluation and implementation. The credibility of IT management is created by its selling of the project in the first place and then by its ability to manage the project in a responsive way. Credible strategists are at least as important as a strategy to the evaluation of IT.


Sign in / Sign up

Export Citation Format

Share Document