Making Technology Investments Profitable

Similar documents
Executive's Guide to Project Management

THE COMPLETE PROJECT MANAGEMENT METHODOLOGY AND TOOLKIT

Security Metrics. A Beginner's Guide. Caroline Wong. Mc Graw Hill. Singapore Sydney Toronto. Lisbon London Madrid Mexico City Milan New Delhi San Juan

The Unified Software Development Process

Trading Beyond the Matrix

Management. Project. Software. Ashfaque Ahmed. A Process-Driven Approach. CRC Press. Taylor Si Francis Group Boca Raton London New York

CREATING A THIRD EDITION DAVID MANN

TABLE OF CONTENTS CHAPTER TITLE PAGE

SOFTWARE TESTING AS A SERVICE

BSM 9.0 ESSENTIALS. Instructor-Led Training

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, p i.

Global Project Management

15 Principles of Project Management Success

Workflow Administration of Windchill 10.2

The Complete Guide to Option Strategies

Learn AX: A Beginner s Guide to Microsoft Dynamics AX. Managing Users and Role Based Security in Microsoft Dynamics AX Dynamics101 ACADEMY

1 of 7 31/10/ :34

C ONTENTS. Acknowledgments

Regulatory Story. RNS Number : 8343I. DCD Media PLC. 08 July TR-1: NOTIFICATION OF MAJOR INTEREST IN SHARES i

From Agile by Design. Full book available for purchase here.

Section 1: Introduction to the Employee Satisfaction Roll Out Process 3

Which is why TMI is here to help. We have to admit it. we really love what we do.

Introduction to Windchill Projectlink 10.2

Ineffective Habits of Financial Advisors (and the Disciplines to Break Them)

Contents. iii. ix xi xi xi xiii xiii xiii xiv xv xvi xvii xix

The following report presents financial data only. The full and binding version is available in Polish. K2 INTERNET S.A.

RESILIENT. SECURE and SOFTWARE. Requirements, Test Cases, and Testing Methods. Mark S. Merkow and Lakshmikanth Raghavan. CRC Press

Preface. Table of Contents. List of Figures. List of Tables. List of Abbreviations. 1 Introduction 1. 2 Problem 23.

Northwards Housing s Communications Strategy

CSSE 372 Software Project Management: Software Risk Management

Dealer Tutorial. Uplink Customer Service UPLINK 2010 Uplink Security, LLC. All rights reserved.

Engineering. Software. Eric J. Braude. Michael E. Bernstein. Modern Approaches UNIVERSITATSBIBLIOTHEK HANNOVER ' TECHNISCHE INFORM ATIONSBIBLIOTHEK

Contents. 1 Introduction. 2 Feature List. 3 Feature Interaction Matrix. 4 Feature Interactions

PART I Think Revenue 1. CHAPTER 1 Develop a Revenue Mind-set 3. Why Cost Approaches Fail 3 How to Make a Big Difference 5 Revenue, Revenue, Revenue 6

JEFFERSON TOWNSHIP SCHOOLS COURSE OF STUDY ADVANCED CHILD DEVELOPMENT CP GRADE 12

As the use of agile approaches

PROJECT MANAGEMENT PROFESSIONAL CERTIFIED ASSOCIATE IN PROJECT MANAGEMENT (PMP & CAPM) EXAM PREPARATION WORKSHOP

Implementation. Business-Driven IT-Wide Agile (Scrum) and Kanban (Lean) Andrew T. Pham and David K. Pham. An Action Guide for Business and IT Leaders

Kouzes, J. M., & Posner, B. Z. (2007). The leadership challenge (4th ed.). San Francisco, CA: Jossey-Bass.

THE CMI CONTENT MARKETING FRAMEWORK. 7 Building Blocks to Success

How to Develop Qualification Criteria

CHANGE MANAGEMENT: HOW TO ACHIEVE A CULTURE OF SAFETY

A STUDY OF THE IMPACT OF CONSTRUCTION ACCIDENTS ON THE PROJECT CONTINUITY

Chapter 20: Workflow

The Impact of Corporate Venture Capital

Contents. Intended Audience for This Book How This Book Is Structured. Acknowledgements

III. BANKS RECEIVABLES FROM REVERSE REPURCHASE

Distributed Administrative Computing Security System (DACSS) Web Training & Other Useful Tools

INNOVATION MANAGEMENT

CHANGE MANAGEMENT: HOW TO ACHIEVE A CULTURE OF SAFETY

IBM Innovate AppScan: Introducin g Security, a first. Bobby Walters Consultant, ATSC bwalters@atsc.com Application Security & Compliance

The following report presents financial data only. The full and binding version is available in Polish. K2 INTERNET S.A.

Agenda item number: 5 FINANCE AND PERFORMANCE MANAGEMENT OVERVIEW AND SCRUTINY COMMITTEE FUTURE WORK PROGRAMME

TABLE OF CONTENTS. Preface About the Author Acknowledgments About APICS Web Added Value

Project Management Guidelines

for Information Technology

Contents. xvii. Preface. xxi. Foreword. 1 Introduction 1. Preamble 1. Scope and Structure of the Book 3. Acknowledgments 4 Endnotes 5

Hi iv. Declaration Certificate Acknowledgement Preface. List o f Table. List o f Figures. viii xvi xvii. 1.1 Introduction 1

NEEBO. - System and Process Manual -

Computer and Network Security in Higher Education

Information Pack for Applicants to the MIDLANDS CONNECT PROJECT TEAM

How to Prepare for a WMS Software Evaluation Process

BS Collaborative Business Relationships It s your choice. Your implementation guide

Integrity 10. Curriculum Guide

Agile Development & Business Goals. The Six Week Solution. Joseph Gee. George Stragand. Tom Wheeler

The Findability Formula

Nearshore IT Sourcing for Small- and Medium-Sized Enterprises: An Exploratory Study of Swiss SMEs Sourcing from Russia and Ukraine

Introduction to Windchill PDMLink 10.0 for Heavy Users

Risk Analysis and the Security Survey

PUREPROFILE LTD. ACN CONTINUOUS DISCLOSURE AND COMMUNICATION POLICY

ITS Project Management

Jason I. Miletsky Perspectives on branding

Business Administration of Windchill PDMLink 10.0

This is a sample chapter from A Manager's Guide to Service Management. To read more and buy, visit BSI British

Consolidated Annual Report of the AB Capital Group for the financial year 2008/2009. covering the period from July 1, 2008 to June 30, 2009

EL PASO COUNTY DEPARTMENT OF HUMAN RESOURCES. Family and Medical Leave

MONTE VISTA CHRISTIAN SCHOOL VIPA 3615 Advanced Photography: Gallery Course Syllabus

PRINCIPLES AND PRACTICE OF INFORMATION SECURITY

Quality Management. Theory and Application PETER D. MAUCH. Ltfi) CRC Press. \ V J Taylor & Francis Group. ^ ^ Boca Raton London New York

PAPER-6 PART-5 OF 5 CA A.RAFEQ, FCA

FRAMEWORK. 7 Building Blocks to Success

Dealing with digital Information richness in supply chain Management - A review and a Big Data Analytics approach

Master Data Management

Business Valuation Discounts and Premiums

Compensating the Sales Force

THE DIGITAL DIRECTION: HOTEL MARKETING BUDGETS AND A DIGITAL 101 FOR HOTELS PART I OF A TWO- PART SERIES

I. The Role of the Board of Directors II. Director Qualifications III. Director Independence IV. Director Service on Other Public Company Boards

MODULE 10 CHANGE MANAGEMENT AND COMMUNICATION

Contents. Acknowledgments. 1 Introduction: Why Study Technical Sales? 1. 2 An Overview of the Sales Process 7

Emergency Incident Management Systems

San$Diego$Imperial$Counties$Region$of$Narcotics$Anonymous$ Western$Service$Learning$Days$$ XXX$Host$Committee!Guidelines$ $$

Preface. Highlights of the Book. Acknowledgments

PMP Certification Exam Prep Bootcamp

PART I: WEBSITE LESSONS AND THE CONNECTED GENERATION 1

(i) The program shall prepare candidates who are familiar with the historical foundations of gifted and talented education;

Assistance Animals In Housing. New HUD Guidance Regarding Assistance Animals. Marley J. Eichstaedt, Executive Director Northwest Fair Housing Alliance

Acknowledgements PART ONE: CONCEPTUAL FRAMEWORK. 1. ERP Systems: An Introduction 3

Project Management Concepts, Methods, and Techniques

Transcription:

Making Technology Investments Profitable ROl Road Map from Business Case to Value Realization Second Edition JACK M. KEEN WILEY John Wiley & Sons, Inc.

Preface to the Second Edition Acknowledgments Introduction xv xvii xix PART ONE UNDERSTANDING VALUE LEAKS: MAJOR THREATS TO PROGRAM SUCCESS 1 CHAPTER 1 Why Value Leaks Torpedo Program Success 5 When IT Program Problems Are Really Value Leakage Problems 5 How Value Leakage Problems Torpedo IT Success 6 Top Ten Danger Areas for Value Leaks 7 The Business Case: The High Cost of Not Getting It Right 7 The Business Case: Flawed Afterthought r or IT Value Star? ;' 8 Spotting Business Case Defects 9 Eight Ways Good Business Cases Shape Program Success. 13 CHAPTER 2 Being "On-Value": The Essential Third Pillar of Investment Success 15 Why Value Leaks Persist: Finding the Root Cause 15 Managing to "On-Value": The Ultimate Success Measure 17 VII

VIII Detailed Table of Contents PART TWO FLUSHING OUT VALUE LEAKS: A GUIDED JOURNEY 19 CHAPTER 3 Avoiding Half-Right "Fixes" 21 Need for a Value Improvement Strategy 21 Half-Right Value Strategies 21 Characteristics of an Effective Value 23 Improvement Strategy CHAPTER 4 Introducing the Value Practices Audit 25 Why a Value Practices Audit? 25 Where Leaks Typically Hang Out 25 Overview of the Value Practices Audit 26 Scope of the Audit 26 Guiding Principles for the Audit's Design 27 Effort and Duration of the Audit 27 Using Audit Results 27 Relationship of the Value Practices Audit to "Quick Audits" Found Elsewhere in This Book 27 How to Apply the Value Practices Audit 28 CHAPTER 5 Evaluating Value Practice Areas 33 Understanding and Using the Value Practices Audit 33 Section A. Auditing the Business Case > t 34 1, Value Practices Audit Profile for the Business Case 35 2. Nature and Importance of the Business Case 35 3- Tips for Recognizing the Trustworthiness of a Business Case 37 Section B: Auditing the Value Flow Map 39 the Value Flow Map 40 2. Nature and Importance of a Value Flow Map 40 3- Tips for Building a Highly Effective Value Flow Map 43

ix Section C. Auditing Stakeholder Accountability 44 Stakeholder Accountability 44 2. The Nature and Importance of Stakeholder Accountability 46 3- Tips for Addressing Stakeholder Accountability 47 Section D. Auditing Program Decision Making 50 Program Decision Making 51 2. Nature and Importance of Value-Directed Decision Making, 51 3- Tips for Effective Program Decision Making 53 ~ Section E. Auditing Value-Based Design 55 Value-Based Design 56 2. Nature and Importance of Value-Based Design 56 3- Tips for Doing Value-Based Design 58 Section F. Auditing Benefits Tracking 58 Benefits Tracking 58 2. Nature and Importance of Benefits Tracking 58 3- Tips for Effective Benefits Tracking 60 Section G. Auditing Value Governance 60 Value Governance 62 2. Nature and Importance of Value Governance $ 62 3- Tips for Effective Value Governance 62 CHAPTER 6 Shifting the Mind-Sets of Management: The Key Fix for Value Leaks 63 i Section H: Management Mind-Sets 64 Management Mind-Sets 64 2. Nature and Importance of Management Mind-Set Shifts 64 3- Tips for Shifting Management Mind-Sets 66 Management Mind-Sets Shifting at GEI (A Story) 67

PART THREE PLUGGING VALUE LEAKS: SUCCESS BEGINS HERE 85 CHAPTER 7 Finding the Best Quick Wins 87 Big Four Quick Wins for Everyone 87, 1. Get Vocal and Visible 87 2. Put Value Topics on CxO Meeting Agendas 88 3- Do a Speedy Business Case Audit 88 4. Dramatize How Hidden Value Can Be Flushed into the Open 88 Tailor Next Steps to Type of Value Challenge 90 Using Quick Audits 92 The Ultimate Goal: 24/7 Value Thinking. 92 In the Final Analysis 93 PART FOUR CHAPTER 8 CHAPTER 9 GETTING THE BUSINESS CASE RIGHT How to Recognize a Trustworthy Business Case The Business Case as a Trusted Scout Using the Seven C's to Assess Content Quality The Seven C's of Content Quality The Seven C's Content Audit Tool for Business Cases The Importance of Good Processes for Value Realization Why Value Realization Processes Really Matter Business Case-Grounded Processes Drive Business Results Substandard Business Case Processes Abound Costs of Tolerating Process Problems Are High Symptoms of Process Problems Types of Value Realization Process Problems Detecting Value Realization Process Problems The Process Audit Tool for Value Realization 95 97 97 98 98 100 105 105 105 106 106 107 108 109 110

XI CHAPTER 10 CHAPTER 11 Defining: Steps 1, 2, and 3 to Building Better Business Cases Seven Hats for Seven Steps STEP 1: SCOPE (Who Expects What?) SCOPE in a Nutshell (Main Hat to Wear: Project Manager) SCOPE Explained Description of Tasks STEP 2: CRITERIA (Who Cares About What?) CRITERIA in a Nutshell (Main Hats to Wear Reporter, Politician, Salesperson) CRITERIA Explained Description of Tasks Hitting the "Dartboard of Value" Using the ValueBoard Using a Balanced ValueBoard Establishing Key Themes Scorecard-Oriented STEP 3: ALIGN (Connect the Dots) ALIGN in a Nutshell (Main Hats to Wear: Analyst, Detective) ALIGN Explained Using the Value Ladder to Display Alignment Using the Seven Tests of Alignment Assessing: Steps 4, 5, and 6 to Building Better Business Cases Introduction Step 4: CALCULATE (Show the Money) CALCULATE in a Nutshell (Main Hats to Wear: Analyst, Detective) CALCULATE Explained Using the PayoffCard Description of Tasks 113 113 115 116 116 116 117 118 118 119 120 121 122 123 126 126 126 127,129 j. 131 131 133 133 133 134 135

XII Detailed Table of Contents Step 5: PROVE (Who Says So?) 140 PROVE in a Nutshell (Main Hats to Wear: Attorney, Detective) 140 PROVE Explained 140 Description of Tasks 141 Step 6: ANALYZE (Find the Winner) 145 ANALYZE in a Nutshell (Main Hats to Wear: Analyst, Project Manager) 145 ANALYZE Explained 146 Description of Tasks 146 CHAPTER 12 Delivering: Step 7 to Building Better Business Cases 153 Introduction 153 Step 7: STORYTELL (Explain It) 153 STORYTELL in a Nutshell (Main Hats to Wear: Salesperson, Attorney, and Reporter) 155 STORYTELL Explained 155 Description of Tasks _ 156 CHAPTER 13 Finding Hidden Value That Others Miss l6l Who Has the Value? l6l CHAPTER 14 Finding Commonly Overlooked Value Areas 162 Knowing Where to Look 162 Knowing What to Look For i 164 Handling Intangibles: The Emotional Enigma of Value Realization 173 '? The "Intangibles" Factor: Controversial Yet Crucial 173 What Is "Intangibility," and Why Is It Controversial? 176 Managing Intangibles with Skill and Style 178 Five Ways to Handle Intangibles 178 Converting Intangibles to Tangibles 179 Using the Scoresheet to Manage Intangibles 186

XIII An Intangibility Policy Memo 189 Tips on Management of Intangibles 189 CHAPTER 15 Using ROl Storytelling to Drive Home the Message 191 Why ROl Storytelling Drives Home the Message 191 Principles of Good ROl Storytelling 193 Pick the Right Story for the Right Audience 193 Build Stories That Touch Human Hearts 194 Use Vivid Language 194 Be Succinct 195 Stay Alert for Story Ideas 196 CHAPTER 16 Selecting: Prioritizing Programs with Confidence and Ease 197 IT Project Selection: Replacing Anxiety with Confidence 197 A Simple Project Prioritization Process 199 How Are We Doing? A Quick Project Selection Process Audit 200 A Simple Project Prioritization Scoresheet 203 Uses 203 Understanding the Project Prioritization Scoresheet (PPS)..207 A Vendor Comparison Prioritization Scoresheet ^ 209 Business Case Submittal Standards 211 P 3 Using Standardized Decision Criteria 213 Implementation Guidelines for the Evaluation Team 214 CHAPTER 17 Tracking: Making Sure Benefits Get Realized 219 Benefits Realization: Fantasy or Fact? 219 The IT Benefits Realization Process Audit 220

XIV Detailed Table of Contents Principles of a Good IT Benefits Realization Process 221 How Good Business Cases Contribute to the Successful Realization of IT Benefits 223 The Value' Ladder: A Tool for Clarifying Benefits Realization Targets 224 APPENDIX Sample Business Case 227 Glossary Bibliography About the Author Index 267 275 279 281