Main
Log in

Governance & Planning

Conclusion: Most organisations do not know the extent of shadow or departmental IT. It is likely to range from using complex SaaS (Software-as-a-Service) solutions for core business systems to use of spreadsheets for simple applications, such as managing grants for local sporting organisations.

Unless there is a filter to assess requests for and identify non-compliant software, e. g. with inadequate security processes or using unapproved technical architecture, management conflicts are inevitable.

Conclusion: The range of channel and customer engagement tools needs thorough and continuous evaluation. There are two challenges to this objective. Firstly, the initial impediment is to gather data from various sources. The second problem is to apply a coherent and durable methodology to all of it.

The greater complexity of technologies and increased channel support means organisations must have a path to understand how their technologies perform. The most common assessment of return on investment can be applied to all data sets but it lacks sophistication. Developing a use-case will help establish a secure methodology which will make clearer the real value of customer satisfaction.

Conclusion: Despite repeated audits pointing to failures by IT to deliver expected outcomes, organisations continue to publish IT plans that do not adequately address the fundamental dimensions of IT planning, being the IT Business Plan, IT Strategies and IT Program of Work.

These elements are often developed as a single composite document, but this approach fails to recognise that each dimension:

  • requires a different method of creation
  • is owned by different stakeholder groups
  • has a different purpose and audience
  • requires renewal on different cycles.

Failure to ensure that all dimensions are addressed presents risks to implementation both in terms of effective up-front investment selection as well as ongoing IT governance arising from gaps in critical decision-making information.

To avoid these risks, organisations should maintain the content of each IT planning element as a separate deliverable even if the desire, or requirement, is to regularly produce an “annually” updated composite document.

Conclusion: One of the objectives of an IT workforce plan is to maximise the use of the skilled IT professionals and project managers and minimise their idle time. Managing the IT workforce plan is a complex task in most organisations as skill levels required may vary by project and by operational support roles.

To be successful, the manager of the plan must maintain a current and accurate skills inventory to assign the right IT professional(s) to the role. The manager also needs to ensure the role is correctly specified so an inexperienced IT professional is not assigned when an experienced one is needed.

IT consists of information and communications technologies (ICT) typically used in business, corporate or enterprise management (e.g. computer processing, data management, business processes and applications, customer service, enterprise networking).

OT consists of specific operational technologies used to run a business operation (e.g. capital assets, manufacturing process control, machinery, vehicles, equipment, avionics, telemetry).

This MAP and its companion Compass research note provide guidance on evaluating the forms of organisation necessary to deliver reliable and effective interworking of IT and OT. The proximity of IT and OT varies substantially by industry.

Whatever the industry, organisations must seek out and evaluate existing and emerging opportunities in converging IT and OT. If these opportunities are missed, the business will lag in real-time management and suffer loss of their productivity and competitive edge.

 

Collaboration services must align with business objctives to be effective but what does the buzzword "collaboration" really mean?

While the hype surrounding collaboration technologies and Web 2.0 services reaches fever pitch within the media, vendors and business managers alike, it will serve organisations well to stop and think carefully about what the buzzword collaboration really means for organisational processes, structures and efficiencies. When collaboration services are misaligned with business objectives, they will hinder, not aid, productivity. Having a model to categorise different forms – or modes – of collaboration is an important first-step in accurately matching technologies to different collaborative applications.

Conclusion: IT professionals who operate in a structured and predictable environment could find the role change to that of an IT manager more challenging than they had anticipated, as it typically requires a mind-set change from completing one or two tasks to managing people. To avoid disappointment, senior management must help new IT managers make the transition and cope with the nuances of the role.

To help them succeed, assign other IT managers, who have made the transition, to coach them. In this way they can learn how to act out the new role and come to grips with the politics of the organisation, or spheres of influence, and know how to interpret business priorities.

Conclusion: Mind mapping is used broadly throughout the world as a technique for improving creativity, problem solving, organising, planning, learning and collaborating. It can be used effectively to help an individual with their personal productivity, and importantly it can help teams and whole organisations.

If organisations are going to embrace mind mapping and encourage employees to utilise this proven technique, then it should manage the rollout like it would for any other major new initiative. A specific training program needs to be utilised, and if software is to be used to enable collaboration via Mind Maps, the organisation will need to determine an approach and evaluate potential applications from the growing list of mind mapping applications becoming available.

Conclusion: Whilst the forthcoming General Data Protection Regulation (GDPR) is a European regulation, some Australian organisations are likely to be impacted and will need to comply. One of the requirements of the regulation is to appoint a Data Protection Officer (DPO), whose job role has very specific duties and legal responsibilities which are defined as part of the GDPR.

However, the guidelines are not completely clear as to when it is mandatory for an organisation to appoint a DPO. Australian organisations should consider if, 1: will they need to comply with the GDPR, and, 2: will they need to appoint a DPO?

Conclusion: Employ a bottom-up technology-based approach and a top-down business approach when developing the business and IT transformation program. Additionally, the program must take a pragmatic approach to reflect workplace changes that are feasible to meet the expectations of clients, staff, suppliers and the community.

Unless the program is continually revised to reflect the changing business and technology environment, it runs the risk of addressing yesterday’s problems. When benefits expected are not being realised, as indicated immediately below, it is important to implement turnaround strategies.

In the News

Managed security: a big gamble for Aussie IT providers - CRN - 02 August 2018

TechSci Research estimates the Australian managed security services (MSS) market will grow at a CAGR of more than 15 percent from 2018-23 as a result of the increased uptake of cloud computing and...
Read More...

Kids, Education and The Future of Work with Dr Joseph Sweeney - Potential Psychology - 25 July 2018

What is the future of work and how do we prepare our kids for it? Are schools and universities setting kids up for future success? Does technology in the classroom improve outcomes for kids? Should...
Read More...

PageUp starts rebuilding and looks to learn lessons after data breach nightmare - AFR - 27 June 2018

The timing couldn't have been worse for PageUp; two days before Europe's new data protection regime came into force the Melbourne-based online recruitment specialist's security systems detected...
Read More...

Australia is still in the cyber security dark ages - AFR - 28 June 2018

In terms of cyber security years, Australia is still in the dark ages, a period typified by a lack of records, and diminished understanding and learning. We're only a few months into practising...
Read More...

AMP does maths on infosec shortage - ITnews - 18th June 2018

Cyber security and risk advisor at analyst firm IBRS, James Turner, said the cyber skills shortage was prompting a wider rethink around the domain in terms of resourcing for the last few years....
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap

Already a subscriber?

Login to read your premium content.

        Forgot your password?
Recently Viewed Articles
Related Articles