skip to main content
article
Free Access

Top management toolbox for managing corporate IT

Published:01 April 1999Publication History
First page image

References

  1. 1 Ahituv, N., Neumann, S., and Riley, H. Principles oflnj~rmation Systemsj~r Management. 4th ed. Brown Communications, Inc., Dubuque, Iowa. 1994.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2 Barki, H., Rivard, S., and Talbot, J. Towards assessment of software development risk. J. Manage. Inf. Syst. 10, 2 (Fall 1993), 203-225.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3 Boehm, B. Software Engineering Economics. Prentice-Hall, Englewood Cliffs, N.J., 1981.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4 Boehm, B. A spiral model of software development and enhancement. Comput. 21, 5 (May 1988), 61-72.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5 DuBrin, A., Ireland, R., and Williams, J. Organization and Management. South-Western Publishing Co., Cincinnati, Ohio, 1989.]]Google ScholarGoogle Scholar
  6. 6 Frantz, D. $80-million failure: B of A's plans for computer don't add up. LosAnge/es Times, Feb. 7, 1988, D1-D3.]]Google ScholarGoogle Scholar
  7. 7 McCracken, D., and Jackson, M. Life-cycle concepts considered harmful. ACM Software Eng. Notes (Apr. 1982), 29-32.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8 McFarlan, F. Portfolio approach to information systems. Harvard Bus. Rev. 59, (Sept.-Oct. 1981), 17-25.]]Google ScholarGoogle Scholar
  9. 9 Ozz, E. When professional standards are lax: The CONFIRM failure and its lessons. Commun. ACM 37, 10 (Oct. 1994), 29-36.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10 Robey, D., and Sales, C. Designing Organizations. 4th ed. Irwin, Chicago, II1., 1994.]]Google ScholarGoogle Scholar
  11. 11 Rothfeder, J. It's late, costly, incompetent, but try firing a computer system. Business Week (Nov. 7, 1988), 86-89.]]Google ScholarGoogle Scholar
  12. 12 Zwass, V. Management Inj~rmation Systems. Brown Communications, Inc., Dubuque, Iowa, 1992.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Top management toolbox for managing corporate IT

          Recommendations

          Reviews

          David Gary Hill

          New business applications play an increasingly important strategic role in corporations, but application development project risks can lead to disastrous results. This paper suggests a top management toolbox that consists of a series of check-and-balance management techniques designed to prevent project runaways and to deliver systems that support corporate strategy. The authors advocate the toolbox as a means to ensure the necessary general management control over IS management as well as IS projects individually and as part of a portfolio. Control ensures that technology progresses according to overall corporate strategy. The paper discusses both the locus and the method of control for managing three dimensions of risk—project size, staff experience with technology, and project structure. There is a need to balance the influence over projects both inside and outside the IS staff. The management toolbox complements this balancing at both a macro and a micro level. The macro level is general management control over the IS function without getting into project specifics, and the micro level is when general management becomes a partner with IS in steering critical IT projects. The toolbox specifies economic tools (such as budgeting) and managerial tools (such as a steering committee and feasibility analysis) for both the macro and the micro levels. An extension of the paper to include strategies for correcting—rather than just identifying—runaway projects would have been useful.

          Access critical reviews of Computing literature here

          Become a reviewer for Computing Reviews.

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image Communications of the ACM
            Communications of the ACM  Volume 42, Issue 4
            April 1999
            97 pages
            ISSN:0001-0782
            EISSN:1557-7317
            DOI:10.1145/299157
            Issue’s Table of Contents

            Copyright © 1999 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 April 1999

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format