HOME





Val IT
Val IT is a governance framework that can be used to create business value from IT investments. It consists of a set of guiding principles and a number of processes and best practices that are further defined as a set of key management practices to support and help executive management and boards at an enterprise level. The latest release of the framework, published by IT Governance Institute (ITGI), based on the experience of global practitioners and academics, practices and methodologies was named ''Enterprise Value: Governance of IT Investments, The Val IT Framework 2.0''. It covers processes and key management practices for three specific domains and goes beyond new investments to include IT services, assets, other resources and principles and processes for IT portfolio management. Overview Val IT allows business managers to get business value from IT investments, by providing a governance framework that consists of * a set of guiding principles, and * a number of processes ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Responsibility Assignment Matrix
In business and project management, a responsibility assignment matrix (RAM), also known as RACI matrix (; ''responsible'', ''accountable'', ''consulted'', and ''informed'') or linear responsibility chart (LRC), is a model that describes the participation by various roles in completing tasks or deliverables for a project or business process. The four key responsibilities most typically used being: ''responsible'', ''accountable'', ''consulted'', and ''informed''. It is used for clarifying and defining roles and responsibilities in cross-functional or departmental projects and processes. There are a number of alternatives to the RACI model. Key responsibility roles in the RACI model Role distinction There is a distinction between a role and individually identified people: a ''role'' is a descriptor of an associated set of tasks; may be performed by many people; and one person can perform many roles. For example, an organization may have ten people who can perform the role of ' ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Value Network Analysis
Value network analysis (VNA) is a methodology for understanding, using, visualizing, optimizing internal and external value networks and complex economic ecosystems.Biem, Alain, and Nathan Caswell. "A Value Network Model for Strategic Analysis." ''HICSS. 2008.'' The methods include visualizing sets of relationships from a dynamic whole systems perspective. Robust network analysis approaches are used for understanding value conversion of financial and non-financial assets, such as intellectual capital, into other forms of value. Allee, Verna. "Value Network Analysis and Value Conversion of Tangible and Intangible Assets." Journal of Intellectual Capital. Publisher: Emerald Insights, Year: 2008, Volume: 9, Issue: 1, Page: 5 - 24, Digital Object Identifier: The value conversion question is critical in both social exchange theory that considers the cost/benefit returns of informal exchanges and more classical views of exchange value where there is concern with conversion of value in ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Value Networks
There is no agreed upon definition of value network. A general definition that subsumes the other definitions is that a value network is a network of roles linked by interactions in which '' economic entities'' engage in both tangible and intangible exchanges to achieve economic or social good. This definition is similar to one given by Verna Allee. Definitions Different definitions provide different perspectives on the general concept of a value network. Christensen Clayton Christensen defines a value network as: "The collection of upstream suppliers, downstream channels to market, and ancillary providers that support a common business model within an industry. When would-be disruptors enter into existing value networks, they must adapt their Business models to conform to the value network and therefore fail at disruption because they become co-opted." Fjeldstad and Stabell: Value configurations Fjeldstad and Stabell define a value network as one of three ways b ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Earned Value Management
Earned value management (EVM), earned value project management, or earned value performance management (EVPM) is a project management technique for measuring project performance and progress in an objective manner. Overview Earned value management is a project management technique for measuring project performance and progress. It has the ability to combine measurements of the project management triangle: Scope (project management), scope, time, and costs. In a single System integration, integrated system, EVM is able to provide accurate forecasts of project performance problems, which is an important aspect of project management. Early EVM research showed that the areas of planning and control are significantly impacted by its use; and similarly, using the methodology improves both scope definition as well as the analysis of overall project performance. More recent research studies have shown that the principles of EVM are positive predictors of project success. The populari ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Risk Management
Risk management is the identification, evaluation, and prioritization of risks, followed by the minimization, monitoring, and control of the impact or probability of those risks occurring. Risks can come from various sources (i.e, Threat (security), threats) including uncertainty in Market environment, international markets, political instability, dangers of project failures (at any phase in design, development, production, or sustaining of life-cycles), legal liabilities, credit risk, accidents, Natural disaster, natural causes and disasters, deliberate attack from an adversary, or events of uncertain or unpredictable root cause analysis, root-cause. Retail traders also apply risk management by using fixed percentage position sizing and risk-to-reward frameworks to avoid large drawdowns and support consistent decision-making under pressure. There are two types of events viz. Risks and Opportunities. Negative events can be classified as risks while positive events are classifi ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


IT Portfolio Management
IT portfolio management is the application of systematic management to the investments, projects and activities of enterprise Information Technology (IT) departments. Examples of IT portfolios would be planned initiatives, projects, and ongoing IT services (such as application support). The promise of IT portfolio management is the quantification of previously informal IT efforts, enabling measurement and objective evaluation of investment scenarios. Overview Debates exist on the best way to measure value of IT investment. As pointed out by Jeffery and Leliveld, companies have spent billions of dollars on IT investments and yet the headlines of mis-spent money are not uncommon. Nicholas Carr (2003) has caused significant controversy in IT industry and academia by positioning IT as an expense similar to utilities such as electricity. IT portfolio management started with a project-centric bias, but is evolving to include steady-state portfolio entries such as infrastructure and a ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


IT Governance
Information technology (IT) governance is a subset discipline of corporate governance, focused on information technology (IT) and its performance and risk management. The interest in IT governance is due to the ongoing need within organizations to focus value creation efforts on an organization's strategic objectives and to better manage the performance of those responsible for creating this value in the best interest of all stakeholders. It has evolved from The Principles of Scientific Management, Total Quality Management and ISO 9001 Quality Management System. Historically, board-level executives deferred key IT decisions to the company's IT management and business leaders. Short-term goals of those responsible for managing IT can conflict with the best interests of other stakeholders unless proper oversight is established. IT governance systematically involves everyone: board members, executive management, staff, customers, communities, investors and regulators. An IT Gover ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Business Value
In management, business value is an informal term that includes all forms of Value (economics), value that determine the health and well-being of the firm in the long run. Business value expands concept of value of the firm beyond economic value (also known as economic profit, economic value added, and shareholder value) to include other forms of value such as employee value, customer value, supplier value, channel partner value, alliance partner value, managerial value, and societal value. Many of these forms of value are not directly measured in monetary terms. According to the Project Management Institute, business value is the "net quantifiable benefit derived from a business endeavor that may be tangible, intangible, or both." Business value often embraces intangible assets not necessarily attributable to any Stakeholder (corporate), stakeholder group. Examples include intellectual capital and a firm's business model. The balanced scorecard methodology is one of the most popula ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Risk IT
IT risk management is the application of risk management methods to information technology in order to manage IT risk. Various methodologies exist to manage IT risks, each involving specific processes and steps. An IT risk management system (ITRMS) is a component of a broader enterprise risk management (ERM) system. ITRMS are also integrated into broader information security management systems (ISMS). The continuous update and maintenance of an ISMS is in turn part of an organisation's systematic approach for identifying, assessing, and managing information security risks. Definitions The Certified Information Systems Auditor Review Manual 2006 by ISACA provides this definition of risk management: "''Risk management is the process of identifying vulnerability (computing), vulnerabilities and threat (computer), threats to the information resources used by an organization in achieving business objectives, and deciding what countermeasure (computer), countermeasures, if any, t ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Information Systems Audit And Control Association
ISACA is an international professional association focused on IT (information technology) governance. On its IRS filings, it is known as the Information Systems Audit and Control Association, although ISACA now goes by its acronym only.
ISACA currently offers 8 certification programs, as well as other micro-certificates.


History

ISACA originated in United States in 1967, when a group of individuals working on auditing controls in computer systems started to become increasingly critical of the operations of their organizations. They identified a need for a centralized source of information and guidance in the field. In 1969, Stuart Tyrnauer, an employee of the (later)