Order Number |
6797898834522 |
Type of Project |
ESSAY |
Writer Level |
PHD VERIFIED |
Format |
APA |
Academic Sources |
10 |
Page Count |
3-12 PAGES |
There are two discussions here that need to be responded to thoroughly. Responses must be on APA format 150+words 1-2 legitimate verifiable sources per response.
CIS5599 discussion 1 post responses.
Respond to the colleagues’ posts regarding:
“ITPM Best Practices” Please respond to the following:
KJs post states the following:
Explain how ITPM best practices can facilitate process change within an organization. Determine if ITPM would be used differently depending upon the industry in which it was used. Explain your answer.
ITPM is increasingly recognized as a management discipline to improve returns on IT investments and overall align IT with the business. ITPM has become a critical component in the IT business lexicon (Lane). ITPM begins by identifying the business capabilities and/or business processes of the company and linking them to applications.
IT leaders can then clearly understand how each application supports business activities. The IT team can track costly redundant applications easily, when it is known that two or more applications support the same capability. ITPM can be used in all industries. It allows IT managers to rank each application and decide which application they want to invest in, eliminate or upgrade.
Lane, D. (2011). Chief Information Officers Body of Knowledge: People, Process, and Technol. John Wiley & Sons
Gomane, G. (2017, September 28). How ITPM and ITSM together create value for IT departments. Retrieved from https://community.mega.com/t5/Blog-EN-Business-IT/How-ITPM-and-ITSM-together-create-value-for-IT-departments/ba-p/14242
Evaluate the four risk-mitigation options and strategies. Give your opinion as to what circumstances would warrant each strategy.
The four stages of risk mitigation options and strategies are
Avoid the risk – In this step, action is taken to avoid any exposure to the risk. One way to avoid the risk will be the either cancel the project
CIS599 discussion 2 post responses.
Respond to the colleagues’ posts regarding:
“Project Costing and Business Continuity” Please respond to the following:
RD’s post states the following:
“Project Costing and Business Continuity” Please respond to the following:
Explain why any proposed process change requires cost estimating. In your opinion, determine whether or not cost estimating is a critical part of analyzing the feasibility of projects. Support your answer.
Cost estimation plays a huge role in determining whether a project is feasible. Going into a project, the PM may request a ROM to determine if the project is worth getting further information. This ROM should be provided with assumptions on how the cost was determined.
The project cost estimate is then conducted to determine the budget and feasibility of the project. Cost estimates can be parametric (CoCoMo), analogic (Delphi, or expert judgment), WBS, top-down, bottom-up, or a combination of different techniques.
Cost estimation is a critical component of the project. Accurate cost estimates can help choose the vendor and plan the budget. A bad cost estimate can result in over/under budgeting, which can result in having too many resources or not enough.
Assess business continuity planning (BCP) as a process that adds business value. Explain the correlation between business value and project cost estimation as they relate to BCP. List and support three business justifications for business value outweighing the possible cost estimation when considering BCP.
A CIO should play a major role in the Business continuity planning process as data is one of the most important aspects of an IT business. Data is equal to money. By conducting BCP, the organization can determine the value of the organization and put steps into place. “Measuring the business value of BCP is tricky.” (Lane, 2011)
Lane, D. (2011). Chief Information Officers Body of Knowledge: People, Process, and Technol. John Wiley & Sons.