: Theo Thiadens
: Manage IT! Organizing IT Demand and IT Supply
: Springer-Verlag
: 9781402037108
: 1
: CHF 90.20
:
: Datenkommunikation, Netzwerke
: English
: 618
: Wasserzeichen/DRM
: PC/MAC/eReader/Tablet
: PDF

The book consists of five parts. In the first part, IT management tasks and the objects involved are discussed. The execution of these tasks has to meet functional and performance demands which are more easily met when an organization has a transparent IT architecture. The second part outlines traditional IT management. 

The starting point is a process-oriented functioning of the IT organization. This goes for both the IT demand organization as well as the IT supply organization. In this part, methods like BISML, ASL, ITIL, MOF, MSF, TMN and eTOM are discussed. The third part deals with controlling IT. Control is different when striving for efficiency and complying with accountants' requirements, compared to control when IT is a means to comply with customers' and/or chain partners’ wishes. In the latter case, innovation of IT processes is an issue. Part four tackles, amongst other things, financial, personnel, purchasing, legal and security

Contents5
Preface10
Introduction12
The field12
Importance of the field12
Limits of the field13
Characteristics of the tasks13
Purpose of the book13
IT management: the basis13
IT management: processes14
Organizing processes15
Control of IT processes15
Aspects16
The future16
Manage IT! Organizing IT Supply and IT Demand17
Part 1 IT management: The basis19
Chapter 1 The basis of the field20
IT management21
Content of this chapter21
WHAT IS IT MANAGEMENT ALL ABOUT?22
Tasks and objects22
Definition of the domain24
Starting points25
THE IMPORTANCE OF IT MANAGEMENT25
VIEWS ON IT MANAGEMENT AND THE EXTERNAL INFLUENCES INVOLVED30
DEFINITION OF THE BASIC CONCEPTS AS USED IN THIS BOOK37
QUESTIONS38
Chapter 2 Supplying IT products and services within an architecture40
Contents of this chapter41
WHAT REQUIREMENTS DO IT–SERVICES AND PRODUCTS HAVE TO MEET?42
WHY OPERATE UNDER AN ARCHITECTURE?47
WHAT IS AN ARCHITECTURE FOR IT FACILITIES?48
QUESTIONS56
Part 2 Traditional IT management: organizing demand and supply57
Chapter 3 Task focussed and simultaneous process-focussed supply of facilities58
ORGANIZING WORK59
HOW TO INTRODUCE PROCESS-FOCUSSED OPERATING?62
CONTROLLING PROCESSES67
QUESTIONS70
Chapter 4 The demand-side: functional management (using the method BiSL)72
Contents of this chapter73
THE DEMAND FOR IT FACILITIES74
LOOKING AT THE DEMAND-SIDE SYSTEMATICALLY: BiSL77
THE PROCESSES AT THE DEMAND-SIDE IN MORE DETAIL: VARIOUS BISL-TASKS81
QUESTIONS89
Chapter 5 The supply-side: application management (using the method ASL)91
THE SUPPLY-SIDE: APPLICATION MANAGEMENT AND EXPLOITATION OF IT FACILITIES92
METHOD FOR APPLICATION MANAGEMENT: ASL94
THE ASL PROCESSES LOOKED AT98
QUESTIONS107
Chapter 6 The supply-side: exploitation (using methods like ITIL, MOF-MSF/eTOM)108
Contents of this chapter109
THE PLACE OF EXPLOITATION109
COMPUTER CENTRES AND CONTROL OF COMPUTER CENTRES110
THE IT INFRASTRUCTURE LIBRARY (ITIL): A METHOD OUTLINING THE PROCESSES IN IT EXPLOITATION ITIL115
ADVANTAGES AND DISADVANTAGES OF INTRODUCING ITIL120
A FEW ITIL PROCESSES IN MORE DETAIL122
OTHER METHODS THAT INDICATE THE PROCESSES AT IT EXPLOITATION127
MOF and MSF128
MSF129
TMN model130
QUESTIONS133
Chapter 7 Organizing IT Tasks and Processes134
Contents of this chapter135
TRENDS IN ORGANIZATION THEORY135
POINTS OF INTEREST IN SETTING UP ORGANIZATIONS139
THE THEORY, THE IT ORGANIZATION AND THE ITIL, ASL AND BiSL PROCESSES146
WHO PERFORMS THE PROCESSES: INSOURCING AND OUTSOURCING149
QUESTIONS155
Part 3 Controlling IT facilities157
Chapter 8 Controlling IT facilities (IT governance)158
Contents of this chapter159
WHO CONTROLS AND HOW DOES HE/SHE DO IT?160
WHAT ARE THE CONTROL POSSIBILITIES FOR THOSE THAT DEMAND IT FACILITIES?161
CONTROL USING INFORMATION180
PLANNING IT FACILITIES185
QUESTIONS189
Chapter 9 House in order: evaluating and improving190
EVALUATION AND IMPROVEMENT192
THE PROCESSES: PERSPECTIVE ON PROCESS IMPROVEMENT194
EFQM Model198
THE PROCESSES, RISK PERSPECTIVE202
THE PROCESSES: AUDIT PERSPECTIVE206
PERFORMANCE REQUIREMENTS REGARDING PRODUCTS207
QUESTIONS210
Chapter 10 Innovation from the customer and the chain perspective212
Contents of this chapter213
TRENDS IN THE SERVICE INDUSTRY, INCLUDING THE IT SERVICE INDUSTRY214
POINTS OF DEPARTURE IN DEVELOPING IT PRODUCTS AND SERVICES215
DISCOVERING, DEVELOPING AND IMPLEMENTING A NEW PRODUCT OR A NEW SERVICE221
THE IMPACT ON THE ORGANIZATION OF WORKING WITHIN CHAINS226
QUESTIONS228
Part 4 Aspects of IT management229
Chapter 11 The financial aspects230
Contents of the chapter231
THE FINANCIAL PERSPECTIVE AND IT PRODUCTS AND SERVICES231
KNOWING COST PRICES DEMANDS237
WHAT DO WE USE OUR KNOWLEDGE ABOUT THE COSTS OF PRODUCTS AND SERVICES FOR?239
AND WITH REGARD TO THE FACTS THERE ARE......245
QUESTIONS246
Chapter 12 The personnel aspects248
Contents of this chapter249
STAFFING THE IT ORGANIZATION250
A BOTTOM-UP APPROACH FOR ARRIVING AT FUNCTION DESCRIPTIONS253
APPLICATIONS OF ROLES, CONTEXT, TASK CLUSTERS AND COMPETENCIES262
QUESTIONS264
Chapter 13 Procurement of IT products and services (using the method ISPL)266
Contents of this chapter267
DEFINITIONS OF THE CONCEPT OF PURCHASE AND MODEL OF THE PURCHASE OF GOODS AND SERVICES268
REASONS FOR CONSIDERING AN ORGANIZATION SPECIFICALLY FOR IT PROCUREMENT270
DIFFERENCES AT PROCUREMENT OF IT PRODUCTS AND SERVICES272
THE IMPACT OF INTERNET ON IT PROCUREMENT275
CONSIDERING PROCUREMENT METHODICALLY277
THE ISPL METHOD279
QUESTIONS287
Chapter 14 Controlling contracts using service level agreements289
Contents of this chapter290
SERVICE LEVEL AGREEMENTS: OFTEN THE ELABORATION OF A CONTRACT291
WORKING WITH SERVICE AGREEMENTS298
SPECIFYING AND CONTROLLING SERVICE AGREEMENTS303
CONTENTS OF SERVICE LEVEL AGREEMENTS309
QUESTIONS311
Chapter 15 Securing IT facilities (according to amongst others ISO 17799)312
Contents of this chapter313
SECURITY, REQUESTS OF THE DEMAND ORGANIZATION AND POSSIBLE ANSWERS FROM THE SUPPLY ORGANIZATION314
WORKING SYSTEMATICALLY AT SECURING OF IT FACILITIES317
APPROACHES OF CONTINUITY IN IT FACILITIES324
DEALING WITH CONFIDENTIALIT OF DATA WHEN USING IT FACILITIES327
IN CASE ONE WANTS GUARANTEES OR WANTS TO TRA