Test 2 Study Guide Flashcards
(80 cards)
What are the five factors that play into maturity for an IT Function?
The five main factors that contribute to the maturity of an IT function are:
- Uniqueness
- Commonality
- Standardization
- Commoditization
- Like a Utility
What does it mean for an IT function to be unique?
A unique IT function is one that provides strategic advantages and benefits, and might even be proprietary.
What does it mean for an IT function to be common?
A common IT function plays to common organizational needs. It doesn’t do much to help the business stand apart from competition, but it’s necessary.
What does it mean for an IT function to be standardized?
A standardize IT function is one that not only provides common tasks and activities, but also sticks to an external standard.
What does it mean for an IT function to be commoditized?
A commoditized IT function is one that is considered in the same light as regular commodities are, such as network services, backup services, storage capacity, etc.
What does it mean for an IT function to be like a utility?
An IT function that is treated like a commodity, but is delivered by a centralized and consolidated source.
What are the four key IT sourcing options?
The four key IT sourcing options are:
- In-House
- Insource
- Outsource
- Partnership
Define Insourcing
Insourcing is the opposite of outsourcing. It’s when a company announces that it’s done with contracting out a business function and is going to do it internally.
It can also be defined as bringing a third-party employee to work inside a company’s facility.
What is the difference between outsourcing and offshoring?
Outsourcing is moving a business function to a contract agency. Offshoring is moving it abroad.
What does in-house sourcing entail?
In-house sourcing is when a company performs an activity or operation within itself, instead of outsourcing.
What are the four criteria to take into account when deciding what sourcing method to take?
The four criteria for selecting sourcing are:
- Flexibility
- Control
- Knowledge Enhancement
- Business Exigency
What does flexibility mean in terms of sourcing?
Flexibility in sourcing refers to the speed at which a function can be delivered, and the range of what can be delivered.
What does control mean in terms of sourcing?
Control, in terms of sourcing, refers to how well delivered results meet requirements, and how secure intellectual assets are.
What does knowledge enhancement mean in terms of sourcing?
In sourcing, knowledge enhancement refers to the amount of work it will take to capture and train the necessary knowledge to perform the function.
What does business exigency mean in terms of sourcing?
In sourcing, business exigency refers to the ability to respond to unforeseen crises or opportunities.
What are the five components of a properly thought-out sourcing strategy?
The five components of a well-thought-out sourcing strategy are:
- Identify your core IT functions
- Create a function sourcing profile
- Evolve full-time IT personnel
- Encourage exploration of all sourcing options
- Combine sourcing options if beneficial
What is a sourcing strategy?
A sourcing strategy is basically a way to determine what IT functions are core to the business and shouldn’t be trusted to be outsourced.
What is a risk mitigation strategy in regards to sourcing?
A risk mitigation strategy is a way that, when considering sourcing, you find a way to share the risk between both yourself and your vendor, so both parties have incentive to perform.
Why is it important to understand cost structures?
It is important to understand cost structures when making sourcing decisions so that you can make ongoing cost comparisons, which is a motivator.
What is the historical view of IT-based risk? How has it changed?
The historical view of IT-based risk is one of a low-risk field, focused on delivering projects and keeping apps running. Today, IT-based risk is complex and broad, and is a central part of any tech-based work.
What are the three main effects of IT risk incidents ?
The three main effects of IT risk incidents are:
- Harm to constituencies both inside and outside of companies.
- Damage to corporate reputations
- Dampening of an organization’s competitive ability.
Where do external IT risks primarily come from?
External IT risks primarily come from three areas:
- Third parties, such as partners, vendors, etc
- Hazards, like disasters or political upheaval
- Legal or regulatory issues, and failure to comply with law
Where do internal IT risks primarily come from?
Internal IT risks primarily come from five areas:
- Information - Privacy, quality, etc.
- People
- Cultural - Risk aversion vs. Risk Awareness
- Control
- Governance
Where do criminal IT risks primarily come from?
IT criminal risks primarily come from:
- Viruses
- Hackers
- Organized Crime
- International Spies
- Terrorists