BCO 6653 - Value and Risk Analysis in IT: Strategic Approaches

Verified

Added on  2023/04/21

|11
|920
|397
Report
AI Summary
This report explores the necessity of value and risk analysis in information technology. It highlights strategic alignment, structured portfolio management, IT and business architecture alignment, and effective IT project management as key components of value analysis. The report identifies technical, structural, financial, human, and natural threats affecting IT infrastructure and discusses protective, mitigation, recovery measures, and contingency planning as benefits of risk analysis. The conclusion emphasizes that IT value analysis is a compelling starting point for determining significant issues and that risk analysis can address risks related to specific actions or events. Desklib provides access to this and other solved assignments to support student learning.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
The need for
value and risk
analysis in
information
technology
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Introduction:
IT risk analysis is an important part to determine
and control practical problems affecting the IT
infrastructure. Besides, a successful value analysis
provides the IT department with proper information to
fetch things undoubtedly and to respond to the
strategic needs and the company’s preferences. In
this presentation, the necessity for risk and value
analysis is done in the sector of information
technology.
Document Page
Value analysis:
This involves the following:
Strategic alignment:
The strategic alliance of Business Strategy and IT is assured as:
The IT strategy is derived from business strategy, reflecting on the strategic direction of the company.
The strategic planning groups involve representatives from IT function, user management and senior business management.
IT priorities and goals are directly derived from immediate strategic business goals (Lohrke, Frownfelter-Lohrke and Ketchen
Jr 2016).
Document Page
Structured portfolio management:
Systematic approaches are constantly classifying, evaluating and prioritizing projects.
Demand assessment and environmental assessment must be done that is consistent
with the strategic objectives of a business.
Project portfolio is updated regularly every year.
There are defined processes for evaluation and ongoing monitoring if investments in a
portfolio. This is to find out whether the intended results are realized or any change to
investments in the basis of the analysis has been occurring.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
IT and Business Architecture alignment:
Value analysis is helpful to fix what has been broken about IT through overcoming the
lack of standardization and integration.
Creating a digitized platform which is started to determine what is consistent and
focusing on information required for customer necessities and strategic goals.
Supporting business strategy that consists of high harmonization as per IT infrastructure
and deploying landscape through standard software (Fleisher and Bensoussan, 2015).
Document Page
Effective IT project management:
Formal measurement tool tracking
metrics. This indicates the cost of
projects as the percentage of savings of
realization and expenses that are
attributed for cancelled and delayed
projects.
Process was existing to manage and
supervise changes as per the effect and
categories.
Comparing the best methods and
practices that are adopted by leading
organizations used to develop initiatives
under project management.
Efficient execution of risk management,
done by various internal and external
parties (Dwivedi et al. 2015).
Document Page
Necessities of IT risk analysis:
IT risks are performed typically as
an element of IT risk analysis. This
includes determining of threats,
risks and ways to manage them.
Various threats are affecting IT
infrastructure. These are
demonstrated hereafter.
Technical threats: Here,
disruption is caused due to
technological failures and
advances.
Structural threats: This is
related to the creation of
elements that can be harmed
by IT infrastructure.
Financial threats: As the IT
Company loses funding or
different experiences,
economic change can occur.
Human threats: This includes
human error and loss of a vital
individual.
Natural threats: This includes
physical and weather disasters
like floods, tornadoes and
earthquakes (Kendrick 2015).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Benefits of risk analysis:
As the IT Company has listed the above risks,
they must consider the following measures of risk
analysis.
Protective measures: This decreases the scopes
as the listed risks take place.
Mitigation measures: This declines the severity of
disaster as it takes place.
Activities of recovery: This restores the
infrastructure of systems affecting the company
for common business operations.
Contingency planning: This reveals what to be
done as a disruptive event or any dangerous
event take place (Slovic 2016).
Document Page
Conclusion:
The IT value analysis is a compelling beginning point for determining
the most significant issues. Here, the key is to define the scopes were
having the most significant effect and earlier success such as the
establishment of continuous and formalized business-relationship
management. Besides, the presentation highlights how risk analysis
can also be referred to risks related to specific action or event. This
applies to projects, security problems, information technology and
effects where the risks are examined on a qualitative and quantitative
basis.
Document Page
References:
Dwivedi, Y.K., Wastell, D., Laumer, S., Henriksen, H.Z., Myers,
M.D., Bunker, D., Elbanna, A., Ravishankar, M.N. and Srivastava,
S.C., 2015. Research on information systems failures and
successes: Status update and future directions. Information
Systems Frontiers, 17(1), pp.143-157.
Fleisher, C.S. and Bensoussan, B.E., 2015. Business and
competitive analysis: effective application of new and classic
methods. FT Press.
Kendrick, T., 2015. Identifying and managing project risk:
essential tools for failure-proofing your project. Amacom.
Lohrke, F.T., Frownfelter-Lohrke, C. and Ketchen Jr, D.J., 2016.
The role of information technology systems in the performance
of mergers and acquisitions. Business Horizons, 59(1), pp.7-12.
Slovic, P., 2016. The perception of risk. Routledge.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]