CIO - Conventional wisdom and decades' worth of IT project failures and less-than-desirable outcomes tell us that every tech-related investment-from a massive SAP ERP rollout to a small Salesforce.com SaaS CRM deployment-comes with some amount of risk.
In fact, according to Forrester Research VP and principal analyst Chip Gliedman, "of all investments within an organization, investment in IT is generally assumed to have the most risk associated with it. Yet, it is surprising that IT investment has traditionally received the least amount of attention when it comes to risk management," Gliedman writes in a new report "Quantifying Technology Investment Risk."
The process of risk measurement has been "confounding decision-makers within IT for some time," Gliedman asserts. As a result, companies rely on weak qualitative analysis that only loosely ties to enterprise-application project outcomes, he says.
Gliedman breaks down IT risk factors into two categories: implementation and impact risks. Implementation-based risks relate to areas such as project size ("the larger the project, the higher the level of uncertainty about the outcome") and the technology and vendor (will they both deliver on the intended benefits?). Impact-based risks include cultural, training and managerial factors that all can significantly affect any project's outcome and benefits.
Most IT departments today could use help in the ongoing struggle to align IT with the business and vice versa: business execs are frustrated by application uptime challenges and their significant costs to the company's bottom line, though IT isn't fully aware of that; the business side is also not at all excited about long-term enterprise projects; and as a consequence of both, they're feeling animosity toward IT.
Providing more risk transparency to the Mahogany Row on all IT projects could be a huge win for IT departments right now.
Gliedman offers what he terms a "simple but powerful" method to determine the value of any IT investment's costs and benefits. It's called "triangular distribution," and he does a good job explaining how to do it (subscription required).
Gliedman provides an interesting example, using a classic buy-versus-build scenario on an enterprise application that all IT departments face today. Using the triangular distribution methodology, Gliedman shows that adjusting for risk on the buy-versus-build example (whether its for ERP, CRM, supply chain or BI application) reveals that initial ROI estimates were too high, and the "more expensive" alternative may actually not be more expensive in the long run.
"While the risk analysis cannot on its own point to the best course of action, it can provide the additional shading to management so that the eventual decision is an informed one," Gliedman concludes. "Likewise, expectations can be set properly, avoiding overly rosy ROI projections that will lead to inevitable disappointment."
Do you Tweet? Follow me on Twitter @twailgum. Follow everything from CIO.com on Twitter @CIOonline.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Live Webcast Unmasking the Differences between Consumer and Enterprise File Sync & Share The consumerization of IT combined with the rapid pace of the modern mobile workplace is forcing enterprise IT teams to evaluate file sync...
- Live Webcast Government Agency Webifies Outdated COBOL Applications Let this CTO tell you how his agency converted 1980s-era green screens into an e-filing portal for the 100,000 cases handled each year...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the... All Applications White Papers | Webcasts