This summary contains everything from the Business Architecture & Transformation (BM03BIM) course from the Master of Business Information Management. This summary has been developed by a group of 7 students, and with mutual efforts, we created this master summary. We combined all our notes from the...
Business Architecture & Transformation - Exam Notes
_____________________________________________________________________________________
Table of Contents
Overview 1
1. Week 1 - IT Strategy 2
1.1. Lecture & Video notes 2
1.1.1. Transformation & Architecture 2
1.1.2. What is business architecture? 3
1.1.3. What is business transformation? 4
1.1.4. Strategy and IT Strategy 4
What is Strategy? 5
What is IT strategy? 6
How to address an IT strategy? 7
Tools to help map IT Strategy 8
Strategy: Cost based or differentiation based? 9
1.1.5. Operating Models 10
2. Week 2 - IT Governance 12
2.1. Corporate Governance 12
2.1.1. Corporate and Key Asset Governance 12
2.1.2. IT Locations in Businesses Arch. 12
2.1.3. Centralization & Decentralization 17
2.2. IT Governance 17
2.2.1. Contingency Factors as a Design Framework 17
2.2.2. IT Governance Modes 19
2.2.3. IT Decisions Types 19
2.2.4. IT Governance Performance & Design (Video) 19
2.3. Control Framework for IT Governance (Video) 25
2.3.1. COBIT 25
2.3.2. ITIL 26
2.4. Sambamurthy, V., & Zmud, R. W. (1999) 28
2.5. Weill, P., & Ross, J. (2005). 32
2.6. Appendix 35
Cases for Digital Transformations (PhD Student’s Research Areas) 35
Dorus Summary 37
3. Week 3 - IT Dynamics 38
3.1. Lecture & Video notes 38
3.1.1. S-Curves (Two types) 38
Technology S-Curve 39
Market S-Curve 39
, Increasing technological pace 39
Jumping the S-Curve 39
Transitioning the S-Curve is difficult 40
3.1.2. Technology Cycle 41
1. Era of ferment (fermentation) 41
2. Dominant design (Selection) 41
3. Incremental change (Renovation) 41
4. Variation 41
3.1.3. Product and Process Technology Dynamics 41
3.1.4. IT Dynamics - Industry Evolution 42
Summary: When to transform? 42
3.2. Six rules of Uncertainty (Rules for Effective Forecasting) Saffo 43
1. Define a cone of uncertainty 43
2. Look for the S-Curve: it is usually a good model 44
3. Embrace things that don’t fit 45
4. Hold strong opinions weakly 45
5. Look back twice as far as you look forward 46
6. Know when not to make a prediction 46
4. Week 4 - IT Project Management 46
4.1. Lecture & Video notes 46
4.1.1. Categories IT Project Failure: People, Processes, Products & Technology 48
Ranking of Classic Mistakes 50
Best Practice Matrix 50
4.1.2. Platform with Network Externalities 50
SAP Example of network externalities 51
4.1.3. Critical Path Analysis 51
Why do Critical Path Analysis? Pros & Cons 58
4.2. Nelson (2007): IT project management: infamous failures, classic mistakes, and best
practices 59
4.2.1. 4 Categories of Classic Mistakes (Stefe McConnell, 1996) 59
4.2.2. Ranking of Classic Mistakes (ALL) 62
4.2.3. Best Practices Matrix 64
4.3. Napier (2009): IT project managers’ construction of successful project management
practice: a repertory grid investigation 65
4.4. Guest Lecture - Bastian Barthelmann (Accenture) 66
5. Week 5 - IT Process Management 71
5.1. Lecture notes 71
5.1.1. Revisiting Operating Models (Ross et al. 2006) 71
5.1.2. Business Process Management as an Alignment Mechanism 72
5.1.3. Business Process Management Lifecycle 72
5.1.4. Business Process Management Techniques 73
, Business Process Modeling Language 73
2 Examples of Process Flows & their Operating Model 73
Important BPM Concepts to Remember: 74
5.1.5. Business Process Mining Methodology (Aalst et al., 2007) 75
5.2. Operating Models (Ross, 2006) Video 76
1- Why do you need an operating model? 76
2 - What is an operating model? 78
3 - How can you determine your operating model? 79
5.3. Business Process Management Notation (BPMN) Video 82
5.4. Appendix 84
5.4.1. Guest Lecture Notes: Apolix 84
5.4.2. BPMN Elements: Gateway Explanations 87
5.4.3. Previous Summary: BPMN Basics 88
5.4.4. Celonis Guest Lecture (Sustainable Pizza Demo) 93
6. Week 6 - IT and Decision and Risk 93
6.1. IT Risk 93
6.1.1. IT Risk Types (non-exhaustive) 93
IT investment risk 93
Data security risk 94
IT quality risk 94
Legal risks 94
IT risk for other stakeholders 94
Information risk: Privacy vs Quality 94
6.1.2. Solutions for / Manage IT Risk 95
1st Phase of the management risk process 95
2nd Phase of the lifecycle of the IT/IS System 97
3rd Corporate maturity towards risk 97
Risk Management - Tools to use 98
6.2. IT Decisions 99
6.2.1. Six decisions IT executives shouldn’t make, but management should 99
1. How much should be spent on IT? 99
2. Which business process should receive the IT dollars? 100
3. Which IT capabilities should be company wide? 100
4. How good do the IT services really need to be? 101
5. What security and privacy risks will be accepted? 102
6. Who is to blame if an IT initiative fails? 102
7. Week 7 - IT Sourcing 103
7.1. Video: IT Sourcing 103
7.2. Lacity et al. (1995) - IT Outsourcing 103
1. Classify IT Units 103
2. Choose a supplier: 103
, 3. Maximizing Flexibility and control 104
7.3. Rottman and Lacity (2006) - Practices on IT Offshoring 104
7.4. Lacity et al. (2009) - IT Outsourcing aspects & questions 108
7.5. Guest Lecture: Edgar van Zoelen - Philips Transformation) 109
7.5.1. Key Takeaways 109
7.5.2. Analysis on Philips’ Transformation 111
7.5.3. Acceleration Program by Philips 111
7.5.4. Philips CBM Map (Scope Capabilities) 113
7.5.5. Building one IT Architecture 113
Overview
Lecture Title Literature
L1 IT Collis, Rukstad - 2008.pdf
Strategy Simon, Fischbach, Schoder - 2014.pdf
Venkatraman - 1994.pdf
Session 1 - Video - introduction
Session 1 - Video - IT strategy
L2 IT Sambamurthy, V., & Zmud, R. W. (1999). pdf
Governanc Weill, P., & Ross, J. (2005).
e Session 2 - Video - IT Governance Evaluation
Session 2 - Video - COBIT ITIL
L3 IT Saffo_2007
Dynamics Klepper 2002.pdf
The Pace of Technology Adoption is Speeding Up.pdf
Session 3 - Video - Saffo six rules of uncertainty
Session 3 - Video - S curves
L4 IT Project Napier, Keil, Tan - 2009.pdf
Managem Nelson - 2007.pdf
ent Simple Introduction to Critical Path Analysis (CPA)
Session 4 - Lecture & Videos Notes
L5 IT Process Text: BPMN Quick Guide
Managem Video: Operating Models
ent Video: BPMN Tutorial
Platform: BPMN.IO
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper willemjelle. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €14,08. Je zit daarna nergens aan vast.