Оглавление
Computer Weekly Professional Series ixPreface xi
1 IT acquisition policy 1
1.1 Introduction 1
1.2 The objectives of purchasing 2
1.3 What makes IT purchasing different? 5
1.4 IT strategy and purchasing 7
1.5 IT value 10
1.6 Foundations of IT purchasing policy 13
1.7 Purchasing procedures 19
2 Dealing with suppliers 27
2.1 Introduction 27
2.2 Good supplier relationships 27
2.3 Poor supplier relationships 29
2.4 Joint development 33
2.5 Good suppliers 34
2.6 Supplier management strategies 36
2.7 Handling salesmen 44
2.8 Negotiating 47
2.9 Using formal tenders 50
2.10 Total outsourcing 54
2.11 Sources of supplier information 58
3 IT costs and cost management 59
3.1 Are we getting value from IT? 59
3.2 The dynamics of IT cost growth 61
3.3 Identifying IT costs 68
3.4 Managing hidden costs 69
3.5 Training costs 69
3.6 Managing maintenance and support costs 74
3.7 Testing, installation and implementation 79
3.8 Invisible costs 81
3.9 Charge-back 85
3.10 Outsourcing 93
3.11 IT asset statements 95
4 Evaluating and reviewing IT investments 101
4.1 Principles of IT evaluation 101
4.2 IT benefits 101
4.3 Why IT expenditure is difficult to evaluate 103
4.4 Methods of evaluating IT expenditure 105
4.5 IT expenditure benchmarking 128
4.6 Reviewing and auditing IT systems 129
5 IT budgeting, accounting and cost control 133
5.1 Introduction 133
5.2 Prerequisites for good IT budgeting 136
5.3 Why good budgeting is important 137
5.4 Four basic approaches to budgeting 138
5.5 Ownership 143
5.6 Practical rules for budget ownership 144
5.7 The scope of IT budgeting 145
5.8 Roles in the IT budgeting process 147
5.9 Building a budget 148
5.10 Project and expenditure justification 155
5.11 Charge-back budgeting 156
5.12 Phasing a budget 158
5.13 Reporting against budget 159
5.14 Forecasting 162
5.15 Good monitoring and reporting practices 164
5.16 Tracking hardware and software 165
5.17 Accounting for IT 167
5.18 A final checklist 175
6 Specifying hardware and systems software 177
6.1 Introduction 177
6.2 Two approaches to specification 178
6.3 Important definitions 179
6.4 Specifying processors 181
6.5 Specifying desktop machines 195
6.6 Specifying portable PCs 197
6.7 Specifying on-line storage 198
6.8 Specifying printers 201
6.9 Specifying communications requirements 204
6.10 System software 206
6.11 Specifying ergonomics 208
7 Specification of application software 209
7.1 Introduction 209
7.2 The importance of good software specification 210
7.3 Specifying requirements for packaged software 215
7.4 Functional requirements 217
7.5 Specifying custom software requirements 228
7.6 Conclusion 241
8 Purchasing other IT products and services 242
8.1 Introduction 242
8.2 Purchasing hardware maintenance 243
8.3 Purchasing consultancy services 248
8.4 Purchasing systems integration services 252
8.5 Purchasing contract staff 253
8.6 Purchasing resilience and disaster
recovery capability 255
8.7 Purchasing security 265
8.8 Conclusion 272
9 Evaluation and selection of IT 273
9.1 Introduction 273
9.2 Overview of evaluation steps 277
9.3 Supplier presentations 285
9.4 Demonstrations 288
9.5 Benchmarking 291
9.6 Weighted ranking methods 292
9.7 Reference sites and site visits 298
9.8 Summary 301
10 Risk and risk management 302
10.1 Introduction 302
10.2 Supplier risks 303
10.3 Hardware purchasing risks 308
10.4 System software risks 312
10.5 Packaged software risks 314
10.6 Custom software risks 320
10.7 Consortium risks 326
10.8 People risks 330
10.9 Major project risks 332
10.10 Quantifying risk 334
10.11 Conclusion: risk and rationality 342
11 Legal aspects of purchasing 344
11.1 Introduction 344
11.2 Contracts: basic principles 344
11.3 Standard contracts 345
11.4 Negotiated contracts 346
11.5 Escrow and related matters 353
11.6 Licences 356
11.7 Other contract issues 357
11.8 Conclusion 361
Index 363