|
|
Serbian
Journal of Management
2017,
vol. 12, iss. 1, pp. 143-155
|
|
Reducing
IT costs and ensuring safe operation with application of the portfolio
management
Livia
Alice Mozsar Kovacsne
Abstract
Large
companies need to give focus on their cost components related to their
information technology. Business growths is supported by their IT and
hundreds or thousands of applications worldwide. Top level management
needs to focus more on their information strategy and the applications
they need to manage. A structured and transparent application landscape
supports not only the current business but it also enables faster
business growth for the future as well. Structuring and organizing the
applications related to the various risks supports secure business and
information operations within a company. Capturing the applications
gives the companies an overview of their information costs and provides
the possibility of measurement and control of their IT costs elements.
Application portfolio management and information security management
are important elements of the corporate strategies.
This Work is licensed under a Creative Commons Attribution 4.0 License.
Keywords
application
portfolio management (APM), application portfolio risk, risk,
information management, information security management, Information
Technology Infrastructure Library (ITIL v3)
|
|
References
|
Newly
uploaded article: references checking, normalizing and linking in
progress. |
Barki,
H., Rivard, S., and Talbot, J., (1993). Toward an assessment of
software development risk. Journal of Management Information Systems,10
(2), 203-223.
Capgemini (2011). HP Application Landscape Report, 5-6.
https://www.capgemini.com/resource-file-access/resource/pdf/Application_Landscape_Report_2011_Edition.pdf,
(27.04.2016)
Capgemini (2014). Application Landscape Report, 23-24.
https://www.at.capgemini.com/resource-file-access/resource/pdf/2014-03-04_alr_v8_web_0.pdf,
(28.04.2016)
CIO (2016)
http://www.cio.com/article/2380234/cio-role/state-of-the-cio-2014-the-great-schism.html
(21.04.2016)
Erik Van Ramshorst (2013). Application portfolio management form an
enterprise architecture perspective, Master’s Thesis, Utrecht
University, Faculty of information and Computing Sciences, 50-53.
Gartner (2014). Gartner Application, Architecture, Development
& Integration Summit, May 19-20 in London, U.K. and July 21-22
in Sydney, Australia
http://www.gartner.com/newsroom/id/2711017 (16.04.2016)
Gartner (2016)
http://www.gartner.com/it-glossary/legacy-application-or-system/
(17.04.2016)
Gartner (2016a). IT Glossary, Total Cost of Ownership
http://www.gartner.com/it-glossary/total-cost-of-ownership-tco/
(16.03.2016)
Hatstand (2015). Capital Market Specialists,
http://www.hatstand.com/news/risk-compliance-regulation/legacy-system-disasters,
(11.03.2016)
Informatika Corporation (2013). A practical guide to legacy application
retirement, White Paper, 3.
https://www.informatica.com/content/dam/informatica-com/global/amer/us/collateral/white-paper/practical-guide-legacy-application-retirement_white-paper_6957.pdf
(15.02.2016)
Infosys (2016). Case Studies, Application portfolio rationalization for
a financial services provider
https://www.infosys.com/industries/financial-services/case-studies/Pages/application-portfolio-rationalization.aspx
(12.03.2016)
ITIL (2011) Glossary and abbreviations, 4.
https://www.axelos.com/Corporate/media/Files/Glossaries/ITIL_2011_Glossary_GB-v1-0.pdf
(22.02.2016)
ITIL (2009) v3 Foundation Study Guide, Release Version 4.2.2.5
http://www.inf.unideb.hu/~fazekasg/oktatas/ITIL_V3_Study_Guide.pdf
(08.04.2016)
ITIL (2016) Information Technology Infrastructure Library Guide
http://www.itinfo.am/eng/information-technology-infrastructure-library-guide/
(22.02.2016)
Lazányi, K (2015a)., Organisational Safety in Health-Care Setting –
Literature Review In: Michelberger Pál (Ed.) Management, Enterprise and
Benchmarking in the 21st Century Budapest: Óbuda University, 111-122.
McFarlan, F.W. (1981). Portfolio Approach to Information Systems,
Harvard Business Review, 142-150.
P.Michelberger, S. Dombora: Ekonomika (2016), A possible tool for
development of information security-SIEM system, Vol. 62, (1), 125-140.
Sarah V. (2012). Risk Management Model in ITIL
https://fenix.tecnico.ulisboa.pt/downloadFile/395144242575/Disserta%C3%A7%C3%A3o.pdf
(03.03.2016)
Schmidt, R., Lyytinen, K., Keil, M., & P. Cule. (2001).
Identifying Software Project Risks: An International Delphi Study.
Journal of Management Information Systems, 17 (4), 5-36.
Tata Consulting Services (2013). TCS successfully optimizes the
application portfolio of a leading telecom company
http://www.tcs.com/SiteCollectionDocuments/Case%20Studies/Consulting-Casestudy-application-portfolio-telecom-0513-1.pdf
(05.02.2016)
Tata Consulting Services (2013a). Application portfolio
rationalization, How IT simplification and standardization ensure
business growth, White Paper, 10-13.
http://www.tcs.com/SiteCollectionDocuments/White%20Papers/Application-Portfolio-Rationalization-IT-Simplification-Standardization-10-13-1.pdf
(04.04.2016)
Tata Consulting Services (2011). Next generation application portfolio
rationalization, How IT simplification and standardization ensure
business growth, White Paper, 18.
http://tcs.com/SiteCollectionDocuments/White%20Papers/Consulting_Whitepaper_Next-Generation-Application-Portfolio-Rationalization_09_2011.pdf
(06.04.2016)
Tata Consulting Services (2012). TCS Standardizes application and
process management to deliver operational leadership for a global
consumer products group
http://www.tcs.com/SiteCollectionDocuments/Case%20Studies/Consulting_Casestudy_TCS-Operational-Leadership-Global-Consumer-Products-Group_0312-1.pdf
Troux (2011). Application portfolio management ranks top in new EA
survey
http://www.troux.com/enterprise-architecture-blogs/application-portfolio-management-ranks-top-new-ea-survey
(02.02.2016)
Ward, J., & Peppard, J., (2002). Strategic Planning for
Information systems, John Willey & Sons Ltd., 13-14.
|
|
|
|
|