Cimiso Linda

Embed Size (px)

Citation preview

  • 8/7/2019 Cimiso Linda

    1/53

    Critical Issues in Managing IT in Organizations 1

    1.0 Information Technology in McDonalds

    1.1 Industry Overview

    The food service industry has gone through some kind of evolution. In the United States,

    it started with public houses in 17 th century that most of the time served beers and other

    limited choices of food, and has evolved to the range as we can see nowadays, such as;

    fine dining restaurant, cafeterias, and fast food restaurants. This evolution, more or less,

    is the same in all over the world.

    The fast food industry in United States, in the 1999, shown the highest sales compare to

    the other types of food service based company, such as; restaurant, cafeterias and other

    drinking places. It can be seen from the rapid growing of the fast food industry. InMalaysia, The fast food market are highly competitive as the total market was rather

    equally occupied by several major players, such as; McDonalds, KFC, Pizza Hut, and

    Burger King, and new competitors, such as; Chicken Rice Shop and Carls Jr. Burger are

    coming in every once in a while.

    In order to keep the organization survives; the role of information technology cannot be

    missed out. In one of the book written by Wick, R. R. (2006), it stated that the fast foodindustry uses sophisticated IT to track and manipulate the market. Furthermore, IT has

    helped the organization in creating competitive advantage over their competitors. It

    ranges from the use of IT for online ordering until the artificial intelligent system for

    prediction of customer order flow build by HyperActive Technologies.

    1.2 Company Overview

    In fast food, industry, we can see some big companies that have lead the overall growth

    of the industry. One of them is million dollars franchise brand, McDonalds. It is a

    company that imposes on offering products range from fried-chicken, hamburgers,

    french-fries, as well as shakes. The idea of the business is offering the same quality of

    products and services in all over the world.

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    2/53

    Critical Issues in Managing IT in Organizations 2

    McDonalds Company Background

    In Malaysia, McDonalds has been operates for twenty six years, and now it becomes a

    huge and well organize fast food restaurant. McDonalds is hiring more than 7000

    employees, 120 support staffs and also keeps expanding with 15 until 20 new restaurants

    opening annually.

    In keeping the business run well, McDonalds organize its people by putting them in the

    level, where each of them is given some responsibilities to handle. Some of the important

    posts that keep the daily activities and the operation of the overall business in

    McDonalds Malaysia run smoothly are;

    Managing director : The one who decides and makes the final decision which brings profits to the company.

    General Manager : The one who is in charge in planning the strategic plan in the

    company and managing the cost related element of the company.

    Senior Vice President : The person who helps, supports, and collects any issues and tries

    to solve them, before bringing it up to the upper level.

    Deputy General Manager : The person who assists the general manager, as well as

    ensuring the standard within the crew.

    Apart from these main posts, there are others employees, both full-time and part-time

    employees, who assist in running the day to day operation in the stores. As a service

    based organization, employees who interact with the customers have a very important

    role. Therefore, there is training given to all the employees of McDonalds to ensure the

    services standard given to the customers.

    McDonalds Current Situation

    As mentioned above, fast food industry is one of the industries that cannot miss out the

    effects of the technology in order to grow. The same situation applies in McDonalds in

    Malaysia.

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    3/53

    Critical Issues in Managing IT in Organizations 3

    McDonalds Malaysia has constantly evolved and changed its strategy to win over the

    competitors, by recognizing Malaysian youths sociological habit of having supper and

    hang out until late night, McDonalds started 24 hours operation in the mid 2007 and

    round the clock delivery service now. Before that, McDelivery has enjoyed exceptionally

    success in Malaysia than anywhere outside Asia.

    However, McDonalds is still taking order by phone instead of receiving order online like

    what Pizza Hut is doing. The major drawback of phone ordering is it is less cost effective.

    McDonalds is spending hundred over thousands monthly for its call centre that is

    outsourced to Telebiz Sdn. Bhd., by going online, it could cut the cost at least to half. In

    addition, the online ordering system is hoped can reduce the load in this call centre,

    afterward.

    In addition, phone ordering is not efficient enough as there are complaints about

    mismatch of order that happens quite often and the delivery crew is often wasting much

    time to search for customer location and figuring out the best route. These problems can

    actually be easily solved by implementing an online ordering system that with a

    comprehensive customers database that could capture and show each distinct account

    owners location upon purchase.

    Surely, similar to any other implementation of new system, there will be a question on

    the feasibility. Here, the problems will be on society acceptance, problem of computer

    literacy in certain places, and many more. In short, can it be accepted? To answer it, take

    McDelivery as an example, derived from MSNBC News (2007) this service is not even

    available at McDonalds origin, however it was so successful in Egypt that delivery

    accounted for 27% of its total revenue.

    According to Dr Fadhullah Suhaimi Abdul Malek, General Manager of Telekom

    Malaysia, a very encouraging increase in internet subscribers had been recorded in the

    past few years, and it is very likely that the figure could reach a benchmark of 10 millions

    in the next five years. (Malaysia internet subscribers to double by 2012, 2007) In

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    4/53

    Critical Issues in Managing IT in Organizations 4

    addition, another statistic from MCMC (Malaysia communications and multimedia

    commission) (2007) shown that internet penetration had mark 47.8% by 2007, it means

    that almost half of the population is using internet regularly and the figure is rising

    tremendously.

    Therefore, by referring to the analysis of the environment that supports the

    implementation of the new system, and considering the advantages of the system, it will

    be an advantage for McDonalds to try out the online ordering service in adding value to

    the business. And at the same time, it is proposed with the intention to further reduce the

    cost that incurred from recent less effective operational flow and enjoy higher efficiency

    at the same time.

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    5/53

    Critical Issues in Managing IT in Organizations 5

    2.0 New Roles of IT Management Ter Pek Yew (TP013172)

    2.1 The Emerge of IT Management and its evolving roles

    Since the adoption of IT at some 50 years ago, the management of IT in organization had

    changed drastically, initially it was only used to process vast data, therefore managing IT

    is simple, just make sure machine is working all the time and reduce cost of running

    business. As technology has developed so rapidly since then, IT was further exploited to

    improve products and services, support decision making, or even reaching consumer, the

    trend had suggested that the aims of IT in an organization was shifting from efficiency to

    value added and from technical to business expertise.

    Initially, IT was used mainly to reduce operational cost by automating businessoperational process. Simplified foods preparation process had helped McDonald to save

    whole chunk of money as employee efficiency had greatly increased, thus labor cost is

    lower and cost to conduct employee training is relatively low as well. After that,

    McDonald had further utilized IT by launching Drive-Thru services, an ordering device

    with microphone embedded inside was deployed at the entrance of Drive-Thru lane and

    consumer can collect its food and make payment at the exit. This unique business model

    had brought so much convenient to consumers and help Mc Donald to tap into and

    capture a new market where it is hardly attainable by its competitors. At this era of ICT,

    Internet is commonly used and was deemed to be a convenient and effective way to

    communicate directly with consumers, it has lead to a new way of marketing, distribution

    and service strategy, Internet has also changed the rules of competition in fast food

    industry, it is certainly the future direction of IT, even business. For the sake of those

    advantages that discussed as earlier, there is a need to implement McDonald online

    ordering system.

    However, developing the new system is one thing, managing the system is another. Rapid

    advancement of IT had open up plenty opportunities for the industry, on the other hand it

    also push information system management to another altitude. As the information system

    grown complex, problems like system vulnerability, data privacy, ethic issue, etc.

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    6/53

    Critical Issues in Managing IT in Organizations 6

    appeared, managing contemporary information system is definitely another great

    challenge for CIO.

    2.2 System Reengineering

    As mentioned earlier, the practice of using IT to being cost efficiency had became

    obsolete now, as consumer are more demanding nowadays, most organizations has a

    tendency to embrace IT to add value on their product/services. As a result, most

    information system now required to be highly personalized to suit respective business,

    unlike conventional IT manager, while contemporary IT manager has to possess thorough

    knowledge of the business or even the whole industry, he/she must also anticipate

    actively in management and know well about operation flow. As shown in figure 2-1,

    such a shift in demand on IT had added a new harsh rule for IT manager, which is theyhas to be not only a IT savvy, but also a veteran of business and management.

    Source: George Cox, Time to Reshape the IS department?, Wentworth Research Program, June 1994

    Figure 2-1

    The main reason to become so particular toward CIO is because of their role of

    conveying vision on how potential new technology could be use to benefit organization

    Asia Pacific Institute of Information Technology

    AddedValue

    CostEfficiency

    ITKnowledge

    BusinessKnowledge

    Impact

    Balance of ExpertiseRequired

    Computer Operations

    System Developmentand Maintenance

    System andInformationArchitecture

    BusinessRequirementIdentification

  • 8/7/2019 Cimiso Linda

    7/53

    Critical Issues in Managing IT in Organizations 7

    to top management. Once a new plan is granted, the 1 st step was to redesign IS system, its

    all about examine the whole business process and identify the needs of organization, then

    come out with a new blueprint, this is the foremost determinant of whether a project

    could success, a small mistake could cause the whole project go awry. Others than that,

    CIO must also ensure that the development of any project is always pertinent to

    government regulation.

    2.3 Scalability & Reliability of System and Capacity Management

    To date, McDonald Malaysia has 172 restaurants nationwide and it is expanding at a pace

    of 10-15 more outlets annually. Therefore, great amount of data is expected to yield from

    new online ordering system, capacity and reliability emerge as a great challenge for IT

    management, robust IT infrastructure must be developed so that it could providesufficient bandwidth and storage capacity for transmission and maintenance of such data.

    Data corruption is a very common problem that plaguing network engineer all the time, it

    is sometime inevitable that organization networking will be using different brand or

    different version of machine or software, often these machine does not work compatibly

    and cause data lose in transmission, thus, IT management will have to take relevant

    measure to prevent this problem to happen and ensure the reliability of data.

    On top of that, IT management has another infrastructure issue to take care of, which is

    the scalability of system. As inventing new system inevitably incurred massive

    investment, it is always wiser to expand/revamp current system to suit current

    organization needs rather than develop a new one. Hence strategic planning at first had

    played a vital role on developing a high scalability system. CIO must be able to foresee

    future need and judge the future trend of IT when planning for new system, sufficient

    spaces for advancement conserved. The increasing popular of cutting edge mobile device

    had indicated that McDonald online ordering system will likely be access by different

    platform like web browser, handphone and other mobile devices, thus new system must

    be carefully scaled so that it could work steadily on several major platform.

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    8/53

    Critical Issues in Managing IT in Organizations 8

    2.4 Change Management

    Another role of IT management in this era was to manage the changes to organization

    leaded by the inception of new information system effectively, successful of a IS project

    are very much depends on whether the process of implementation has carried out

    carefully, as suggested by ( Laudon & Laudon, 2006) , implementation refers to all

    organizational activities working toward the adoption, management, and routinization of

    an information system. They also listed out 4 success/failure factors in implementation:

    The role of users in the implementation process

    The degree of management support for and commitment to implementation

    effort

    The level of complexity and risk of the implementation project

    The quality of management of the implementation process

    ODR, a change management firm in Atlanta had pointed out that the major cause of

    failure is people resisted to change, especially when they do not understand the new IS

    fully or not prepared to change, or they think that the impending system will not change

    the status quo. This case is likely to happen in McDonald online ordering system, as

    McDonald is adopting a franchise system, thus they will have little influence over its

    franchisee, communicating with all of them will be a very hard task while convincingthem to change will be even tough.

    There is a possible remedy, which is to increase user involvement in designing the

    system, they argue that by getting end users heavily anticipating in designing new

    system, they will have the chance to shape the system with their priorities and

    requirement, also they will react more positively to completed project too, so it will

    ultimately ruled out the possibility of users resistance to adopt new system.

    However, there are high chances of backfire too, end users and system developer hold

    different perspective, what concerned them the most could be very different, for instance,

    an end users would ask How quickly can I access data while How many line of

    programming code will be needed?, obviously there is a chasm between two different

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    9/53

    Critical Issues in Managing IT in Organizations 9

    point of view and this communication gap will probably caused completed system does

    not meet users requirement. Finally, the possible outcome is, end users deterred further

    away and implementation process fail.

    2.5 Incident Management

    It is definitely something unrealistic for a CIO to expect a new information system to be

    flawless and it can work well for years, especially under the context of building such

    highly personalized and complicated IT solution. Even if the design was done excellently

    and the system was done by top-notch programmer in the world, there are certainly some

    foreseeable/unforeseeable factors that could disrupt the system, it could be external

    factors like inter-omitted feeding of internet connection, or problem from the system

    itself like virus/bugs, and factual evidence had shown that sometimes bugs can came outof nowhere even the system is isolated from any network, just like memory card of a

    hand phone, very often, some unidentified program file will exist after a period of time

    even it has never connected to any network.

    Therefore, the sustainability of the new system is heavily depend on how IT manager

    carry out incident management, the objective of incident management was to ensure the

    system is continually operated at standard level, and reacts instantly to any incident that

    could cause interruption to the system. Many organizations had fully digitalized its

    operation nowadays, especially financial institution like bank, tens of thousands of

    transaction could be processing in a moment, and the amount could easily reach tens of

    millions, imagine what will happen if the system broke down for few minutes, they could

    suffer very huge loss.

    According to ITIL (Information Technology Infrastructure Library) a standard model

    developed by OGC (Office of Government Commerce) of UK, the process of incident

    management are as stated below:

    i) Incident detection and recording

    ii) Classification and initial support

    iii) Investigation and diagnosis

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    10/53

    Critical Issues in Managing IT in Organizations 10

    iv) Resolution and recovery

    v) Incident closure

    vi) Incident ownership, monitoring, tracking and communication

    (Incident Management, 2003)

    Differed from other IT management, input of incident management will come from

    system users, while IT manager play a role of analyzing error history and proposed for

    changes and improvement of the system.

    2.6 Security Management

    After all, the most important and challenging task for IT management was to deal with

    the potential problem that underlie in the vulnerabilities of the system. Cyber crime andsecurities issues had been escalating in parallel with the advancement of technology

    through these years, as information system growing in size and intricacy, it inevitably

    exposed more leakage and weaknesses of the system, hence it open up new chances for

    the opportunist. At these era of digitalized and automation process, multinational

    corporate confidential data is often safeguard centrally, once it is broken, the losses could

    be far beyond what the corporate can bear, probably bankrupt for the worst case scenario.

    (OBrien & Marakas, 2006) had clarified that the main objective of Security management

    was to ensure the accuracy, integrity, and safety of all information system processes and

    resources, in other words, McDonald online system must be free/minimized from errors,

    frauds, and losses. Generally, incidents that are deemed harmful to the system can be

    categorized as below:

    2.6.1 Network Intrusion

    Network intrusion is the utmost threat that put corporate bottom line at risk as

    assessing corporate confidential data could bring a fortune for those malicious entities,

    this crime might also be done by its competitor to cause havoc. As information system

    grown sophisticated, the heavily coded program inevitably exposed/magnified some

    leakage between code lines, and the incompatible that might arise due to the increasing

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    11/53

    Critical Issues in Managing IT in Organizations 11

    use of divergent hardware/software had open up plenty opportunity for malicious

    network penetration, making network intrusion more undetectable.

    Hacking is the most common type of network intrusion, theoretically any electronic

    devices that is connect to public network is exposing itself to hacker, especially

    connected to a wireless network, as wireless signal can be easily sensed. This mean,

    proposed McDonald system is at high risk of being intruded as connection must be

    made through public network with its consumers. Many organization has opted for

    developed VPN (virtual private network) to hedge its network from risk, however, it is

    learnt that many cases were done by insider, as they had certain level of access to the

    system, they can sometimes sniff something out like passwords or leakage of the

    system. Hacking methods had also been transformed dynamically, from conventionalmethod like DOS (Denial of Service) and Trojan Horse, to Social Engineering today,

    which deliberate conversation will be conduct with company staff to sniff out useful

    information.

    Instead of obtaining corporate information, cyber theft involve in cyber crime that

    involving theft of money from bank, normally they will broke into banks network and

    transfer whatever amount of money they like away, they will also fraudulently

    modified the database so that such crime would not be discovered. Many cases had

    happened in the past and it has no sign of extinction, it was also believed that

    victimized Bank always reveal a lower figure on losses to comfort their customers as

    well as shareholders.

    There are tons of anti-intrusion and software safeguard system in the market, with

    vigilant planning, an information system is theoretically hardly been hacked into.

    However past cases had clearly stated that the real headache of Security Management

    is intrusion from insider, especially in multinational corporation that has tens of

    thousands employees. The cases that happened recently in France is had clarified that

    what a leakage in a system cost, Socit Gnrale had loss a staggering $7 billion over

    the cases. Clearly the greatest challenge for Security management now was to prevent

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    12/53

    Critical Issues in Managing IT in Organizations 12

    insider from committing crime, or on how to detect insider fraudulent before loss

    severely.

    2.6.2 Piracy Issues

    Piracy is always the utmost concern of people on virtual world, it is also the factor that

    hinder the development of e-commerce, included McDonald online ordering system,

    bolstering users confident on using the web portal emerge as a new role of IT manager,

    if it is not done well probably the new system will not be widely use and eventually the

    whole project fail. However, this task can comfortably be complete comparing with

    those problems discussed earlier, obtaining a certificate from TRUSTe and educate

    users with adopted preventive measures should be sufficed.

    However, the core responsibility of IT management should lied on the enforcement,

    how they ensure leakage/misuse of customers information would not happen, and what

    measure to take when acquiring sensitive info like credit card number, also how to

    prevent future conflict with customers. It is simple and direct, which is adopting secure

    transaction system and have an agreement with user upon signup, nevertheless, an

    survey on 20 local companies web site had reveal a surprisingly 90% of local website

    did not practice secure transaction. (Daniel M., 2008, Pg. WE2)

    This will surely further worried people that are already fearful of identity theft,

    although it is not common in Malaysia, yet they are still case of phishing site that

    caused huge loses and panic to customers of a particular bank before. Extra attention

    must be given to this as McDonald will inevitably send out e-letters as part of

    promotion, this could likely be exploited by hackers to coax customer exposed their

    personal information. It could have huge impact on credibility of the system.

    In brief, at this digitalized era, IT had play increasingly important role in business,

    managing an Information system was always a tough task, however as the technology

    develop, the job scope had been broaden, the responsibility is much heavier, and more

    challenges is waiting ahead.

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    13/53

    Critical Issues in Managing IT in Organizations 13

    3.0 Information Technology Financial Management Linda Yuni Tan (TP013160)

    3.1 Business Value of Information Technology

    The role of IT in an organization has changed drastically, as described earlier. However,

    there is a need to measure the important and value of the IT investment. Here, financial

    management roles come in.

    Laudon & Laudon (2006) states that any classification of IT investment are carried out in

    adding value to the business; by improving the current business process or by improving

    the management decision making. In which, this improvements resulted from IT

    investment can be measured using the traditional capital budgeting that will be described

    later on.

    The investment in IT always concerns on the issue of how the investment is going to

    benefit and bring more profits or other advantages to the organization. Therefore, the

    financial management assists in determining value of the investment, whether it is worthy

    to invest.

    .

    3.1.1 Objectives of the IT financial management

    In understanding on what actually IT financial management refers to, it can be seen from

    the objectives and responsibilities it caters.

    Here are some of the IT investment managements objectives and responsibilities:

    - Provide better cost information to assist the management

    In order to see clearer on how the investment will benefit the company, this is when

    budgeting models can show on the details. It shows the costs, benefits as well as

    comparison on the decision to do in-house development or outsource it to developers. By

    having this detail, thus it helps higher management level to consider and decide on the

    investment.

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    14/53

    Critical Issues in Managing IT in Organizations 14

    In the case of McDonalds investment in online ordering system will be using one of

    the budgeting models, the Payback Method. In fact, there are more budgeting models

    that can be used, which each of them carries different objectives.

    - Encourage more efficient use of resources

    Financial management also assists in considering the efficient use of the resources, such

    as; labor, hardware, software, etc. It aims to save costs in the investment, whenever it is

    possible.

    Online ordering system for McDonalds will be using the infrastructure that has already

    existed. By doing this, McDonalds will be able to fully utilize the use of the resource,

    such as the website as well as the investment made earlier in the call centre.

    - Account fully for the cost recovery, via charging

    Financial management has the responsibilities to control and manage the recovery of

    the cost spend in the investment via charging to the relevant customers. In McDonalds

    online ordering, the cost recovery management might be gained back by setting up

    minimum purchase. At the end, the objective is to increase sales and gain more profits.

    3.2 Application of Financial Management in McDonalds

    In the proposed online ordering system for McDonalds, here are how the financial

    management are going to be applied to assist the decision making and value

    measurement:

    3.2.1 Assist the management decision making on in-house development or outsource

    One of the objectives of the IT financial management is to help in decision making on

    whether to build the system in-house or outsource it to the expert. This is a very crucial

    decision to be made. As when the wrong decision is made, it will not only cause

    delivering non-interactive system but also loses to the organization, in term of time as

    well as money.

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    15/53

    Critical Issues in Managing IT in Organizations 15

    In this case, McDonalds online ordering system will be outsourced. The considerations

    in making this decision are:

    Focus of business : Firstly to allow McDonalds stay focus in their core business. By

    maintaining good services or coming out with other business strategies.

    Lack of technical expertise : As mentioned in the book written by Starbucks, W. H

    (2006), it is stated that McDonalds is described as the firm with low technical expertise.

    Therefore, it might be risky to do the development in-house, as experience will be very

    important in the system development process.

    Flexibility in Technology : By outsourcing the project, McDonalds eliminates baring

    risk of possibilities of loses to keep up with the changing technology. In this case,

    developer company will be the one who responsibles to adapt with the changing

    technology and deliver up-to-date system.

    3.2.2 Support the use of capital budgeting

    According to Laudon & Laudon (2002) capital budgeting model is one of several

    techniques used to measure the value of investing in long term capital investment

    projects. Here, the investment in IT is considered as long-term project as it is hoped in

    long run this investment can benefit the organization in certain ways.

    There are few capital budgeting method that can actually be used, they are;

    - The payback method

    - Return on investment

    - The cost benefit ratio

    - The net present value

    - The profitability index

    - The internal rate of return

    The objective of each method above is to know whether the project is worth to invest.

    Again, as mentioned earlier, for the investment in McDonalds online ordering system,

    the Payback Method will be used. The idea of Payback method model is to measure the

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    16/53

    Critical Issues in Managing IT in Organizations 16

    time required to pay back the investment spent on the project. Therefore, McDonalds

    management can have the roughly picture on whether the money invest here is worthy.

    3.3 The cost benefits analysis

    Before coming out with the final result of the Payback Method, identifying cost and

    benefits would be important. Cost and benefits are two elements that are highly taken into

    account in the traditional capital budgeting.

    3.3.1 Cost

    Cost is the total spent for goods or services including money and time and labor.

    (WordWeb Dictionary, 2007) In this case, cost is the expenses that McDonalds needs to

    spend in order to succeed the implementation of the online ordering system. Below arethe specifications on the costs that are going to be spent in the development of the

    proposed online ordering system.

    Direct Cost

    Direct cost is costs that can be allocated accurately and is directly linked in the process of

    delivering out the whole project. As the system is going to be outsourced, therefore, the

    development cost will be as described below:

    - Outsourcing Cost

    When a system is outsourced, most probably it comes as a package. In which,

    organization will only gives the specification of the system. In this case, the rest of the

    development that includes labor costs, infrastructure upgrading, hardware, software, even

    maintenance will be handled by the system developer. Here are some of the details on

    what services are included in the agreement with the developer company.

    - Direct Labor Cost

    Direct labor cost refers the cost spent on those people who involved directly in the setting

    up of the system. Here, it includes webpage designers, database and system

    administrators.

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    17/53

    Critical Issues in Managing IT in Organizations 17

    - Infrastructure Upgrading

    In this case, McDonalds has already the basic infrastructure that links its restaurants with

    the call centre. Therefore, there will be a need for the developer company to upgrade the

    existing infrastructure, by setting up connection from the online ordering system handling

    centre to the call centre server. It also includes the design of the data structure and

    development of the server side as well as installation of groupware that are needed to run

    the system. Furthermore, the database management is needed in order to store the

    customers information and orders made.

    - Service

    In term of service, training will come as a package. The first initial training will be given

    to McDonalds employees who will be the users of the system.

    - Hardware

    Hardware refers to all physical parts that allow users to interact with the system. In the

    online ordering system, there is a need for the centre, where the orders are handled, to

    setup Local Area Network that will involve the setting up of PCs and storage. In addition,

    PCs also will be placed in the McDonalds restaurants that open for 24 hours and provide

    the delivery service.

    All around East Malaysia, there are approximate of 40 restaurants that operate 24 hours

    and providing McDelivery. However, as some of them has already has PCs, therefore,

    roughly it needs only 30 PCs for the restaurants and 10 PCs for the online ordering

    center, make it total of 40 PCs to be purchased. And in setting up this network, there is a

    need for cabling.

    .

    - Software

    In order for the PCs to be able to run, and Windows will be installed as the basic

    operating system. In assuring the credibility of the OS, McDonalds has to buy a software

    license from Microsoft or its legal dealer. Here, McDonalds might consider to purchase

    the full package with perpetual licensing that offers unlimited used period as well as

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    18/53

    Critical Issues in Managing IT in Organizations 18

    lower maintenance and upgrading costs. Software will also include the installation of

    firewall for security purposes.

    - Feasibility study

    Before passing the project to be built by the developer, McDonalds needs to do

    feasibility study to specify the requirement and specifications of the system. In which,

    Mitchell (2005) from Internationalstaff.net stated that the study will cover the scope of

    the system, time frame, and performance indicators that used to monitor the project. This

    study will include the market research that will require the company to spend big budget

    on it.

    Indirect Costs

    According to the IT service centre in The University of Melbourne (2006), Indirect cost

    refers to cost incurred which cannot be directly allocated in full to a single product,

    service, customer, cost centre or business activity; incurred on behalf of a number of cost

    units or centers to which the cost may be apportioned.

    Below are the indirect costs that are incurred in the investment of McDonalds online

    ordering system:

    - Maintenance fee

    In order for a system to run smoothly, there is a need for good maintenance. This is

    applied in the online ordering system as well. To keep the website and the system run

    24/7, it needs good maintenance support. This system maintenance covers server,

    gateway, groupware, website and database maintenance. However, as the system is

    outsourced, the maintenance will be done by the developer company as well. Moreover,

    maintenance includes the upgrading and maintenance of the software and software used.

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    19/53

    Critical Issues in Managing IT in Organizations 19

    - Continuous Employee Training

    Training will be important area to invest as good human resource as valuable as the good

    system. Therefore, training will be carried out for those employees who are new, as well

    as training on the updated information for the current employees.

    - Building Rent

    In operating the new system, it is required a single centre that in charge only in handing

    the customers online orders. Here, all the technical parts are located. Thus, there is a need

    for McDonalds to rent an office building for this purposes.

    The total cost is shown below. It covers the 5 years period of time, thus it can show how

    the system can benefit the organization in the long run.

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    20/53

    Critical Issues in Managing IT in Organizations 20

    McDonald's CorporationOnline Ordering SystemEstimated Cost (2008-2012)

    Year: 0 1 2 3 4Direct Costs 2008 2009 2010 2011 2012Initial outsourcing cost

    File servers 2@10,000 20,000Gateway and its security 8,000 8,000Database design 20,000 20,000Network software 10,000 10,000Groupware 40@400 16,000Webpage design 1,000 1,000Direct Labor Cost 80,000 80,000First training 20,000 20,000

    HardwarePCs 40@3,000 120,000Cabling 10,000 10,000Storage 60,000 60,000

    SoftwareFirewall 4,000 4,000Windows 40@900 36,000

    Feasibility study 100,000 100,000

    Indirect Costs

    Indirect Labor Cost 10@18,000 180,000 180,000 180,000 180,000 180,000System maintenance

    Server maintenance 2@2000 4,000 4,000 4,000 4,000Gateways maintenance 800 800 800 800 800

    Asia Pacific Institute of Information Technology

    mailto:2@10,000mailto:40@400mailto:40@3,000mailto:40@900mailto:10@18,000mailto:2@2000mailto:40@400mailto:40@3,000mailto:40@900mailto:10@18,000mailto:2@2000mailto:2@10,000
  • 8/7/2019 Cimiso Linda

    21/53

    Critical Issues in Managing IT in Organizations 21

    Database maintenance 5,000 5,000 5,000 5,000 5,000Groupware maintenance & upgrades 40@200 8,000 8,000 8,000 8,000Website maintenance 1,200 1,200 1,200 1,200 1,200

    Software maintenance & upgrades 15,000 15,000 15,000 15,000 15,000Hardware maintenance & upgrades 20,000 20,000 20,000 20,000 20,000Web Hosting 600 600 600 600 600Continuous Training 10,000 10,000 10,000 10,000 10,000Building Rent & Electricity 36,000 36,000 36,000 36,000 36,000 36,000

    Total Cost 721,000 280,600 280,600 280,600 280,600 1,843,400

    Assumption:

    * All figures above are taken from some other resources and adapt in approximation value

    ** All costs are in Ringgit Malaysia (RM) currency

    Asia Pacific Institute of Information Technology

    mailto:40@200mailto:40@200mailto:40@200mailto:40@200
  • 8/7/2019 Cimiso Linda

    22/53

    Critical Issues in Managing IT in Organizations 22

    3.3.2 Benefits

    Glossary by ACF (2006) states that benefits are the qualitative and quantitative

    improvement expected or resulted from a system investment. There are two different

    benefits that can be acquired from an information technology investment. It can be in

    form of;

    - Tangible benefits

    - Intangible benefits

    Tangible Benefits

    Again, Laudon & Laudon (2006) defines tangible benefits as the benefit that can be

    quantified and assigned in monetary value. In this case, the tangible benefits of having

    the online ordering system are:

    - Improved productivity and business operation

    As mentioned in earlier, one of the problems with the phone ordering, there might be

    wrong ordering taking or wasted time in delivery. By using this online ordering system, it

    decrease the chance doing wrong in order taking, in addition, the system can be designed

    to find the best route to be followed by the deliveryman. At the end, it improves

    employees productivity as well as business operations.

    - Increase in sales

    Increment in sales will be definite. Changing society and the statistic provided by

    MCMC, higher the chances for the system success. This system especially targeting large

    group of people who are packed with their daily activities, thus delivery services to their

    front doors might seem to provide convenience. And it is supported with the fact that

    customers need only registered once, and then log in to order, for the next transaction.

    This simplicity will be the main attraction to success this investment.

    - Reduced in marketing cost

    Online advertising has been a trend nowadays. By having online ordering system, it

    attracts more people to visit McDonalds website. Therefore, at the same time,

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    23/53

    Critical Issues in Managing IT in Organizations 23

    McDonalds promotion can reach more people through this website. Consequently,

    McDonalds can reduce the marketing cost by fully utilizing the website.

    Intangible Benefits

    Laudon & Laudon (2006) defines intangible benefit as benefits that cannot be

    immediately quantified but may lead to quantifiable gains in the long run. There are

    some intangible benefits that can be identified from the investment on the online ordering

    system for McDonalds.

    - Customers satisfaction and loyalty

    The implementation of online ordering system might be able to improve the services by

    offering convenience, accuracy of orders and saving in cost of phone credits for customers. This satisfaction of customers might benefit the company, as it will result in

    customers retention. In addition, it will be a medium in attracting other potential target

    markets to purchase the companys product and services.

    - Competitive advantage

    This investment can add value to the company. As in Malaysia online ordering system

    has become a trend for some huge fast-food restaurant, such as: Pizza Hut and Domino

    Pizza. In addition, against the competitors who have the same product line, such as: KFC

    and Burger King, this system will be McDonalds competitive advantage.

    - Customers information

    By having this online ordering system, McDonalds can also acquire the important

    information of the customers for the legal use in business forecast and for marketing

    purposes. Thus, McDonalds can reduce the costs spent in the market research. However,

    the use of that information must be still in legal boundary, so that company and

    customers can build a long term relationship.

    Here are the details on the amount of benefit that McDonalds might be gaining back

    from the investment that has been made in the online ordering system.

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    24/53

    Critical Issues in Managing IT in Organizations 24

    McDonald's CorporationOnline Ordering SystemEstimated Benefit (2008-2012)

    Year: 0 1 2 3 42008 2009 2010 2011 2012

    BenefitsIncreased sales 100,000 750,000 750,000 840,000 900,000Saving in market research 70,000 70,000 70,000 70,000Reduce marketing expenses 40,000 40,000 40,000 40,000

    Total Benefit 100,000 860,000 860,000 950,000 1,010,000 3,780,000

    Assumption:

    * The figures above are in estimation value which is based on the original data from McDonalds Corporation, globally, with some

    modifications and assumptions to adapt with the situation in McDonalds Malaysia.

    ** All the value are in Ringgit Malaysian (RM) Currency

    ** To be clearer on how the estimation of benefit is carried out, please refer to Appendix I

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    25/53

    Critical Issues in Managing IT in Organizations 25

    3.4 The Payback Method

    From the specification of the cost and benefits above, payback method calculation can be

    carried out, as below:

    Initial Investment 721,000

    Year 1 (2008)

    -

    621,000 -621,000Year 2 (2009) 579,400 -41,600Year 3 (2010) 579,400 537,800Year 4 (2011) 669,400 1,207,200Year 5 (2012) 729,400 1,936,600

    Payback Period 2,086 (2 years, 1 month)

    From the cash flows and calculation above, thus this investment can achieve it payback

    period in 2 year and 1 month. Along with that, the total benefit from this investment is

    RM. 1,936,600 at the end of the fifth year.

    3.5 IT Cost Recovery

    IT cost recovery refers to how the organization recovers the cost that has been invested in

    the IT project by charging it to the customers or in some other possible ways. In this case,for customers to do transaction online they need to make minimum purchase, by doing

    this; it will increase the sales and revenue gains. Another policy is that, if customers do

    not reach certain minimum purchase, then they will be charged a delivery cost.

    But at the end, the goal in this project is to increase sales, so that company can raise their

    revenue, indirectly makes more profits.

    In summary, going through some considerations, the financial management assists the

    management of McDonalds in deciding to outsource the project. In addition, financial

    management analysis also provides the information on how this system is going to

    benefit McDonalds, such as; increased sales, productivity and business operation and at

    the same time, it helps the organization to reduce cost spent on marketing and market

    research. Finally, from the approximate calculation of the Payback Method, it is shown

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    26/53

    Critical Issues in Managing IT in Organizations 26

    that McDonalds is going to gain back the invested money within 2 years and 1 month. In

    addition, the high increased in sales every following year and cost saving in other areas

    resulted from this system implementation make this project worth to invest.

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    27/53

    Critical Issues in Managing IT in Organizations 27

    4.0 Managing Computer Security - Chiong You Hoe (TP010944)

    4.1 Introduction to Security Management

    On April 24, 1982 McDonald opened its first restaurant in Kuala Lumpur, till now

    McDonald has more than 8000 employees, with the expansion of 10 to 12 restaurants

    annually, as written in The Star Online (2007). First for all, McDonald is fast food

    restaurant which serve customer with the hamburger, French fries, soft drink, desserts

    and also breakfast meal. Generally, McDonald provide to customer with fresh, healthy

    products in shorter of a period time while customer ordered. Last year, McDonald (M)

    has invested RM300 Million for the following five years. Due to the huge business

    expand, here a proper and well organizes security will be needed in order to manage and

    protected the Technology for the future.

    Security refers to process for ensuring that confidentiality, availability of computer

    hardware devices, data, and hardware. Mostly security involves data to be encryption,

    password protection, double lock to prevent hardware to get stolen. Encryption enables

    data to translate data into form which is unintelligible without a deciphering mechanism,

    and password enable the user to login before access the data. Lack of security will results

    of the theft of data; attract attention of hacker, leakiness of data to third parties and so on.

    4.2 Current Situation of Security Management

    Nowadays the internet usage keeps increasing from year to year. Due to the huge usage

    of internet and it also brings up cases of infect of viruses, spyware, Trojan, and Hacker.

    According to survey, it found over the last two years Americans have lost approximately

    $8 billion at the hands of computer viruses, spyware and phishing scams. Computer

    Crime Research Center, 2006

    They are several ways to prevent such as installing Anti-Virus to scan removable drive

    before open it, implement Firewall to block up unnecessary advertisement, keep updating

    operating system, and strict the network service to avoid harmful website.

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    28/53

    Critical Issues in Managing IT in Organizations 28

    Each company should take serious and must have strong protection to protect their data,

    company profile under secure environment. As the information is private and confidential

    to the competitors, this is because some of the competitor may be hire hacker to steal the

    information and re-modify and sell it under their brand.

    Based on the research, there are three main issues needed to be considerate in order to

    protect information being stolen.

    Intrusion

    Denial of Service

    Information Theft

    4.2.1 Intrusion

    Intrusion refers to the tools to monitor the most vulnerable points in a network to detect

    and deter unauthorized intruders. (Kenneth C. Laudon, 2002, Page 446). An instruction

    of alert will be send to IT professionals or System Admin within the organization to

    inform the weaknesses of the network security. Admin can shut down the particular

    device, hardware or sensitive part if receives unauthorized traffic affect the network.

    Information can leak, or stole easily if admin didnt monitor the network. MacDonaldestablish its business on 1982, till now, MCD has been came out a few idea to attract

    customer attention. For instance, prosperity hamburger during Chinese New Year, small

    packet during Chinese New Year and Hari Raya , 24hrs drive thru service and also Mini

    Toy during debut of new Movie. New product, new service, and also new design of the

    outlook of the branch, those information must be keep in secret to prevent competitor to

    go after. By the way, some competitors would like to obtain what their want either with

    the legal or illegal way.

    Last year, McDonald just launched its 24hours business on the selected location with the

    mission to provide best quality of service to satisfy the customer. During Football

    Season, McDonald also comes out plan which is Football fans can watch their football

    match in McDonald. Those events which could not being found with the rest of fast food

    restaurant in Malaysia. McDonald marketing department plays very important role in

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    29/53

    Critical Issues in Managing IT in Organizations 29

    design, market survey the customer needs and wants, and also marketing to create

    awareness of the product. Here, internet and computer are the main component will be

    use to create, generate, and data gathering process.

    4.2.2 Denial of Service

    Denial of Service happens when hackers flood up network server or Web Server with

    requests for information or other data in order to crash down the network. This happens

    when hacker wants to stealing the company data, as result to slow down the responds

    time from the server and to cover up hacker by detect from the admin department.

    Recently, Website becomes more important and more useful for the computer users.

    Everything can be done with just a finger click, and all will be settle immediacy with inshorten of period. Every company has their own website or server to provide updated on-

    line information, and also provide on-line transaction. Because of the fast growth of

    internet in Malaysia and also high criminal cases in Malaysia, people tend to do on-line

    banking more than go out.

    McDonalds does participating in Charities Fund, which is Ronald McDonald Childrens

    Charities Fund of Malaysia (RMCC), this website enables the customer to fill up the

    personal detail, and also amount of the donation. At the same time, this website also

    remind the customer dont forget to share the happiness together with those who need

    helps from community society. A strong security protection must be needed, as useful

    customer personal detail can be obtained from this website during transaction.

    Since we are going to implementing Online Ordering System to McDonald at the end of

    this assignment, this will be another one of the risky problems need to be considers.

    Basically on-line transaction involves payment networking, which involve vital customer

    credit-card information and also security pin code number during transaction. Denial of

    service could be happens at this level as attackers will send some other advertisement to

    slow down the network performance and

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    30/53

    Critical Issues in Managing IT in Organizations 30

    4.2.3 Information Theft

    Information Theft, reference to a process which some one steals the information from

    your computer, or company database from server without any notification from third

    parties. This will be another theft for McDonald as every month they need to generate a

    monthly summary report, and the report needs to be sending to headquarter for update

    any business result in particular location within the month. Information theft will accrue

    if they didnt have strong security. For instance, Spyware will be needed to steal the data,

    and copy it into removable drive or CD and sell it to the buyer which looking for the

    information of competitor.

    Virus is the more popular term but technically, a virus is a program code that cannot

    work without being inserted into another program. (James OBrien, Pg.503)

    Anything can be happen in this world, imagining if McDonald system break down for a

    few hours because of hacking. What will happen to them? Everything will be gone

    within few hours, customer information, company information, suppliers information

    and so on.

    There are three main type of information theft which needs to be concern on if going for

    online Ordering System.

    Trojans A program that appears legitimate, but

    performs some illegal activity when it is

    run. It stays in the computer and doing

    damage or allows someone from removable

    site to take control of the computer.

    For instance, Backdoor, ArcBoombs, etc

    Viruses A program which runs into the program

    files to execute and by the same time also

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    31/53

    Critical Issues in Managing IT in Organizations 31

    attaches copies of itself to other programs

    in the system, as result to infect other

    For Instance, Macro viruses, logic Bombs,

    boot Sector Viruses and so on.. Worms A destructive program that replicates itself

    throughout a single computer or network. It

    can do damage by sheer reproduction,

    consuming internet disk within a single

    computer.

    For instance, Morris Worm

    4.3 Solution of Computer Security Management System

    Every company has their own IT department to protect and implement to make it more

    successful for the future. Prevention is very important to McDonald, since we are going

    to suggest of Online Ordering System, which its linking to the entire entire network.

    James OBrien (2006, p.517) states that As today few professionals facing greater

    challenges than those IT managers whore developing Internet security policies for

    rapidly changing network infrastructures. How can they balance the need for internetsecurity and internet access? Are the budgets for internet security adequate? What impact

    will intranet, extranet, and web application development have on security architectures?

    How can they come up with best practices for developing internet security policy?

    There are a lot of way to protect Viruses from attract the system, but at the end just few

    ways which is suitable and useful against malicious attack. Those will be:-

    4.3.1 Firewall

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    32/53

    Critical Issues in Managing IT in Organizations 32

    According to James OBrien (2006, p. 518) Firewall serves is a gatekeeper system that

    protects a companys intranets and other computer networks from intrusion, typically a

    router or a dedicated server

    Firewall is useful for monitoring or controls any network traffic during transaction.

    Basically firewall use to prevent unauthorized network access to the server or computer,

    but some error can be happen at the end due to user mistake. For instance, user can allow

    or deny any network communicate from outside by click on the warning massage appear

    on the screen.

    McDonald IT department can monitor or place rule and regulation notice on checking

    each network transaction for each staff during working hours. Is importance for OnlineOrder System as inside contain private information when customer doing online payment.

    By educating employees regarding the Computer Security will bring in more benefit as

    this department is helping and also developing the networking.

    4.3.2 Antivirus Software

    It is software which designed to keep your PC free of these computer viruses and Worms,

    it does so by scanning of the Computer file system looking for virus, if a virus found it

    will inform you and then take steps to remove the virus threat.

    Antivirus is useful in detection, reaction and preventive from viruses attack. Nowadays,

    antivirus is must software not only for IT Department but also for single PC user around

    the world. The software must keep updating from time to time which can be protecting

    the computer or server by hack. McDonald Online Ordering System is needed updated

    version of antivirus, to prevent or protect the client information for the time been.

    For instance, Nov. 2005, during Thanksgiving Holiday a fast moving virus called Sober

    Virus has attacked UC Computers in Worldwide. For the first hour after attacks, 50% of

    the anti-Virus vendors able to recover the damage and also released security update to

    protect customers from virus variants.

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    33/53

    Critical Issues in Managing IT in Organizations 33

    4.3.3 Encryption Code

    Nowadays, Encryption Code is wide used by all amount Company. This is because

    encryption able to change the code into some format which cant be read or break easily

    by the attackers even if they got their hands on the information. For MacDonald, it will

    be useful as it use to protect customer information from stealing. Encryption Key is very

    important as it use to decode the encrypted message, without it the person not able to read

    the information. So the key should be given to a specific employee to ensure the safety of

    the information.

    Encryption process is needed as daily information is circulating around their network,

    attackers can steal information just to plug in the cable and access it without notification.

    According to James OBrien (2006, p. 517) Encryption involves using special

    mathematical algorithms or keys to transform digital data into a scrambled code before

    they are transmitted and decode the data when they are received

    4.3.4 Strong Authentication

    Authentication is a process of proving the identity of user to logging into network, user

    ID and Password, smart card and Biometrics can be used to prove the identity of user.

    Mostly this security apply in server room, which they need to key in their identity before

    enter the room, as server room is the place which store any private information regarding

    company, employees data, client information, project detail, and some other daily data, so

    a strict process must be apply in order to prevent data licking out to third parties.

    McDonald must have strict policies and also strong security control before implement

    Online Ordering System, because any uncontrollable security system will bring up some

    other harmed to the company, no any in customer policies but also reputation since

    McDonald is World Wide fast food restaurant.

    4.3.5 Security Management Policy

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    34/53

    Critical Issues in Managing IT in Organizations 34

    Policy is black and white written agreement form which must be following by each

    employee in the whole organization. The purpose is to protect the organization interest,

    employee behavior in organization, what can and cant do in organization, network

    access and some others. Policy was created to protect organization and staff of the

    company, as basically employees will do something surprising to the organization at the

    end.

    McDonald does have their policy based on the requirements with their supplier, and also

    within department itself. For instance, each department must have their own rule and

    regulation to protect their right, as Account Department must keep the lost and profit

    amount of company within their own department, and their must not tell it with other

    department.

    Wrapping this up, security is very important to McDonald Corporation, as it use to

    protect company right and client benefit to avoid data for licking out. Basically,

    employees are responsibility to protect the data as they are the person who gets in touch

    with the data daily.

    Many organizations did not take seriously in data security, as their did not put so much

    efforts in the security, so that is why at the end we have hacker who able intruders to the

    organization network and do on what the hacker want. Prevention is better than cure,

    Strong Authentication, Security Policy, Antivirus Software, Firewall and Encryption

    Code; those will give some other protection to the company.

    Knowing the possible risk and finding out the ways to overcome from time to time being

    must take for each organization as we still have some other disasters which are waiting

    for us to solve.

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    35/53

    Critical Issues in Managing IT in Organizations 35

    5.0 Managing Project Development Naranbadral. L(TP010847)

    5.1 Project Definitions

    Here are some definitions of a Project:

    A project is a temporary effort to create a unique product or service. Projects usually

    include constraints and risks regarding cost, schedule or performance outcome.

    (Organizing for Project Management, 1997)

    Project is a process of selection and reduction of the ideas and perspectives of those

    involved into a set of clearly defined objectives , key success criteria and evaluated

    risks .

    (Project Definition, 2001)

    Thus, it is concluded that a project is a set of tasks set and agreed by a team of people who

    will execute them within a planned time frame. The team will be utilizing software project

    management concepts to ensure the successful completion of the tasks.

    5.2 Project management

    Project management is a methodical approach to planning and guiding project processes

    from start to finish. According to the Project Management Institute, the processes areguided through five stages: initiation, planning, executing, controlling, and closing.

    Project management can be applied to almost any type of project.

    The project management concepts include setting objective, planning the tasks to be done,

    set initiation and dead line, creating milestones, and manage resources, evaluating and

    closing the project.

    Usually a group of people with complimenting skills and a leader will be gathered to start

    working on the project. In order for the project to be successful the team must have

    elaborate understanding of the system which is going to be built, what is the scope of the

    project, what features it should have and what it shouldnt have, user requirements set by

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    36/53

    Critical Issues in Managing IT in Organizations 36

    the study group which will plot out the main requirements, how much of resource is

    available and timeline in with the project must be completed.

    All the above is highly dependent on the skills and abilities of the project Manager.

    Since McDonalds is not an expert in the field the project will have to be outsourced. The

    above details will be handled by the outsourced company; McDonalds will participate as

    a sponsor and provide all the needed details of the day to day operation to insure the

    success of the project.

    Objective

    The main objectives of the Online ordering system for McDonalds would be:

    - User friendly interface- Provide effective means to make online orders

    - Provide accurate information

    - Provide on time information delivery

    - Provide interactive marketing

    - Provide information

    o Provide nutritional information

    o

    Suggest Mac meal diet information- Provide help

    - Provide Feedback system

    - Enable possibility for future enhancements

    Setting a clear cut objective allows for the developers to have clear cut set of tasks to be

    accomplished

    5.3 Project Managers Roles

    Project manager is a person who oversees the whole project. He/she selects the team

    members with relevant skills to ensure the success of the project. Project manager is

    basically a person, who points what the team members should do, manages the timing,

    motivates the members, ensures productivity, deals with external vendors/suppliers, and

    deals with administration by reporting to them periodically.

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    37/53

    Critical Issues in Managing IT in Organizations 37

    5.3.1 Project Managers Responsibilities

    - Scheduling

    Detailed schedule specifying who is doing what and when is it supposed to start and

    when is it supposed end.

    - Cost control and budget management

    Make sure the project funds are not over or under utilized. Over utilization of funds could

    cause the sponsor to stop funding the project. Under utilization of funds could make the

    sponsors to lose fate in the project by assuming the project manager is cutting corners to

    save cost. Therefore the budget should be properly utilized within given parameters.

    - Resource allocationPrioritize the tasks based on the value and allocate resources based on the priority. For

    instance user friendly system development has higher priority than ----- therefore must

    allocated more resource.

    - Collaboration software

    Project manager must specify and list the software which will be working together with

    the online ordering system for McDonalds. For example the web browsers such as

    Mozilla Firefox, Internet Explorer, Safari, and Netscape which will be working together

    with the system.

    - Communication

    Project manager will be the middle man for communication between the team and the top

    management and also the user or sponsors. Project manager will have regular interactions

    with the team, other managers, and customer to update them on the progress as well as

    notify the team of the user specified changes the system and etc.

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    38/53

    Critical Issues in Managing IT in Organizations 38

    - Quality management

    It is the duty of the project manager to do checkup on the teams work and evaluate them

    based on the quality. Low quality work from the team will affect the outcome of the

    whole project.

    - Documentation.

    Project manager is responsible for the making detailed documentation of the tasks,

    events, and other relevant details.

    5.3.2 Setting goals

    Breakdown and Categorize the project tasks

    Setting long-term and short-term achievable goals. Break the goals down to tasks basedon the team members individual skills and allocate them accordingly. This will show the

    team members a clear cut task to be performed thus improving the productivity.

    Critical point in the system development is to set the goals. Correctly set goals

    can determine the success or the failure of the project. If the goals are set wrongly the

    whole project could become halt and ultimately scrapped. Making changes in main goals

    of the project is usually costly and wasteful. The whole system might have to be remade

    based on the magnitude of the problem.

    5.3.3 Setting Start and Deadline

    Setting start date and deadline for the specified tasks, the project will have a preset

    deadline by which the system must be ready for delivery. Project managers skills will

    determine the successful delivery of the system within designated period. Mainly

    everything depends on putting the tasks reasonable time and allocating more time for the

    most important tasks without forgoing the simple but beneficial tasks.

    5.3.4 Evaluating accomplished task

    When a milestone is achieved project managers must evaluate the task performed against

    the overall goal, customer requirements, and system requirements and determine the

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    39/53

    Critical Issues in Managing IT in Organizations 39

    advancement made towards next milestone. This will keep the project within the given

    specifications and prevent wearing off.

    5.3.5 Working with a team

    - Leadership

    Project manager must show leadership by example, ethically, and morally.

    - Team building

    Project managers are required to break the ice for the new group members so that the

    team could function effectively.

    - Motivation

    Motivation is important for the teams for their daily performance. Providing

    encouragements and rewards will help the team perform better than usual. Nowadays

    many companies utilize competition and reward concepts to help motivate the teams who

    are working on the project.

    For Example: McDonalds nominates Employee of the Month the criteria is based on

    the number of customers served by an individual employee as well as customer feedback

    provided.

    5.3.6 Working with target group

    Working with a target group is one of the best ways to ensure the success of the project.

    The software company should work with McDonalds as well as their customer target

    group. This will provide better understanding for the project manager on exactly what the

    customers want, and ways to improve. Project manager would have to relay this to the

    team and work towards the requirements.

    5.3.7 Allocating resources

    Project managers are the ones who will handle the resource allocation. They usually do it

    based on the priority of the task and goals. The resources available to project manager

    are:

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    40/53

    Critical Issues in Managing IT in Organizations 40

    - Time

    - Team member time

    - Funds provided by sponsor

    - Target group time

    Correct allocation of resources requires detailed information on the tasks. Effective

    allocation will keep the project within budget. Project managers should allocate some

    portion of the resources for

    5.3.8 Dealing with Conflict

    Conflict comes in many types, example:- Software conflict

    - Requirement conflict

    - Budget conflict

    - Specification conflict

    5.3.9 Dealing with Vendors and Subcontractors

    Project manager deals will have to dealers and subcontractors on the scheduling and

    delivery. Example:

    - Software providers

    - Hardware suppliers

    - Unique hardware developers

    McDonalds will probably have to have customized equipment to be used at the branches.

    Therefore the project manager will have to deal with subcontractor to develop a

    compatible hardware for the system.

    For example: The online orders must be relayed to the kitchen staff via network and be

    available for viewing in the system. So a LCD display would be required to make to

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    41/53

    Critical Issues in Managing IT in Organizations 41

    information available for the cook, a specially built terminal will have to be developed to

    automate the process.

    The project manager will have to give the specifications for the terminal to be built to

    subcontractor.

    5.4 Project Planning and Specification

    According to National Park Service Glossary (2008), project planning is:

    The second step of the planning-design-construction program. Following the elements

    of advance planning, it covers the design function, including working drawings and

    specifications for the construction of or improvement to a facility.

    The project planning will include all the parts of the system will have to be planned,

    specified, sampled, and agreed upon. Only after the agreement has been reached by the

    customer, project team and project leader the system get the Go ahead.

    5.5 Project control

    Nowadays companies utilize the many methods to control the project progress. First

    would be setting milestones of which the project manager assesses the progress by

    evaluating the work done.

    Setting deadlines control the project timeline by assigning deadline by which the task

    must be completed. Having target groups to test the system. Testing will help discover

    inadequacies as well as the achieved goals.

    5.6 Staff management

    Staff management is important since the project developer team members are the oneswho build up the system. Individual skills, character, abilities, personal communication

    skills, and shortfalls will be the main influence in the system development.

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    42/53

    Critical Issues in Managing IT in Organizations 42

    Staff management is important because it can compensate for the individual

    disadvantages with the advantages of the other members in the team.

    There are number of techniques used in managing staff such as team building, job

    matching, moral building, and cross training and etc. these are all the techniques which

    help overcome individual members disadvantages, increase productivity, and provide

    better quality.

    5.7 Wrong project

    There comes a time when there sudden realization that the project which is been

    undertaken has gone out of the budget, scope, not able to satisfy the user requirements,

    and gone obsolete. The project could face any of the above problems as soon as one of above problem is discovered the developer should put a full stop to the development and

    assess the likelihood of system still been salvageable. This can be done through

    environmental studies, opportunity and cost analysis. Depending on the analysis the

    developer group must take decision if to continue or not.

    The choice will result in one of the following two:

    1. They will manage to salvage the operation thus inquiring small amount of extra

    cost.

    If this is feasible the developer should make necessary adjustments to the system and

    make it fit the changed criteria.

    2. Even thou it was delivered on time and within the given budget the system could

    be obsolete thus rendering it useless.

    If this scenario is likely to happen the developer must discontinue the system thus

    preventing it from further inquiring cost.

    5.8 Risk management

    5.8.1 Risk Definition

    According to the Shari Lawrences Software engineering theory and practice risk is A

    loss associated with the event, the event which creates a situation where something

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    43/53

    Critical Issues in Managing IT in Organizations 43

    negative happens to the project: a loss of time, quality, money, control, and

    understanding.

    There are many types of risks according to Boehm:

    - Personnel shortfalls

    Individual or group disadvantages.

    - Unrealistic budgeting and scheduling

    Too ambitious scheduling as well as too much cost saving.

    - Developing wrong software functionDue to lack of communication between developer and study group as well as customer,

    wrong software functions might be developed.

    - Developing wrong user interface

    Due to misunderstanding the wrong or inadequate user interface can be developed.

    - Continuing stream of requirement changes

    Constant changes made in the requirements by the customer or the study group.

    - Straining computer science capabilities

    Pushing the limits of computer science too much and set a goal which is not achievable

    by the current technology, or the technology would cost too much.

    - Key personnel loss

    Key personnel loss could put the project under a risk.

    There are many methods to prevent the above risks but McDonalds should be prepared

    to face some of these risks might affect the company.

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    44/53

    Critical Issues in Managing IT in Organizations 44

    5.8.2 Reduce risk and risk control

    The main goal would be to reduce risk impact, reduce risk probability, and have more

    risk control.

    To reduce risk impact the developers must be flexible enough change and adapt to the

    new parameters faced.

    To reduce risk probability the developers must take into account the future possible risks

    and adjust the development accordingly.

    To increase risk control the developers must anticipate and preemptively prevent the risks

    from ever arising

    For McDonalds the risks involving could be probability of system been obsolete or not

    provide competitive advantage over the competitor as well as competitors been able to

    replicate similar system.

    5.8.3 Contingency plan

    According to www.pcmag.com A plan involving suitable backups, immediate actions

    and longer term measures for responding to computer emergencies such as attacks or

    accidental disasters. Contingency plans are part of business resumption planning. This

    mainly concerns the developer to have safe guard from potential risks such as natural

    disaster, accident and etc.

    As for McDonalds they should make backup of orders, as well as safe guard from cyber

    threats by having high security features.

    In summary, the project development concepts will help McDonalds to obtain modern

    Information System which will benefit the company reputation as well as the

    performance. With development of internet each day many companies go online and

    compete in the almost equally no matter the size of it. McDonalds should increase its

    productivity by increasing the competiveness on the cyber grounds.

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    45/53

    Critical Issues in Managing IT in Organizations 45

    6.0 Conclusion

    Along with the changes in the society, the roles of information technology in an

    organization have changed as well. For some industries, IT might be a key role in

    succeeding the organizations, in which it works together with the main business units.

    Therefore, development of IT to support the business might be a crucial area for the

    organizations to invest in. And in identifying the value of the investment, the IT financial

    management introduces method that can be used as the measurement, such as; Capital

    budgeting method.

    However, in this technology era, the implementation of IT is followed by consideration

    on security management to ensure the security of the organizations system and data.There are so many types of security issues that may be faced by the organization.

    However, there is security management that includes steps as well as policies to prevent

    the issues from occurring.

    In conclusion, after going through some analysis, the proposed online ordering system in

    McDonalds may bring long term benefits for the firm. On the top of that, in order to

    deliver a success online ordering system that is on schedule, within budget and as the

    required, the project development process is a crucial part to work on. In which, the better

    the planning, the higher chances to deliver a good and success system.

    Asia Pacific Institute of Information Technology

  • 8/7/2019 Cimiso Linda

    46/53

    Critical Issues in Managing IT in Organizations 46

    7.0 References

    Group References

    Arndt, M. & Ghobrial, C. (2007), Knock knock, its your Big Mac , viewed 27

    February 2008, < http://www.msnbc.msn.com/id/19748673/>

    Fitzgerald, M. (2007) Making Fast Food Even Faster viewed 29 February 2008,

    Internet World Stats (2007), Malaysia internet subscribers to double by 2012, viewed

    27 February 2008, < http://www.internetworldstats.com/asia/my.htm >

    Laudon, K. C. & Laudon, J. P. (2006) Management Information Technology Systems:

    Managing the digital firm , 9 th edn, Pearson Education, New Jersey

    Laudon, K. C. & Laudon, J. P. (2002), Management Information Technology Systems:

    Managing the digital firm , 7 th edn, Pearson Education, New Jersey

    McDonalds Malaysia Sdn Bhd (2008), Our People & Restaurants

    Viewed 25 February 2008, < http://www.mcdonalds.com.my/abtus/pplres/ourpeople.asp >

    MCMC (2007), Malaysia Communication and Malaysia Commision viewed 27

    February 2008, < www.mcmc.gov.my >

    Rat Kroc (1996), McDOnalds and the fast food industry, viewed 20 February 2008,

    Waste Reduction Resource Centre (2006), Food Service: Background and Overview,

    viewed 18 February 2008, < http://wrrc.p2pays.org/p2rx/subsection.cfm?

    hub=448&subsec=1&nav=1&CFID=1574313&CFTOKEN=74112287 >

    Asia Pacific Institute of Information Technology

    http://www.nytimes.com/2007/10/28/technology/28proto.html?_r=1&oref=sloginhttp://www.internetworldstats.com/asia/my.htmhttp://www.mcdonalds.com.my/abtus/pplres/ourpeople.asphttp://www.mcmc.gov.my/http://www.wiley.com/legacy/products/subject/business/forbes/kroc.htmlhttp://wrrc.p2pays.org/p2rx/subsection.cfm?hub=448&subsec=1&nav=1&CFID=1574313&CFTOKEN=74112287http://wrrc.p2pays.org/p2rx/subsection.cfm?hub=448&subsec=1&nav=1&CFID=1574313&CFTOKEN=74112287http://www.nytimes.com/2007/10/28/technology/28proto.html?_r=1&oref=sloginhttp://www.internetworldstats.com/asia/my.htmhttp://www.mcdonalds.com.my/abtus/pplres/ourpeople.asphttp://www.mcmc.gov.my/http://www.wiley.com/legacy/products/subject/business/forbes/kroc.htmlhttp://wrrc.p2pays.org/p2rx/subsection.cfm?hub=448&subsec=1&nav=1&CFID=1574313&CFTOKEN=74112287http://wrrc.p2pays.org/p2rx/subsection.cfm?hub=448&subsec=1&nav=1&CFID=1574313&CFTOKEN=74112287
  • 8/7/2019 Cimiso Linda

    47/53

  • 8/7/2019 Cimiso Linda

    48/53

    Critical Issues in Managing IT in Organizations 48

    IT Financial Management - Linda Yuni Tan (TP013160)

    Administration for Children and Families (2006) Glossary, viewed 9 March 2008,

    BrandRepublic (2005), Low Budget, Big Results, viewed 13 March 2008,

    Internet World Stats (2007), Malaysia Internet Stats and Marketing Report, viewed 6

    March 2008, < http://www.internetworldstats.com/asia/my.htm >

    iStart (2004) Online orders delivering for Pizza Hut, viewed 12 March 2008,

    Laudon, K. C. & Laudon, J. P. (2006) Management Information Technology Systems:

    Managing the digital firm , 9 th edn, Pearson Education, New Jersey

    Laudon, K. C. & Laudon, J. P. (2002), Management Information Technology Systems:

    Managing the digital firm , 7 th edn, Pearson Education, New Jersey

    Microsoft Corporation (2008), Full Package Software options from Microsoft Small

    Business, Viewed 12 March 2006,

    McDonalds Malaysia revised (2007), viewed 8 March 2008,

    Mitchell, A. (2005), How to outsource, viewed 12 March 2008,

    Asia Pacific Institute of Information Technology

    http://www.google.com.my/url?sa=X&start=2&oi=define&q=http://www.acf.hhs.gov/programs/cb/systems/sacwis/cbaguide/appendixb.htm&usg=AFQjCNG-lWXLp8SCY52RPzACBVQQVPiMtghttp://www.brandrepublic.com/bulletins/marketresearch/article/466487/market-research-low-budget-big-results/http://www.brandrepublic.com/bulletins/marketresearch/article/466487/market-research-low-budget-big-results/http://www.istart.co.nz/index/HM20/PC0/PVC197/EX286/CS25570http://www.microsoft.com/smallbusiness/buy/software/full-package-software.mspxhttp://www.mcdonalds.com.my/http://www.internationalstaff.net/Linked%20Files/Publications/Main_How2outsource.htmhttp://www.internationalstaff.net/Linked%20Files/Publications/Main_How2outsource.htmhttp://www.google.com.my/url?sa=X&start=2&oi=define&q=http://www.acf.hhs.gov/programs/cb/systems/sacwis/cbaguide/appendixb.htm&usg=AFQjCNG-lWXLp8SCY52RPzACBVQQVPiMtghttp://www.brandrepublic.com/bulletins/marketresearch/article/466487/market-research-low-budget-big-results/h