IT Governance and Shareholder Value

I note that the IT Governance Institute (it’s chaired by Tony Hayes, my predecessor as Chair of the ITM COE for CPA Australia) has released a “Guide to IT Value @ Risk”. The guide will be found here, while the IT Governance Institute can be found here.

IT Governance is about the way that the information technology business function is managed, particularly in the context of the board’s responsibilities. IT Governance is one of the major work programs of the Information Technology & Management Centre of Excellence for 2005.

Pits, Traps and Windfalls of Open Source Software (For Business)

One of the things that I have often come across when consulting with clients is, obviously, the phenomenon of open-source software, and next week (17 May 2005) I will be presenting to the local CPA Australia IT discussion group on the topic of Pits, Traps and Windfalls of Open Source Software.

Now, I happen to think that open source software is better than the proverbial sliced bread on a picnic, but it does come with some real dangers hidden with its benefits. A real commercial issue is that, for software that is “free”, no purchase order is required and a business can find itself heavily reliant upon the open source software (and the skills of the person who knows how to use it) without any of the usual gatekeeper controls to ensure people understand what it’s all about (many businesses require a business case to purchase new software – but, no outlay means no business case means no commercial considerations are part of the decision).

And once you get out of the top five or ten open source projects in a particular software category, your ability to find someone that can actually use the software decreases markedly (which usually means that, once you find them, you’ve got to pay them quite well thanks very much). So fairly soon, and without any real red flags to indicate that it’s happening, the business can become very reliant upon the skills of one single solitary person (who may or may not be a good bloke, but is still susceptible to the all-too-common “hit by a bus” problem).

But, I use Open Office at home (fairly seamlessly for most documents) and we do sponsor open-source software such as DotNetNuke to our clients, as it’s a category killer in open source portal tools, and is based upon some standard technologies. I think it will always be interesting to run the numbers for clients and see which way they are better off. And this is exactly why I’m presenting next week on exactly this topic. So if you’re in the Brisbane area, please feel free to drop in and say “hi” by registering and perhaps discuss the finer points or two of this topic in the business context.

Information Systems In The Old School Yard

In another life, I worked for independent schools (Anglican Church Grammar School and St Margaret’s Anglican Girls’ School), and in so doing I came to a good appreciation of what schools try to do with what they’ve got available (i.e. a lot with not much). In my post-school career, I have had occasion to visit schools and evaluate how the schools organise and run their information technology.

Each quarter my firm (BDO Kendalls) publishes a newsletter specifically to the education sector. In the autumn edition, I was asked to write an article entitled “Maximising Education Technology“, and so here it is, published in all its glory.

As always, feedback welcome.

Could You Say That Again?

Going back through my old papers, I discovered this (rather more accessible, although it’s still research) version of my thesis on Information Request Ambiguity. A riveting read? Probably not, but it’s a good source for anyone wanting to take a look at the theoretical underpinnings of internal communication and its potential commercial effects.

In case you’re wondering, information request ambiguity is when there is ambiguity in a request for a report to be written by a third party. Information Request Ambiguity is a mouthful, but it’s probably more professional-sounding than calling it the “Are you sure that’s what you want?” factor.

This paper was presented at the International Conference in Information Systems in 2001. We are repeating the experiment and hoping to publish in a first-tier journal “real soon now”. The main rationale for the research was to identify the different types of ambiguity, and what their likely effects are (e.g. accuracy, mistaken reporting, etc).

Information Systems, Security, and Fraud

I note that John Halliday (a colleague at BDO Kendalls – Director IS Audit) has written an overview article on information systems security and fraud. This is a good short article raising the link between IS security, governance structures, and organisational fraud. John is promising a series of articles in this newsletter, so I am sure there is more to come here.

From what I understand, this article also dovetails nicely with a seminar that was run on 18th April 2005.