First published: January 2006
The majority of IT Departments acknowledge perceived shortcomings
When 100 IT managers were asked to list the top three IT related requests heard from business management, nine out of ten indicated one or more perceived shortcomings.
Business managers say IT should become both more efficient and effective
It is common for business managers to wish that IT would generate more value in line with business needs and priorities, communicate and engage with the business more effectively, and deliver solutions and services more quickly, reliably and at a lower cost. Between 40% and 50% indicate feedback in each of these three areas. A number of cultural issues are also highlighted.
IT employs a range of methods for coordinating with the business
The most common method of coordinating activity is the nomination of named IT liaison representatives for key areas of the business. A number of other communication and coordination methods are employed, however, ranging from collaborative development of business and IT strategy, through steering committees for key initiatives, to sign-off and budgetary controls.
Delivery of value is enhanced by a broader engagement model
The greater the number of active touch points between IT and the business, the greater the potential for IT to deliver business value. Those employing three or more of the above-mentioned methods see a significant increase in perceived performance.
IT also performs better when it has a full dialogue with the business
Two-way communication and coordination, particularly at a strategic level, enhances the delivery of value over and above the unidirectional flow of information or requirements.
The best performance is achieved through a partnership approach
The most effective approach to delivering value is a full partnership between IT and the business with joint strategy, planning and investment decision-making.
Source of Data: This report is based on a study completed in January 2006 in which 100 IT managers were interviewed on the relationship with their peers in the business. Respondents happened to be from the UK financial services sector (mixture of SMB and corporate), but readers will recognise many of the comments and issues discussed within this report as being relevant to most types of organisation.
This report is free of charge. Click above to download the PDF or view the interactive e-document.
If you experience any problems during this process please contact us at;
email@example.com or call +44 (0)1425 626501 / 620008
By Jack Vile & Dale Vile
As both company and personally owned mobile devices are increasingly used in business, understanding and dealing with the associated risks has become a significant concern for many. In this report we explore some of the trends in mobile technology adoption. ...more
By Dale Vile & Tony Lock
If it has been a while since you thought about your DR measures, or a review has been prompted by a risk assessment, compliance audit, actual disaster or some other scare, it’s worth taking some time to understand what can be achieved in light of important changes that have taken place over the past few years. ...more
By Tony Lock
With the advent of digitisation, all public sector environments generate and capture a significant amount of electronic data. Against this background, this paper explores how to manage costs and risks while meeting these changing needs through ‘active archiving’. ...more
By Dale Vile
In some organisations, the tension between IT and business teams has come to a head around the topic of devices & the so called ‘Bring Your Own Device’ phenomenon.It’s time for IT and business managers to get together & start a proper dialogue about to deal with evolving requirements. ...more
By Dale Vile
By Dale Vile
Organisations of all sizes are trying to understand the security implications of mobile working, device proliferation and BYOD. But with IT vendors offering up a broad range of options, it can be hard to know where to focus your efforts ...more
By Tony Lock
While the importance of business information is almost universally recognised, few organisations have enjoyed either the time or the resources required to ensure that the data they store across an expanding range of computer systems is adequately protected. ...more