Reducing IT costs and ensuring safe operation with application of the portfolio management
Large companies need to give focus on their cost components related to their information technology. Business growths is supported by their IT and hundreds or thousands of applications worldwide. Top level management needs to focus more on their information strategy and the applications they need to manage. A structured and transparent application landscape supports not only the current business but it also enables faster business growth for the future as well. Structuring and organizing the applications related to the various risks supports secure business and information operations within a company. Capturing the applications gives the companies an overview of their information costs and provides the possibility of measurement and control of their IT costs elements. Application portfolio management and information security management are important elements of the corporate strategies.
Barki, H., Rivard, S., and Talbot, J., (1993). Toward an assessment of software development risk. Journal of Management Information Systems,10 (2), 203-223.
Capgemini (2011). HP Application Landscape Report, 5-6.
Capgemini (2014). Application Landscape Report, 23-24.
CIO (2016) http://www.cio.com/article/2380234/cio-role/state-of-the-cio-2014-the-great-schism.html (21.04.2016)
Erik Van Ramshorst (2013). Application portfolio management form an enterprise architecture perspective, Master’s Thesis, Utrecht University, Faculty of information and Computing Sciences, 50-53.
Gartner (2014). Gartner Application, Architecture, Development & Integration Summit, May 19-20 in London, U.K. and July 21-22 in Sydney, Australia
Gartner (2016) http://www.gartner.com/it-glossary/legacy-application-or-system/ (17.04.2016)
Gartner (2016a). IT Glossary, Total Cost of Ownership http://www.gartner.com/it-glossary/total-cost-of-ownership-tco/ (16.03.2016)
Hatstand (2015). Capital Market Specialists, http://www.hatstand.com/news/risk-compliance-regulation/legacy-system-disasters, (11.03.2016)
Informatika Corporation (2013). A practical guide to legacy application retirement, White Paper, 3.
Infosys (2016). Case Studies, Application portfolio rationalization for a financial services provider
ITIL (2011) Glossary and abbreviations, 4.
ITIL (2009) v3 Foundation Study Guide, Release Version 188.8.131.52 http://www.inf.unideb.hu/~fazekasg/oktatas/ITIL_V3_Study_Guide.pdf (08.04.2016)
ITIL (2016) Information Technology Infrastructure Library Guide http://www.itinfo.am/eng/information-technology-infrastructure-library-guide/ (22.02.2016)
Lazányi, K (2015a)., Organisational Safety in Health-Care Setting – Literature Review In: Michelberger Pál (Ed.) Management, Enterprise and Benchmarking in the 21st Century Budapest: Óbuda University, 111-122.
McFarlan, F.W. (1981). Portfolio Approach to Information Systems, Harvard Business Review, 142-150.
P.Michelberger, S. Dombora: Ekonomika (2016), A possible tool for development of information security-SIEM system, Vol. 62, (1), 125-140.
Sarah V. (2012). Risk Management Model in ITIL https://fenix.tecnico.ulisboa.pt/downloadFile/395144242575/Disserta%C3%A7%C3%A3o.pdf (03.03.2016)
Schmidt, R., Lyytinen, K., Keil, M., & P. Cule. (2001). Identifying Software Project Risks: An International Delphi Study. Journal of Management Information Systems, 17 (4), 5-36.
Tata Consulting Services (2013). TCS successfully optimizes the application portfolio of a leading telecom company
Tata Consulting Services (2013a). Application portfolio rationalization, How IT simplification and standardization ensure business growth, White Paper, 10-13.
Tata Consulting Services (2011). Next generation application portfolio rationalization, How IT simplification and standardization ensure business growth, White Paper, 18.
Tata Consulting Services (2012). TCS Standardizes application and process management to deliver operational leadership for a global consumer products group
Troux (2011). Application portfolio management ranks top in new EA survey
Ward, J., & Peppard, J., (2002). Strategic Planning for Information systems, John Willey & Sons Ltd., 13-14.
The Author wishes to submit the Work to SJM for publication. To enable SJM to publish the Work and to give effect to the parties’ intention set forth herein, they have agreed to cede the first right to publication and republication in the SJM Journal.
The Author hereby cedes to SJM, who accepts the cession, to the copyright in and to the paper.
The purpose of the cession is to enable SJM to publish the Work, as first publisher world-wide, and for republication in the SJM Journal, and to grant the right to others to publish the Work world-wide, for so long as such copyright subsists;
SJM shall be entitled to edit the work before publication, as it deems fit, subject to the Authors approval
The Author warrants to SJM that:
- the Author is the owner of the copyright in the Work, whether as author or as reassigned from the Author’s employee and that the Author is entitled to cede the copyright to SJM;
- the paper (or any of its part) is not submitted or accepted for publication in any other Journal;
- the Work is an original work created by the Author;
- the Author has not transferred, ceded, or assigned the copyright, or any part thereof, to any third party; or granted any third party a licence or other right to the copyright, which may affect or detract from the rights granted to SJM in terms of this agreement.
The Author hereby indemnifies the SJM as a body and its individual members, to the fullest extent permitted in law, against all or any claims which may arise consequent to the warranties set forth.
No monetary consideration shall be payable by SJM to the Author for the cession, but SJM shall clearly identify the Author as having produced the Work and ensure that due recognition is given to the Author in any publication of the Work.
Should SJM, in its sole discretion, elect not to publish the Work within 1 year after the date of this agreement, the cession shall lapse and be of no further effect. In such event the copyright shall revert to the Author and SJM shall not publish the Work, or any part thereof, without the Author’s prior written consent.