An excellent template to evaluate the return on investment for IT projects. This IT ROI Template provides detailed analysis and three key metrics – ROI, NPV, and TCO – on projects and can be easily adapted for deployment in your organization.
This comprehensive and easy to use MS Excel based Return on Investment (ROI) template can be used to create a business case for IT investments, gain support for your initiative, and monitor outcomes.
This presentation provides an in-depth tutorial on return on analysis (ROI) concepts used to calculate the value delivered by information technology initiatives. It introduces the concept of ROI, discusses the different types of ROI metrics in use, the benefits of using an ROI based approach to IT value, the pros and cons of using the approach, and presents different approaches to calculate ROI, with examples. Excellent Read! (100 pages)
This presentation goes over the basics of IT ROI – what is it? why is it important? how to calculate ROI? And much more – everything you wanted to know about IT ROI but were afraid to ask!
This document provides guidance on integrating IT security and IT Investment Management processes. Applying funding towards high-priority security investments supports the objective of maintaining appropriate security controls, both at the enterprise-wide and system level, commensurate with levels of risk and data sensitivity. This paper introduces common criteria against which managers can prioritize security activities to ensure that corrective actions are incorporated into the capital planning process to deliver maximum security in a cost-effective manner. (70 Pages)
This document provides guidance on how an organization, through the use of metrics, identifies the adequacy of in-place security controls, policies, and procedures. It provides an approach to help management decide where to invest in additional security protection resources or identify and evaluate nonproductive controls. It explains the metric development and implementation process and how it can also be used to adequately justify security control investments. The results of an effective metric program can provide useful data for directing the allocation of information security resources and should simplify the preparation of performance-related reports. (100 pages)
This document provides an overview of a comprehensive investment lifecycle management framework to identify, select, fund, build, deploy and monitor investments – from investment proposals, to business cases to implemented solutions and key decisions in between.
This comprehensive guide provides policy, principles, process, framework, and examples for a complete and thorough management – identify, select, evaluate, fund, deploy, monitor – of major investments. You can adapt this guide to create your own Information Technology investment management process and framework.
This case study illustrates the use of the public value framework for government IT to assess the public ROI generated. The specific initiative discusses is the implementation of the Government of Israel’s Merkava Project.