• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

E-commerce change management

Extracts from this document...


Effective Change Management for Software Delivery Authors: Bianca van der Zwaan & Mandy de Cocq van Delwijnen E-Commerce: Change Management Teacher: Mr. Schols October 2007 Table of contents Page Management summary 3 Core business Borland 4 1 The external change, problems and opportunities 5 2 Recognition of the need for change 6 3 Start of change process 7 4 Diagnosis 8 5 Prepare and plan for implementation 10 6 Implement change 11 7 Review and consolidation 13 Work cited list 14 Management summary The goal of this report is to analyze a change management process of an existing e-commerce company. "Change management should be seen as a process for managing all changes to the project, including assets and its outcomes". (Solving the problem...") The IT company which we have researched is company "A" of the management report of Borland 'the open ALM company'. Two students of the International Business and Management study made this report within the E-Commerce class. The information that is used in this report is from the internet and from the book of John Hayes called "The Theory and Practice of Change Management". By analysing Company A the seven step model of Hayes and Hyde from 1998 of the book is used. This model presents a theoretical framework for thinking about the management of change and to define the whole change management process. ...read more.


To arrive to that point, they should integrate assets, changes, and project- and portfolio management. To illustrate this, they should include all the activities which are part of the original plan and all the activities which are the result of re-planning when changes were made. This is called the 'integrated approach' and it characterizes a major difference from the usual view of the project, change, and asset management. Company A knew what had to be done to successfully change their strategy to create a more integrated change management. Firstly, all the activities performed on project assets should be linked to the planned activities and the project structure. Secondly, the need for changes, regardless of the source or reason, should be managed in a adequate way. Therefore project plans should be updated accordingly and there should be regular evaluations about the development of the existing plan. "Change management should be seen as a process for managing all changes to the project, including assets and its outcomes." ("Solving the Problem...") 4) Diagnosis Review the present state As discussed before Company A was doing a good job with change management on a project by project basis. Their weak point was that it did not make a clear link to the asset(s) being changed. Furthermore they did not make connections to the project and portfolio management processes for managing change and task implementation. ...read more.


They have to organise all these changes and link them with each other. This same routine need to be followed when dealing with resource assignments, work estimations, actual process updates, and metrics like defect rates and state aging. This will make company A more effective and it will prevent them from making the same mistake twice. These steps will also be monitored by the change control board. When problems occur they will be noticed in an early stage and therefore also dealt with in a early stage.("Integrate portfolio...") 7) Review and consolidation As mentioned in the previous chapter, during the whole process of change every step is closely monitored and reviewed by the change control board. When problems seem to occur the change control board will take immediate action to protect the company from failing. Since the change control board will monitor every step, the problems will be detected in a early stage. By this way of working these beginner problems will not lead to big problems within the change management process. When company A is finished implementing all these changes it will have accomplished more efficiency and they will prevent themselves for making the effort and making mistakes more than once. However, company A has to keep in mind that changes will never stop and while implementing the changes discussed in the report, the need for other changes already arise. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our University Degree Electronic Media Studies section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Electronic Media Studies essays

  1. This paper intends to provide a framework for thinking, debate and action on the ...

    As epistemology, the linear model creates distinctions that closer examinations of scientific and technological activity fail to confirm. In addition, the linear vision of innovation dominates also the regional innovation capability evaluations. (Steinmueller, 1994) The basic criticism of the notion that technology springs from scientific base is that supplants the complexity of the real situation of the subject.

  2. Impact of Internet On Society With Special Review On Home-Shopping (E-Commerce).

    Now, estimates of the number of users range from 10 Million to 30 Million. Nearly every country participates in the Internet, with over 25% of the computers located in Europe. With the development of Internet it has given rise to home shopping, which has really played apart in our day to day life.

  1. Critical review - 'What Just Happened?", a chronicle from the information frontier - James ...

    Towards the end of the Millennium the Internet and global electronic infrastructure itself was in jeopardy along with the financial stability of the world. We where under threat from the technology we had created but not in any aggressive way we were told-merely a oversight that a child could have spotted.

  2. ICT Report 3D

    strip or a plastic smartcard with a chip, which contains his or her card number and some security information, such as an expiration date or Card Verification Code. Security is provided by the customer entering a personal identification number (PIN).

  1. Information Technology New and Old: James Patrick Kelly's Big Guy and E. M. Forster's ...

    that form our shared history in cyberspace.5 Given these close ties it has to be assumed that science fiction readers, unlike a general audience, are aware of the actual workings of the Internet. Science fiction written for genre readers has to stand up to the scrutiny of an expert audience

  2. What follows considers the problem of technical improvement as one of the main problems ...

    That is the reason of demands to bring technologies into education. Educational technologies stipulate the creation of a lot of methods providing the effectiveness of studying by a strict definition of aims, content, forms and ways of teaching, as well as internal essence of all educational processes in their intercommunication.

  1. Moral and ethical uses in Information Technology.

    For Example: -Sanford Wallace created a site SmartBotPro.Net, if someone visit the site he can view different items being advertised and only after his or her (the visitor) consent will unsolicited email be sent to them. This site can be seen at http://www.smartbotpro.net/ References Big Fine for Spamming AOL Members Link to: The decision Big Fine for Spamming AOL Members.

  2. What in your view, are the main problems involved in attempting to produce policies ...

    ?Data privacy? is the security of an individual?s financial data, health records, commercial transactions, reading or surfing habits and seeks to mitigate the effects of identity theft and fraud; the marginalisation of vulnerable segments of the community through the dissemination of their private records; obtrusive marketing campaigns based on purchase

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work