Search This Blog

Thursday, September 15, 2016

CHAPTER FIVE : ORGANIZATIONAL STRUCTURES THAT SUPPORT STRATEGIC INITIATIVES

INFORMATION TECHNOLOGY (IT) ROLES AND RESPONSIBILITIES
Information technology is a relatively new functional area.
Recent IT – related strategic positions:
             -   Chief Information Officer (CIO)
             -   Chief Technology Officer (CTO)
             -   Chief Security Officer (CSO)
             -   Chief Privacy Officer (CPO)
             -   Chief Knowledge Officer (CKO)
DEFINE :
       i) Chief Information Officer (CIO) – oversees all uses of IT and ensures the strategic                alignment of IT with business goals and objectives.

Broad CIO functions include;
Manager – ensuring the delivery of all IT projects, on time and within budget.
Leader – ensuring the strategic vision of IT is in line with the strategic vision of the organization.
Communicator – building and maintaining strong executive relationships.




ii) Chief Technology Officer (CTO) – responsible for ensuring the throughput , speed, accuracy, availability and reliability of IT

iii) Chief Security Officer (CSO) – responsible for ensuring the security of IT systems


iv) Chief Privacy Officer (CPO) – responsible for ensuring the ethical and legal use of information

v) Chief Knowledge Officer (CKO) – responsible for collecting, maintaining and distributing the organization’s knowledge



THE GAP BETWEEN BUSINESS PERSONNEL AND IT PERSONNEL
  •  Business personnel possess expertise in functional areas such as marketing, accounting and sales
  •  IT personnel have the technological expertise
  • This typically causes a communications gap between the business personnel and IT personnel 

IMPROVING COMMUNICATIONS
  • Business personnel must seek to increase their understanding of IT
  • IT personnel must seek to increase their understanding of the business
  •  It is the responsibility of the CIO to ensure effective communication between business personnel and IT personnel

ORGANIZATIONAL FUNDAMENTALS – ETHICS AND SECURITY
ETHICS 
Ethics – the principles and standards that guide our behavior toward other people
Privacy is a major ethical issues;
    • Privacy – the right to be left alone when you want to be to have control ever your own personnel possessions and not to be observed without your consent
Issues affected by technology advances
Intelligent property
Intangible creative work that is embodied in physical form
Copyright
The legal protection afforded an expression of an idea, such as a song, video game and some types of proprietary documents
Fair use doctrine
In certain situations, it is legal to use copyrighted material
Pirated software
The unauthorized use, duplication, distribution or sale of copyrighted software
Counterfeit software
Software that is manufactured to lock like the real thing and sold as such
One of the main ingredients in trust is privacy

SECURITY
Risks that may happen :
Sources of Unplanned Downtime
Bomb threat
Hacker
Snowstorm
Burst pipe
Hail
Sprinkler malfunction
Chemical spill
Hurricane
Static electricity
Construction
Ice storm
Strike
Corrupted data
Insects
Terrorism
Earthquake
Lightning
Theft
Electrical short
Network failure
Tornado
Epidemic
Plane crash
Train derailment
Equipment failure
Frozen pipe
Smoke damage
Evacuation
Power outage
Vandalism
Explosion
Power surge
Vehicle crash
Fire
Rodents
Virus
Flood
Sabotage
Water damage (various)
Fraud
Shredded data
Wind


PROTECTING INTELLECTUAL ASSETS

·               Organizational information is intellectual capital – it must be protected
·               Information security – the protection of information from accidental or intentional misuse by persons inside or outside an organization

·               E-business automatically crates tremendous information security risks for organization

No comments:

Post a Comment