Sunday, July 14, 2013

now is chapter 5 turn, i do my best!!..


CHAPTER 5: ORGANIZATIONAL STRUCTURES THAT SUPPORT STRATEGIC INITIATIVES

5.1) ORGANIZATIONAL STRUCTURES..
v Employees across the organization must work closely together to develop strategic initiatives that create competitive advantages..

5.2) IT ROLES AND RESPONSIBILITY..
v  Chief Information Officer (CIO) – Overseeing all uses of information technology and ensuring the strategic alignment of IT with business goals and objectives..
v  Chief Technology Officer (CTO) – Responsible for ensuring the throughput, speed, accuracy, availability and reliability of an organization’s information technology..
v  Chief Security Officer (CSO) – Responsible for ensuring the security of IT systems and developing strategies and IT safeguards against attacks from hackers and viruses..
v  Chief Privacy Officer (CPO) – Responsible for ensuring the ethical and legal use of information within an organization..
v  Chief Knowledge Officer (CKO) – Responsible for collecting, maintaining and distributing the organization’s knowledge..

5.3) THE GAP BETWEEN BUSINESS PERSONNEL AND IT PERSONNEL..
v  Business personnel possess expertise in functional areas such as marketing, accounting, sales and so forth..
v  IT personnel have the technological expertise..
v  Business personnel must seek to increase their understanding of IT. Although they do not need to know every technical detail, it will benefit their careers to understand which they can and cannot accomplish using IT..
v  IT personnel are left out of strategy meetings because of the belief they do not understand the business so they will not add any value. So, IT personnel must understand the business if the organization is going to determine which technologies can benefit (or hurt) the business..

5.4) ORGANIZATIONAL FUNDAMENTALS- ETHICS AND SECURITY..
ETHICS:
v  Technology poses new challenges for our ethics- the principles and standards that guide our behavior toward other people..
v  Issues affected by technology advances:
Intellectual property
Intangible creative work that is embodied in physical form..
Copyright
The legal protection afforded an expression of idea, such as a song, video game, and some types of proprietary documents..
Fair use doctrine
In certain situations, it is legal to use copyrighted material..
Pirated software
The unauthorized use, duplication, distribution, or sale of copyrighted software..
Counterfeit software
Software that is manufactured to look like the real thing and sold as such..

SECURITY:
v  Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside the organization..

No comments:

Post a Comment