CHAPTER 5:
ORGANIZATIONAL STRUCTURES THAT SUPPORT STRATEGIC INITIATIVES
5.1) ORGANIZATIONAL STRUCTURES..
v Employees
across the organization must work closely together to develop strategic
initiatives that create competitive advantages..
5.2) IT ROLES AND RESPONSIBILITY..
v Chief
Information Officer (CIO) – Overseeing all uses of information technology and
ensuring the strategic alignment of IT with business goals and objectives..
v Chief
Technology Officer (CTO) – Responsible for ensuring the throughput, speed,
accuracy, availability and reliability of an organization’s information
technology..
v Chief
Security Officer (CSO) – Responsible for ensuring the security of IT systems
and developing strategies and IT safeguards against attacks from hackers and
viruses..
v Chief
Privacy Officer (CPO) – Responsible for ensuring the ethical and legal use of
information within an organization..
v Chief
Knowledge Officer (CKO) – Responsible for collecting, maintaining and
distributing the organization’s knowledge..
5.3) THE GAP BETWEEN BUSINESS PERSONNEL AND IT PERSONNEL..
v Business
personnel possess expertise in functional areas such as marketing, accounting,
sales and so forth..
v IT
personnel have the technological expertise..
v Business
personnel must seek to increase their understanding of IT. Although they do not
need to know every technical detail, it will benefit their careers to
understand which they can and cannot accomplish using IT..
v IT
personnel are left out of strategy meetings because of the belief they do not
understand the business so they will not add any value. So, IT personnel must
understand the business if the organization is going to determine which
technologies can benefit (or hurt) the business..
5.4) ORGANIZATIONAL FUNDAMENTALS- ETHICS AND SECURITY..
ETHICS:
v Technology
poses new challenges for our ethics- the principles and standards that guide
our behavior toward other people..
v Issues
affected by technology advances:
Intellectual property
|
Intangible creative work that is embodied in physical
form..
|
Copyright
|
The legal
protection afforded an expression of idea, such as a song, video game, and
some types of proprietary documents..
|
Fair use doctrine
|
In certain situations, it is legal to use copyrighted
material..
|
Pirated software
|
The unauthorized
use, duplication, distribution, or sale of copyrighted software..
|
Counterfeit software
|
Software that is manufactured to look like the real thing
and sold as such..
|
SECURITY:
v Information
security is a broad term encompassing the protection of information from
accidental or intentional misuse by persons inside or outside the
organization..
No comments:
Post a Comment