Tuesday, January 14, 2014

Chapter 5 : Organizational Structures That Support Strategic Initiatives.

Good afternoon :) 
 

Today's agenda in to expose our self with the structure that supports our strategic initiatives based on the previous chapters.....shall we dive in? :D

Lets begin with IT roles and responsibilities;

Chief Information Officer (CIO)- these people are responsible to oversee all uses or IT and ensures the strategic alignment of IT with business goals and objective. The CIOmreports direct to CEO. A broad function of CIO includes manager, leader and communicator.  
Chief Technology Officer (CTO)- CTO responsible for ensuring the throughout, speed, accuracy, availability, and reliability of an organization’s information technology.  Similar to CIOs but CIOs take on the additional responsibility usefulness of ensure that IT is associated with the organization’s strategic initiatives.
 
Chief Privacy Officer (CPO)-  For the CPO they are responsible for ensuring the ethical and legal use of information. This role is regarding the use of personal information, including medical data and financial information, and laws and regulations. 
 
Chief Knowledge Officer (CKO)-CKO responsible for collecting, maintaining and distribution the organization’s knowledge. Those who hold this position have to manage intellectual capital and the custodian of knowledge management practices in an organization.

Chief Security Officer (CSO) - The CSO generally serves as the business leader responsible for the development, implementation and management of the organization’s corporate security vision, strategy and programs. They direct staff in identifying, developing, implementing and maintaining security processes across the organization to reduce risks, respond to incidents, and limit exposure to liability in all areas of financial, physical, and personal risk; establish appropriate standards and risk controls associated with intellectual property; and direct the establishment and implementation of policies and procedures related to data security.


Gap Between Business Personnel And It Personnel

It exist because presence of perception business people that the Information Technology Department
generates expenses not income. Thus making them look more like a liability. In the same
time, The Information technology department is “hidden” from the customer often classified as a
“back office” business initiative or process. This create a different perspective to the business
personnel and the result, a gap is exist. 

How do we fix this issue you might ask....



through....

 Communication
#  Communication is the main ingredient that will close the gap between the business personnel and the IT Department. Business leaders must understand, really understand, that  Information Technology is not optional but critical to the success of the business. 
#  The head of the company sets the tone for the entire business. 
#  In addition IT department teams need to understand the business practices of the company.
 Now lets go to the fundamentals of Ethics & Security... 
  
ETHICS
Ethics is the principle and standards that guide our behavior toward other people.
Descriptive ethics is exactly that a description of "what is"       in the land of business ethics.  This
perception seeks to recognize moral & ethical systems shared by people, cultures, and
societies.  This form seeks to know prevailing views and actions about ethical performance.  One
problem to this school of thought is that using this perspective may lead one to believe that an
actual unethical behavior is satisfactory because "everyone is doing it."
 
 Issues Affected By Technology Advances : 
i) Intellectual property - Intangible creative work that is personified in physical form.
ii) Copyright - The legal protection afforded an expression of an idea, such as a song, video   game, and some types of proprietary documents.
iii) Fair use doctrine - In certain situations, it is legal to use copyrighted material.
iv) Pirated software - The unauthorized use, duplication, distribution, or sale of copyrighted software.
v) Counterfeit software - Software that is manufactured to look like the real thing and sold as such. 
 
SECURITY
    Security is a major ethical issues. The right to be left alone when you want to have control over your own personal possessions and not to be observed without your consent.
before I end this blog here is a website that helped me a lot in understanding this chapter better :)
https://sites.google.com/site/qccrdesir/unit-1/chapter-5---organizational-structure-that-support-strategic-initiatives

HAVE A NICE DAY! :d

No comments:

Post a Comment