ORGANIZATIONAL STRUCTURES
- Organizational employees must work closely together to develop strategic initiatives that create competitive advantages.
- Ethics and security are two fundamental building blocks that organizations must base their businesses upon.
INFORMATION TECHNOLOGY ROLES AND RESPONSIBILITIES
- Information technology is a relatively new functional area, having only been around formally for around 40 years.
- Recent IT – related strategic positions:
- Chief Information Officer (CIO)
- Chief Technology Officer (CTO)
- Chief Security Officer (CSO)
- Chief Privacy Officer (CPO)
- Chief Knowledge Officer (CKO)
Chief Information Officer (CIO) – oversees all uses of IT and ensures the strategic alignment of IT with business goals and objectives.
- Broad CIO functions include;
- Manager – ensuring the delivery of all IT projects, on time and within budget.
- Leader – ensuring the strategic vision of IT is in line with the strategic vision of the organization.
- Communicator – building and maintaining strong executive relationships.
Average CIO compensation by industry
Industry | Average CIO Compensation |
Wholesale/Retail/Distribution | $ 243,304 |
Finance | $ 210,547 |
Insurance | $ 197,697 |
Manufacturing | $ 190,250 |
Medical/Dental/Health Care | $ 171,032 |
Government | $ 118,359 |
Education | $ 93,750 |
· What concerns CIOs the most
Percentages % | CIOs Concerns |
94 | Enhancing customer satisfaction |
92 | Security |
89 | Technology evaluation |
87 | Budgeting |
83 | Staffing |
66 | ROI analysis |
64 | Building new applications |
45 | Outsourcing hosting |
o Chief Technology Officer (CTO) – responsible for ensuring the throughput , speed, accuracy, availability and reliability of IT
o Chief Security Officer (CSO) – responsible for ensuring the security of IT systems
o Chief Privacy Officer (CPO) – responsible for ensuring the ethical and legal use of information
o Chief Knowledge Officer (CKO) – responsible for collecting, maintaining and distributing the organization’s knowledge
THE GAP BETWEEN BUSINESS PERSONNEL AND IT PRSONNEL
- Business personnel possess expertise in functional areas such as marketing, accounting and sales
- IT personnel have the technological expertise
- This typically causes a communications gap between the business personnel and IT personnel
IMPROVING COMMUNICATIONS
- Business personnel must seek to increase their understanding of IT
- IT personnel must seek to increase their understanding of the business
- It is the responsibility of the CIO to ensure effective communication between business personnel and IT personnel
ORGANIZATIONAL FUNDAMENTALS – ETHICS AND SECURITY
- Ethics and security are two fundamental building blocks that organizations must base their businesses on to be successful
- In recent years, such event as the 9/11 have shed new light on the meaning of ethics and security
ETHICS
- Ethics – the principles and standards that guide our behavior toward other people
- Privacy is a major ethical issues;
- Privacy – the right to be left alone when you want to be to have control ever your own personnel possessions and not to be observed without your consent
- Issues affected by technology advances
Intelligent property | Intangible creative work that is embodied in physical form |
Copyright | The legal protection afforded an expression of an idea, such as a song, video game and some types of proprietary documents |
Fair use doctrine | In certain situations, it is legal to use copyrighted material |
Pirated software | The unauthorized use, duplication, distribution or sale of copyrighted software |
Counterfeit software | Software that is manufactured to lock like the real thing and sold as such |
- One of the main ingredients in trust is privacy
- Primary reasons privacy issues lost trust for e-business
1. | Loss of personnel privacy is a top concern for Americans in the 21st century |
2. | Among Internet users, 37 percent would be “a lot” more inclined to purchase a product on a websites that had a privacy policy |
3. | Privacy/security is the number one factors that would convert Internet researchers into Internet buyers |
SECURITY – HOW MUCH WILL DOWNTIME COST YOUR BUSINESS??
Sources of Unplanned Downtime | ||
Bomb threat | Hacker | Snowstorm |
Burst pipe | Hail | Sprinkler malfunction |
Chemical spill | Hurricane | Static electricity |
Construction | Ice storm | Strike |
Corrupted data | Insects | Terrorism |
Earthquake | Lightning | Theft |
Electrical short | Network failure | Tornado |
Epidemic | Plane crash | Train derailment |
Equipment failure | Frozen pipe | Smoke damage |
Evacuation | Power outage | Vandalism |
Explosion | Power surge | Vehicle crash |
Fire | Rodents | Virus |
Flood | Sabotage | Water damage (various) |
Fraud | Shredded data | Wind |
· How much will downtime cost your business??
PROTECTING INTELLECTUAL ASSETS
· Organizational information is intellectual capital – it must be protected
· Information security – the protection of information from accidental or intentional misuse by persons inside or outside an organization
· E-business automatically crates tremendous information security risks for organization
Average Reported Computer Security
Expenditure/Investment per Employee
No comments:
Post a Comment