Monday 15 July 2013

CHAPTER 5

ORGANIZATIONAL STRUCTURES

     Organizational structures as communication flowcharts that communication in which managers at various levels are required to deliver information to too many people for too many levels of approval.
      Well designed organizational structures will produce efficient communication channels and encourage fast, clean decisions. To develop strategic initiatives that create competitive advantages organizational employees must work closely together.
      Organizational structure allows the expressed allocation of responsibilities for different functions and processes to different entities such as the branch, work group and individual.

IT ROLES AND RESPONSIBILITIES

1. Chief Information Officer (CIO)
     CIO ensures effective communications between business and IT personnel. A wide function of in CIO is manager to ensure the delivery of all IT project, on time and within budget. Next, leader is the wide functions of a CIO for make sure the strategic vision of IT in the organization. Furthermore, communicator must building and maintaining strong executive relationship.


2. Chief Technology Officer (CTO)
     CTO responsible for ensuring the throughout, speed, accuracy, availability, and reliability of an organization’s information technology.
     Similar to CIOs but CIOs take on the additional responsibility usefulness of ensure that IT is associated with the organization’s strategic initiatives.


3.  Chief Privacy Officer (CPO) 
      CPO responsible for ensuring the ethical and legal use of information. This role is regarding the use of personal information, including medical data and financial information, and laws and regulations.


4. Chief Knowledge Officer (CKO)
     CKO responsible for collecting, maintaining and distribution the organization’s knowledge. Those who hold this position have to manage intellectual capital and the custodian of knowledge management practices in an organization.


5. Chief Security Officer (CSO)
     The CSO generally serves as the business leader responsible for the development, implementation and management of the organization’s corporate security vision, strategy and programs. They direct staff in identifying, developing, implementing and maintaining security processes across the organization to reduce risks, respond to incidents, and limit exposure to liability in all areas of financial, physical, and personal risk; establish appropriate standards and risk controls associated with intellectual property; and direct the establishment and implementation of policies and procedures related to data security.

Gap Between Business Personnel And It Personnel
§  The gap between the business arm in a company and information technology is exist because presence of perception business people that the Information Technology Department generates expenses not income. This means, they looks alike liability and not asset to the company. In the same time, The Information technology department is “hidden” from the customer often classified as a “back office” business initiative or process. This create a different perspective to the business  personnel and the result, a gap is exist.

Ways To Decrease Gap Between Both IT Personnel And Business Personnel

 Communication
§ Communication is the main ingredient that will close the gap between the business personnel and the IT Department. Business leaders must understand, really understand, that Information Technology is not optional but critical to the success of the business.
§ The head of the company sets the tone for the entire business.
§ In addition IT department teams need to understand the business practices of the company.
 Cross Training
Rettig suggests that initiating cross training is one way to reduce the distance between business and IT.
§       Cross   training   is   a loaded  concept  and  most  technologists  will be specialists  with  years  of  training  in  their  chosen  field. This mean, the IT personnel could be train with other department skills to install some confidence in them. Not to give them other job.

ORGANIZATIONAL FUNDAMENTAL
1.    ETHICS
Ethics is the principle and standards that guide our behaviour toward other people.
Descriptive ethics is exactly that a description of "what is"       in the land of business ethics.  This perception seeks to recognize moral & ethical systems shared by people, cultures, and societies.  This form seeks to know prevailing views and actions about ethical performance.  One problem to this school of thought is that using this perspective may lead one to believe that an actual unethical behaviour is satisfactory because "everyone is doing it."
 Issues Affected By Technology Advances :
i) Intellectual property - Intangible creative work that is personified in physical form.
ii) Copyright - The legal protection afforded an expression of an idea, such as a song, video   game, and some types of proprietary documents.
iii) Fair use doctrine - In certain situations, it is legal to use copyrighted material.
iv) Pirated software - The unauthorized use, duplication, distribution, or sale of copyrighted software.
v) Counterfeit software - Software that is manufactured to look like the real thing and sold as such.


2. SECURITY
a.    Security is a major ethical issues.
b.    The right to be left alone when you want to have control over your own personal possessions and not to be observed without your consent.
Privacy
It is the the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals, but share basic common themes.

i-Information Security
Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.[1]
The terms information security, computer security and information assurance are frequently used interchangeably. These fields are interrelated often and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them.

ii- Electronic Business

Electronic business, commonly referred to as "ebusiness" or "e-business", or an internet business, may be defined as the application of information and communication technologies (ICT) in support of all the activities of business. Commerce constitutes the exchange of products and services between businesses, groups and individuals and can be seen as one of the essential activities of any business
The term "e-business" was coined by IBM's marketing and internet teams in 1996.
Electronic business methods enable companies to link their internal and external data processing systems more efficiently and flexibly, to work more closely with suppliers and partners, and to better satisfy the needs and expectations of their customers.

No comments:

Post a Comment