Monday 15 July 2013

CHAPTER 5 ORGANIZATIONAL STRUCRURES THAT SUPPORT STRATEGIC INITIATIVES

IT ROLES AND RESPONSIBILITIES

1. Chief Information Officer (CIO)
     CIO to ensure effective communications between business and IT personnel. A wide function of in CIO is manager to ensure the delivery of all IT project, on time and within budget. Next, leader is the wide functions of a CIO for make sure the strategic vision of IT in the organization. Furthermore, communicator must building and maintaining strong executive relationship.


2. Chief Technology Officer (CTO)
     CTO responsible for ensuring the throughout, speed, accuracy, availability, and reliability of an organization’s information technology.
     Similar to CIOs but CIOs take on the additional responsibility usefulness of ensure that IT is associated with the organization’s strategic initiatives.


3.  Chief Privacy Officer (CPO) 
      CPO responsible for ensuring the ethical and legal use of information. This role is regarding the use of personal information, including medical data and financial information, and laws and regulations.


4. Chief Knowledge Officer (CKO)
     CKO responsible for collecting, maintaining and distribution the organization’s knowledge. Those who hold this position have to manage intellectual capital and the custodian of knowledge management practices in an organization.


5. Chief Security Officer (CSO)
     The CSO generally serves as the business leader responsible for the development, implementation and management of the organization’s corporate security vision, strategy and programs. They direct staff in identifying, developing, implementing and maintaining security processes across the organization to reduce risks, respond to incidents, and limit exposure to liability in all areas of financial, physical, and personal risk; establish appropriate standards and risk controls associated with intellectual property; and direct the establishment and implementation of policies and procedures related to data security.

Gap Between Business Personnel And It Personnel
§  The gap between the business arm in a company and information technology is exist because presence of perception business people that the Information Technology Department generates expenses not income. This means, they looks alike liability and not asset to the company. In the same time, The Information technology department is “hidden” from the customer often classified as a “back office” business initiative or process. This create a different perspective to the business  personnel and the result, a gap is exist.

Ways To Decrease Gap Between Both IT Personnel And Business Personnel

 Communication
§  Communication is the main ingredient that will close the gap between the business personnel and the IT Department. Business leaders must understand, really understand, that  Information Technology is not optional but critical to the success of the business.
§  The head of the company sets the tone for the entire business.
§  In addition IT department teams need to understand the business practices of the company.
 Cross Training
Rettig suggests that initiating cross training is one way to reduce the distance between business and IT.
§       Cross   training   is   a loaded  concept  and  most  technologists  will be specialists  with  years  of  training  in  their  chosen  fieldt. This mean, the IT personnel could be train with other department skills to instill some confidence in them. Not to give them other job.



ORGANIZATIONAL FUNDAMENTAL
1.    ETHICS
Ethics is the principle and standards that guide our behavior toward other people.
Descriptive ethics is exactly that a description of "what is"       in the land of business ethics.  This perception seeks to recognize moral & ethical systems shared by people, cultures, and societies.  This form seeks to know prevailing views and actions about ethical performance.  One problem to this school of thought is that using this perspective may lead one to believe that an actual unethical behavior is satisfactory because "everyone is doing it."
 Issues Affected By Technology Advances :
i) Intellectual property - Intangible creative work that is personified in physical form.
ii) Copyright - The legal protection afforded an expression of an idea, such as a song, video   game, and some types of proprietary documents.
iii) Fair use doctrine - In certain situations, it is legal to use copyrighted material.
iv) Pirated software - The unauthorized use, duplication, distribution, or sale of copyrighted software.
v) Counterfeit software - Software that is manufactured to look like the real thing and sold as such.


2. SECURITY
a.    Security is a major ethical issues.
b.    The right to be left alone when you want to have control over your own personal possessions and not to be observed without your consent.
Privacy
It is the the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals, but share basic common themes.

i-Information Security

Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.[1]
The terms information security, computer security and information assurance are frequently used interchangeably. These fields are interrelated often and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them.

 

ii- Electronic Business


Electronic business, commonly referred to as "ebusiness" or "e-business", or an internet business, may be defined as the application of information and communication technologies (ICT) in support of all the activities of business. Commerce constitutes the exchange of products and services between businesses, groups and individuals and can be seen as one of the essential activities of any business
The term "e-business" was coined by IBM's marketing and internet teams in 1996.
Electronic business methods enable companies to link their internal and external data processing systems more efficiently and flexibly, to work more closely with suppliers and partners, and to better satisfy the needs and expectations of their customers.



Summary

     An efficient structure facilitates the management and explain the relationships, roles and responsibilities, authority and line level supervisory or reporting. In reviewing the organizational structure, Manager shall can specify the human resources, financial, technical and can be obtained, how they should be allocated, and less resources.

     Organizations may differ from other ways that affect the structure. For example, some organizations have been paid or volunteer members who are very active. Representatives of these groups can look forward to chair the Board of Directors, special meeting, or other activities to address their concerns and keep their support. Occasionally power or their participation governed by the law; is sometimes the organization sets the policiesdelineating the level and type of participation and whether certain interest or remunerationcan be expected.


Organizational Structure of the Business Analysis Function

      The role of Business Analysis can exist in a variety of structures within an organizational framework. Because Business Analysts typically act as a liaison between the business and technology functions of a company, the role can be often successful either aligned to a line of business, within IT or sometimes both.

Business Alignment

      When Business Analysts report up through the business side, they are often subject matter experts for a specific line of business. These Business Analsysts typically work solely on project work for a particular business, pulling in Business Analysts from other areas for cross-functional projects. In this case, there are usually Business Systems Analysts on the IT side to focus on more technical requirements.

No comments:

Post a Comment