IT ROLES AND RESPONSIBILITIES
1. Chief Information Officer (CIO)
CIO to ensure effective communications between business and IT
personnel. A wide function of in CIO is manager to ensure the delivery
of all IT project, on time and within budget. Next, leader is the wide
functions of a CIO for make sure the strategic vision of IT in the
organization. Furthermore, communicator must building and maintaining
strong executive relationship.
2. Chief Technology Officer (CTO)
CTO responsible for ensuring the throughout, speed, accuracy,
availability, and reliability of an organization’s information
technology.
Similar to CIOs but CIOs take on the additional responsibility
usefulness of ensure that IT is associated with the organization’s
strategic initiatives.
3. Chief Privacy Officer (CPO)
CPO responsible for ensuring the ethical and legal use of information.
This role is regarding the use of personal information, including
medical data and financial information, and laws and regulations.
4. Chief Knowledge Officer (CKO)
CKO responsible for collecting, maintaining and distribution the
organization’s knowledge. Those who hold this position have to manage
intellectual capital and the custodian of knowledge management practices
in an organization.
5. Chief Security Officer (CSO)
5. Chief Security Officer (CSO)
The CSO generally serves as the business leader responsible for the
development, implementation and management of the organization’s
corporate security vision, strategy and programs. They direct staff in
identifying, developing, implementing and maintaining security processes
across the organization to reduce risks, respond to incidents, and
limit exposure to liability in all areas of financial, physical, and
personal risk; establish appropriate standards and risk controls
associated with intellectual property; and direct the establishment and
implementation of policies and procedures related to data security.
Gap Between Business Personnel And It Personnel
§ The
gap between the business arm in a company and information technology is
exist because presence of perception business people that the
Information Technology Department generates expenses not income. This
means, they looks alike liability and not asset to the company. In the
same time, The Information technology department is “hidden” from the
customer often classified as a “back office” business initiative or
process. This create a different perspective to the business personnel
and the result, a gap is exist.
Ways To Decrease Gap Between Both IT Personnel And Business Personnel
Communication
§ Communication
is the main ingredient that will close the gap between the business
personnel and the IT Department. Business leaders must understand,
really understand, that Information Technology is not optional but
critical to the success of the business.
§ The head of the company sets the tone for the entire business.
§ In addition IT department teams need to understand the business practices of the company.
Cross Training
Rettig suggests that initiating cross training is one way to reduce the distance between business and IT.
§ Cross
training is a loaded concept and most technologists will be
specialists with years of training in their chosen fieldt. This
mean, the IT personnel could be train with other department skills to
instill some confidence in them. Not to give them other job.
ORGANIZATIONAL FUNDAMENTAL
1. ETHICS
Ethics is the principle and standards that guide our behavior toward other people.
Descriptive
ethics is exactly that a description of "what is" in the land of
business ethics. This perception seeks to recognize moral & ethical
systems shared by people, cultures, and societies. This form seeks to
know prevailing views and actions about ethical performance. One
problem to this school of thought is that using this perspective may
lead one to believe that an actual unethical behavior is satisfactory
because "everyone is doing it."
Issues Affected By Technology Advances :
i) Intellectual property - Intangible creative work that is personified in physical form.
ii) Copyright - The legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents.
iii) Fair use doctrine - In certain situations, it is legal to use copyrighted material.
iv) Pirated software - The unauthorized use, duplication, distribution, or sale of copyrighted software.
v) Counterfeit software - Software that is manufactured to look like the real thing and sold as such.
2. SECURITY
a. Security is a major ethical issues.
b. The
right to be left alone when you want to have control over your own
personal possessions and not to be observed without your consent.
Privacy
It
is the the ability of an individual or group to seclude themselves or
information about themselves and thereby reveal themselves selectively.
The boundaries and content of what is considered private differ among
cultures and individuals, but share basic common themes.
i-Information Security
Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.[1]
The terms information security, computer security and information assurance are frequently used interchangeably. These fields are interrelated often and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them.
ii- Electronic Business
Electronic business,
commonly referred to as "ebusiness" or "e-business", or an internet
business, may be defined as the application of information and
communication technologies (ICT)
in support of all the activities of business. Commerce constitutes the
exchange of products and services between businesses, groups and
individuals and can be seen as one of the essential activities of any
business
The term "e-business" was coined by IBM's marketing and internet teams in 1996.
Electronic
business methods enable companies to link their internal and external
data processing systems more efficiently and flexibly, to work more
closely with suppliers and partners, and to better satisfy the needs and
expectations of their customers.
Summary
An efficient structure facilitates the management and explain the relationships, roles and responsibilities, authority and line level supervisory or reporting. In reviewing the organizational structure, Manager shall can specify the human resources, financial, technical and can be obtained, how they should be allocated, and less resources.
Organizations may differ from other ways that affect the structure. For
example, some organizations have been paid or volunteer members who are
very active. Representatives of these groups can look forward
to chair the Board of Directors, special meeting, or other activities to
address their concerns and keep their support. Occasionally power
or their participation governed by the law; is sometimes the
organization sets the policiesdelineating the level and type
of participation and whether certain interest or remunerationcan
be expected.
Organizational Structure of the Business Analysis Function
The role of Business Analysis can exist in a variety of structures
within an organizational framework. Because Business Analysts typically
act as a liaison between the business and technology functions of a
company, the role can be often successful either aligned to a line of
business, within IT or sometimes both.
Business Alignment
No comments:
Post a Comment