1 / 27

CHAPTER 5

CHAPTER 5. Organizational Structures that Support Strategic Initiatives. LEARNING OUTCOMES. 5.1 Compare the responsibilities of a chief information officer (CIO), chief technology officer (CTO), chief privacy officer (CPO), chief security officer (CSO), and chief knowledge office (CKO)

berk-bird
Télécharger la présentation

CHAPTER 5

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CHAPTER 5 Organizational Structures that Support Strategic Initiatives

  2. LEARNING OUTCOMES 5.1 Compare the responsibilities of a chief information officer (CIO), chief technology officer (CTO), chief privacy officer (CPO), chief security officer (CSO), and chief knowledge office (CKO) 5.2 Explain the gap between IT people and business people and the primary reason this gap exists 5.3 Define the relationship between information security and ethics

  3. ORGANIZATIONAL STRUCTURES • Organizational employees must work closely together to develop strategic initiatives that create competitive advantages • Ethics and security are two fundamental building blocks that organizations must base their businesses upon

  4. IT ROLES AND RESPONSIBILITIES • Information technology is a relatively new functional area, having only been around formally for around 40 years • Recent IT-related strategic positions: • Chief Information Officer (CIO) • Chief Technology Officer (CTO) • Chief Security Officer (CSO) • Chief Privacy Officer (CPO) • Chief Knowledge Office (CKO)

  5. IT ROLES AND RESPONSIBILITIES • Chief Information Officer (CIO) – oversees all uses of IT and ensures the strategic alignment of IT with business goals and objectives • Broad CIO functions include: • Manager – ensuring the delivery of all IT projects, on time and within budget • Leader – ensuring the strategic vision of IT is in line with the strategic vision of the organization • Communicator – building and maintaining strong executive relationships

  6. IT ROLES AND RESPONSIBILITIES • Average CIO compensation by industry

  7. IT ROLES AND RESPONSIBILITIES • What concerns CIOs the most

  8. IT ROLES AND RESPONSIBILITIES • Chief Technology Officer (CTO) – responsible for ensuring the throughput, speed, accuracy, availability, and reliability of IT • Chief Security Officer (CSO) – responsible for ensuring the security of IT systems • Chief Privacy Officer (CPO) – responsible for ensuring the ethical and legal use of information • Chief Knowledge Office (CKO) - responsible for collecting, maintaining, and distributing the organization’s knowledge

  9. IT ROLES AND RESPONSIBILITIES • Skills pivotal for success in executive IT roles

  10. THE GAP BETWEEN BUSINESS PERSONNEL AND IT PERSONNEL • Business personnel possess expertise in functional areas such as marketing, accounting, and sales • IT personnel have the technological expertise • This typically causes a communications gap between the business personnel and IT personnel

  11. Improving Communications • Business personnel must seek to increase their understanding of IT • IT personnel must seek to increase their understanding of the business • It is the responsibility of the CIO to ensure effective communication between business personnel and IT personnel

  12. ORGANIZATIONAL FUNDAMENTALS – ETHICS AND SECURITY • Ethics and security are two fundamental building blocks that organizations must base their businesses on to be successful • In recent years, such events as the Enron and Martha Stewart, along with 9/11 have shed new light on the meaning of ethics and security

  13. ETHICS • Ethics – the principles and standards that guide our behavior toward other people • Privacy is a major ethical issue • Privacy – the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent

  14. ETHICS • Issues affected by technology advances

  15. ETHICS • One of the main ingredients in trust is privacy • Primary reasons privacy issues lost trust for ebusiness

  16. SECURITY - HOW MUCH WILL DOWNTIME COST YOUR BUSINESS?

  17. SECURITY - HOW MUCH WILL DOWNTIME COST YOUR BUSINESS? • How Much Will Downtime Cost Your Business?

  18. Protecting Intellectual Assets • Organizational information is intellectual capital - it must be protected • Information security – the protection of information from accidental or intentional misuse by persons inside or outside an organization • Ebusiness automatically creates tremendous information security risks for organizations

  19. Protecting Intellectual Assets

  20. Protecting Intellectual Assets

  21. OPENING CASE STUDY QUESTIONSApple – Merging Technology, Business, and Entertainment • Predict what might have happened to Apple if its top executives had not supported investments in IT • Explain why it would be unethical for Apple to allow its customers to download free music from iTunes • Evaluate the effects on Apple’s business if it failed to secure its customer’s information and it was accidentally posted to an anonymous website • Explain why Apple should have a CIO, CTO, CPO, CSO, and CKO

  22. CHAPTER FIVE CASEExecutive Dilemmas in the Information Age • The vast array of business initiatives from SCM to ERP make it clear the IT is a business strategy and is quickly becoming a survival issue • This case explores several examples of executive IT issues resulting from IT

  23. CHAPTER FIVE CASE QUESTIONS • Explain why understanding technology, especially in the areas of security and ethics, is important for a CEO. How do CEO’s actions affect the organizational culture? • Identify why executives in nontechnological industries need to worry about technology and its potential business ramifications • Describe why continuously learning about technology allows an executive to better analyze threats and opportunities • Identify three things that a CTO, CPO, or CSO could do to prevent the above issues

  24. BUSINESS DRIVEN TECHNOLOGY UNIT ONE CLOSING

  25. UNIT CLOSING CASE ONEMajor League Baseball – The Real Competitive Advantages • Using Porter’s Five Forces Model, analyze MLBAM’s buyer power and supplier power. What could MLBAM do to increase customer loyalty? • Which of Porter’s three generic strategies is MLBAM following? • How can MLBAM use efficiency IT metrics and effectiveness IT metrics to improve its business?

  26. UNIT CLOSING CASE ONEMajor League Baseball – The Real Competitive Advantages • Predict what might happen to MLBAM if it failed to secure its subscriber information and all personal information – including credit card numbers – was accidentally posted to an anonymous website • How could MLBAM use a customer relationship management system to improve revenue growth?

  27. UNIT CLOSING CASE TWOBusiness 2.0: Bad Business Decisions • Explain why understanding information technology and management information systems can help you achieve business success – or more importantly, help you avoid business disasters – regardless of your major

More Related