Friday, January 10, 2014

Organizing Chapter Five

 

 For this chapter I'm posting my blog early because this chapter is a short one. So, for chapter five : Organizational Structures that Support Strategic Initiatives, it consist of knowing the chief officers that are vital to IT such as Chief Information Officer, Chief Security Officer, Chief Technology Officer and many more. We also learnt about the difference of IT people and Business people, I didn't even realized that there is a different between those two or maybe I did. Then there's ethic and security discussion.

   There are a few important role or position that are related to IT:
  • Chief Information Officer, who oversees all uses of IT and ensures the strategic alignment of IT with business goals and objectives. CIO function as a leader, communicator and a manager.
  • Chief Technology Officer, who is responsible for ensuring the throughput, speed, accuracy, availability, reliability of IT.
  • Chief Security Officer, responsible for ensuring the security of IT system.
  • Chief Privacy Officer, responsible for ensuring the ethical and legal use of information.
  • Chief Knowledge Officer, responsible for collecting, maintaining and distributing the organization's knowledge.



   Did you ever notice the difference between It people and Business people? Well there is few difference between these two such as IT people are good with technologies while Business people are good in marketing, sales, accounting etc. In this situation, there is gap between these type of people so how do suggest we eliminate this gap? Well by improving communication, in other words Business people must learn IT and IT people must learn Business. The Chief Information Officer is responsible to ensure the effective communication amongst these two.  

  Ethics and security are both important building blocks that organizations must base their business on to be successful. Ethics is the principles and standards that guide our behaviour toward other people. Some of the issues that arise due to technology advance are intellectual property (intangible creative work that is embodied in physical form), copyright (the legal protection afforded an expression of an idea), fair use doctrine (in certain situations, it is legal to use copyrighted material), pirated software (the unauthorized use, duplication, distribution or sale of copyrighted software) and counterfeit software (software that is manufactured to look like the real thing and sold as such.
Security is need to protect organizational information cause it is intellectual capital. Information security is the protection of information from accidental or intentional misuse by persons inside or outside and organization. 



   Thank you for reading!!!


No comments:

Post a Comment