Chapter 12 Strategies for Managing the Technology Infrastructure.

Slides:



Advertisements
Similar presentations
© Prentice Hall CHAPTER 15 Managing the IS Function.
Advertisements

Systems Development Environment
Grow Your Business through Contact Centre Outsourcing Fanny Vaz Director, Personal Market Unit, CTM.
Acquiring Information Systems and Applications
Discovering the Value of IP January 24, 2006 Don Fiorentino Vice President/General Manager.
Security Controls – What Works
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
CHAPTER 10 & 13 IS within the Organization & Acquiring IS and Applications.
© 2007 by Prentice Hall1-1 Chapter 1 Meeting Present and Emerging Strategic Human Resource Challenges.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Chapter 5 IT Processes Presented by Dr. Mohamed Sammouda.
Managing the Information Technology Resource Jerry N. Luftman
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Lecture 15 Chapter 8 Organizing and Leading the IT Function.
Database Administration
Chapter 9 Database Design
Managing the Application Portfolio
Principles of Information Systems, Sixth Edition 1 Systems Investigation and Analysis Chapter 12.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Investigation and Analysis Chapter 12.
Lecture 15 Chapter 8 Organizing and Leading the IT Function.
Introduction to Systems Analysis and Design
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
Acquiring Information Systems and Applications
Acquiring Information Systems and Applications
PHASE 3: SYSTEMS DESIGN Chapter 8 System Architecture.
The Internetworked E-Business Enterprise
1 IS 8950 Managing and Leading a Networked IT Organization.
Systems Investigation and Analysis
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Strategic Management of IS/IT: Organization and Resources
Final Coverage Topic 4: INFORMATION RESOURCES and INFORMATION SYSTEMS By Dr. Faustino Reyes.
. Traffic Flow Management System Benefits Flexibility for Future Growth: TFMS provides a modern software architecture to meet future growth and support.
1 Chapter 9 Database Design. 2 2 In this chapter, you will learn: That successful database design must reflect the information system of which the database.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
1 Enterprise and Global Management of Information Technology.
Chapter 6 of the Executive Guide manual Technology.
Chapter 10 Managing Information Systems and Technology Investments.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Acquiring Information Systems and Applications
© 2014 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Alter – Information Systems © 2002 Prentice Hall 1 The Process of Information System Planning.
Investment Justifications PSIC Technology Objectives 1.
Acquiring Information Systems and Applications
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Why is Outsourcing a Problem? Customer view –length of contract –benefit tends to diminish over time –IT may be outsourced as a commodity, but later may.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
CHAPTER 13 Acquiring Information Systems and Applications.
1.NAFTA 2.International information systems architecture 3.Global business strategy plan 4.Enterprise-wide IT plan 5.Technology platform Which of the following.
Principles of Information Systems, Sixth Edition Systems Investigation and Analysis Chapter 12.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Catawba County Board of Commissioners Retreat June 11, 2007 It is a great time to be an innovator 2007 Technology Strategic Plan *
Chapter 3 Strategic Information Systems Planning.
Module 4: Managing IS Organizations Topic 8. Infrastructure Planning.
Database Administration
Chapter 11 Managing Application Development. Agenda Application management framework Application management issues Criteria for development approach Development.
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Chapter 15 Managing Information. Agenda Chief Information Officer IS Department and End Users Control & Security Contingency Management.
Week 7 Lecture Part 2 Introduction to Database Administration Samuel S. ConnSamuel S. Conn, Asst Professor.
Chapter 1 Meeting Present and Emerging Strategic Human Resource Challenges.
Chapter 15 Telecommunication Department Management.
Managing the Application Portfolio
Information Systems Development
Data and database administration
Information Technology (IT) Department
Information Systems in Global Business Today
Final HIPAA Security Rule
Presentation transcript:

Chapter 12 Strategies for Managing the Technology Infrastructure

Agenda Technology infrastructure Objectives of IT infrastructure Business issues in managing technology Justify IS/IT investment Management issues Technology strategies

IT Infrastructure Physical infrastructure of hardware, software, & network Architectures (plan) for information, process, organization, & technology Management policies for service delivery, capacity, security, privacy, sourcing, & audit Management processes & services for facilities, training vendor management, & technical support

Objectives of IT Infrastructure Provide proper infrastructure to support business IS needs Maximize the use of information and IS for business Provide a high degree of IS/IT integration in terms of cost, quality, & benefit Facilitate rapid application development Reduce complexity and non-standardization Build a global communication infrastructure

Business issues in Managing Technology Link IT investment to business needs Identify technical opportunities Identify IS/IT investment by competitors & partners Business and technical awareness Relate IT resources to business needs Appropriate user support

Justify IS/IT Investment Application specific cost/benefit analysis Replace obsolete technology Using more efficient technology for reducing costs of existing applications An enable for the overall business strategy Embrace growth in business volumes

Management Issues Information era Location and control of technology Integration challenges Security & privacy Contingency management Vendor management New technology

Information Era New geopolitical order in world New environment in the market place New environment with business

Location and Control of Technology Centralization or decentralization Selection criteria –Economic –Enterprise style –Innovation –Resources –Multinational organization

Integration Challenges - I Environment –Various platforms of hardware & software –Decentralization –Global organization –Different policies & procedures

Integration Challenges - II Solutions –Common operating systems –Sharing databases –Common application development tools –Common or integrated hardware –Integration of legacy and new systems (middleware) –Integration of packages

Security & Privacy Security –Protect data, information, IS/IT facilities Privacy –Protect confidential information of individuals

Security & Privacy Logical security Physical security Data security Communication security Administration security Application security

Physical Security Location (traffic) Security (lock) Environmental (air) Fire Power

Logical Security Photo Fingerprints Voice Eye Signature Password

Data Security Minimal privilege Minimal exposure

Communication Security Firewall Decryption Encryption Private & public key

Administrative Security Policy Procedure Hardware Software Employee Data

Application Security Input security Processing security Output security

Contingency Management - I Types –Emergency plan (natural disaster) –Backup plan –Recovery plan Contents –Procedures –Testing –Practicing –Updating

Vendor Management Reputation Future growth Product consideration Good lawyer and contract Others?

Contingency Management - II Disaster Recovery firm –Outsource strategic function? Planning steps –Discovering the important critical IT functions and process –Identifying the cost to have information unavailable –Balancing the cost of unavailability with the cost of recovery

Contingency Management - III Hardware backup –Hot site –Cold site –Mobile facility Software and database backup –Selective backup –Incremental backup –Total backup –On site backup –Off site backup

Contingency Management - IV Telecommunication backup –Fault-tolerant networks Personnel backup –Name –Phone no. –Address Back-up power generators System –Scaled-down manual system –Parallel systems

New Technology Identification & investment Experimentation, learning, and adaptation Rationalization and management control Widespread technology transfer

Technology Strategies High potential Strategic Key operational Support

High Potential Prototyping development R&D control, separate actitivity New technology or new use of technology Application generator/ RAD tools External skills, knowledge transfer Application evaluation Determine next stage of development

Strategic Application generator Incremental development Relational or object oriented database Ideal technology – new skills Flexible architecture Peak demand capacity Tested contingency plan External technology influence Isolate risky systems Tailor package to needs

Key Operational Software engineering and SDLC Integrated architectures Quality/charge control Peak capacity planning Hierarchical or network database Tested contingency plan Incremental technology Application packages- enhanced Mandatory standards Careful technology selection – IT veto

Support Evolutionary technology Capacity plan on average requirements Disinvestment End user support Avoid obsolescence Low priority contingency plan General purpose application package/unmodified Sustained quality and efficiency