Copyright 2010, The World Bank Group. All Rights Reserved. ICT - a core management issue Part 2 Managing ICT resources Produced in Collaboration between.

Slides:



Advertisements
Similar presentations
Chapter 14 Intranets & Extranets. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES Introduction Technical Infrastructure Planning an Intranet.
Advertisements

Digital Library Service at Higher Education in India
Steps towards E-Government in Syria
What is On Time Booking? Reservation and distribution system for passenger transport companies (airlines and ferries ) Tool that helps you to manage the.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
“High Performing Financial Institutions and the Keys to Success in an Uncertain Environment”
McGraw-Hill/Irwin Copyright © 2008, The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
4.1 © 2006 by Prentice Hall 4 Chapter The Digital Firm: Electronic Business and Electronic Commerce.
1 July 23, 2002 Strategic Technology Plan Briefing to LOT Committee.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Principles of Information Technology
Kamehameha Schools Kapalama High School Ke Ko’i Lipi 1 to 1 Laptop Learning Program Parent Presentation.
E-Learning, Human Capital Management and the Banking Sector Dimitris Baltas, ATC ROM.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 MAP Value Proposition.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Open Source for Government Alexander C. Pitzner Sr. Network Engineer Harrisburg University of Science and Technology
The Internetworked E-Business Enterprise
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
CISB113 Fundamentals of Information Systems Telecommunications & Network.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Transforming Services Creating Efficiencies Empowering Citizens Transforming Services Creating Efficiencies Empowering Citizens Transforming Services Creating.
Electronic Commerce & Marketing. What is E-Commerce? Business communications and transactions over networks and through computers, specifically –The buying.
Information Technology and E-Commerce: Managing Information, Knowledge, and Business Relationships © 2007 The McGraw-Hill Companies, Inc., All Rights.
Electronic Business. What is Electronic Business? It is defined as ICT (Information and Communication Technologies) application with support to all business.
IT Infrastructure for Business
Managing Information in a Global World
Computing Fundamentals Module Lesson 19 — Using Technology to Solve Problems Computer Literacy BASICS.
 What is intranet What is intranet  FeaturesFeatures  ArchitectureArchitecture  MeritsMerits  applicationsapplications  What is ExtranetWhat is.
E-Procurement An Architectural Framework Approach December 10, 2008.
Britt’s AC Web-centered Intranet Linda S. Cook 9/10/01 Barry University, Merritt Island, FL Program: MSIT Instructor: Dr. Pamela Luckett IT699 Integrated.
Chapter 4 Copyright © 2011 by Nelson Education Ltd. 1 Prepared by Norm Althouse University of Calgary Prepared by Norm Althouse University of Calgary.
1 Seminar on 2008 SNA Implementation June 2010, Saint John’s, Antigua and Barbuda GULAB SINGH UN Statistics Division Diagnostic Framework: National.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Software Categories Figure 3-1.
Copyright 2010, The World Bank Group. All Rights Reserved. ICT - a core management issue Part 1 Managing ICT resources Produced in Collaboration between.
Presented by Yasmin Al-bobo Supervise Dr.Issam El-Bohise E-COMMERCE & Internet Law Intranet.
13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.
ACM 511 Introduction to Computer Networks. Computer Networks.
The information supply chain FDIC XBRL International Conference Mr. Inscoe.
E-BUSINESS.
Chapter 17 THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition Chapter Using Technology to Manage.
Introduction to E-Commerce. Define e-commerce in your own words.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
18 Westminster Palace Gardens, Artillery Row, London SW1P 1RR Tel: +44 (0) Web:
The World Bank Group works with government agencies, non-governmental organisations and private sector companies to formulate assisting strategies that.
Computing Fundamentals Module Lesson 6 — Using Technology to Solve Problems Computer Literacy BASICS.
Chapter 4 Intranets and Extranets. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Introduction Technical Infrastructure Planning.
Statistical Organization and Management: Information Technology Stefan Schweinfest, UNSD Workshop for SADC Member States, Luanda, December 2006.
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
Workshop on Statistical Organization and Management for SADC Member States – UNSD Information Technology Group 1 Discussions Luanda, 05 December 2006.
E-Commerce Intra-Business and E-Government Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
Federal Acquisition Service U.S. General Services Administration Region 7 Industry Day February 24, 2015.
Contact US: ID: Phone Number:
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
1 EXPANDING E-BUSINESS OPPORTUNITIES FOR VIETNAM Presented by Russell Pipe Director of E-Government Programs Kenan Institute Asia – Bangkok at the VIETNAM.
Interaction with Vendors that Support the PFMS: Experience of Kazakhstan Treasury Committee of the Ministry of Finance of the Republic of Kazakhstan, 2016.
Chapter 9 : Knowledge Transfer in the E-World KNOWLEDGE TRANSFER IN THE E-WORLD Chapter 4.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Role of Metadata in dissemination of census data Regional Seminar on dissemination and spatial analysis of census data, Nairobi, September, 2010.
AfterOpen Source Software and Open Standards there's Open Content Jan Willem Broekema Open Source as Option in your Software Strategy e-government.
1 The government digital agenda aims to create digital services that are more efficient, convenient, secure and accessible than the manual services they.
INTRODUCTION TO E-BUSINESS AND E-COMMERCE
Information Technology (IT) Department
Chapter 6 Innovative Systems: From E-Government and E-Learning to C2C E-Commerce and Collaborative Commerce.
Contact Center Security Strategies
Regional Perspectives on Paperless Trade:
Intranets & Extranets Companies that do not have the resources to invest in enterprise applications can still achieve some measure of information integration.
Technology Chapters 9 and 18.
Presentation transcript:

Copyright 2010, The World Bank Group. All Rights Reserved. ICT - a core management issue Part 2 Managing ICT resources Produced in Collaboration between World Bank Institute and the Development Data Group (DECDG)

Copyright 2010, The World Bank Group. All Rights Reserved. ICT for dissemination Modern technology has reduced the need for printing In addition to printed formats, CD-ROMS and Internet can be used Advantages of Internet publishing include: Speed Cost reduction Versatility and interactivity No limit to data and metadata Equal access for all Possibility to publish out-of-print editions Database searches are possible Flexible download formats 2

Copyright 2010, The World Bank Group. All Rights Reserved. ICT for internal communication Intranet very useful tool for internal communication built from the same concepts and technologies used for the Internet provide a gateway to the Internet by means of a network gateway with a firewall deliver tools and applications, and for collaboration used as corporate culture-change platforms, enabling organization- wide discussions Extranets extend a private network onto the Internet with special provisions for access, authorization, and authentication 3

Copyright 2010, The World Bank Group. All Rights Reserved. ICT for external communication and e- Government e-Government increasingly important: promoted by the United Nations is about providing information and knowledge to citizens Electronic dissemination of statistics is therefore part of e- Government is also about providing e-services to citizens and business Electronic data collection is therefore also part of e-Government Some countries have started collecting Census data electronically 4

Copyright 2010, The World Bank Group. All Rights Reserved. Custom-made or off-the-shelf Customized software development is risky Many customized software projects were never or only partially completed, or much later than planned, or over budget If an off-the-shelf product meets most of the requirements, buy it and drop additional requirements Avoid immature products Check experiences of other buyers of a product Check whether or not the product is compatible with existing IT Assess risks and price/performance issues 5

Copyright 2010, The World Bank Group. All Rights Reserved. Outsourcing Outsourcing: buying ITC products or services Proven technologies are available in the marketplace Standard products are less expensive Vendors have specialized skills The NSO can concentrate on its core mission Competition can bring innovation to bear Risks can be shared with a vendor Proprietary systems are only available from a vendor 6

Copyright 2010, The World Bank Group. All Rights Reserved. Relations with vendors NSOs can accomplish their missions by outsourcing Jeopardizing core functions or information confidentiality are risks Outsourcing risks can be shared with a vendor, along with the rewards Market analysis is needed to be sure the acquisition of the product is justified Care should be taken not to invent something that is much more cost-effectively available in the market Do not create a sub-optimal solution to a problem best left to the creativity and competition of the private sector Maintain a healthy relationship with a commercial supplier Managing outsourcing requires special expertise 7

Copyright 2010, The World Bank Group. All Rights Reserved. Sound ICT practices Conditions for sound ICT management include: Attention from top-level management Effective risk analysis Avoidance of untried technologies Preference for small projects End-user involvement Preparation of a detailed ITC project plan Three phases: 1.Selection phase 2.Controlling 3.Evaluation 8

Copyright 2010, The World Bank Group. All Rights Reserved. ICT Project management Larger ICT projects demand special management Management elements: Investment management Information management IT architecture System development Information security 9

Copyright 2010, The World Bank Group. All Rights Reserved. ICT Strategy Main pillars of an ICT strategy for NSOs should be: One common system with common standards across the NSO Common access throughout the organization to all data and metadata Data security: common access restricted in accordance with the rules on the protection of confidential data Common documentation: access to all common repositories of documentation Metadata must be accessible in direct conjunction with the data Common platforms and tools; a limited number of technological platforms Common methods for ICT projects and system development ICT training program to facilitate collaboration and rotation of staff 10

Copyright 2010, The World Bank Group. All Rights Reserved. Computer system security Risks include break-ins, causing disruption and possible corruption For NSOs electronic data collection involves risks Information security policy is needed to ensure: Integrity Confidentiality Availability of data and systems 11

Copyright 2010, The World Bank Group. All Rights Reserved. Security threats Viruses, worms and Trojans are malware Other malware includes adware and spyware Antivirus software can be used to fight malware Spam is unwanted and can be kept out through spam filters A firewall is designed to block unauthorized access to computer systems, in particular Intranets 12

Copyright 2010, The World Bank Group. All Rights Reserved. Free statistical software For general office use: Open Office, a suite compatible with Microsoft Office Free statistical packages include: CSPro CCOUNT ProtoGenie IMPS Stats and others ASYCUDA is software for international trade statistics 13

Copyright 2010, The World Bank Group. All Rights Reserved. Paperless office The concept of paperless office arose with the proliferation of the PC Improvements in printers and copiers have made it easier to reproduce documents in bulk Initially, the use of paper increased instead of decreased Over the last decade, the use of office paper has stabilized Many paper systems can be replaced by digital systems and Internet replaces reference books Paper can also be eliminated by automating paper-based processes that rely on forms; in the case of NSOs electronic data capture Special consideration must be given to electronic signature etc. Consideration must also be given to equal access; paper must be maintained when some participants cannot practically gain electronic access 14