Business Driven Technology Unit 1 Achieving Business Success Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
5-2 Unit One O Chapter 1– Business Driven Technology O Chapter 2 – Identifying Competitive Advantages O Chapter 3 – Strategic Initiatives for Implementing Competitive Advantages O Chapter 4 – Measuring the Success of Strategic Initiatives O Chapter 5– Organizational Structures that Support Strategic Initiatives
Chapter 5 Organizational Structures That Support Strategic Initiatives 5-3
5-4 LEARNING OUTCOMES 1. Define the primary IT roles along with their associated responsibilities 2. Explain the gap between IT and business professionals 3. Explain why ethics and security are fundamental building blocks of business today
5-5 Organizational Structures O Organizational employees must work closely together to develop strategic initiatives that create competitive advantages O Ethics and security are two fundamental building blocks that organizations must base their businesses upon
5-6 IT Roles and Responsibilities O Information technology is a relatively new functional area, having only been around formally for around 40 years O Recent IT-related strategic positions: O Chief Information Officer (CIO) O Chief Technology Officer (CTO) O Chief Security Officer (CSO) O Chief Privacy Officer (CPO) O Chief Knowledge Office (CKO)
5-7 IT Roles and Responsibilities O Chief Information Officer (CIO) – oversees all uses of IT and ensures the strategic alignment of IT with business goals and objectives O Broad CIO functions include: O Manager – ensuring the delivery of all IT projects, on time and within budget O Leader – ensuring the strategic vision of IT is in line with the strategic vision of the organization O Communicator – building and maintaining strong executive relationships
5-8 O Chief knowledge officer (CKO) - Responsible for collecting, maintaining, and distributing the organization’s knowledge O Chief privacy officer (CPO) – Responsible for ensuring the ethical and legal use of information IT Roles and Responsibilities
5-9 O Chief security officer (CSO) – Responsible for ensuring the security of IT systems O Chief technology officer (CTO) – Responsible for ensuring the throughput, speed, accuracy, availability, and reliability of IT IT Roles and Responsibilities
5-10 IT Roles and Responsibilities O What concerns CIOs the most
5-11 IT Roles and Responsibilities O Skills pivotal for success in executive IT roles
5-12 The Gap Between Business Personnel and IT Personnel O Business personnel possess expertise in functional areas such as marketing, accounting, and sales O IT personnel have the technological expertise O This typically causes a communications gap between the business personnel and IT personnel
5-13 Improving Communications O Business personnel must seek to increase their understanding of IT O IT personnel must seek to increase their understanding of the business O It is the responsibility of the CIO to ensure effective communication between business personnel and IT personnel
5-14 Organizational Fundamentals Ethics and Security O Ethics and security are two fundamental building blocks that organizations must base their businesses on to be successful O In recent years, such events as the Enron and Martha Stewart, along with 9/11 have shed new light on the meaning of ethics and security
5-15 Ethics O Ethics – the principles and standards that guide our behavior toward other people O Privacy is a major ethical issue O Privacy – the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
5-16 Ethics O Issues affected by technology advances O Intellectual property O Copyright O Fair use doctrine O Pirated software O Counterfeit software
5-17 SECURITY - HOW MUCH WILL DOWNTIME COST YOUR BUSINESS?
5-18 SECURITY - HOW MUCH WILL DOWNTIME COST YOUR BUSINESS?
5-19 Protecting Intellectual Assets O Organizational information is intellectual capital - it must be protected O Information security – the protection of information from accidental or intentional misuse by persons inside or outside an organization
5-20 Protecting Intellectual Assets
5-21 Protecting Intellectual Assets
5-22 LEARNING OUTCOME REVIEW O Now that you have finished the chapter please review the learning outcomes in your text