International IT Development and Management David Kroenke Using MIS 3e Part 4: The International Dimension.

Slides:



Advertisements
Similar presentations
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
Advertisements

Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 12-1 International Business Environments and Operations, 13/e Part 5 Global Strategy,
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 3.1.
International MIS The International Dimension. INT_DIM-2 Study Questions Copyright © 2015 Pearson Education, Inc. Q1: How does the global economy affect.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
International Business Environments & Operations
Globalization Copyright © 2010 Pearson Education, Inc. publishing as Prentice Hall.
International MIS Chapter Extension 18. ce18-2 Study Questions Q1: How does the global economy impact organizations and processes? Q2: What are the characteristics.
International Business Environments & Operations
Managing Global Human Resources
chapter 14 International Organizational Design and Control
Chapter 6 The Voice of the Market.
 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall Chapter 15 Implementing and Validating the Quality System.
9- 1 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall i t ’s good and good for you Chapter Nine New-Product Development and Product.
Copyright © 2011 Pearson Education 16-1 International Business Environments and Operations, 13/e Global Edition Part 6 Managing International Operations.
 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall Chapter 6 The Voice of the Market.
1. 2 Technology in Action Technology in Focus: Careers in IT Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 2 The Origins of Software
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.1.
9-1 Organizational Design, Competences, and Technology Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall.
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 15-1 International Business Environments and Operations Part 5 Global Strategy, Structure,
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 4.1.
Computers Are Your Future Tenth Edition Chapter 10: Careers & Certification Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
© Pearson Prentice Hall 2009 Part 4-1 Using MIS 2e Part 4 The International Dimension: International IT Development & Management David Kroenke.
GO! All In One 2/E By: Shelley Gaskin, Nancy Graviett, Debra Geoghan Chapter 5 Using Internet Explorer, Microsoft Cloud Computing, and OneNote Copyright.
Chapter Extension 8 Functional Processes, Applications, and Systems.
chapter 16 International Marketing International Business, 6th Edition
International MIS International Dimension. ID-2 Study Questions Q1: How does the global economy impact organizations and processes? Q2: What are the characteristics.
GO! All In One 2/E By: Shelley Gaskin, Nancy Graviett, Debra Geoghan Chapter 2 Getting Started with Windows 8.1 Copyright © 2015 Pearson Education, Inc.
8-1 Organizational Design and Strategy in a Changing Global Environment Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 8 Audit Planning 1.
Direct / Online marketing Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 17.
Chapter Sixteen Market-Based Management and Financial Performance.
International MIS The International Dimension. ID-2 Study Questions Copyright © 2016 Pearson Education, Inc. Q1: How does the global economy affect organizations.
Marketing Environment 03 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 9- slide 1 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Chapter Nine New-Product Development and Product Life-Cycle Strategies.
GO! with Office 2013 Volume 1 By: Shelley Gaskin, Alicia Vargas, and Carolyn McLellan Access Chapter 3 Forms, Filters, and Reports.
1 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter Six Competitor Analysis and Sources of Advantage.
Global IS and the Value Chain David Kroenke Using MIS 3e Part 3: The International Dimension.
Copyright © 2011 Pearson Education 15-1 International Business Environments and Operations, 13/e Global Edition Part 5 Global Strategy, Structure, and.
Chapter 5 Initiating and Planning Systems Development Projects Modern Systems Analysis and Design Sixth Edition Jeffrey A. Hoffer Joey F. George Joseph.
THE LEGAL ENVIRONMENT OF BUSINESS © 2009 Pearson Education, Inc. publishing as Prentice Hall Ch The Legal Environment of Business A Critical Thinking.
Organizing in a Changing Global Environment Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 3-1.
Managing Organizational Change Chapter Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
The International Dimension, Part IV International IT Development and Management © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 16-1 International Business Environments and Operations, 13/e Part 6 Managing International.
© 2012 Pearson Education, Inc. publishing Prentice Hall. Note 17 Generic Strategies— Advantage and Scope.
1 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall.
CHAPTER 2 Personal Selling Opportunities in the Age of Information.
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 19-1 International Business Environments and Operations, 13/e Part 6 Managing International.
CHAPTER 1 Developing a Personal Selling Philosophy.
© 2012 Pearson Education, Inc. publishing Prentice Hall. Note 9 The Product Life Cycle.
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 17-1 International Business Environments and Operations, 13/e Part 6 Managing International.
© 2012 Pearson Education, Inc. publishing Prentice Hall. Note 18 Generic Strategies—The Value Map.
© 2012 Pearson Education, Inc. publishing Prentice Hall. Note 16 What is a Marketing Strategy?
David M. Kroenke and David J. Auer Database Processing Fundamentals, Design, and Implementation Appendix B: Getting Started in Systems Analysis and Design.
Chapter 16 - slide 1 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Chapter Sixteen Personal Selling and Sales Promotion.
Copyright © 2015 Pearson Education, Inc.17-1 International Business Environments & Operations 15e Daniels ● Radebaugh ● Sullivan.
David M. Kroenke and David J. Auer Database Processing: Fundamentals, Design, and Implementation Chapter Ten: Managing Databases with SQL Server 2012,
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. Chapter
Chapter Two Marketing Performance and Marketing Profitability.
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. Chapter
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall Process Specifications and Structured Decisions Systems Analysis and Design, 8e Kendall.
Chapter 9 Strategy Review, Evaluation, and Control
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
Business Markets and Business Buying Behavior
International Business Environments and Operations, 13/e
Organizing in a Changing Global
Presentation transcript:

International IT Development and Management David Kroenke Using MIS 3e Part 4: The International Dimension

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-2 Q1 What characteristics make international IS management challenging? Q2 Why is international information systems development difficult? Q3 What are the challenges of international project management? Q4 What are the challenges of international IS Management responsibilities? Q5 How does the international dimension affect computer security risk management? Q6 What challenges exist for investigating global computer crime? Study Questions

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-3 Size  Comprised of people from many cultures with different languages Complexity  More IS and IT assets  Exposed to more risk and greater uncertainty Security incidents more difficult to investigate Challenging Characteristics of International IT Management

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-4 Q1 What characteristics make international IS management challenging? Q2 Why is international information systems development difficult? Q3 What are the challenges of international project management? Q4 What are the challenges of international IS Management responsibilities? Q5 How does the international dimension affect computer security risk management? Q6 What challenges exist for investigating global computer crime? Study Questions

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-5 Development of international systems exceedingly complicated  Used by people living and working in vastly different cultures Localizing software is challenging  Surmountable with good software design and development Hard to determine unified purpose and scope Even harder to determine requirements International Information Systems Development Difficulties

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-6 Q1 What characteristics make international IS management challenging? Q2 Why is international information systems development difficult? Q3 What are the challenges of international project management? Q4 What are the challenges of international IS Management responsibilities? Q5 How does the international dimension affect computer security risk management? Q6 What challenges exist for investigating global computer crime? Study Questions

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-7 International projects require complex integration of results  Work groups distributed across globe Task dependencies span teams in different countries Time management troublesome  Different cultures have different workweeks  No standard rate of development Different pay rates for labor Quality standards vary from location to location Human resources and worker expectations differ Effective team communication important Challenges of International Project Management

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-8 Figure ID4-1 Challenges of International Project Management

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-9 Define set of standard business processes  Requires conversion to different work processes  People resist change Develop alternative versions that support different processes in different countries  Creates system design challenges Business processes may vary by nation or culture  Creates many systems, instead of single one Responses to Challenges

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-10 Q1 What characteristics make international IS management challenging? Q2 Why is international information systems development difficult? Q3 What are the challenges of international project management? Q4 What are the challenges of international IS Management responsibilities? Q5 How does the international dimension affect computer security risk management? Q6 What challenges exist for investigating global computer crime? Study Questions

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-11 Planning  Task becomes more complex and difficult  Supporting business processes more complicated  Global economic changes affect processes and strategies  Technology adoption produces change Operations  Different cultures and languages add complexity  Integration of similar but different systems  Outsourcing  Outsource vendor’s information systems Challenges of International IT Management

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-12 Q1 What characteristics make international IS management challenging? Q2 Why is international information systems development difficult? Q3 What are the challenges of international project management? Q4 What are the challenges of international IS Management responsibilities? Q5 How does the international dimension affect computer security risk management? Q6 What challenges exist for investigating global computer crime? Study Questions

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-13 More difficult and complex  Political, civil unrest, terrorists, natural disaster More threats  Infrastructure located around the world Possibility of threat difficult to estimate  Subject to great uncertainty Technical and data safeguards  May need more and more complex safeguards  Human safeguards need to be evaluated on culture-by- culture basis Affects on Computer Security Risk Management

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-14 Q1 What characteristics make international IS management challenging? Q2 Why is international information systems development difficult? Q3 What are the challenges of international project management? Q4 What are the challenges of international IS Management responsibilities? Q5 How does the international dimension affect computer security risk management? Q6 What challenges exist for investigating global computer crime? Study Questions

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-15 International computer crime is common. Web sites operated in African countries phish for data in the United States. A scam in the United States steals data from a U.S. corporation and sells that data to an illegal operation in South America. Someone kidnaps a U.S. citizen in a foreign country and sends an ransom demand to relatives in the United States. The service provider is located in a Middle Eastern country. Challenges Exist for Investigating Global Computer Crime

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-16 U.S. criminal investigator can obtain evidence only with consent of the country in which evidence lies. Most nations have laws, agreements, and treaties for cooperating in criminal investigations, but formal process for obtaining permission to search is slow and cumbersome. Some nations will not cooperate. G8 group of nations developed a 24-hour point-of- contact system. System, used by more than 30 nations, requires each country to staff an office that can speed processing of permission for evidence gathering. Challenges Exist for Investigating Global Computer Crime

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-17 Evidence-gathering facilitated by informal arrangements among individuals in security agencies and organizations. However, law regarding admissibility of such evidence in court is complicated. U.S. Fourth Amendment can apply in complex ways to searches outside United States. The law for gathering evidence for computer crimes in United States is complicated, and even more so for international investigations. Organizations that suspect they have been victims of a computer crime, especially international computer crime, should seek legal counsel, first. Challenges Exist for Investigating Global Computer Crime

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-18 Q1 What characteristics make international IS management challenging? Q2 Why is international information systems development difficult? Q3 What are the challenges of international project management? Q4 What are the challenges of international IS Management responsibilities? Q5 How does the international dimension affect computer security risk management? Q6 What challenges exist for investigating global computer crime? Active Review

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-19 United States Internal Revenue Service (IRS) Business Systems Modernization (BSM) project has been a multiyear attempt to replace existing tax-processing information systems with systems based on modern technology Subsystem that has generated most controversy and caused most serious delays is the Customer Account Data Engine (CADE). The heart of CADE is a database of business rules. IRS database contains rules about tax laws and processing of tax forms.  Example of a rule: Rule 10 IF the amount on line 7 of Form 1040EZ is greater than zero, THEN invoke Rule 15. With a rule-based approach, IRS needs to only develop programs that access the database and follow the rules. Case 4: The Need for Technical Feasibility

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-20 Using traditional technology, developers interview users, determine what the business rules are, and then write computer code that operates in accordance with the rules. Disadvantage of such traditional programming is that only technically trained programmers can decipher the rules in the program code. Also, only trained programmers can add, change, or delete rules. Advantage of rule-based systems such as CADE is that the business rules are stored in the database and can be read, added, changed, or deleted by personnel with business knowledge but little computer training. Hence, in theory, CADE is more adaptable to changing requirements than a system written with traditional programming languages. Case 4: The Need for Technical Feasibility

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-21 Technical feasibility of using a rule-based system for a problem as large and complex as IRS tax processing is unknown. No one tried to estimate that feasibility. Result has been a string of schedule delays and cost overruns. Database for simple returns has some 1,200 business rules, but no reliable estimate has yet been developed for the number of rules required for the full system. Some experts believe difficulty and complexity of creating rules increases geometrically with the number of rules. Case 4: The Need for Technical Feasibility

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-22 Software Engineering Institute of (SEI) Carnegie Mellon University verified that no one knows with any certainty how many business rules will eventually be required. “No one knows how long rule harvesting will take, how many people will be required, the background, training, and experience of the people required, or how much it will cost. Based on anecdotal information presented to us, we believe the time will be measured in years and cost will be measured in the tens of millions of dollars. Case 4: The Need for Technical Feasibility

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-23 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America. Copyright © 2011 Pearson Education, Inc. Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall