Download presentation
Presentation is loading. Please wait.
Published byCecil Anderson Modified over 9 years ago
1
IT - The Organization and the Individual
2
Learning Objectives Recognize the difficulties in managing information resources. Recognize the difficulties in managing information resources. Recognize information systems ’ vulnerability and manage risk. Recognize information systems ’ vulnerability and manage risk. Discuss the security issues of the Web and electronic commerce. Discuss the security issues of the Web and electronic commerce. Identify the major aspects of the economics of information technology. Identify the major aspects of the economics of information technology. Demonstrate how to define and measure tangible information technology benefits. Demonstrate how to define and measure tangible information technology benefits. Show how to evaluate intangible information technology benefits. Show how to evaluate intangible information technology benefits.
3
God is on the Small Stuff and it all matters “Leadership is an Art” Bruce Bickel & Stan Jantz
4
….In the Small Stuff Empowering is more than delegating Empowering is more than delegating Have the courage to hold people accountable Have the courage to hold people accountable Associate with leaders as often as you can Associate with leaders as often as you can Being a good example is better than giving good advice Being a good example is better than giving good advice There are born leaders and there are leaders who are made. And then there arte those who become leaders out of necessity There are born leaders and there are leaders who are made. And then there arte those who become leaders out of necessity
5
Small Stuff (cont.) An exceptional leader is one who gets average people to do superior work An exceptional leader is one who gets average people to do superior work If you want to lead, read If you want to lead, read Use your influence sparingly. It will last longer Use your influence sparingly. It will last longer When you find a leader, follow When you find a leader, follow When you identify a follower, lead When you identify a follower, lead Be available to take someone’s place in an emergency Be available to take someone’s place in an emergency Power begins to corrupt the moment you begin to seek it Power begins to corrupt the moment you begin to seek it
6
Small Stuff (cont.) A signpost like a peer, only warns you about the road ahead. But a map, like a mentor can show you hoe to get where you want to go A signpost like a peer, only warns you about the road ahead. But a map, like a mentor can show you hoe to get where you want to go Find a mentor Find a mentor Managing people begins with caring for them Managing people begins with caring for them One of the sobering characteristics of leadership is that leaders are judged to a greater than followers. One of the sobering characteristics of leadership is that leaders are judged to a greater than followers.
7
Evaluating Trends
8
Technology & Organizations Impact of new technologies on organizations: Impact of new technologies on organizations: First, most organizations will perform existing functions at decreasing costs over time and thus become more efficient.First, most organizations will perform existing functions at decreasing costs over time and thus become more efficient. Second, creative organizations will find new uses for information technology—based on the improving price- to-performance ratio—and thus become more effective.Second, creative organizations will find new uses for information technology—based on the improving price- to-performance ratio—and thus become more effective. New and enhanced products and services will provide competitive advantage to organizations that have the creativity to exploit the increasing power of information technology.New and enhanced products and services will provide competitive advantage to organizations that have the creativity to exploit the increasing power of information technology.
9
Trend -- Information -> Collaboration Today’s Internet focuses on access to and delivery of information Today’s Internet focuses on access to and delivery of information Tomorrow’s Internet will support human collaboration in an information-rich environment Tomorrow’s Internet will support human collaboration in an information-rich environment The Internet is global, and is creating a global capability to build knowledge-based communities The Internet is global, and is creating a global capability to build knowledge-based communities
10
Examples of reading
11
Technological & Financial Trends Moore’s Law Moore’s Law Moore suggested in 1965 that the number of transistors, and thus the power, of an integrated circuit (computer chip) would double every year while the cost remained the same.Moore suggested in 1965 that the number of transistors, and thus the power, of an integrated circuit (computer chip) would double every year while the cost remained the same. He later revised this estimate to a slightly less rapid pace: doubling every 18 months.He later revised this estimate to a slightly less rapid pace: doubling every 18 months. Price-to-performance ratio Price-to-performance ratio Organizations will have the opportunity to buy, for the same price, twice the processing power in 1½ years, four times the power in 3 years, eight times the power in 4½ years, etc.Organizations will have the opportunity to buy, for the same price, twice the processing power in 1½ years, four times the power in 3 years, eight times the power in 4½ years, etc.
12
Moore’s Law
13
Nolan’s Stages Theory of IT Adoption and Org. Learning (Pg 528-530) Initiation Initiation Expansion Expansion Control Control Integration Integration Data administration Data administration Maturity Maturity
14
Research and Development Commercialization Partnerships Privatization NSFNET Internet2, Abilene, vBNS Advanced US Govt Networks ARPAnet gigabit testbeds Active Nets wireless WDM SprintLink InternetMCI US Govt Networks ANS Interoperable High Performance Research &Education Networks 21st Century Networking Quality of Service (QoS)
19
The Productivity Paradox Over the last 50 years, organizations have invested trillions of dollars in information technology. Over the last 50 years, organizations have invested trillions of dollars in information technology. Total worldwide annual spending on IT in 2000 was two trillion dollars, and is expected to be over three trillion dollars by 2004.Total worldwide annual spending on IT in 2000 was two trillion dollars, and is expected to be over three trillion dollars by 2004. Yet it is very hard to demonstrate that IT investments really have increased outputs or wages. Yet it is very hard to demonstrate that IT investments really have increased outputs or wages. The discrepancy between measures of investment in information technology and measures of output at the national level is described as the Productivity Paradox. The discrepancy between measures of investment in information technology and measures of output at the national level is described as the Productivity Paradox.
20
Productivity Economists define productivity as outputs divided by inputs. Economists define productivity as outputs divided by inputs. Outputs are calculated by multiplying units produced, for example, number of automobiles, by their average value.Outputs are calculated by multiplying units produced, for example, number of automobiles, by their average value. If inputs are measured simply as hours of work, the resulting ratio of outputs to inputs is labor productivity. If inputs are measured simply as hours of work, the resulting ratio of outputs to inputs is labor productivity. If other inputs—investments and materials—are included, the ratio is known as multifactor productivity. If other inputs—investments and materials—are included, the ratio is known as multifactor productivity.
21
Risk Management
22
Value of Information to Decision Making The value of information to decision making is the difference between the net benefits—benefits adjusted for costs—of decisions made using the information and decisions without the information. The value of information to decision making is the difference between the net benefits—benefits adjusted for costs—of decisions made using the information and decisions without the information. Value of Information = Net benefits with information – Net benefits without information
23
Total Cost of Ownership An interesting approach for evaluating the value of IT is the total cost of ownership (TCO). An interesting approach for evaluating the value of IT is the total cost of ownership (TCO). TCO is a formula for calculating the cost of owning and operating a PC.TCO is a formula for calculating the cost of owning and operating a PC. The cost includes hardware, technical support, maintenance, software upgrades, and help-desk and peer support.The cost includes hardware, technical support, maintenance, software upgrades, and help-desk and peer support. By identifying such costs, organizations get more accurate cost-benefit analyses and also reduce the TCO.By identifying such costs, organizations get more accurate cost-benefit analyses and also reduce the TCO. It is possible to reduce TCO of workstations in networked environments by as much as 26 percent by adopting best practices in workstation management (Kirwin et al., 1997).It is possible to reduce TCO of workstations in networked environments by as much as 26 percent by adopting best practices in workstation management (Kirwin et al., 1997).
24
Assessing Intangible Benefits There are 4 main methodologies of assessing intangible benefits: Value analysis allows users to evaluate intangible benefits on a low-cost, trial basis before deciding whether to commit to a larger investment. Value analysis allows users to evaluate intangible benefits on a low-cost, trial basis before deciding whether to commit to a larger investment. Information economics focuses on the application of IT in areas where its intangible benefits contribute to performance on key aspects of organizational strategies and activities. Information economics focuses on the application of IT in areas where its intangible benefits contribute to performance on key aspects of organizational strategies and activities. Management by maxim provides a means of rationalizing IT infrastructure investments. Management by maxim provides a means of rationalizing IT infrastructure investments. Option valuation takes into account potential future benefits that current IT investments could produce. Option valuation takes into account potential future benefits that current IT investments could produce.
25
Disaster Recovery Plan A disaster recovery plan is essential to any security system. Here are some key thoughts about disaster recovery by Knoll (1986): The purpose of a recovery plan is to keep the business running after a disaster occurs.The purpose of a recovery plan is to keep the business running after a disaster occurs. Recovery planning is part of asset protection.Recovery planning is part of asset protection. Planning should focus first on recovery from a total loss of all capabilities.Planning should focus first on recovery from a total loss of all capabilities. Proof of capability usually involves some kind of what-if analysis that shows that the recovery plan is current.Proof of capability usually involves some kind of what-if analysis that shows that the recovery plan is current. All critical applications must be identified and their recovery procedures addressed in the plan.All critical applications must be identified and their recovery procedures addressed in the plan.
26
Ethics Where does work end and private life begin?
27
Change Portfolio Career – Handy Portfolio Career – Handy Telecommuting Telecommuting Smart Work – 80% cerebral/20%manual Smart Work – 80% cerebral/20%manual Virtual Corporations Virtual Corporations Intellectual Capital Intellectual Capital
28
Video
29
Ethics Privacy Privacy Intellectual Property Intellectual Property CopyrightCopyright Trade SecretsTrade Secrets PatentPatent Quality of Life Quality of Life Social Responsibility Social Responsibility
30
Case: Cyber Crime On Feb. 6, 2000 - the biggest EC sites were hit by cyber crime. On Feb. 6, 2000 - the biggest EC sites were hit by cyber crime. Yahoo!, eBay, Amazon.com, E*TradeYahoo!, eBay, Amazon.com, E*Trade The attacker(s) used a method called denial of service (DOS). The attacker(s) used a method called denial of service (DOS). Clog a system by hammering a Web site ’ s equipment with too many requests for informationClog a system by hammering a Web site ’ s equipment with too many requests for information The total damage worldwide was estimated at $5- 10 billion (U.S.). The total damage worldwide was estimated at $5- 10 billion (U.S.). The alleged attacker, from the Philippines, was not prosecuted because he did not break any law in the Philippines.The alleged attacker, from the Philippines, was not prosecuted because he did not break any law in the Philippines.
31
Lessons Learned from the Case Information resources that include computers, networks, programs, and data are vulnerable to unforeseen attacks. Information resources that include computers, networks, programs, and data are vulnerable to unforeseen attacks. Many countries do not have sufficient laws to deal with computer criminals. Many countries do not have sufficient laws to deal with computer criminals. Protection of networked systems can be a complex issue. Protection of networked systems can be a complex issue. Attackers can zero on a single company, or can attack many companies, without discrimination. Attackers can zero on a single company, or can attack many companies, without discrimination. Attackers use different attack methods. Attackers use different attack methods. Although variations of the attack methods are known, the defence against them is difficult and/or expensive. Although variations of the attack methods are known, the defence against them is difficult and/or expensive.
32
U.S. Federal Statutes According to the FBI, an average white-collar crime involves $23,000; but an average computer crime involves about $600,000. According to the FBI, an average white-collar crime involves $23,000; but an average computer crime involves about $600,000. The following U.S. federal statutes deal with computer crime; The following U.S. federal statutes deal with computer crime; Counterfeit Access Device and Computer Fraud Act of 1984Counterfeit Access Device and Computer Fraud Act of 1984 Computer Fraud and Abuse Act of 1986Computer Fraud and Abuse Act of 1986 Computer Abuse Amendment Act of 1994 (prohibits transmission of viruses)Computer Abuse Amendment Act of 1994 (prohibits transmission of viruses) Computer Security Act of 1987Computer Security Act of 1987 Electronic Communications Privacy Act of 1986Electronic Communications Privacy Act of 1986 Electronic Funds Transfer Act of 1980Electronic Funds Transfer Act of 1980 Video privacy protection act of 1988Video privacy protection act of 1988
33
IT Security in the 21 st Century Increasing the Reliability of Systems. Increasing the Reliability of Systems. The objective relating to reliability is to use fault tolerance to keep the information systems working, even if some parts fail. Intelligent Systems for Early Detection. Intelligent Systems for Early Detection. Detecting intrusion in its beginning is extremely important, especially for classified information and financial data. Intelligent Systems in Auditing. Intelligent Systems in Auditing. Intelligent systems are used to enhance the task of IS auditing.
34
IT Security in the 21 st Century (cont.) Artificial Intelligence in Biometrics. Artificial Intelligence in Biometrics. Expert systems, neural computing, voice recognition, and fuzzy logic can be used to enhance the capabilities of several biometric systems. Expert Systems for Diagnosis, Prognosis, and Disaster Planning. Expert systems can be used to diagnose troubles in computer systems and to suggest solutions. Expert Systems for Diagnosis, Prognosis, and Disaster Planning. Expert systems can be used to diagnose troubles in computer systems and to suggest solutions. Smart Cards. Smart card technology can be used to protect PCs on LANs. Smart Cards. Smart card technology can be used to protect PCs on LANs. Fighting Hackers. Several new products are available for fighting hackers. Fighting Hackers. Several new products are available for fighting hackers.
35
National Security Loss of individual privacy Loss of individual privacy Wiretaps Wiretaps Library Example Library Example Right’s at Work Right’s at Work
36
Merry Christmas!! See you January 6 th, 2003
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.