11 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Developing Business/IT Strategies Chapter 11.

Slides:



Advertisements
Similar presentations
Global Information Systems
Advertisements

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Enterprise & Global Management of Information Technology Chapter 14.
McGraw-Hill/Irwin Copyright © 2008, The McGraw-Hill Companies, Inc. All rights reserved.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Chapter 12 Enterprise and Global Management of Information Technology.
Developing Business/IT Strategies
Enterprise and Global Management of e-Business Technology
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Chapter 12: Enterprise and Global Management of IT Impact of.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Enterprise and Global Management of Information Technology
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Security and Ethical Challenges
Developing Business/IT Strategies Chapter 11 McGraw-Hill/IrwinCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 14 Enterprise and Global Management of Information Technology.
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 11 Business/IT Strategies for Development.
1 Tonga Institute of Higher Education IT 245 Management Information Systems Lecture 11 Security, and Ethical Challenges of E- Business.
McGraw-Hill/Irwin ©2008,The McGraw-Hill Companies, All Rights Reserved Chapter 11 Security and Ethical Challenges.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Chapter 11 Security and Ethical Challenges.
12-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
1 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Chapter 9 Developing Business/Information Technology Strategies.
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved.
PRELIM NOTES. Managing Information Resources & Technologies To serve customers well… companies need to be proficient in half a dozen key areas: reduced.
Strategic Management of IS/IT: Organization and Resources
Chapter 1 Foundations of Information Systems in Business
UDMIS.info Ethics and IS. UDMIS.info The Ethics of IS Ethics and Privacy Ethical Issues Law & Order.
Enterprise and Global Management of Information Technology Chapter 14 McGraw-Hill/IrwinCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
McGraw-Hill/Irwin ©2008,The McGraw-Hill Companies, All Rights Reserved Chapter 12 Enterprise and Global Management of Information Technology.
1 Enterprise and Global Management of Information Technology.
Security and Ethical Challenges Chapter 13 McGraw-Hill/IrwinCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Business/IT Strategies for Development
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 11 Business/IT Strategies for Development.
Enterprise and Global Management of e-Business Technology
Security and Ethics Privacy Employment Health Crime Working
12-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Irwin/McGraw-Hill Copyright © 2000, The McGraw-Hill Companies, Inc. All rights reserved. I n t r o d u c t i o n t o I n f o r m a t i o n S y s t e m.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Developing Business/IT Strategies Chapter 11 McGraw-Hill/IrwinCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Security and Ethical Challenges Chapter 13.
Security And EthicalChallenges of IT Oktalia Juwita, S.Kom., M.MT. Dasar-dasar Sistem Informasi – IKU1102.
Security and Ethics Safeguards and Codes of Conduct.
Foundations of Information Systems in Business
Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Lecturer: Dr Mohammad Nabil Almunawar Foundations of Information Systems in Business.
McGraw-Hill/Irwin Copyright © 2008, The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies,
INTRODUCTION TO INFORMATION SYSTEMS LECTURE 11: SECURITY & ETHICAL CHALLENGES أ/ غدير عاشور
UNIT V Security Management of Information Technology.
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
Enterprise and Global Management of Information Technology
INFS 211: Introduction to Information Technology
Securing Information Systems
Developing Business/IT Strategies
Security and Ethical Challenges
Chapter 13 Security and Ethical Challenges.
INFORMATION SYSTEMS SECURITY and CONTROL
Business/Information Technology Strategies
Developing Business/IT Strategies
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 21 Successfully Implementing The Information System
Presentation transcript:

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Developing Business/IT Strategies Chapter 11

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Strategic Planning Definition: Development of an organization’s mission, goals, strategies, and policies

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. What is SWOT Analysis? SWOT analysis is used to evaluate the impact that each possible strategic opportunity can have on a company and its use of information technology Strengths – core competencies Weaknesses – substandard business performance Opportunities – potential for new markets or innovative breakthroughs Threats – potential for losses posed by competitive forces

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Business Model Definition: A conceptual framework that expresses the underlying economic logic and system that prove how a business can deliver value to customers at an appropriate cost and make money

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Business/IT Planning Process Components Strategy Development – developing business strategies that support a company’s business vision Resource Management – developing strategic plans for managing or out-sourcing a company’s IT resources Technology Architecture – making strategic IT choices that reflect an information technology architecture designed to support a company’s e- business and other business/IT initiatives

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. End User Resistance Solutions Proper education and training End user involvement in organizational changes, and in the development of new information systems

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Dimensions of Change Management

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Change Management Tactics Involve as many people as possible in e-business planning and application development Make constant change an expected part of the culture Tell everyone as much as possible about everything as often as possible, preferably in person Make liberal use of financial incentives and recognition Work within the company culture, not around it

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Change Management Process

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Security and Ethical Challenges Chapter 13

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Business Ethics Definition: Questions that managers must confront as part of their daily business decision making including: Equity Rights Honesty Exercise of Corporate Power

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Corporate Social Responsibility Theories Stockholder Theory – managers are agents of the stockholders, and their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices Social Contract Theory – companies have ethical responsibilities to all members of society, which allow corporations to exist based on a social contract

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Corporate Social Responsibility Theories Stakeholder Theory – managers have an ethical responsibility to manage a firm for the benefit of all its stakeholders, which are all individuals and groups that have a stake in or claim on a company

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Principles of Technology Ethics Proportionality – the good achieved by the technology must outweigh the harm or risk Informed Consent – those affected by the technology should understand and accept the risks

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Hacking Definition: The obsessive use of computers, or the unauthorized access and use of networked computer systems

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Common Hacking Tactics Trojan Horse – a program that, unknown to the user, contains instructions that exploit a known vulnerability in some software Back Doors – a point hidden point of entry to be used in case the original entry point has been detected or blocked

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Privacy Issues Accessing individuals’ private conversations and computer records, and collecting and sharing information about individuals gained from their visits to Internet websites and newsgroups Always knowing where a person is, especially as mobile and paging services become more closely associated with people rather than places

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Censorship Spamming – indiscriminate sending of unsolicited messages to many Internet users Flaming – sending extremely critical, derogatory, and often vulgar messages or newsgroup postings to other users on the Internet or online services

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Ergonomics Definition: Designing healthy work environments that are safe, comfortable, and pleasant for people to work in, thus increasing employee morale and productivity

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Security Management The goal of security management is the accuracy, integrity, and safety of all information system processes and resources.

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Internetworked Security Defenses Encryption – data transmitted in scrambled form and unscrambled by computer systems for authorized users only Firewalls – a gatekeeper system that protects a company’s intranets and other computer networks from intrusion by providing a filter and safe transfer point for access to and from the Internet and other networks

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Denial of Service Defenses At the zombie machines – set and enforce security policies At the ISP – monitor and block traffic spikes At the victim’s website – create backup servers and network connections

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Other Security Measures Security Codes – multilevel password system used to gain access into the system Backup Files – duplicate files of data or programs Security Monitors – software that monitors the use of computer systems and networks and protects them from unauthorized use, fraud, and destruction

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Fault Tolerant Systems Systems that have redundant processors, peripherals, and software that provide a: Fail-over capability to back up components in the event of system failure Fail-safe capability where the computer system continues to operate at the same level even if there is a major hardware or software failure

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Enterprise & Global Management of Information Technology Chapter 14

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Why Study IT Management? As the 21 st century unfolds, many companies throughout the world are intent on transforming themselves into global business powerhouses via major investments in global e-business, e- commerce, and other IT initiatives.

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Components of IT Management

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Components of Business/IT Planning Strategy Development – developing business strategies that support a company’s business vision Resource Management – developing strategic plans for managing or outsourcing a company’s IT resources Technology Architecture – making strategic IT choices that reflect an information technology architecture designed to support a company’s business/IT initiatives

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Information Technology Architecture Technology Platform – Networks, computer systems, system software and integrated enterprise application software provide a computing and communications infrastructure, or platform, that supports the strategic use of information technology for e-business, e- commerce, and other business/IT applications Data Resources – operational and specialized databases store and provide data and information for business processes and decision support

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Information Technology Architecture Applications Architecture – integrated architecture of enterprise systems that support strategic business initiatives as well as cross-functional business processes IT Organization – organizational structure of the IS function within a company and the distribution of IS specialists are designed to meet the changing strategies of a business

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Application Development Management Definition: Managing activities such as systems analysis and design, prototyping, applications programming, project management, quality assurance, and system maintenance for all major business/IT development projects

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. System Performance Monitors Definition: Software packages that monitor the processing of computer jobs, help develop a planned schedule of computer operations that can optimize computer system performance, and produce detailed statistics that are invaluable for effective planning and control of computing capacity

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Chargeback Systems Definition: Output of a system performance monitor that allocates costs to users based on the information services rendered

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Chief Information Officer Job Description: Oversees all uses of information technology in many companies, and brings them into alignment with strategic business goals

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Global IT Management Dimensions

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. International vs. Global vs. Transnational

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Global IT Platform Definition: Managing the hardware, software, data resources, telecommunications networks, and computing facilities that support global business operations

Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Transborder Data Flows Definition: Business data flow across international borders over the telecommunications networks of global information systems May be viewed as violating a nation’s sovereignty or violating their laws to protect local IT industry from competition or their labor regulations for protecting local jobs