5.1. Compare the responsibilities of a Chief Information Officer (CIO), Chief Technology Officer (CTO), Chief Privacy Officer (CPO), Chief Security Officer (CSO), and Chief Knowledge Office (CKO).
5.2. Explain the gap between IT people and business people and the primary reasons this gap exists.
5.3.Define the relationship between information security and ethics.
Organizational Structures
- Organizational employees must work closely together to develop strategic initiatives that create competitive advantages.
- ethics and security are two fundamental building blocks that organizations must base their businesses upon.
- Information technology is a relatively new functional area, having only been around formally for around 40 years.
- Recent IT-related strategic positions:
- - Chief Information Officer
- - Chief Technology Officer
- - Chief Security Officer
- - Chief Privacy Officer
- - Chief Knowledge Officer.
- Chief Information Officer (CIO)
- Overseas all uses of IT and ensures the strategic alignment of IT with business goals and objectives.
- Broad CIO functions include:
- - Manager - Ensuring the delivery of all IT projects, on time and within budget.
- -Leader - Ensuring the strategic vision of IT is in line with the strategic vision of the organization.
- - Communicator - Building and maintaining strong executive relationships.
- CIO position involved all the internal and external relationships.
- The main things which concerned the CIO's the most is the customers satisfaction.
- He is the one who will taking care all the system in the organization. He is also the master in the technology that will handle all the things that occur or happened during the systems is being used.
- for example, malfunctioning.
- CTO are responsible for ensuring the throughput, speed, accuracy, availability, and reliability of IT. meaning that CTO need to ensure the efficiency of IT metrics.
- CSO is responsible for ensuring the security of IT systems and developing strategies and IT safeguards against attack from hackers and viruses.
- Meaning that, CSO have to ensure that the system is free from hackers and viruses that can breakdown the systems.
- CPO is responsible for ensuring the ethical and legal use of information within an organization .
- CPO's are the newest senior executive position in IT.
- Many CPO's are lawyers by training or ex-lawyer, enabling them to understand the often complex legal issues surrounding the use of information.
- For example, they always work with the legal of IT cases.
- CKO is responsible for collecting, maintaining, and distributing the organization's knowledge.
- CKO designs Programs and System that make it easy for people to reuse the knowledge.
- these system create repositories of organizational documents, methodologies, tools, and practices, and they established methods for filtering the information.
- For example, CKO create a database to keep or store all the information or data that the organization have so that the data will not missing.
- The data also can be kept in digital form.
- Ability to communicate effectively.
- Strategic Thinking and Planning.
- Understanding Business Processes and Operations.
- Negotiation/sales skills.
- Thorough Knowledge of Technology options.
- Technical Proficiency.
- Business personnel possess expertise in functional areas such as marketing, accounting and sales.
- IT personnel have the technology expertise.
- This typically causes a communications gap between the business personnel and IT personnel.
- Business personnel have their own vocabularies based on their experience and expertise.
- IT personnel have their own vocabularies consisting of acronyms and technical terms.
- effective communication between business and IT personnel should be two-way street with each side making effort to better understand the other ( including through written and oral communication)
- Business personnel must seek to increase their understanding of IT.
- IT personnel must seek to increase their understanding of the business.
- It is the responsibility of the CIO to ensure effective communication between business personnel and IT personnel.
- For example, CIO can organize seminar, event or forum to change the opinion between IT and Business personnel people.
- Ethics and security are two fundamental building blocks that organizations must base their businesses on to be successful.
- In recent years, such events as the Enron and Martha Stewart, along with 9/11 have shed new light on the meaning of ethics and security.
Ethics
- Ethics is the principles and standards that guide our behaviour toward other people.
- Privacy is a major ethical issue for today.
- Privacy is the right to be , to have control over your own personnel possession, and not to be observed without your consent.
- The one who will clarify that the ethics is one of the terms that should be followed are CIO and MIS.
- The issues that affected by technology advances are :
- - Intellectual Property - Intangible creative work that is embodied in physical form such as pattern and trademark.
- - Copyright - The legal protection afforded an expression of an idea such as a song, video game, and some types of proprietary documents.
- - Fair use Doctrine- In certain situations, it is legal to use copyrighted material such as use the author name for the thesis reference.
- -Pirated Software - the unauthorized use, duplication, distribution, or sale of copyrighted software such as duplicate the original version into the fake one for example, movie.
- - Counterfeit software - Software that is manufactured to look like the real thing and sold as such. For example, Microsoft.
- One of the main ingredients in trust is privacy.
- Primary reasons privacy issues lost trust for e-business are :-
- - Loss of privacy is a top concern for Americans in the 21st century.
- - Among internet users, 37 percent would be " a lot" more inclined to purchase a product on a web site that had a privacy policy.
- - Privacy/security is the number one factor that would convert internet researchers into internet buyers
- Organizational information is intellectual capital.
- Therefore, it must be protected safely from being leaked.
- Information security is the protection of information from accidental or intentional misuse by persons inside or outside an organization.
- E-business automatically creates tremendous information security risks for organizations,
No comments:
Post a Comment