Saturday, August 6, 2016

BUS 188: Chapter 11 Outline

Matthew Mercado
08/06/16
BUS 188 (11:00am-3:00pm)
Chapter 11 Outline (2 page minimum)
Aggarwal

Chapter 11 Outline: Information Systems Management

            In the previous chapter, we talked about how IS security is important to consider and how we can respond. However, we will be talking about the functions and organization behind the Information Systems Department. The major functions of IS systems department include: Plan the use of IS to accomplish organizational goals and strategies, manage outsourcing relationships, protect information assets, develop, operate, and maintain the organization’s computing infrastructure, and finally develop, operate, and maintain applications.

            The Chief Information Officer (or CIO) is the title for the IS Department head. Some of the other titles he/she has are vice president of information services, director of information services, and director of computer services.  The CIO always reports to the CEO while sometimes-executive reports are sent to the Chief operating officer (or COO). The CIO’s IS department is in charge of technology, operations, development, and outsourcing relations. Operations department manages the computing infrastructure that includes computers, in-house server farms, network, and communications media. The development department manages the processes of creating new IS as well maintain the already existing ones. Lastly, the outsourcing relations IS department exists in organizations that have negotiated outsourcing agreements with other companies to provide equipment, applications, and other services. Another function to take into consideration is the data administration that’s sole duty is to protect data and information assets by establish data standards and data management practices and policies. This shows how in-depth the IS department and how they function in every field.

            There are a variety of IS-related jobs that are both interesting and paid well. Some of these jobs include (but not limited to): Business analysts, systems analyst, programmers, test QQ engineers, technical writers, tech support engineers, network administrator, IT consults, technical sales, IT Project manager, IT manager, database administrator, business intelligence analyst, CTOs, CIOs, and CISOs. The amount of responsibility is different for each field, but all serve a purpose with different criteria, tasks, and salary ranges. To get up to CTO, CIO, and CISO positions, workers would have to work their way up, adapt to situations/scenarios, and have a very deep and in-depth knowledge on security threats, protections, and trends.

            Outsourcing the process of hiring another organization to perform a service. This is often done to save costs, gain expertise, and to free management time. Organizations and companies often chose to outsource portions of there IS system activities. For management as said above, outsourcing is used to obtain expertise, avoid managerial problems, and free management time. For cost reduction, outsourcing can be used to obtain part-time services as well as gain economies of scale. Lastly for risk reduction, outsourcing can be used to cap financial exposure, improve equality, and reduce implementation risk. Businesses and organizations have found hundreds of ways to outsource information services and portions of information systems. Some businesses choose to outsource the acquisitions and operation of computer hardware, the development of software, and even outsource an entire system. PeopleSoft, for example, gained popularity by providing payroll function as an outsourced service.

            Where there are advantages of outsourcing, there are also risks. Some of these include loss of control, benefits outweighed by long-term (or LT) costs, and they’re not being an easy exit. The loss of control include vendor in driver’s seat, technology direction, potential loss of intellectual capital, product enhancements in wrong priority, vendor management, direction or identity changes, and finally if the CIO is superfluous. Benefits outweighing by LT costs include having a higher unit costs forever, paying for someone else’s mismanagement, outsource vendor is de facto sole source in time, and may not get what you pay for but you don’t know it. Lastly, the no easy exist include critical knowledge in minds of vendors, NOT employees and expensive and risky to change vendors. When choosing to outsource, it is quite a difficult decision because businesses are constantly thinking about ups and downs. The correct decision in outsourcing may not be clear, but only time and events will enable the company to make a decision in doing so.

            Lastly, when becoming a user of information systems, we have both rights and responsibilities with your relationship with the IS department. We have the right to computer hardware and programs, reliable network and internet connections, a secure computing environment, protection from viruses/worms/threats, contribute to requirements for new system features and functions, reliable systems development and maintenance, prompt attention to any problems or concerns, properly prioritize problem fixes and resolutions, and effective training. Our list of responsibilities includes: Learning basic computer skills, learn standard techniques and procedures for the applications we use, follow security and backup procedures, protecting your passwords, use computers and mobile devices according to employer’s computer-use policy, make no unauthorized hardware modifications, install only authorized programs, apply software patches and fixes when directed to do so, devote time to respond carefully to requests for requirements for new system features and functions, and avoid reporting trivial problems.


No comments:

Post a Comment