CHAPTER 5 : ORGANIZATION STRUCTURES THAT
SUPPORT STRATEGIC INITIATIVES
- Information Technology (IT) is a relatively new functional area, having only been around formally for around 40 years.
- Recent IT-related strategic positions :
- Chief Information Officer (CIO)
- Chief Technology Officer (CTO)
- Chief Security Officer (CSO)
- Chief Privacy Officer (CPO)
- Chief Knowledge Office (CKO)
IT roles and Responsibolities :-
CTO - responsible for ensuring the throughput, speed, accuracy, availability and reliability of IT.
CSO - responsible for ensuring the security of IT systems.
CPO - responsible for ensuring the ethical and legal use for information.
CKO - reponsible for collecting, maintaining and distributing the organization's knowledge.
CTO - responsible for ensuring the throughput, speed, accuracy, availability and reliability of IT.
CSO - responsible for ensuring the security of IT systems.
CPO - responsible for ensuring the ethical and legal use for information.
CKO - reponsible for collecting, maintaining and distributing the organization's knowledge.
ORGANIZATIONAL FUNDAMENTALS ETHICS AND SECURITY :
Ethics and scurity are two fundamental building blocks that organizations must base their businesses on to be successful.
Ethics and scurity are two fundamental building blocks that organizations must base their businesses on to be successful.
ETHICS is the principles and standards that guide our behaviour toward other people.
PRIVACY is a major ethical issue. The right to be left alone when you want to be, to have control over your own personel possessions and not to be observed without your consent.
· Issues affected by technology advances :
- Intellectual property (Intagible creative work that is embodied in physical form)
- Copyright (The legal protection afforded an expression of an idea such a song, video games).
- Fair use doctrine (In certain situations, it is legal to use copyrighted material.)
- Pirated software (The unauthorized use, duplication, distribution or sales of copyrighted software.)
- Counterfelt software (Software that is manufactured to look like the real thing and sold as such.)
SECURITY
· Information security is the protection of information from accidental or intentional misuse by persons inside or outside an organization.


No comments:
Post a Comment