Categories
Management

Information Systems Resources and Management

What practices help ensure that the costs of providing an IT service are aligned with the needs of business managers?

 

There is a requirement of aligning corporate governance with Information Technology governance. (Hiles, 2002) Likewise, strategic decision making for corporate governance must align with IT strategic decision making. For instance, if the business has set its target for expanding customer services for their products, there is a requirement of updating the IT infrastructure to be scalable enough.

 

What are some of the global IS management challenges that face IS leaders today?

 

(Palvia, Palvia, & Zigli, 1992) One of the biggest challenges incorporates cultural differences within different regions, religions countries, cities and societies. For addresses these differences, IT leadership must be trained prior to be a part of a new culture or region. Moreover, geopolitical challenges are common in corporate organizations having presence around the globe, as IT based solutions may be delayed due to political turmoil in different countries. Likewise, the control and administration of this corporate organization must be assigned to a Group Chief Information Officer along with a provision of IT functions within all remote sites across the globe. Moreover, for every region a Chief Information Officer must be deputed and will report to the Group CIO deputed in the Head Office.

 

What is the role of a chief security officer, and why is this organizational role a relatively new one?

 

 

The Chief Information Security Officer (CISO) is defiantly a right person selected to handle all the IT security related issues in any organization. Moreover, in many companies, the word CSO is mostly used. However, in modern days the CISO title is more suitable for the role that focuses on the info security measures. In order to allocate a person responsible for IT security, the Chief Security Officer (CSO) is initially selected as a principal for Information Technology functions. The role of CISO in an organization is to lead the “corporate security” issues as, well as to supervise physical security and safety of the staff members. However, in previous times the corporate security and information security is managed by different functions. The role of CSOs is to participate in fields such as Continuity Planning for business, Loss Prevention and Fraud Prevention and Privacy Policy. The following physical security tools are managed and incorporated under technology that provides increased database and network delivery. At a reduced cost, the CSOs can provide better security services practically. Conversely, it can be found challenging for less skilled professionals to overcome issues in an organization.

 

What are some special issues associated with managing an offshore outsourcing arrangement?

 

The core factors that are associated with outsourcing are (Hirschheim, Heinzl, & Dibbern, 2009):

Managing Cost

This is the most critical factor from all other factors, as it facilitates the client and the service provider to generate revenue. For this reason, cost calculation must be perfect before outsourcing a project or signing a contract.

Managing Communication

There is a requirement of establishing a consistent communication channel along with communication strategy that must be given high importance. Likewise, the communication strategy ensures no gaps between the client and service provider communication.

Managing Performance

This factor incorporates time management, as the project must be delivered, as per the deadline.

What is a balanced scorecard approach, and why might it be useful for measuring overall IS performance?

 

(Niven, 2005) Balanced Score Card is a tool that is used in strategic management for identifying and enhancing different internal IT department performances and outcomes. Likewise, the tool calculates and provides figures in terms of feedback for measuring performance.

 

 

References

Hirschheim, R. R. A., Heinzl, A., & Dibbern, J. (2009). Information systems outsourcing Springer Berlin Heidelberg.

Hiles, A. (2002). The complete guide to IT service level agreements: Aligning IT services to business needs Rothstein Catalog on Service Level Books, Rothstein Associates Incorporated.

Niven, P. R. (2005). Balanced scorecard diagnostics: Maintaining maximum performance Wiley.

Palvia, S., Palvia, P., & Zigli, R. M. (1992). The global issues of information technology management Idea Group Publishing.