Wednesday, May 4, 2011

Ch. 11: Information Systems Management

Q1: What are the functions and organization of the IS department?
The major functions of the IS department are:

·         Plan the use of IS to accomplish organizational goals and strategy

·         Develop, operate, and maintain the organization’s computing infrastructure

·         Develop, operate, and maintain enterprise applications

·         Protect information assets

·         Manage outsourcing relationships

The title of the principal manager of the IS department varies from organization to organization. A common title is chief information officer, or CIO. Other common titles are vice president of information services, director of information services, and director of computer services. The CIO reports to the CEO. A typical IS department has four groups and a data administration staff function. There is usually a technology office, operations, development, and outsourcing relations.  

Q2:  How do organizations plan the use of IS?
The major IS planning functions are: Align information systems with organizational strategy, communicate issues to the executive group, develop priorities and enforce them within the IS department, and sponsor the steering committee.

Q3: What tasks are necessary for managing computing infrastructure?
The tasks necessary for managing computing infrastructure are the most visible of all of the IS department’s functions. The structure of the IS infrastructure must mirror the structure of the organization. Three more tasks are to create and maintain infrastructure for end-user computing; create, operate, and maintain networks; and to create, operate, and maintain data centers, data warehouses, and data marts.  The IS department also needs to establish technology and product standards, track problems and monitor resolutions, and manage computing infrastructure.  

Q4: What tasks are necessary for managing enterprise applications?
Developing new applications is a major application management functions. The process of creating new applications begins when the IS department aligns its priorities with the organization’s strategy. Then using priorities that arise from alignment, the IS dept. develops system plans and proposals and submits them to the steering committee for approval. Besides this, the IS dept must also maintain (legacy) systems. A legacy information system is one that has outdated technologies and techniques but is still used, despite its age. They arise because organizations cannot afford to replace an IS just because better technology has been developed. Other tasks are to integrate enterprise applications, manage development staff. Administer data is also a task-data and database administration functions sound similar but are quite different. Data administration describes a function that pertains to all of an organization’s data assets. Database administration describes a function that pertains to a particular database.  Data standards are definitions, or metadata, for data items shared across the organization.  A data dictionary is a file or database that contains data definitions.

Q5:  What are the advantages and disadvantages of outsourcing?
Advantages of outsourcing are management advantages, cost reduction, and risk reduction. The risks are loss of control, benefits outweighed by long-term costs, and no easy exit.

Q6: What are your user rights and responsibilities?
Your user rights are the right to computer hardware and programs that you need.  You have a right to a reliable network and a secure computing environment. You have a right to participate in requirements meetings for new applications that you will use and for major changes to applications that you currently use.  You also have the right to receive prompt attention to your problems and concerns about information services. Your responsibilities are to learn basic computer skills and to learn the basic techniques and procedures for the applications you use. You have a responsibility to follow security and backup procedures, and for using your computer resources in a manner that is consistent with your employer’s policy. You also have a responsibility to make no unauthorized hardware modifications to your computer and to install only authorized programs. You also have to install computer patches and fixes when asked to do so and to treat information systems professionals professionally.

Q7:  2020?
Cloud computing is a form of hardware/software outsourcing in which organizations offer flexible plans for customers to lease hardware and software facilities. Virtualization is the process whereby multiple operating systems share the same computer hardware, usually a server. Green computing is environmentally friendly computing consisting of three major components: power management, virtualization, and e-waste management. Finally, green computing is concerned with e-trash, or computers and related devices that are no longer in use.

Kroenke, David. "Chapter 11: Information Systems Management." Using MIS. Upper Saddle River, NJ: Prentice Hall, 2011. 408-433. Print

1 comment: