Corporate Computing Function
This paper will discuss various aspects of corporate computing functions. First, it will speculate why the fifth point, "Meet information requirements of management", is in the CIO 's list of nine points. Next, this paper will evaluate each point to determine the most important three for the initial rollout phase. Finally, this paper will recommend one additional point the CIO should include in order to ensure the topic of security is addressed in the mission statement.
Requirements for the Corporate Computing Function According to Stallings, there are several requirements that the Chief Information Officer (CIO) must be concerned about in reference to corporate computing that a computing facility must
…show more content…
Furthermore, CEOs want their CIOs to deliver against those needs and resources (Melymuka, 2002, January 30, para 2-12). Therefore, the CIO must understand these managerial requirements and develop an IT strategy that meets them, focusing where management feels is most important. This author assesses that this is the most important principle for a CIO to manage.
Provide Computing Capability and Organizational Integrity
According to one source, for a CIO to accomplish the principles of providing computing capability to all organizational units that legitimately require it, as well as maintaining organizational integrity in operations that are dependent on computing, he or she must maintain an overall IT infrastructure that facilitates a comprehensive set of knowledge management capabilities. In so doing, the CIO focuses on IT configuration, the consistencies and commonalities of shared goals, the marketing and production strategies, as well as the managerial practices within diversifying firms (Hu, Zhang &Teng, 2010, para 20). Essentially, by analyzing the overall IT infrastructure, the CIO can ensure his or her strategy provides the appropriate computing capability to the entire organization, as well as maintain the management’s desired organizational integrity with systems that are fully assimilated into the infrastructure.
Costs and Needs
The CIO has two major concerns in the areas of ensuring that the computing principles
Outrigger hired a CIO in 1986 when other organizations were still struggling with what the role a CIO could play in its operations. The IT in Outrigger understands its importance in building a competitive advantage and has played a huge role in Outrigger’s success till date.
IT Organizational Restructure is necessary for the current IT department to be developed into a CIO organization. Outlining a new framework and identifying roles and responsibilities will help to shape an effective organization to be in a better situation to support the company’s goals. It will also better align the current and future IT investments and
Any enterprise has to pay special attention to computer security. Computer security is a field that is concerned with the control of risks related to computer use. A primary focus should be on the external threats to the computing environment. In enterprise with branches cross country, it is important to allow information from "trusted" external sources, and disallow intrusion from anonymous or non-trusted sources. In a secure system, the authorized users of that system are still
From the Requirements for the Corporate Computing Function, the fifth computing facility fulfillment point reads, “Meet information requirements of management” (Stallings, 2009, p. 58). Stated in another way, this Chief Information Officer’s (CIO) mission statement’s component implies that company information can be utilized by management for a great deal of things. While the security of all company-owned data is immensely important to the success of the organization, some of the information carries significant value when used by
Possess significant and extensive experience in leading a full spectrum CIO office to include such disciplines as: information security, systems administration, developing internal and external web pages, software development, network services, storage services and IT work support for investigations and audits. This experienced is evidenced via assignment with the Army Materiel Command (2001 to 2010) (AMC) as Director of Enterprise Operations, Strategic Planning and Chief Technical Advisor and more recent in the position as the Chief Information Security Officer. My assignments at the US Patent and Trademark Office (2012 to 2015) allowed an even greater leadership experience in providing IT services. These services including computer
Similar to Cisco and Tektronix, the previous legacy CRM systems in Cigna were independent of each other and outdated. The CIO was keen to improve the efficiency of the business operation through IT and to consolidate the system plans through developing them internally. Cigna needed to move IT into the turnaround mode in order to meet customer and legal demands. As such, there was a need for an IT governance structure to ensure broad based, multi-level participation by all stakeholders in IT Governance (Rau, 2004), the selected roles and responsibilities within and external to IT & the relationship amongst these components. No such governance council was established in Cigna which would seem to have resulted in all IT related decisions falling onto the shoulders of the CIO without having additional support of other senior managers. In addition, without the IT council being in place, it did not seem to be asked as to whether or not the CIO had the experience to handle such a project. Based on the fact that she was an internal recruit, it is unlikely that she had previous experience as IT lead on such a project. There were unrealistic expectations placed on the IT department by senior management
The information systems project steering committee, chief information officer (CIO), and an independent consultant should be involved in the decision-making process. The steering committee is responsible for every information system acquisition project in the facility. The CIO is responsible for all information resource management function at the facility. The independent consultant who is familiar with the different system can provide useful feedback about selecting a system (Sayles & Trawick, 2014,
Sometimes IT professionals are declined budget forcing them to deal efficiently with what they have. Therefore, they must follow the advice of Mr. Fawcett. There are three things he advises every CIO with:
When the CEO launches two new strategic initiatives requiring integration across all business units, the organization – whose IT decisions have been largely delegated to its business units in proportion to their revenue generating capacity – now faces the dilemma of how to prioritize its IT projects in order to support the new strategic “enterprise” vision.
Richter’s CIO is facing two major decisions – is the current IT structure appropriate to meet the growing demands of the overall organization and to what extent should IT at affiliates be centrally controlled.
Research. The CIO hired Deloitte consulting to do a complete evaluation of the current state of IT and identify also a desired future state. The engagement was completed and the report completed in August. The actors involved here extensive -- all levels of the business organization including the university president, vice presidents, deans, and department chairs. All IT organizations across campus were asked and provided an opportunity to give input to process (most opted in). This extensive research provided the
Additionally, the information regarding CIOS changing with some measure of ordinariness exhibits that a feasible CIO has not been put set up, it has all the earmarks of being as they are all things considered exorbitantly particular and not able to see the timberland through the tress the degree that taking apart with the business. Though the structure themself is a limitation of IT, the way that persons who are both IT and commercial cunning have not remained put into executive positions is a decreasing level of the business adjacent of association. CITATION Luc13 \l 1033 (Lucasdebartolo, 2013)Recommended plan for Savvy Store program
Preventing the loss of the organization’s resources such as hardware, data and physical IT assets.
There are key individuals that have a specific role, and responsibility in the development of an information environmental, and physical security policy. As with all policies, there must be a top-down approach, which begins at the highest levels of management. The CIO of an organization is responsible for ensuring the policies are administered correctly, and that the policies align with business objects. A security policy of any type should not prevent the business from operating correctly.
Frenzel (2004) claimed that to be successful, a firm’s IT management team must take action on the following critical areas: business management issues; strategic and competitive issues; planning and implementation concerns; and operational items. If for any reason, the organisation experiences difficulties in the above areas, the manager will need to set goals and objectives to overcome and prevent these issues.