Professional Documents
Culture Documents
McGraw-Hill/Irwin
Learning Outcomes
5.1
Compare the responsibilities of a chief information officer (CIO), chief technology officer (CTO), chief privacy officer (CPO), chief security officer (CSO), and chief knowledge office (CKO) Explain the gap between IT people and business people and the primary reason this gap exists Define the relationship between information security and ethics
5.2
5.3
5-2
Organizational Structures
Organizational employees must work closely together to develop strategic initiatives that create competitive advantages Ethics and security are two fundamental building blocks that organizations must base their businesses upon
5-3
5-4
5-6
5-7
5-9
Improving Communications
Business personnel must seek to increase their understanding of IT IT personnel must seek to increase their understanding of the business It is the responsibility of the CIO to ensure effective communication between business personnel and IT personnel
5-11
Ethics
Ethics the principles and standards that guide our behavior toward other people Privacy is a major ethical issue
Privacy the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
5-13
Ethics
Issues affected by technology advances
Intellectual property Copyright Fair use doctrine Pirated software Counterfeit software
5-14
Ethics
One of the main ingredients in trust is privacy Primary reasons privacy issues lost trust for ebusiness
5-15
Security
Organizational information is intellectual capital - it must be protected Information security the protection of information from accidental or intentional misuse by persons inside or outside an organization E-business automatically creates tremendous information security risks for organizations
5-16
Security
5-17
Security
5-18
OPENING CASE STUDY QUESTIONS Apple Merging Technology, Business, and Entertainment
1. Predict what might have happened to Apple if its top executives had not supported investments in IT Explain why it would be unethical for Apple to allow its customers to download free music from iTunes Evaluate the effects on Apples business if it failed to secure its customers information and it was accidentally posted to an anonymous Web site Explain why Apple should have a CIO, CTO, CPO, CSO, and CKO
5-19
2.
3.
4.
5-20
McGraw-Hill/Irwin
UNIT CLOSING CASE ONE How Levis Got its Jeans into Wal-Mart
1. Explain how Levi Strauss & Co. achieved business success through the use of information, information technology, and people Using Porters Five Force Model analyze Levi Strausss buyer power and supplier power. Which of Porters Five Forces did Levi Strauss address through the implementation of its updated supply chain management system? Which of the three generic strategies is the company following? Evaluate how Levi Strauss can gain business intelligence through the implementation of a customer relationship 5-24
2.
3. 4.
UNIT CLOSING CASE ONE How Levis Got its Jeans into Wal-Mart
5. 6. How can Levi Strauss use efficiency IT metrics and effectiveness IT metrics to improve its business? David Bergen, Levi CIO, put together a cross-functional team of key managers from IT, finance, and sales to transform the companys systems to meet Wal-Marts requirements. Analyze the relationships between these three business areas and determine why Bergen chose them to be a part of his cross-functional team Predict what might happen to Wal-Marts business if it failed to secure its partners information and all sales information for all products was accidentally posted to an anonymous Web site
5-25
7.
5-26