Read and analyze the attached case. You must discuss the case and how Information Technology
is used or misused. Discuss the effectiveness and ineffectiveness of its application if appropriate,
or discuss your opinion of the case and how IT could have been more effectively used.
Each analysis must be at least 1-2 pages in length and no more than 3 pages. It should include a
section summarizing the case (1-2 paragraphs), and then an analysis of how IT was used or
misused. The analysis portion must be the bulk of the feedback. I am looking for your
observations of the case, what you think!!
http://www.gao.gov/assets/680/674906.pdf
Solution
Computer crime is a very vast topic. It includes many mal functions by computer users. It is all
about making bad use of information technology for personal interest or in order to create
troublesome situation for others.
Plagiarism is one aspect. It is passing off the work of other people as your own without giving
any credit to them. Piracy is another topic worth thinking about because people make a lot of
effort and spend lot of money to create or make something where other just make a copy of them
instant of buying the original one. Crackers are basically attention who break into computer
system and make illegitimate use of them. With the rapid evolution in Information Technology,
the numbers of crackers are also growing. It is very difficult to get hold of all these issues that is
why we have some association running, aiming to reduce and stop these concerns.
nformation technology and its systems have become so important that large organization can no
longer operate without them, not to mention operate efficiently. Each organization has its unique
purpose, use of information technology is now becomes one of most important means to achieve
the goals as claimed by Hawkins (2004). Technology could increase an organization’s
effectiveness by refine its operations, business process and internal collaboration. In the context
of education, technology could break down communication barriers between students and
faculties and among students themselves. For example, email system could enable lecturers and
students have effective communication when both of them are remote from campus and located
at different time zone of the world. Technology could also help students have better access to the
learning information, experts and learning communities. In most universities’ library system,
students could now access, view and finding citations of thousands of academic journals which
are integral part of student’s academic study from its online database and database’s associated
subscriptions. Technology could also enable active new learning modes, such as multi-media
teaching, computer lab and virtual learning environment that could connect students from
different parts of the world in one virtual environment simultaneously.
However, technology by itself could not delivery the outcomes desired and pursued by the
organization. The current use of technology in education setting involves developing of new
teaching and learning models and refining administrative operation process chains and today’s
available information technology solutions have an array of capabilities and the potential to both
improve the learning environments and widen teaching methods options.
If use of technology has such substantial impact on the operation of organization, what are the
responsibilities of senior IT post or its Chief Information Officer (CIO) and what characteristics
making an effective or ineffective CIO? Armstrong, Simer, & Spaniol (2011) has identified
following duties that are usually fall into CIO’s domains. First, CIO is responsible for developing
a technology plan for the schools including the budget. Secondly, he is responsible for IT
governance and provisioning IT system/services within the organization. Thirdly, part of CIO’s
provisioning IT system services, which is also one of most significant but often been neglected,
is to introduce new technology systems and make them functional. Fourthly, provide IT training
to staff members who manage and use the IT system both within and outside his department. In
another words, CIO is responsible for matching the needs of education institutions and new or
available technology teaching and learning options. The duties require substantial leadership
from senior IT post who could assembly various technology solutions; implement them in a way
which could better serve the goals of organizations and maintain technology system to operate in
a safe and stable manner.
The implementation of information technology has impact across all areas of organizations; CIO
cannot manage the technology system without concerning and communicating the needs of all
other departments and the overall goals of organization. Thus in Hawkins (2004), it is provided
that an effective CIO must have strong managerial ability. He is able to coordinate all important
units within the organization, allowing them to express each of their unique technology needs
and “harmonize” the differences or conflicts among them. An actual application of CIO’s
managerial skill is given by Grand (1997) which provides senior IT post often encounters
“incompatibility among networks, data structures, software packages etc...” Those incompatible
technology components however may met specific needs of each department, therefore, CIO
must able to pursue each departments to combine each of their “disparate systems” into a new
comprehensive framework that inevitability involve compromises from the users.
However, CIO’s ability of coordinating needs from units of organization is not an end itself; he
exercises his managerial skill for the purpose of achieving the goals of business, most
importantly, its continuous growth. Therefore, CIO must have insight of what is successful
business operation pertain to the organization he is working, for example, in the context of
schools, it means better education quality, growth and sustainable revenues. This CIO
characteristic is confirmed with my experiences with Mr. Mu. (n.d.) from Tai Shang Consultancy
(“Tai Sha”). Tai Sha is a leading education consultancy services company in China. Mr. Mu,
who is the chief IT officer of the company, has been required to participate senior business
operation meetings and been consulted of business operation strategies on a regular basis. But it
should be noted online marketing channel is one of the major marketing tools used by Tai Sha
which may result requiring Mr. Mu (n.d.) to have particular strong business operation
understanding.
The third characteristic ability that a technology manager should have is the sensitivity to new
technology from strategic planner perspective of an organization. For example, it is provided in
Armstrong et al., (2011) IT manager is responsible for selecting and introduce new systems for
the organization. For example, he may decide to make arrangements for introducing and using
"hosted, cloud-based, or even outsourced systems and services" since these newly emerged
technologies can reduce the cost of hardware and installation, or make the costs associated with
maintaining the system more transparent. But whether or not adopting them depends on CIO’s
judgment and careful analysis of organization’s strategic goals, value of the services, and the
budget. For example, in school setting, instead of knowing how the new technologies work and
its technology advantages, CIO is responsible for making decisions based on its degree of
alignment with students learning improvements.
An associated ability that CIO should grip is that he should be skilled in negotiation and
contracts with external service providers. The trend of adopting cloud technology is more
obvious than ever and its applications could be wide spread on all areas of an organization. CIO
may understand the technology itself very well, but procure good bargain from the service
providers would also fall into their duty territories. Person with limited exposure to technologies
may not even able to fully understand the functions of a new system and its implications that
brought by external service providers. On the other hand, CIO with strong technology
background would not be easily misled by external contractors.
An ineffective IT manager lacks the personality and influences that enable him to change
organization’s internal operation culture. Introducing new technologies inevitably involve
change of an organization’s existing practices, such as teaching methods if it is a school or
marketing strategies if it is commercial organization. The change of practices requires extensive
training on the staff members and sometime turn the proficient users of old practice into new
learners. The introduction of new technologies may thus meet resistance from staff members and
spread of rumors of its ineffectiveness. Armstrong et al., (2011) suggests this challenge could be
dealt with through process of lunching pilot program. These pilot users typically go on to
become the proponents of the system and provide the groundwork for developing systemic
training programs.
Another characteristic of ineffective IT manager is provided by Bjelland (2005), CIO's inability
to understand and explain the technologies from layman's perspective. An innovative
technology program may require collaborations from all departments of an organization. The
new IT platform may exert substantial impact on organization's position on the market. But the
creation of the system calls for a "clear, simple vision" to enable people with different
technology backgrounds to coordinate their efforts. The technology questions raised by people
also needs answers that are clear and simple. Mr. Mu. (n.d.) based on personal experiences
unfortunately sometime during the business technology explanation conversation fall into jargon
and implicitly telling non-technical people that a problem is too complex for people to
understand possibly due to his strong technology background. The good technology manager
should able to understand the technology strategy from layman’s perspective first place, so he
could naturally explain the strategy to a non-technical superior in a real and simple way.

More Related Content

DOCX
Information Technology for ManagementThis book is li.docx
PDF
How Business Alignment Is The Relationship Between It...
PDF
BIM Term Paper Proposal on Applications of ICT on Office Management
DOCX
Invited Paper – EDSIGCON 2017 Keynote Reflections on the Cur.docx
PDF
Introduction to Information Systems Supporting 4th Edition Rainer Solutions M...
DOCX
Organizational Behavior Question#3
DOC
Information systems strategy formulation
PDF
5 Keys to Mastering Today's Communication Domain
Information Technology for ManagementThis book is li.docx
How Business Alignment Is The Relationship Between It...
BIM Term Paper Proposal on Applications of ICT on Office Management
Invited Paper – EDSIGCON 2017 Keynote Reflections on the Cur.docx
Introduction to Information Systems Supporting 4th Edition Rainer Solutions M...
Organizational Behavior Question#3
Information systems strategy formulation
5 Keys to Mastering Today's Communication Domain

Similar to Read and analyze the attached case. You must discuss the case and ho.pdf (16)

PDF
Managing and Using Information Systems A Strategic Approach 6th Edition Pearl...
PDF
wk3 reply to prof.I need help with this question below a 200 words.pdf
PPTX
Typical characteristics of IT gradutes
PPTX
Typical characteristics of it gradutes
PPTX
Ict applications in school management and record keeping
PDF
Managing and Using Information Systems A Strategic Approach 6th Edition Pearl...
PDF
Digital innovation as a fundamental and powerful concept in the information s...
PDF
The Future of Enterprises - Social by Birth
PDF
2015_CTI_BSc-IT_Module-Description_Final1
PDF
Future enterprises-social-birth
PDF
A Report On The Influence Of Technology On Human Resource Management
PDF
Questions On Technical Design Decisions
PDF
Managing and Using Information Systems A Strategic Approach 6th Edition Pearl...
PDF
A contrarian view to adoption of collaboration-tools-in-the-global-workplace
PPT
MELJUN CORTES research lectures_dba_thesis_example_strategic_business_model
DOCX
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
Managing and Using Information Systems A Strategic Approach 6th Edition Pearl...
wk3 reply to prof.I need help with this question below a 200 words.pdf
Typical characteristics of IT gradutes
Typical characteristics of it gradutes
Ict applications in school management and record keeping
Managing and Using Information Systems A Strategic Approach 6th Edition Pearl...
Digital innovation as a fundamental and powerful concept in the information s...
The Future of Enterprises - Social by Birth
2015_CTI_BSc-IT_Module-Description_Final1
Future enterprises-social-birth
A Report On The Influence Of Technology On Human Resource Management
Questions On Technical Design Decisions
Managing and Using Information Systems A Strategic Approach 6th Edition Pearl...
A contrarian view to adoption of collaboration-tools-in-the-global-workplace
MELJUN CORTES research lectures_dba_thesis_example_strategic_business_model
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
Ad

More from info324235 (20)

PDF
In a plaque assay, a microbiologist counts 20 plaques on a plate. Ho.pdf
PDF
How is Cladophora morphologically similar to Spirogyra How is it di.pdf
PDF
How did greek medicine influence medicine todaySolutionGrek m.pdf
PDF
Gather information about TinyOS and prepare short report about it.pdf
PDF
Foundation of EthicsWhat does Mill say is the ultimate sanction of.pdf
PDF
Explain what single human development most contributed to the evolut.pdf
PDF
Case Study 4 Understanding a Development Miracle China business deci.pdf
PDF
5. An analog filer has system fnction Ha(s)--a (a) (10 pts,) Comvert .pdf
PDF
About 71 of young adult Internet users ( ages 18 to 29) use social-.pdf
PDF
A certain ROM has 32 words x 16 bit structure. The input lines to th.pdf
PDF
________________stakeholders are the ones who most directly interact.pdf
PDF
4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf
PDF
Write out a checklist for construction of a good graphic. For Ja.pdf
PDF
Which TCPIP Application layer protocol provides IP address resoluti.pdf
PDF
why do so many genes (20-30 of all genes) encode transport prot.pdf
PDF
Why is the NFP at the venous end a negative number filtration occur.pdf
PDF
What are 3 changes that occur in dendritic cells once they become ‘a.pdf
PDF
Which of the following traits is considered MendelianSelect one.pdf
PDF
What are three risks of not including best HR practices into the man.pdf
PDF
When a persons score on one variable is used to make predictions abo.pdf
In a plaque assay, a microbiologist counts 20 plaques on a plate. Ho.pdf
How is Cladophora morphologically similar to Spirogyra How is it di.pdf
How did greek medicine influence medicine todaySolutionGrek m.pdf
Gather information about TinyOS and prepare short report about it.pdf
Foundation of EthicsWhat does Mill say is the ultimate sanction of.pdf
Explain what single human development most contributed to the evolut.pdf
Case Study 4 Understanding a Development Miracle China business deci.pdf
5. An analog filer has system fnction Ha(s)--a (a) (10 pts,) Comvert .pdf
About 71 of young adult Internet users ( ages 18 to 29) use social-.pdf
A certain ROM has 32 words x 16 bit structure. The input lines to th.pdf
________________stakeholders are the ones who most directly interact.pdf
4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf
Write out a checklist for construction of a good graphic. For Ja.pdf
Which TCPIP Application layer protocol provides IP address resoluti.pdf
why do so many genes (20-30 of all genes) encode transport prot.pdf
Why is the NFP at the venous end a negative number filtration occur.pdf
What are 3 changes that occur in dendritic cells once they become ‘a.pdf
Which of the following traits is considered MendelianSelect one.pdf
What are three risks of not including best HR practices into the man.pdf
When a persons score on one variable is used to make predictions abo.pdf
Ad

Recently uploaded (20)

PDF
semiconductor packaging in vlsi design fab
PDF
Climate and Adaptation MCQs class 7 from chatgpt
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PPTX
Module on health assessment of CHN. pptx
PDF
IP : I ; Unit I : Preformulation Studies
PDF
HVAC Specification 2024 according to central public works department
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 1).pdf
PPTX
Core Concepts of Personalized Learning and Virtual Learning Environments
PDF
Empowerment Technology for Senior High School Guide
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PPTX
Education and Perspectives of Education.pptx
PDF
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
PDF
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
semiconductor packaging in vlsi design fab
Climate and Adaptation MCQs class 7 from chatgpt
Introduction to pro and eukaryotes and differences.pptx
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Module on health assessment of CHN. pptx
IP : I ; Unit I : Preformulation Studies
HVAC Specification 2024 according to central public works department
Share_Module_2_Power_conflict_and_negotiation.pptx
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 1).pdf
Core Concepts of Personalized Learning and Virtual Learning Environments
Empowerment Technology for Senior High School Guide
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
Cambridge-Practice-Tests-for-IELTS-12.docx
B.Sc. DS Unit 2 Software Engineering.pptx
Education and Perspectives of Education.pptx
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
FORM 1 BIOLOGY MIND MAPS and their schemes

Read and analyze the attached case. You must discuss the case and ho.pdf

  • 1. Read and analyze the attached case. You must discuss the case and how Information Technology is used or misused. Discuss the effectiveness and ineffectiveness of its application if appropriate, or discuss your opinion of the case and how IT could have been more effectively used. Each analysis must be at least 1-2 pages in length and no more than 3 pages. It should include a section summarizing the case (1-2 paragraphs), and then an analysis of how IT was used or misused. The analysis portion must be the bulk of the feedback. I am looking for your observations of the case, what you think!! http://www.gao.gov/assets/680/674906.pdf Solution Computer crime is a very vast topic. It includes many mal functions by computer users. It is all about making bad use of information technology for personal interest or in order to create troublesome situation for others. Plagiarism is one aspect. It is passing off the work of other people as your own without giving any credit to them. Piracy is another topic worth thinking about because people make a lot of effort and spend lot of money to create or make something where other just make a copy of them instant of buying the original one. Crackers are basically attention who break into computer system and make illegitimate use of them. With the rapid evolution in Information Technology, the numbers of crackers are also growing. It is very difficult to get hold of all these issues that is why we have some association running, aiming to reduce and stop these concerns. nformation technology and its systems have become so important that large organization can no longer operate without them, not to mention operate efficiently. Each organization has its unique purpose, use of information technology is now becomes one of most important means to achieve the goals as claimed by Hawkins (2004). Technology could increase an organization’s effectiveness by refine its operations, business process and internal collaboration. In the context of education, technology could break down communication barriers between students and faculties and among students themselves. For example, email system could enable lecturers and students have effective communication when both of them are remote from campus and located at different time zone of the world. Technology could also help students have better access to the learning information, experts and learning communities. In most universities’ library system, students could now access, view and finding citations of thousands of academic journals which are integral part of student’s academic study from its online database and database’s associated
  • 2. subscriptions. Technology could also enable active new learning modes, such as multi-media teaching, computer lab and virtual learning environment that could connect students from different parts of the world in one virtual environment simultaneously. However, technology by itself could not delivery the outcomes desired and pursued by the organization. The current use of technology in education setting involves developing of new teaching and learning models and refining administrative operation process chains and today’s available information technology solutions have an array of capabilities and the potential to both improve the learning environments and widen teaching methods options. If use of technology has such substantial impact on the operation of organization, what are the responsibilities of senior IT post or its Chief Information Officer (CIO) and what characteristics making an effective or ineffective CIO? Armstrong, Simer, & Spaniol (2011) has identified following duties that are usually fall into CIO’s domains. First, CIO is responsible for developing a technology plan for the schools including the budget. Secondly, he is responsible for IT governance and provisioning IT system/services within the organization. Thirdly, part of CIO’s provisioning IT system services, which is also one of most significant but often been neglected, is to introduce new technology systems and make them functional. Fourthly, provide IT training to staff members who manage and use the IT system both within and outside his department. In another words, CIO is responsible for matching the needs of education institutions and new or available technology teaching and learning options. The duties require substantial leadership from senior IT post who could assembly various technology solutions; implement them in a way which could better serve the goals of organizations and maintain technology system to operate in a safe and stable manner. The implementation of information technology has impact across all areas of organizations; CIO cannot manage the technology system without concerning and communicating the needs of all other departments and the overall goals of organization. Thus in Hawkins (2004), it is provided that an effective CIO must have strong managerial ability. He is able to coordinate all important units within the organization, allowing them to express each of their unique technology needs and “harmonize” the differences or conflicts among them. An actual application of CIO’s managerial skill is given by Grand (1997) which provides senior IT post often encounters “incompatibility among networks, data structures, software packages etc...” Those incompatible technology components however may met specific needs of each department, therefore, CIO must able to pursue each departments to combine each of their “disparate systems” into a new comprehensive framework that inevitability involve compromises from the users.
  • 3. However, CIO’s ability of coordinating needs from units of organization is not an end itself; he exercises his managerial skill for the purpose of achieving the goals of business, most importantly, its continuous growth. Therefore, CIO must have insight of what is successful business operation pertain to the organization he is working, for example, in the context of schools, it means better education quality, growth and sustainable revenues. This CIO characteristic is confirmed with my experiences with Mr. Mu. (n.d.) from Tai Shang Consultancy (“Tai Sha”). Tai Sha is a leading education consultancy services company in China. Mr. Mu, who is the chief IT officer of the company, has been required to participate senior business operation meetings and been consulted of business operation strategies on a regular basis. But it should be noted online marketing channel is one of the major marketing tools used by Tai Sha which may result requiring Mr. Mu (n.d.) to have particular strong business operation understanding. The third characteristic ability that a technology manager should have is the sensitivity to new technology from strategic planner perspective of an organization. For example, it is provided in Armstrong et al., (2011) IT manager is responsible for selecting and introduce new systems for the organization. For example, he may decide to make arrangements for introducing and using "hosted, cloud-based, or even outsourced systems and services" since these newly emerged technologies can reduce the cost of hardware and installation, or make the costs associated with maintaining the system more transparent. But whether or not adopting them depends on CIO’s judgment and careful analysis of organization’s strategic goals, value of the services, and the budget. For example, in school setting, instead of knowing how the new technologies work and its technology advantages, CIO is responsible for making decisions based on its degree of alignment with students learning improvements. An associated ability that CIO should grip is that he should be skilled in negotiation and contracts with external service providers. The trend of adopting cloud technology is more obvious than ever and its applications could be wide spread on all areas of an organization. CIO may understand the technology itself very well, but procure good bargain from the service providers would also fall into their duty territories. Person with limited exposure to technologies may not even able to fully understand the functions of a new system and its implications that brought by external service providers. On the other hand, CIO with strong technology background would not be easily misled by external contractors. An ineffective IT manager lacks the personality and influences that enable him to change
  • 4. organization’s internal operation culture. Introducing new technologies inevitably involve change of an organization’s existing practices, such as teaching methods if it is a school or marketing strategies if it is commercial organization. The change of practices requires extensive training on the staff members and sometime turn the proficient users of old practice into new learners. The introduction of new technologies may thus meet resistance from staff members and spread of rumors of its ineffectiveness. Armstrong et al., (2011) suggests this challenge could be dealt with through process of lunching pilot program. These pilot users typically go on to become the proponents of the system and provide the groundwork for developing systemic training programs. Another characteristic of ineffective IT manager is provided by Bjelland (2005), CIO's inability to understand and explain the technologies from layman's perspective. An innovative technology program may require collaborations from all departments of an organization. The new IT platform may exert substantial impact on organization's position on the market. But the creation of the system calls for a "clear, simple vision" to enable people with different technology backgrounds to coordinate their efforts. The technology questions raised by people also needs answers that are clear and simple. Mr. Mu. (n.d.) based on personal experiences unfortunately sometime during the business technology explanation conversation fall into jargon and implicitly telling non-technical people that a problem is too complex for people to understand possibly due to his strong technology background. The good technology manager should able to understand the technology strategy from layman’s perspective first place, so he could naturally explain the strategy to a non-technical superior in a real and simple way.