Chapter 8: The Business of Information Technology Flashcards
Framework that displays the demands on the business side and the IT offerings on the supply side to help understand differences in capabilities
IT Maturity Model
What are the three levels of the IT Maturity Model
- Business Efficiency (IT = Order Taker)
- Business Effectiveness (IT = Solutions Provider)
- Business Transformation (IT = Business Partner)
This IT Maturity Level represents an immature IT organization where IT managers maintain an inward focus.
IT Maturity Level 1
This IT Maturity Level shifts the focus to business processes and IT personnel search for solutions to business problems
IT Maturity Level 2
This IT Maturity Level is reached when IT managers are considered business partners who search for ideas that provide value to the organization and value relationships both inside and outside not only the IT organization but also the firm
IT Maturity Level 3
What three (3) firm characteristics affect what the IT organization is expected to do?
- Firm Size
- Organizational Structure
- Level of IT Maturity
Name the 14 core IT support activities
- developing and maintaining information systems
- managing supplier relationships
- managing data, information * Knowledge
- managing Internet and network services
- managing human resources
- operating the data center
- providing general support
- planning for business discontinuities
- Innovating Current Processes
- Establishing Architectual Platforms and Standards
- Promoting Enterprise security
- anticipating new technologies
- participating in setting and implementing strategic goals
- integrating social IT
What are the 8 common IT activities are considered Level 1
- developing and maintaining information systems
- managing supplier relationships
- managing data, information * Knowledge
- managing Internet and network services
- managing human resources
- operating the data center
- providing general support
- planning for business discontinuities
What are the 3 common IT activities are considered Level 2
- Innovating Current Processes
- Establishing Architectual Platforms and Standards
- Promoting Enterprise security
What are the 3 common IT activities are considered Level 3
- Anticipating new technologies
- Participating in setting and implementing strategic goals
- Integrating the use of social IT
True or False
IT professionals should not have the sole responsibility for deciding which business projects receive IT dollars
True
Business partners participate in prioritizing IT projects to ensure that resources are applied appropriately
True or False
IT professionals should not solely decide the acceptable level of IT services or security.
True
senior managers run the business, they are the ones who must decide on the level of service and security that should be delivered by the IT organization.
The most senior executive in the enterprise responsible for technology vision and leadership for designing, developing, implementing, and managing IT initiatives for the enterprise to operate effectively in a constantly changing and intensely competitive marketplace
Chief Information Officer
Track emerging technologies; advise on technology adoption; design and manage IT architecture
Chief technology officer (CTO)
Create knowledge management infrastructure; build a knowledge culture; make corporate knowledge payoff
Chief knowledge officer (CKO)
Create and maintain the definition, storage, and retirement of data in the firm; streamline access to the data; reduce data redundancy
Chief data officer (CDO)
Take advantage of data analysis opportunities, often used for understanding customers, transactions, markets, or trends
Chief analytics officer (CAO)
Manage phones, networks, and other communications technology across the entire enterprise
Chief telecommunications officer (CTO)
Chief network officer (CNO)
Build and maintain internal and external networks
Chief resource officer (CRO)
Manage outsourcing relationships
This person Ensure that information management practices are consistent with security requirements
Chief information security officer (CISO)
Establish and enforce processes and practices to meet privacy concerns of customers, employees, and vendors
Chief privacy officer (CPO)
Oversee and ensure the viable use of mobile platforms and apps
Chief mobility officer (CMO)