Information Systems: Organizational Structures That Support Strategic Initiatives Chapter 5




Chapter 5 Organizational Structure that support SI

Question 1       It is the responsibility of the CIO to ensure effective communications between business and IT personnel.
True
False

Question 2       Which industry spends the least per employee on computer security?
Medical
Financial
Telecom
Education

Question 3       The chief technology officer is responsible for ensuring the throughput, speed, accuracy, availability, and reliability of an organization's information technology.
True
False

Question 4       Which issue concerns CIOs the most?
Building new applications
Technology evaluation
Enhancing customer satisfaction
Outsourcing hosting

Question 5       Broad functions of a CIO include all of the following, except:
Ensuring that the strategic vision of IT is in line with the strategic vision of the organization
Building and maintaining strong executive relationships
Building and maintaining strong customer processes
Ensuring the delivery of all IT projects, on time and within budget

Question 6       Which of the following activities does a CIO perform?
Oversees all uses of information technology
Ensures the strategic alignment of IT with business goals
Ensures the strategic alignment of IT with business objectives
All of the above

Question 7       The majority of organizations spend over 10% of their IT budget on information security.
True
False

Question 8       Who is responsible for ensuring the ethical and legal use of information within an organization?
CTO
CKO
CSO
CPO

Question 9       Which of the following is the least important skill for an IT executive to possess?
Technical
Negotiation
Communication
Strategic thinking

Question 10     The most important skills for an IT executives are technical knowledge and proficiency.
True
False

Question 11     Job titles, roles, and responsibilities do not differ from organization to organization.
True
False

Question 12     Who is responsible for ensuring the throughput, speed, accuracy, availability, and reliability of an organization's information technology?
CTO
CIO
CPO
CSO

Question 13     Who is responsible for ensuring the security of IT systems and developing strategies and IT safeguards against attacks from hackers and viruses?
CTO
CIO
CPO
CSO

Question 14     Counterfeit software is manufactured to look like the real thing and sold as such.
True
False
Question 15     Ethics are the laws that guide our behavior toward other people.
True
False

Question 16     What first ever national appointment was made by President Barack Obama?
National Chief Security Officer
National Chief Privacy Officer
National Chief Technology Officer
All of the above

Question 17     What gives, in certain situations, a person the legal right to use copyrighted material?
Pirated software
Intellectual property
Fair use doctrine
Copyright

Question 18     The old business axiom "time is money" needs to be updated to more accurately reflect the crucial interdependence between IT and business processes. What is the recommended new phrase?
Uptime is money
Downtime is impossible
Downtime is a bad business process
Uptime is a good business process

Question 19     Which of the following is one of the four categories of costs associated with downtime?
Financial performance
Revenue
Damaged reputation
All of the above

Question 20     Downtime usually only has a short-term cost.
True
False

Question 21     What is intangible creative work that is embodied in physical form?
Fair use doctrine
Copyright
Intellectual property
Pirated software

Question 22     The chief security officer is responsible for ensuring the ethical and legal use of information within an organization.
True
False

Question 23     According to Infonetics research, what is the leading cause of downtime?
Stack overflow
Power outage
Tornadoes
Software failure followed by human error

Question 24     What is the legal protection afforded an expression of an idea?
Fair use doctrine
Intellectual property
Pirated software
Copyright

Question 25     Communication between Business and IT personnel is generally considered to be good.
True
False

Question 26     One of the main ingredients in trust is privacy.
True
False

Question 27     What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?
Copyright
Privacy
Information security
Ethics

Question 28     Privacy is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
True
False

Question 29     What are the principles and standards that guide our behavior toward other people?
Intellectual property
Ethics
Copyright
Pirated software

Question 30     Who is responsible for collecting, maintaining, and distributing the organizational knowledge?
CTO
CSO
CKO
CPO

Question 31     Match the following IT excutive positions with their definition.
1.         Chief Information Officer (CIO) = Responsible for overssing all IT and ensuring the strategic alignment of IT with business
2.         Chief Technology Officer (CTO) = Responsible for ensuring the throughput, speed, accuracy, availability, and reliability of IT
3.         Chief Security Officer (CSO) = Responsible for ensuring the security of IT systems
4.         Chief Privacy Officer (CPO) = Responsible for ensuring the ethical and legal use of information
5.         Chief Knowledge Officer (CKO) = Responsible for collecting, maintaining, and distributing the organization's knowledge
----------------------------------------------------------------------------------------------------------------------


1. Explain why understanding technology, especially in the areas of security and ethics, is important for a CEO. How do CEO’s actions affect the organizational culture?
Privacy is the protection of information from unwanted public viewing or intrusion. Similarly privacy is implemented in many workplace organizations to sustain confidentiality of certain information. Under privacy and confidentially laws and legislations ethical conduct must be ascertained to ensure information is safeguarded from potential misuse. It is also important and integral for CEO’s to maintain security and ethical dealings when utilizing files and document retention. A company must ensure it has standardized work practices in dealing with destruction of files after litigation. This is to prevent duplication, copyright, fraud and misuse of information.

2. Identify why executives in non-technological industries need to worry about technology and its potential business ramifications?
Organizations that are not technologically driven still have to worry about the ramifications of technology and its purpose. Due to globalization and the pace of competition in the global market a business must consistently grow and improve its technological understanding and use, so that it maintains competitive advantage. It is vital that organizations understand their customers’ needs and wants in order to deliver a valued service to potential long term clients. The internet is one of the most common medium of communication nowadays. Managers and executives must understand that time is money and customer satisfaction must be maintained. The internet allows customers to access information readily, in a timely manner, conveniently and globally. Furthermore, executives in non-technological industries need to worry about technology and it potential business ramifications because time is money, thus affecting future productivity and production. Standards must be implemented to protect access to certain information, acceptable use policy privacy policies and maintenance policies.

3. Describe why continuously learning about technology allows an executive to better analyze threats and opportunities.
Globalization has contributed to the ever-changing pace of technological advancements. Furthermore, it is important for managers and executives to continuously learn about various technologies to better analyze success and opportunities that may arise from effective and efficient knowledge in authentication and authorization; prevention and resistance and detection and response.

4. Identify three things that a CTO, CPO, or CSO could do to prevent the above issues
It is the responsibility of the CTO, CPO and the CSO to prevent issues that may be evident in the organizations information and technological system. Policies and procedures may be introduced to maintain the integrity of data and information. This may include the adoption and implementation of a privacy policy, where effective online privacy policies by which they interact. The Chief Security Officer may also use encryption and passwords to allow authorized personnel’s to access important company information and private and confidential files. Likewise, training may be provided to staff who are not confident or who do not have the skills to effectively utilize an organizations technology or equipment. It is vital that employees are trained to ensure staff morale is high, productivity is achieved and confidence is maintained.

No comments:

Post a Comment