SlideShare a Scribd company logo
1 of 4
Download to read offline
Read and analyze the attached case. You must discuss the case and how Information Technology
is used or misused. Discuss the effectiveness and ineffectiveness of its application if appropriate,
or discuss your opinion of the case and how IT could have been more effectively used.
Each analysis must be at least 1-2 pages in length and no more than 3 pages. It should include a
section summarizing the case (1-2 paragraphs), and then an analysis of how IT was used or
misused. The analysis portion must be the bulk of the feedback. I am looking for your
observations of the case, what you think!!
http://www.gao.gov/assets/680/674906.pdf
Solution
Computer crime is a very vast topic. It includes many mal functions by computer users. It is all
about making bad use of information technology for personal interest or in order to create
troublesome situation for others.
Plagiarism is one aspect. It is passing off the work of other people as your own without giving
any credit to them. Piracy is another topic worth thinking about because people make a lot of
effort and spend lot of money to create or make something where other just make a copy of them
instant of buying the original one. Crackers are basically attention who break into computer
system and make illegitimate use of them. With the rapid evolution in Information Technology,
the numbers of crackers are also growing. It is very difficult to get hold of all these issues that is
why we have some association running, aiming to reduce and stop these concerns.
nformation technology and its systems have become so important that large organization can no
longer operate without them, not to mention operate efficiently. Each organization has its unique
purpose, use of information technology is now becomes one of most important means to achieve
the goals as claimed by Hawkins (2004). Technology could increase an organization’s
effectiveness by refine its operations, business process and internal collaboration. In the context
of education, technology could break down communication barriers between students and
faculties and among students themselves. For example, email system could enable lecturers and
students have effective communication when both of them are remote from campus and located
at different time zone of the world. Technology could also help students have better access to the
learning information, experts and learning communities. In most universities’ library system,
students could now access, view and finding citations of thousands of academic journals which
are integral part of student’s academic study from its online database and database’s associated
subscriptions. Technology could also enable active new learning modes, such as multi-media
teaching, computer lab and virtual learning environment that could connect students from
different parts of the world in one virtual environment simultaneously.
However, technology by itself could not delivery the outcomes desired and pursued by the
organization. The current use of technology in education setting involves developing of new
teaching and learning models and refining administrative operation process chains and today’s
available information technology solutions have an array of capabilities and the potential to both
improve the learning environments and widen teaching methods options.
If use of technology has such substantial impact on the operation of organization, what are the
responsibilities of senior IT post or its Chief Information Officer (CIO) and what characteristics
making an effective or ineffective CIO? Armstrong, Simer, & Spaniol (2011) has identified
following duties that are usually fall into CIO’s domains. First, CIO is responsible for developing
a technology plan for the schools including the budget. Secondly, he is responsible for IT
governance and provisioning IT system/services within the organization. Thirdly, part of CIO’s
provisioning IT system services, which is also one of most significant but often been neglected,
is to introduce new technology systems and make them functional. Fourthly, provide IT training
to staff members who manage and use the IT system both within and outside his department. In
another words, CIO is responsible for matching the needs of education institutions and new or
available technology teaching and learning options. The duties require substantial leadership
from senior IT post who could assembly various technology solutions; implement them in a way
which could better serve the goals of organizations and maintain technology system to operate in
a safe and stable manner.
The implementation of information technology has impact across all areas of organizations; CIO
cannot manage the technology system without concerning and communicating the needs of all
other departments and the overall goals of organization. Thus in Hawkins (2004), it is provided
that an effective CIO must have strong managerial ability. He is able to coordinate all important
units within the organization, allowing them to express each of their unique technology needs
and “harmonize” the differences or conflicts among them. An actual application of CIO’s
managerial skill is given by Grand (1997) which provides senior IT post often encounters
“incompatibility among networks, data structures, software packages etc...” Those incompatible
technology components however may met specific needs of each department, therefore, CIO
must able to pursue each departments to combine each of their “disparate systems” into a new
comprehensive framework that inevitability involve compromises from the users.
However, CIO’s ability of coordinating needs from units of organization is not an end itself; he
exercises his managerial skill for the purpose of achieving the goals of business, most
importantly, its continuous growth. Therefore, CIO must have insight of what is successful
business operation pertain to the organization he is working, for example, in the context of
schools, it means better education quality, growth and sustainable revenues. This CIO
characteristic is confirmed with my experiences with Mr. Mu. (n.d.) from Tai Shang Consultancy
(“Tai Sha”). Tai Sha is a leading education consultancy services company in China. Mr. Mu,
who is the chief IT officer of the company, has been required to participate senior business
operation meetings and been consulted of business operation strategies on a regular basis. But it
should be noted online marketing channel is one of the major marketing tools used by Tai Sha
which may result requiring Mr. Mu (n.d.) to have particular strong business operation
understanding.
The third characteristic ability that a technology manager should have is the sensitivity to new
technology from strategic planner perspective of an organization. For example, it is provided in
Armstrong et al., (2011) IT manager is responsible for selecting and introduce new systems for
the organization. For example, he may decide to make arrangements for introducing and using
"hosted, cloud-based, or even outsourced systems and services" since these newly emerged
technologies can reduce the cost of hardware and installation, or make the costs associated with
maintaining the system more transparent. But whether or not adopting them depends on CIO’s
judgment and careful analysis of organization’s strategic goals, value of the services, and the
budget. For example, in school setting, instead of knowing how the new technologies work and
its technology advantages, CIO is responsible for making decisions based on its degree of
alignment with students learning improvements.
An associated ability that CIO should grip is that he should be skilled in negotiation and
contracts with external service providers. The trend of adopting cloud technology is more
obvious than ever and its applications could be wide spread on all areas of an organization. CIO
may understand the technology itself very well, but procure good bargain from the service
providers would also fall into their duty territories. Person with limited exposure to technologies
may not even able to fully understand the functions of a new system and its implications that
brought by external service providers. On the other hand, CIO with strong technology
background would not be easily misled by external contractors.
An ineffective IT manager lacks the personality and influences that enable him to change
organization’s internal operation culture. Introducing new technologies inevitably involve
change of an organization’s existing practices, such as teaching methods if it is a school or
marketing strategies if it is commercial organization. The change of practices requires extensive
training on the staff members and sometime turn the proficient users of old practice into new
learners. The introduction of new technologies may thus meet resistance from staff members and
spread of rumors of its ineffectiveness. Armstrong et al., (2011) suggests this challenge could be
dealt with through process of lunching pilot program. These pilot users typically go on to
become the proponents of the system and provide the groundwork for developing systemic
training programs.
Another characteristic of ineffective IT manager is provided by Bjelland (2005), CIO's inability
to understand and explain the technologies from layman's perspective. An innovative
technology program may require collaborations from all departments of an organization. The
new IT platform may exert substantial impact on organization's position on the market. But the
creation of the system calls for a "clear, simple vision" to enable people with different
technology backgrounds to coordinate their efforts. The technology questions raised by people
also needs answers that are clear and simple. Mr. Mu. (n.d.) based on personal experiences
unfortunately sometime during the business technology explanation conversation fall into jargon
and implicitly telling non-technical people that a problem is too complex for people to
understand possibly due to his strong technology background. The good technology manager
should able to understand the technology strategy from layman’s perspective first place, so he
could naturally explain the strategy to a non-technical superior in a real and simple way.

More Related Content

Similar to Read and analyze the attached case. You must discuss the case and ho.pdf

wk3 reply to prof.I need help with this question below a 200 words.pdf
wk3 reply to prof.I need help with this question below a 200 words.pdfwk3 reply to prof.I need help with this question below a 200 words.pdf
wk3 reply to prof.I need help with this question below a 200 words.pdffeetshoemart
 
Typical characteristics of IT gradutes
Typical characteristics of IT gradutesTypical characteristics of IT gradutes
Typical characteristics of IT gradutesMohammad Salim
 
Ict applications in school management and record keeping
Ict applications in school management and record keepingIct applications in school management and record keeping
Ict applications in school management and record keepingRex Mwamba
 
Digital innovation as a fundamental and powerful concept in the information s...
Digital innovation as a fundamental and powerful concept in the information s...Digital innovation as a fundamental and powerful concept in the information s...
Digital innovation as a fundamental and powerful concept in the information s...venny55
 
The Future of Enterprises - Social by Birth
The Future of Enterprises - Social by BirthThe Future of Enterprises - Social by Birth
The Future of Enterprises - Social by BirthAndy Kellam
 
2015_CTI_BSc-IT_Module-Description_Final1
2015_CTI_BSc-IT_Module-Description_Final12015_CTI_BSc-IT_Module-Description_Final1
2015_CTI_BSc-IT_Module-Description_Final1Moses75
 
Future enterprises-social-birth
Future enterprises-social-birthFuture enterprises-social-birth
Future enterprises-social-birthJen Fiocca
 
A Report On The Influence Of Technology On Human Resource Management
A Report On The Influence Of Technology On Human Resource ManagementA Report On The Influence Of Technology On Human Resource Management
A Report On The Influence Of Technology On Human Resource ManagementNavitha Pereira
 
Questions On Technical Design Decisions
Questions On Technical Design DecisionsQuestions On Technical Design Decisions
Questions On Technical Design DecisionsRikki Wright
 
A contrarian view to adoption of collaboration-tools-in-the-global-workplace
A contrarian view to adoption of collaboration-tools-in-the-global-workplaceA contrarian view to adoption of collaboration-tools-in-the-global-workplace
A contrarian view to adoption of collaboration-tools-in-the-global-workplaceSubroto Gupta
 
MELJUN CORTES research lectures_dba_thesis_example_strategic_business_model
MELJUN CORTES research lectures_dba_thesis_example_strategic_business_modelMELJUN CORTES research lectures_dba_thesis_example_strategic_business_model
MELJUN CORTES research lectures_dba_thesis_example_strategic_business_modelMELJUN CORTES
 
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
Running Header  1APPLICATION DEVELOPMENT METHODS2.docxRunning Header  1APPLICATION DEVELOPMENT METHODS2.docx
Running Header 1APPLICATION DEVELOPMENT METHODS2.docxrtodd599
 
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
Running Header  1SYSTEM ARCHITECTURE2Unit .docxRunning Header  1SYSTEM ARCHITECTURE2Unit .docx
Running Header 1SYSTEM ARCHITECTURE2Unit .docxrtodd599
 
Impact of IT & strategic issue of IT
Impact of IT & strategic issue of ITImpact of IT & strategic issue of IT
Impact of IT & strategic issue of ITShubham Upadhyay
 

Similar to Read and analyze the attached case. You must discuss the case and ho.pdf (15)

wk3 reply to prof.I need help with this question below a 200 words.pdf
wk3 reply to prof.I need help with this question below a 200 words.pdfwk3 reply to prof.I need help with this question below a 200 words.pdf
wk3 reply to prof.I need help with this question below a 200 words.pdf
 
Typical characteristics of IT gradutes
Typical characteristics of IT gradutesTypical characteristics of IT gradutes
Typical characteristics of IT gradutes
 
Typical characteristics of it gradutes
Typical characteristics of it gradutesTypical characteristics of it gradutes
Typical characteristics of it gradutes
 
Ict applications in school management and record keeping
Ict applications in school management and record keepingIct applications in school management and record keeping
Ict applications in school management and record keeping
 
Digital innovation as a fundamental and powerful concept in the information s...
Digital innovation as a fundamental and powerful concept in the information s...Digital innovation as a fundamental and powerful concept in the information s...
Digital innovation as a fundamental and powerful concept in the information s...
 
The Future of Enterprises - Social by Birth
The Future of Enterprises - Social by BirthThe Future of Enterprises - Social by Birth
The Future of Enterprises - Social by Birth
 
2015_CTI_BSc-IT_Module-Description_Final1
2015_CTI_BSc-IT_Module-Description_Final12015_CTI_BSc-IT_Module-Description_Final1
2015_CTI_BSc-IT_Module-Description_Final1
 
Future enterprises-social-birth
Future enterprises-social-birthFuture enterprises-social-birth
Future enterprises-social-birth
 
A Report On The Influence Of Technology On Human Resource Management
A Report On The Influence Of Technology On Human Resource ManagementA Report On The Influence Of Technology On Human Resource Management
A Report On The Influence Of Technology On Human Resource Management
 
Questions On Technical Design Decisions
Questions On Technical Design DecisionsQuestions On Technical Design Decisions
Questions On Technical Design Decisions
 
A contrarian view to adoption of collaboration-tools-in-the-global-workplace
A contrarian view to adoption of collaboration-tools-in-the-global-workplaceA contrarian view to adoption of collaboration-tools-in-the-global-workplace
A contrarian view to adoption of collaboration-tools-in-the-global-workplace
 
MELJUN CORTES research lectures_dba_thesis_example_strategic_business_model
MELJUN CORTES research lectures_dba_thesis_example_strategic_business_modelMELJUN CORTES research lectures_dba_thesis_example_strategic_business_model
MELJUN CORTES research lectures_dba_thesis_example_strategic_business_model
 
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
Running Header  1APPLICATION DEVELOPMENT METHODS2.docxRunning Header  1APPLICATION DEVELOPMENT METHODS2.docx
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
 
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
Running Header  1SYSTEM ARCHITECTURE2Unit .docxRunning Header  1SYSTEM ARCHITECTURE2Unit .docx
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
 
Impact of IT & strategic issue of IT
Impact of IT & strategic issue of ITImpact of IT & strategic issue of IT
Impact of IT & strategic issue of IT
 

More from info324235

In a plaque assay, a microbiologist counts 20 plaques on a plate. Ho.pdf
In a plaque assay, a microbiologist counts 20 plaques on a plate. Ho.pdfIn a plaque assay, a microbiologist counts 20 plaques on a plate. Ho.pdf
In a plaque assay, a microbiologist counts 20 plaques on a plate. Ho.pdfinfo324235
 
How is Cladophora morphologically similar to Spirogyra How is it di.pdf
How is Cladophora morphologically similar to Spirogyra How is it di.pdfHow is Cladophora morphologically similar to Spirogyra How is it di.pdf
How is Cladophora morphologically similar to Spirogyra How is it di.pdfinfo324235
 
How did greek medicine influence medicine todaySolutionGrek m.pdf
How did greek medicine influence medicine todaySolutionGrek m.pdfHow did greek medicine influence medicine todaySolutionGrek m.pdf
How did greek medicine influence medicine todaySolutionGrek m.pdfinfo324235
 
Gather information about TinyOS and prepare short report about it.pdf
Gather information about TinyOS and prepare short report about it.pdfGather information about TinyOS and prepare short report about it.pdf
Gather information about TinyOS and prepare short report about it.pdfinfo324235
 
Foundation of EthicsWhat does Mill say is the ultimate sanction of.pdf
Foundation of EthicsWhat does Mill say is the ultimate sanction of.pdfFoundation of EthicsWhat does Mill say is the ultimate sanction of.pdf
Foundation of EthicsWhat does Mill say is the ultimate sanction of.pdfinfo324235
 
Explain what single human development most contributed to the evolut.pdf
Explain what single human development most contributed to the evolut.pdfExplain what single human development most contributed to the evolut.pdf
Explain what single human development most contributed to the evolut.pdfinfo324235
 
Case Study 4 Understanding a Development Miracle China business deci.pdf
Case Study 4 Understanding a Development Miracle China business deci.pdfCase Study 4 Understanding a Development Miracle China business deci.pdf
Case Study 4 Understanding a Development Miracle China business deci.pdfinfo324235
 
5. An analog filer has system fnction Ha(s)--a (a) (10 pts,) Comvert .pdf
5. An analog filer has system fnction Ha(s)--a (a) (10 pts,) Comvert .pdf5. An analog filer has system fnction Ha(s)--a (a) (10 pts,) Comvert .pdf
5. An analog filer has system fnction Ha(s)--a (a) (10 pts,) Comvert .pdfinfo324235
 
About 71 of young adult Internet users ( ages 18 to 29) use social-.pdf
About 71 of young adult Internet users ( ages 18 to 29) use social-.pdfAbout 71 of young adult Internet users ( ages 18 to 29) use social-.pdf
About 71 of young adult Internet users ( ages 18 to 29) use social-.pdfinfo324235
 
A certain ROM has 32 words x 16 bit structure. The input lines to th.pdf
A certain ROM has 32 words x 16 bit structure. The input lines to th.pdfA certain ROM has 32 words x 16 bit structure. The input lines to th.pdf
A certain ROM has 32 words x 16 bit structure. The input lines to th.pdfinfo324235
 
________________stakeholders are the ones who most directly interact.pdf
________________stakeholders are the ones who most directly interact.pdf________________stakeholders are the ones who most directly interact.pdf
________________stakeholders are the ones who most directly interact.pdfinfo324235
 
4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf
4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf
4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdfinfo324235
 
Write out a checklist for construction of a good graphic. For Ja.pdf
Write out a checklist for construction of a good graphic.  For Ja.pdfWrite out a checklist for construction of a good graphic.  For Ja.pdf
Write out a checklist for construction of a good graphic. For Ja.pdfinfo324235
 
Which TCPIP Application layer protocol provides IP address resoluti.pdf
Which TCPIP Application layer protocol provides IP address resoluti.pdfWhich TCPIP Application layer protocol provides IP address resoluti.pdf
Which TCPIP Application layer protocol provides IP address resoluti.pdfinfo324235
 
why do so many genes (20-30 of all genes) encode transport prot.pdf
why do so many genes (20-30 of all genes) encode transport prot.pdfwhy do so many genes (20-30 of all genes) encode transport prot.pdf
why do so many genes (20-30 of all genes) encode transport prot.pdfinfo324235
 
Why is the NFP at the venous end a negative number filtration occur.pdf
Why is the NFP at the venous end a negative number  filtration occur.pdfWhy is the NFP at the venous end a negative number  filtration occur.pdf
Why is the NFP at the venous end a negative number filtration occur.pdfinfo324235
 
What are 3 changes that occur in dendritic cells once they become ‘a.pdf
What are 3 changes that occur in dendritic cells once they become ‘a.pdfWhat are 3 changes that occur in dendritic cells once they become ‘a.pdf
What are 3 changes that occur in dendritic cells once they become ‘a.pdfinfo324235
 
Which of the following traits is considered MendelianSelect one.pdf
Which of the following traits is considered MendelianSelect one.pdfWhich of the following traits is considered MendelianSelect one.pdf
Which of the following traits is considered MendelianSelect one.pdfinfo324235
 
What are three risks of not including best HR practices into the man.pdf
What are three risks of not including best HR practices into the man.pdfWhat are three risks of not including best HR practices into the man.pdf
What are three risks of not including best HR practices into the man.pdfinfo324235
 
When a persons score on one variable is used to make predictions abo.pdf
When a persons score on one variable is used to make predictions abo.pdfWhen a persons score on one variable is used to make predictions abo.pdf
When a persons score on one variable is used to make predictions abo.pdfinfo324235
 

More from info324235 (20)

In a plaque assay, a microbiologist counts 20 plaques on a plate. Ho.pdf
In a plaque assay, a microbiologist counts 20 plaques on a plate. Ho.pdfIn a plaque assay, a microbiologist counts 20 plaques on a plate. Ho.pdf
In a plaque assay, a microbiologist counts 20 plaques on a plate. Ho.pdf
 
How is Cladophora morphologically similar to Spirogyra How is it di.pdf
How is Cladophora morphologically similar to Spirogyra How is it di.pdfHow is Cladophora morphologically similar to Spirogyra How is it di.pdf
How is Cladophora morphologically similar to Spirogyra How is it di.pdf
 
How did greek medicine influence medicine todaySolutionGrek m.pdf
How did greek medicine influence medicine todaySolutionGrek m.pdfHow did greek medicine influence medicine todaySolutionGrek m.pdf
How did greek medicine influence medicine todaySolutionGrek m.pdf
 
Gather information about TinyOS and prepare short report about it.pdf
Gather information about TinyOS and prepare short report about it.pdfGather information about TinyOS and prepare short report about it.pdf
Gather information about TinyOS and prepare short report about it.pdf
 
Foundation of EthicsWhat does Mill say is the ultimate sanction of.pdf
Foundation of EthicsWhat does Mill say is the ultimate sanction of.pdfFoundation of EthicsWhat does Mill say is the ultimate sanction of.pdf
Foundation of EthicsWhat does Mill say is the ultimate sanction of.pdf
 
Explain what single human development most contributed to the evolut.pdf
Explain what single human development most contributed to the evolut.pdfExplain what single human development most contributed to the evolut.pdf
Explain what single human development most contributed to the evolut.pdf
 
Case Study 4 Understanding a Development Miracle China business deci.pdf
Case Study 4 Understanding a Development Miracle China business deci.pdfCase Study 4 Understanding a Development Miracle China business deci.pdf
Case Study 4 Understanding a Development Miracle China business deci.pdf
 
5. An analog filer has system fnction Ha(s)--a (a) (10 pts,) Comvert .pdf
5. An analog filer has system fnction Ha(s)--a (a) (10 pts,) Comvert .pdf5. An analog filer has system fnction Ha(s)--a (a) (10 pts,) Comvert .pdf
5. An analog filer has system fnction Ha(s)--a (a) (10 pts,) Comvert .pdf
 
About 71 of young adult Internet users ( ages 18 to 29) use social-.pdf
About 71 of young adult Internet users ( ages 18 to 29) use social-.pdfAbout 71 of young adult Internet users ( ages 18 to 29) use social-.pdf
About 71 of young adult Internet users ( ages 18 to 29) use social-.pdf
 
A certain ROM has 32 words x 16 bit structure. The input lines to th.pdf
A certain ROM has 32 words x 16 bit structure. The input lines to th.pdfA certain ROM has 32 words x 16 bit structure. The input lines to th.pdf
A certain ROM has 32 words x 16 bit structure. The input lines to th.pdf
 
________________stakeholders are the ones who most directly interact.pdf
________________stakeholders are the ones who most directly interact.pdf________________stakeholders are the ones who most directly interact.pdf
________________stakeholders are the ones who most directly interact.pdf
 
4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf
4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf
4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf
 
Write out a checklist for construction of a good graphic. For Ja.pdf
Write out a checklist for construction of a good graphic.  For Ja.pdfWrite out a checklist for construction of a good graphic.  For Ja.pdf
Write out a checklist for construction of a good graphic. For Ja.pdf
 
Which TCPIP Application layer protocol provides IP address resoluti.pdf
Which TCPIP Application layer protocol provides IP address resoluti.pdfWhich TCPIP Application layer protocol provides IP address resoluti.pdf
Which TCPIP Application layer protocol provides IP address resoluti.pdf
 
why do so many genes (20-30 of all genes) encode transport prot.pdf
why do so many genes (20-30 of all genes) encode transport prot.pdfwhy do so many genes (20-30 of all genes) encode transport prot.pdf
why do so many genes (20-30 of all genes) encode transport prot.pdf
 
Why is the NFP at the venous end a negative number filtration occur.pdf
Why is the NFP at the venous end a negative number  filtration occur.pdfWhy is the NFP at the venous end a negative number  filtration occur.pdf
Why is the NFP at the venous end a negative number filtration occur.pdf
 
What are 3 changes that occur in dendritic cells once they become ‘a.pdf
What are 3 changes that occur in dendritic cells once they become ‘a.pdfWhat are 3 changes that occur in dendritic cells once they become ‘a.pdf
What are 3 changes that occur in dendritic cells once they become ‘a.pdf
 
Which of the following traits is considered MendelianSelect one.pdf
Which of the following traits is considered MendelianSelect one.pdfWhich of the following traits is considered MendelianSelect one.pdf
Which of the following traits is considered MendelianSelect one.pdf
 
What are three risks of not including best HR practices into the man.pdf
What are three risks of not including best HR practices into the man.pdfWhat are three risks of not including best HR practices into the man.pdf
What are three risks of not including best HR practices into the man.pdf
 
When a persons score on one variable is used to make predictions abo.pdf
When a persons score on one variable is used to make predictions abo.pdfWhen a persons score on one variable is used to make predictions abo.pdf
When a persons score on one variable is used to make predictions abo.pdf
 

Recently uploaded

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Recently uploaded (20)

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 

Read and analyze the attached case. You must discuss the case and ho.pdf

  • 1. Read and analyze the attached case. You must discuss the case and how Information Technology is used or misused. Discuss the effectiveness and ineffectiveness of its application if appropriate, or discuss your opinion of the case and how IT could have been more effectively used. Each analysis must be at least 1-2 pages in length and no more than 3 pages. It should include a section summarizing the case (1-2 paragraphs), and then an analysis of how IT was used or misused. The analysis portion must be the bulk of the feedback. I am looking for your observations of the case, what you think!! http://www.gao.gov/assets/680/674906.pdf Solution Computer crime is a very vast topic. It includes many mal functions by computer users. It is all about making bad use of information technology for personal interest or in order to create troublesome situation for others. Plagiarism is one aspect. It is passing off the work of other people as your own without giving any credit to them. Piracy is another topic worth thinking about because people make a lot of effort and spend lot of money to create or make something where other just make a copy of them instant of buying the original one. Crackers are basically attention who break into computer system and make illegitimate use of them. With the rapid evolution in Information Technology, the numbers of crackers are also growing. It is very difficult to get hold of all these issues that is why we have some association running, aiming to reduce and stop these concerns. nformation technology and its systems have become so important that large organization can no longer operate without them, not to mention operate efficiently. Each organization has its unique purpose, use of information technology is now becomes one of most important means to achieve the goals as claimed by Hawkins (2004). Technology could increase an organization’s effectiveness by refine its operations, business process and internal collaboration. In the context of education, technology could break down communication barriers between students and faculties and among students themselves. For example, email system could enable lecturers and students have effective communication when both of them are remote from campus and located at different time zone of the world. Technology could also help students have better access to the learning information, experts and learning communities. In most universities’ library system, students could now access, view and finding citations of thousands of academic journals which are integral part of student’s academic study from its online database and database’s associated
  • 2. subscriptions. Technology could also enable active new learning modes, such as multi-media teaching, computer lab and virtual learning environment that could connect students from different parts of the world in one virtual environment simultaneously. However, technology by itself could not delivery the outcomes desired and pursued by the organization. The current use of technology in education setting involves developing of new teaching and learning models and refining administrative operation process chains and today’s available information technology solutions have an array of capabilities and the potential to both improve the learning environments and widen teaching methods options. If use of technology has such substantial impact on the operation of organization, what are the responsibilities of senior IT post or its Chief Information Officer (CIO) and what characteristics making an effective or ineffective CIO? Armstrong, Simer, & Spaniol (2011) has identified following duties that are usually fall into CIO’s domains. First, CIO is responsible for developing a technology plan for the schools including the budget. Secondly, he is responsible for IT governance and provisioning IT system/services within the organization. Thirdly, part of CIO’s provisioning IT system services, which is also one of most significant but often been neglected, is to introduce new technology systems and make them functional. Fourthly, provide IT training to staff members who manage and use the IT system both within and outside his department. In another words, CIO is responsible for matching the needs of education institutions and new or available technology teaching and learning options. The duties require substantial leadership from senior IT post who could assembly various technology solutions; implement them in a way which could better serve the goals of organizations and maintain technology system to operate in a safe and stable manner. The implementation of information technology has impact across all areas of organizations; CIO cannot manage the technology system without concerning and communicating the needs of all other departments and the overall goals of organization. Thus in Hawkins (2004), it is provided that an effective CIO must have strong managerial ability. He is able to coordinate all important units within the organization, allowing them to express each of their unique technology needs and “harmonize” the differences or conflicts among them. An actual application of CIO’s managerial skill is given by Grand (1997) which provides senior IT post often encounters “incompatibility among networks, data structures, software packages etc...” Those incompatible technology components however may met specific needs of each department, therefore, CIO must able to pursue each departments to combine each of their “disparate systems” into a new comprehensive framework that inevitability involve compromises from the users.
  • 3. However, CIO’s ability of coordinating needs from units of organization is not an end itself; he exercises his managerial skill for the purpose of achieving the goals of business, most importantly, its continuous growth. Therefore, CIO must have insight of what is successful business operation pertain to the organization he is working, for example, in the context of schools, it means better education quality, growth and sustainable revenues. This CIO characteristic is confirmed with my experiences with Mr. Mu. (n.d.) from Tai Shang Consultancy (“Tai Sha”). Tai Sha is a leading education consultancy services company in China. Mr. Mu, who is the chief IT officer of the company, has been required to participate senior business operation meetings and been consulted of business operation strategies on a regular basis. But it should be noted online marketing channel is one of the major marketing tools used by Tai Sha which may result requiring Mr. Mu (n.d.) to have particular strong business operation understanding. The third characteristic ability that a technology manager should have is the sensitivity to new technology from strategic planner perspective of an organization. For example, it is provided in Armstrong et al., (2011) IT manager is responsible for selecting and introduce new systems for the organization. For example, he may decide to make arrangements for introducing and using "hosted, cloud-based, or even outsourced systems and services" since these newly emerged technologies can reduce the cost of hardware and installation, or make the costs associated with maintaining the system more transparent. But whether or not adopting them depends on CIO’s judgment and careful analysis of organization’s strategic goals, value of the services, and the budget. For example, in school setting, instead of knowing how the new technologies work and its technology advantages, CIO is responsible for making decisions based on its degree of alignment with students learning improvements. An associated ability that CIO should grip is that he should be skilled in negotiation and contracts with external service providers. The trend of adopting cloud technology is more obvious than ever and its applications could be wide spread on all areas of an organization. CIO may understand the technology itself very well, but procure good bargain from the service providers would also fall into their duty territories. Person with limited exposure to technologies may not even able to fully understand the functions of a new system and its implications that brought by external service providers. On the other hand, CIO with strong technology background would not be easily misled by external contractors. An ineffective IT manager lacks the personality and influences that enable him to change
  • 4. organization’s internal operation culture. Introducing new technologies inevitably involve change of an organization’s existing practices, such as teaching methods if it is a school or marketing strategies if it is commercial organization. The change of practices requires extensive training on the staff members and sometime turn the proficient users of old practice into new learners. The introduction of new technologies may thus meet resistance from staff members and spread of rumors of its ineffectiveness. Armstrong et al., (2011) suggests this challenge could be dealt with through process of lunching pilot program. These pilot users typically go on to become the proponents of the system and provide the groundwork for developing systemic training programs. Another characteristic of ineffective IT manager is provided by Bjelland (2005), CIO's inability to understand and explain the technologies from layman's perspective. An innovative technology program may require collaborations from all departments of an organization. The new IT platform may exert substantial impact on organization's position on the market. But the creation of the system calls for a "clear, simple vision" to enable people with different technology backgrounds to coordinate their efforts. The technology questions raised by people also needs answers that are clear and simple. Mr. Mu. (n.d.) based on personal experiences unfortunately sometime during the business technology explanation conversation fall into jargon and implicitly telling non-technical people that a problem is too complex for people to understand possibly due to his strong technology background. The good technology manager should able to understand the technology strategy from layman’s perspective first place, so he could naturally explain the strategy to a non-technical superior in a real and simple way.