Chapter 9: The People in
Information Systems
Learning Objectives
Upon successful completion of this chapter, you will be
able to:
• describe each of the different roles that people play
in the design, development, and use of information
systems;
• understand the different career paths available to
those who work with information systems;
• explain the importance of where the information-
systems function is placed in an organization; and
• describe the different types of users of information
systems.
Introduction
The opening chapters of this text focused on the technology behind
information systems, namely hardware, software, data, and
networking. The last chapter covered business processes and the
Chapter 9: The People in Information
Systems | 189
U. S. Bureau
of Labor
Statistics –
2020
Projections
key role they can play in the success of a business. This chapter
discusses people, the last component of an information system.
People are involved in information systems in just about every
way. People imagine information systems, people develop
information systems, people support information systems, and,
perhaps most importantly, people use information systems.
The Creators of Information Systems
The first group of people to be considered play a role in designing,
developing, and building information systems. These people are
generally technical and have a background in programming,
analysis, information security, or database design. Just about
everyone who works in the creation of information systems has a
minimum of a bachelor’s degree in computer science or information
systems, though that is not necessarily a requirement. The process
of creating information systems will be covered in more detail in
Chapter 10.
The following chart shows the U. S. Bureau of Labor Statistics
projections for computing career employment in 2020.
190 | Information Systems for Business and Beyond (2019)
Systems Analyst
The systems analyst straddles the divide between identifying
business needs and imagining a new or redesigned system to fulfill
those needs. This individual works with a team or department
seeking to identify business requirements and analyze the specific
details of an existing system or a system that needs to be built.
Generally, the analyst is required to have a good understanding
of the business itself, the purpose of the business, the business
processes involved, and the ability to document them well. The
analyst identifies the different stakeholders in the system and works
to involve the appropriate individuals in the analysis process.
Prior to analyzing the problem or the system of concern, the
analyst needs to a) clearly identify the problem, b) gain approval for
the project, c) identify the stakeholders, and d) develop a plan to
monitor the project. The analysis phase of the project can be broken
down into five steps.
1. Se.
Management Information Systems – Week 7 Lecture 2Developme.docxcroysierkathey
Management Information Systems – Week 7 Lecture 2
Development & Improvement
Chapter 13 Systems Development: Design, Implementation, Maintenance,
and Review
You have learned about information systems and seen a little about how the project is run to create a new
system. This week you will focus on the actual systems design process. This will help you whether you
become a programmer, systems analyst or are a department manager. There are countless articles on
this subject on the internet and some great YouTube videos so take a moment to do some extra research
and learn more about systems development.
When an IS manager sits down to design a system they look at several areas and have many special
tools at their disposal.
A systems engineer or senior developer will first look at the logical design. This usually means that they
look at the user request and determine what they really mean! Once they have clarification they will create
a physical design. This might be object-oriented (using code that has already been created) or mock ups
showing interface design and controls. This is sometimes called storyboarding. This image is an example
of creating a new user interface:
System design time is an investment for the business, it will help by preventing, detecting, and correcting
errors prior to the application software being written. It will generate systems design alternatives. One
alternative is to ask software developers to create the application for the business, this is done by creating
a request for proposal (RFP). Software vendors will then propose several options at various price points.
The business can then review the proposals, do a cost benefit analysis and select an appropriate plan of
action.
Once a project has started it is a good idea to freezing design specifications using a contract, and even a
design report called a Functional Design Document. This process is intended to allow the development
team to focus on creating a specific application and not have to try to hit a constantly moving target. As
the application is being developed it is also time to acquire the hardware that will be needed. If the
application requires a headset with microphone for voice input or a super-fast computer, this is the time to
make sure the application will be functional when it is implemented.
Types of IS hardware vendors include:
General computer manufacturers
Small computer manufacturers
Peripheral equipment manufacturers
Computer dealers and distributors
Chip makers
While the application is being developed and the hardware acquired, in a perfect world the personnel will
be hired and trained and any preparations will be done for the site and data requirements (additional disk
drives for databases or could computing). One of the phases of software development is the testing
phase. It really cannot be considered the final stage because it may result in some additional planning,
programming or other modifications. It can be considered to be ...
CHAPTER 8 User InterfaceDesignChapter 8 is the first of thre.docxchristinemaritza
CHAPTER 8 User Interface
Design
Chapter 8 is the first of three chapters in the systems design phase of the SDLC. This chapter explains how to design an effective user interface, and how to handle data security and control issues. The chapter stresses the importance of user feedback and involvement in all design decisions.
OBJECTIVES
When you finish this chapter, you will be able to:
· Explain the concept of user interface design and human-computer interaction, including basic principles of user-centered design
· Explain how experienced interface designers perform their tasks
· Describe rules for successful interface design
· Discuss input and output technology issues
· Design effective source documents and forms
· Explain printed output guidelines
· Describe output and input controls and security
· Explain modular design and prototyping techniques
INTRODUCTION
User interface design is the first task in the systems design phase of the SDLC. Designing the interface is extremely important because everyone wants a system that is easy to learn and use.
After discussing the user interface, human-computer interaction, and interface design rules, the chapter describes output, data security and control issues, prototyping, and the next steps in the systems design process.
PREVIEW CASE: Mountain View College Bookstore
Background: Wendy Lee, manager of college services at Mountain View College, wants a new information system that will improve efficiency and customer service at the three college bookstores.
In this part of the case, Tina Allen (systems analyst) and David Conroe (student intern) are talking about user interface design issues.
Participants:
Tina and David
Location:
Mountain View College Cafeteria, Monday afternoon, November 25, 2013
Project status:
Tina and David have examined development strategies for the new bookstore system. After performing cost-benefit analysis, they recommended in-house development of the new bookstore system. Now they are ready to begin the systems design phase by working on user interface design for the new system.
Discussion topics:
User interface design concepts and principles
Tina:
Hi, David. Ready to start work on user interface design?
David:
Sure. Will we start with output because it’s important to users?
Tina:
Output is very important, but the most important issue for users is the interface itself. For example, is it easy to learn? Is it easy to work with? We’ll try to design everything — output, input, and all the other elements — from a user’s point of view.
David:
How do we do that?
Tina:
Well, many sources of information about effective design concepts and principles are available. We’ll study those, and then ask our own users for their input and suggestions.
David:
What about input and data entry?
Tina:
Good question, You’ve heard the old saying, “garbage in, garbage out.” User interface principles apply to user input generally, but repetitive data entry deserves special attention. We need to creat ...
Choose a National Transportation Safety Board (NTSB) report of a w.docxspoonerneddy
Choose a National Transportation Safety Board (NTSB) report of a
weather-related accident/incident
and, along with at least
five
other sources, investigate what happened in the accident/incident, offer the causes, and the recommendations for the future in order to prevent such an accident/incident.
The following components must be present within your report. Please be sure to follow the template provided.
1. Cover Page
2. Introduction
3. Synopsis of Incident
4. Causation
5. Decision Criteria
6. Analysis
7. Implications
8. Recommendations
9. Personal Narrative
10. Conclusion
11. References
.
Choose a global health issue. For this assignment, you will introduc.docxspoonerneddy
Choose a global health issue. For this assignment, you will introduce the health issue and discuss the interventions necessary to prevent the issue and promote health.
Some topics to consider may include:
Anthrax
Bioterrorism
Cholera
Clostridium
botulinum
infection
Community-associated methicillin-resistant
Staphylococcus
Ebola virus disease
Escherichia
coli
Human immunodeficiency virus disease
Malaria
Plague
Severe respiratory distress syndrome
Small pox
Suicide
Tuberculosis
Vancomycin-resistant enterococcus infection
West Nile virus
Include the following in your paper:
Introduction/overview of the health issue and the prevalence in the United States and worldwide
Contributing factors
Prevention strategies
Signs and symptoms
Diagnostic tests (if applicable)
Advanced practice nursing role and management strategies
Medical/pharmacological management (if applicable)
Follow-up care
Conclusion
Write a 3–4 page paper following APA format. You must include 2–3 scholarly sources in your citations and references.
Review the rubric for further information on how your assignment will be graded.
Due: Sunday, 11:59 p.m. (Pacific time)
Points: 100
.
More Related Content
Similar to Chapter 9 The People in Information Systems Learning Ob.docx
Management Information Systems – Week 7 Lecture 2Developme.docxcroysierkathey
Management Information Systems – Week 7 Lecture 2
Development & Improvement
Chapter 13 Systems Development: Design, Implementation, Maintenance,
and Review
You have learned about information systems and seen a little about how the project is run to create a new
system. This week you will focus on the actual systems design process. This will help you whether you
become a programmer, systems analyst or are a department manager. There are countless articles on
this subject on the internet and some great YouTube videos so take a moment to do some extra research
and learn more about systems development.
When an IS manager sits down to design a system they look at several areas and have many special
tools at their disposal.
A systems engineer or senior developer will first look at the logical design. This usually means that they
look at the user request and determine what they really mean! Once they have clarification they will create
a physical design. This might be object-oriented (using code that has already been created) or mock ups
showing interface design and controls. This is sometimes called storyboarding. This image is an example
of creating a new user interface:
System design time is an investment for the business, it will help by preventing, detecting, and correcting
errors prior to the application software being written. It will generate systems design alternatives. One
alternative is to ask software developers to create the application for the business, this is done by creating
a request for proposal (RFP). Software vendors will then propose several options at various price points.
The business can then review the proposals, do a cost benefit analysis and select an appropriate plan of
action.
Once a project has started it is a good idea to freezing design specifications using a contract, and even a
design report called a Functional Design Document. This process is intended to allow the development
team to focus on creating a specific application and not have to try to hit a constantly moving target. As
the application is being developed it is also time to acquire the hardware that will be needed. If the
application requires a headset with microphone for voice input or a super-fast computer, this is the time to
make sure the application will be functional when it is implemented.
Types of IS hardware vendors include:
General computer manufacturers
Small computer manufacturers
Peripheral equipment manufacturers
Computer dealers and distributors
Chip makers
While the application is being developed and the hardware acquired, in a perfect world the personnel will
be hired and trained and any preparations will be done for the site and data requirements (additional disk
drives for databases or could computing). One of the phases of software development is the testing
phase. It really cannot be considered the final stage because it may result in some additional planning,
programming or other modifications. It can be considered to be ...
CHAPTER 8 User InterfaceDesignChapter 8 is the first of thre.docxchristinemaritza
CHAPTER 8 User Interface
Design
Chapter 8 is the first of three chapters in the systems design phase of the SDLC. This chapter explains how to design an effective user interface, and how to handle data security and control issues. The chapter stresses the importance of user feedback and involvement in all design decisions.
OBJECTIVES
When you finish this chapter, you will be able to:
· Explain the concept of user interface design and human-computer interaction, including basic principles of user-centered design
· Explain how experienced interface designers perform their tasks
· Describe rules for successful interface design
· Discuss input and output technology issues
· Design effective source documents and forms
· Explain printed output guidelines
· Describe output and input controls and security
· Explain modular design and prototyping techniques
INTRODUCTION
User interface design is the first task in the systems design phase of the SDLC. Designing the interface is extremely important because everyone wants a system that is easy to learn and use.
After discussing the user interface, human-computer interaction, and interface design rules, the chapter describes output, data security and control issues, prototyping, and the next steps in the systems design process.
PREVIEW CASE: Mountain View College Bookstore
Background: Wendy Lee, manager of college services at Mountain View College, wants a new information system that will improve efficiency and customer service at the three college bookstores.
In this part of the case, Tina Allen (systems analyst) and David Conroe (student intern) are talking about user interface design issues.
Participants:
Tina and David
Location:
Mountain View College Cafeteria, Monday afternoon, November 25, 2013
Project status:
Tina and David have examined development strategies for the new bookstore system. After performing cost-benefit analysis, they recommended in-house development of the new bookstore system. Now they are ready to begin the systems design phase by working on user interface design for the new system.
Discussion topics:
User interface design concepts and principles
Tina:
Hi, David. Ready to start work on user interface design?
David:
Sure. Will we start with output because it’s important to users?
Tina:
Output is very important, but the most important issue for users is the interface itself. For example, is it easy to learn? Is it easy to work with? We’ll try to design everything — output, input, and all the other elements — from a user’s point of view.
David:
How do we do that?
Tina:
Well, many sources of information about effective design concepts and principles are available. We’ll study those, and then ask our own users for their input and suggestions.
David:
What about input and data entry?
Tina:
Good question, You’ve heard the old saying, “garbage in, garbage out.” User interface principles apply to user input generally, but repetitive data entry deserves special attention. We need to creat ...
Choose a National Transportation Safety Board (NTSB) report of a w.docxspoonerneddy
Choose a National Transportation Safety Board (NTSB) report of a
weather-related accident/incident
and, along with at least
five
other sources, investigate what happened in the accident/incident, offer the causes, and the recommendations for the future in order to prevent such an accident/incident.
The following components must be present within your report. Please be sure to follow the template provided.
1. Cover Page
2. Introduction
3. Synopsis of Incident
4. Causation
5. Decision Criteria
6. Analysis
7. Implications
8. Recommendations
9. Personal Narrative
10. Conclusion
11. References
.
Choose a global health issue. For this assignment, you will introduc.docxspoonerneddy
Choose a global health issue. For this assignment, you will introduce the health issue and discuss the interventions necessary to prevent the issue and promote health.
Some topics to consider may include:
Anthrax
Bioterrorism
Cholera
Clostridium
botulinum
infection
Community-associated methicillin-resistant
Staphylococcus
Ebola virus disease
Escherichia
coli
Human immunodeficiency virus disease
Malaria
Plague
Severe respiratory distress syndrome
Small pox
Suicide
Tuberculosis
Vancomycin-resistant enterococcus infection
West Nile virus
Include the following in your paper:
Introduction/overview of the health issue and the prevalence in the United States and worldwide
Contributing factors
Prevention strategies
Signs and symptoms
Diagnostic tests (if applicable)
Advanced practice nursing role and management strategies
Medical/pharmacological management (if applicable)
Follow-up care
Conclusion
Write a 3–4 page paper following APA format. You must include 2–3 scholarly sources in your citations and references.
Review the rubric for further information on how your assignment will be graded.
Due: Sunday, 11:59 p.m. (Pacific time)
Points: 100
.
Choose a geographic community of interest (Hyde park, Illinois) and .docxspoonerneddy
Choose a geographic community of interest (Hyde park, Illinois) and go to the corresponding website. Gather information on the population (race, sex, age, educational level, employment), health resources, major grocery stores and transportation. Students must make an initial post describing the official name and geographic boundaries, along with some of the findings (at least 5 facts) from the website, like overall appearance, upkeep, trash/cleanliness, type of housing (apartments vs. homes) in the area.
.
Choose a disease condition of the gastrointestinal tract, describe.docxspoonerneddy
Choose a disease condition of the gastrointestinal tract, described in your own words. Please use at least two sentences. Include a digestive system medical term with a combining form, suffix and prefix that relates to your disease condition. Define the term both literally and officially using the glossary to define the word parts and the mobile medical dictionary to define the term. Remember to use dash and slash!
.
Choose a few health issues in your community that can be used to pla.docxspoonerneddy
Choose a few health issues in your community that can be used to plan community health interventions. Briefly identify urgent health issues and non-urgent health issues. What makes health issues urgent and a priority? Which needs are not a priority and why? Who determines this or should determine this (identify internal and external stakeholders)? How would you document and present this to your community?
.
Choose a current member of Congress and research their background. P.docxspoonerneddy
Choose a current member of Congress and research their background. Prepare a 1-page analysis of their background including their views, policy choices and opinions on current issues.
Post your paper to the Discussion Area with a short introduction. Spend time reviewing other students’ papers. Comment on at least 2 students’ papers. What impact does the congressional member’s background (social, economic, educational, ethnic, gender, ideological, etc.) have on your opinion of them? Be specific. Provide concrete examples.
.
Choose a couple of ways how your life would be different without the.docxspoonerneddy
Choose a couple of ways how your life would be different without the Internet. How would the business world be different? Think of the job you have now, a job you’ve had previously, or the job you’d really like to have and discuss what you think the impact would be based on your understanding of equipment used to support Internet access such as switches and routers.
.
Choose a countrydifferent fromyournative country,and.docxspoonerneddy
Choose a country
different from
your
native country,
and
write about
three interesting
or
exotic
(touristy or not)
places
that you want to visit in that country.
As follows:
1.
Write
what features
make those places
interesting or exotic
TO YOU, NOT THE REST OF THE WORLD
Give enough details of the features of the places so you can make
readers picture those interesting or exotic places in their mind.
.
Choose 5 questions and answer them with my materials onlyD.docxspoonerneddy
Choose 5 questions and answer them with my materials only
Dispossession
1- What is meant by “dispossession”?
2- What does and does not change in this process?
Forced Movements
1- Name three ways Native Americans were moved from their homeplace?
Reservations
1- What was meant by, “kill the Indian, save the man”?
2- How was religion involved in reservations?
3- After being removed from their “spiritual homeplace”, how might this affect American Indian religion?
Christianity
1- Name one way Native Americans were “converted” to Christianity, and why they chose to do so?
2- To some American Indians, what was missing in the Christian perspective or practices?
Two Faces of History
1- Name opposing views of the world between Native Americans and Europeans? Is this evident today?
Leading Figures
1- Describe a “leading figure” according to a Native American perspective. Give three examples.
2- Who are the notable leaders we learn about in school? Why them? What do they often have in common?
.
Choose a communication situation you recently experienced at you.docxspoonerneddy
Choose a communication situation you recently experienced at your workplace or other organization you are affiliated with. Use the human communication process described in your text, starting on page 11, "Human Communication: Message and Constitutive Processes," to analyze why—or why not—a shared reality was experienced as an end result. Summarize your experience and include your analysis as an attachment in this assignment thread. Consider the following items in your analysis:
Identify the source and the receiver.
What was the message and what type of message function was it serving?
How was it encoded?
How was it decoded?
What channel was used to transmit the message?
What type of noise was experienced?
Comment on the competencies, fields of experience, and culture of the participants involved.
Identify the communication context of this situation.
What was the intended effect versus the actual effect of the message?
Was a shared reality constructed? If not, what needed to change?
.
Choose 5 interconnected leadership task (listed below). Tell why each task is important to understand as a leader that is involved with the strategic planning process.
Explain what each process means and what is involved with the five that you picked.
Interconnected Leadership task:
1)Understanding the context
2)Understanding the people involved, including oneself
3)Sponsoring Process
4)Championing the process
5)Facilitating the process
6)Fostering collective leadership
7)Using dialogue and discussion
8)Making and implementing policy decisions
9)Enforcing norms, settling disputes, and managing residual conflict
10) Pulling it all together
Outline:
Cover Page
Abstract
Introduction: (Overview what you will discuss)
Body (2 FULL Pages of Content)
Reference Page (2-3 references)
.
Choose 5 out of the first 10 questions, 5 pages essay1. Where do.docxspoonerneddy
Choose 5 out of the first 10 questions, 5 pages essay
1. Where do American Indians believe they come from?
2. As a student, how would you approach going to a ceremony?
3. How would “I” (meaning Mr. Madril), define/describe an American Indian “church”?
4. Why is the idea of the ‘circle’ valued by some American Indian people?
5. Define ‘ontology’
6. How do some American Indian people view eagles/eagle feathers?
7. How has Christianity and American Indian people interacted?
8. Name or describe some ‘sacred places’/sacred spaces
9. Name some ‘ceremonies’
10. What is a ‘holy person’?
.
Choose 3 or 4 poems from Elizabeth Bishop. You may choose any poems .docxspoonerneddy
Choose 3 or 4 poems from Elizabeth Bishop. You may choose any poems that you want, whether in our eText or from another source, but be sure to use proper citations for each of them. Discuss how the poet’s life has influenced her or his poetry. You may find context from the poet’s childhood, personal experiences, etc. and link them to poems of your choice.
Be careful not to give me five pages of biography!
When referencing poems, you may quote specific lines but
do not
type the entire poem into your essay.
MLA Format
5-6 pages, double spaced, not including Works Cited page
Works Cited page
Proper in-text citations
.
Choose 1 topic to write an essay. Dont restate all the time. Write .docxspoonerneddy
Choose 1 topic to write an essay. Don't restate all the time. Write your own thoughts. 800 words.
1. Jesus was both a person of his times and a figure whose teachings have obviously transcended his specific context. How did Jesus’s life and teachings better fit the first century? How do Jesus’s life and teachings seem to apply today? Which do you think better characterizes Jesus’s actual life and teachings? Is it more convincing to you that the first century Jesus resists our expectations, or that he anticipates them?
2. Jesus and the early Christians were a part of the larger Jewish context. At the same time, they also brought a number of innovations and new combinations. Compare Jesus’s life and message to that of the Pharisees, Essenes, followers of John the Baptist, Sadducees, priests, and/or the temple. How did Jesus and the early Christians fit with these other Jewish groups? How did they challenge them? Is it more convincing to you that Jesus and the early Christians were part of first century Judaism, or that they pushed to create a new religion?
3. Jesus avoided political attention for most of his life and work. Whatever he taught, he taught it skillfully and carefully enough that political figures allowed him to continue when many others were crucified. And yet, at the end, he too was crucified, but alone. Describe both the ways in which the historical Jesus avoided political confrontation and the ways in which he touched on politically sensitive ideas. Which gives us a better portrait of Jesus—the one who was politically cautious, or the rebel?
.
Choose 1 focal point from each subcategory of practice, educatio.docxspoonerneddy
Choose 1 focal point from each subcategory of practice, education, research and administration and describe how the APRN can provide effective care in end of life management
Using the American nurses association position statement, recommendations for improvement in end of life management focuses on practice, education, research and administration. Listed below are steps that nurses can take to overcome barriers in healthcare practice.
Practice
1. Strive to attain a standard of primary palliative care so that all health care providers have basic knowledge of palliative nursing to improve the care of patients and families.
2. All nurses will have basic skills in recognizing and managing symptoms, including pain, dyspnea, nausea, constipation, and others.
3. Nurses will be comfortable having discussions about death, and will collaborate with the care teams to ensure that patients and families have current and accurate information about the possibility or probability of a patient’s impending death.
4. Encourage patient and family participation in health care decision-making, including the use of advance directives in which both patient preferences and surrogates are identified.
Education
1. Those who practice in secondary or tertiary palliative care will have specialist education and certification.
2. Institutions and schools of nursing will integrate precepts of primary palliative care into curricula.
3. Basic and specialist End-of-Life Nursing Education Consortium (ELNEC) resources will be available.
4. Advocate for additional education in academic programs and work settings related to palliative care, including symptom management, supported decision-making, and end-of-life care, focusing on patients and families.
Research
1. Increase the integration of evidence-based care across the dimensions of end-of-life care.
2. Develop best practices for quality care across the dimensions of end-of-life care, including the physical, psychological, spiritual, and interpersonal.
3. Support the use of evidence-based and ethical care, and support decision-making for care at the end of life.
4. Develop best practices to measure the quality and effectiveness of the counseling and interdisciplinary care patients and families receive regarding end-of-life decision-making and treatments.
5. Support research that examines the relationship of patient and family satisfaction and their utilization of health care resources in end-of-life care choices.
Administration
1. Promote work environments in which the standards for excellent care extend through the patient’s death and into post-death care for families.
2. Encourage facilities and institutions to support the clinical competence and professional development that will help nurses provide excellent, dignified, and compassionate end-of-life care.
3. Work toward a standard of palliative care available to patients and families from the time of diagnosis of a serious illness or an injury.
4. Suppo.
Choose 1 focal point from each subcategory of practice, education, r.docxspoonerneddy
Choose 1 focal point from each subcategory of practice, education, research and administration and describe how the APRN can provide effective care in end of life management.
Using the American nurses association position statement, recommendations for improvement in end of life management focuses on practice, education, research and administration. Listed below are steps that nurses can take to overcome barriers in healthcare practice.
Practice
1. Strive to attain a standard of primary palliative care so that all health care providers have basic knowledge of palliative nursing to improve the care of patients and families.
2. All nurses will have basic skills in recognizing and managing symptoms, including pain, dyspnea, nausea, constipation, and others.
3. Nurses will be comfortable having discussions about death, and will collaborate with the care teams to ensure that patients and families have current and accurate information about the possibility or probability of a patient’s impending death.
4. Encourage patient and family participation in health care decision-making, including the use of advance directives in which both patient preferences and surrogates are identified.
Education
1. Those who practice in secondary or tertiary palliative care will have specialist education and certification.
2. Institutions and schools of nursing will integrate precepts of primary palliative care into curricula.
3. Basic and specialist End-of-Life Nursing Education Consortium (ELNEC) resources will be available.
4. Advocate for additional education in academic programs and work settings related to palliative care, including symptom management, supported decision-making, and end-of-life care, focusing on patients and families.
Research
1. Increase the integration of evidence-based care across the dimensions of end-of-life care.
2. Develop best practices for quality care across the dimensions of end-of-life care, including the physical, psychological, spiritual, and interpersonal.
3. Support the use of evidence-based and ethical care, and support decision-making for care at the end of life.
4. Develop best practices to measure the quality and effectiveness of the counseling and interdisciplinary care patients and families receive regarding end-of-life decision-making and treatments.
5. Support research that examines the relationship of patient and family satisfaction and their utilization of health care resources in end-of-life care choices.
Administration
1. Promote work environments in which the standards for excellent care extend through the patient’s death and into post-death care for families.
2. Encourage facilities and institutions to support the clinical competence and professional development that will help nurses provide excellent, dignified, and compassionate end-of-life care.
3. Work toward a standard of palliative care available to patients and families from the time of diagnosis of a serious illness or an injury.
4. Sup.
Chinese HistoryBased on the lecture on Chinese History and Marxi.docxspoonerneddy
Chinese History
Based on the lecture on Chinese History and Marxist Historiography that we can observe that women’s values for love and marriage have changed dramatically. China entered different periods from the feudal system to the opening of China. In the feudal period, people attached importance to family ethics took the land as the main interest and lived a life according to family rules. However, after China entered the capitalist era, capitalism encouraged people to pursue money and material life.
Marriage and love are very important to a woman. However, at different times, a woman has a completely different way of life. For example, Yulian lived in a feudal period dominated by family so she put her husband's family first. In my opinion, Yulian sacrificed her love and happiness for putting family first, which is a great thing but not worth it. However, Jia Jia from the beginning of the gold digger because of a series of events and become a brave pursuit of their own love and life woman is very worthy of praise.
With the passage of time, people's concept has changed gradually, from the old conservative value of family to the priority of their own ideas, from the pursuit of land as the interest standard to the pursuit of money and material life as the most important goal, which is an important symbol of the changing times.
Jia Jia and Julian have something in common. They all focus on who can give them a stable and good life. However, the difference is that Yulian follows the traditional idea of giving priority to her family but Jia Jia is based on their own ideas to live out their own life.
Marxist Historiography
1. Marxist Historiography has five different stages. The first stage is Primitive Communism, People at this stage use hunting as raw meat, which is the most important asset. The second stage is Oriental Slavery, the agricultural development began, and people willing to fight elsewhere and take slaves to cultivate for themselves. The most valuable is the slave. The third stage is Feudalism, serfs or peasants serve for their king and pay the rent or tax. Capitalism is the four-stage, the most important asset is money. The five-stage is Communism, for this stage that no more private ownership and it will be a world of peace and no war.
2. Base on Marxist Historiography lecture, the era of Yulian's life is very important to the family. She listens to her family's arrangements to get married and takes care of her husband's family after marriage. So I think Yulian is in the third stage of the Marxism Feudalism stage because people at this stage serve the king, they obedient and obey the rules. Yulian's life all follow her husband’s family and obey her family. Jia Jia emphasized that she has money from the beginning of the film. Anything she wants that she just use money to get it. All Jia Jia thinks that she can buy it with money. Therefore, Jia Jia is the fourth stage Capitalism stage in Marxism.
3. On the stage of Yulian so be .
Children need an Aesthetics Experience from the teacher and in the c.docxspoonerneddy
Children need an Aesthetics Experience from the teacher and in the classroom. The above document is a brief summary of Aesthetic and some key terms.
Do the following:
1. Read the document completely
2. Study the Key Terms
3. Use the key terms and determine which words can be used in a Early Childhood Classroom and which words can be used with an An Art Conversation with a child. Give a brief explanation of your reasoning
.
China’s economy
中国经济
http://worldmap.harvard.edu/chinamap/
How has China’s economy changed 1949-present?
What is the structure of PR China’s economy?
What are some major agricultural issues in China?
What are some industrial issues in China?
What is the Belt and Road Initiative?
What are the economic forces at work in China?
How has the economic reform policy progressed in China?
How has China’s economy changed 1949-present?
Economy Timeline
Mao 1950s Land reform, Collectivization, Great Leap Forward, 1960s Cultural Revolution
1976 Four Modernizations
Deng Reforms
1980s Agricultural Responsibility System
Socialist Economy with Chinese Characteristics
Exports
1992 Deng’s Southern tour
Regional Development, Coast, Interior
2000 Develop the West
2010 Moderate Prosperity, Technology, Green
2013 Third Plenum - China Dream
http://www.bbc.co.uk/news/business-25033622
http://www.bbc.com/news/world-asia-china-31744373
Videos
China in the Red
http://www.pbs.org/wgbh/pages/frontline/shows/red/
http://www.dailymotion.com/video/xen5f7_pbs-china-in-the-red-9-11_news
What are the lives of people like?
Form of Economy
Mixed Economy
Market-Leninism
Transition: Elements of Socialism, Market & Capitalism
What is the structure of PR China’s economy?
Ownership types: State, Collective, Private and individual, Foreign
Economic Indicators
GDP Trillion $25.36
GDP per capita $18, 200
GDP growth 6.9% GDP Composition
Agriculture 8%, Industry 40% Service 52%
Labor Composition
Agriculture 28%, Industry 29% Service 43%
Poverty 3.3%, <RMB2300 ( US$400)
Trade
Exports (number 1):
US 19, Hong Kong 12, Japan 6, South Korea 5
Electrical, computers, apparel, furniture, textiles
Imports ( number 2):
South Korea 10, Japan 9, US 9, Germany 5, Australia 5
Electrical, oil, medical, ore, vehicle, soybean
Structure of China’s Transitional Economy 1
Structure of China’s Transitional Economy
Industrial structure (compare to Japan and S. Korea)
Enterprise groups – SOE State Operated Enterprise
state support/control, losing money, 25% industry
Collective enterprises – independent of state
manager bought company from state
40% industry
TVE Enterprises – Township and Village Enterprises (former collective)
Owned operated by rural - Dynamic element of economy
Structure of China’s Transitional Economy 2
Private Entrepreneurs - small business, 20% industry
services/manufactures Difficult taxes, legality, politics
Foreign Ventures – partnerships, 10% industry
– commerce, industry
Agriculture - backbone of economy 8% econ
employment / food supply
Responsibility system, state out of agriculture
have right to work land
Food price control and some subsidies still exist
Economic Dualism
Industrial v. non-industrial : worker - peasant
Coastal & open cities v. hinterland “backward”
City v. country
urban v. rural
China Inc?
Simplified form
CCP
Business Bureaucracy
(SOE, Coll., TVE) (State Council)
Rural .
Childrens Health Insurance Program CHIP. Respond to the 5 questions.docxspoonerneddy
Children's Health Insurance Program CHIP. Respond to the 5 questions in 200 words per question using at least 4 source.
1. What is the CHIP program? When and how was it established? how does it benefit children’s health and wellbeing and that of the overall population?
2. How could the CHIP program continue to be successfully funded?
3. Who do you feel should be covered in the program?
4. How should the qualifications be set for being accepted?
5. Revise one evidence-based article regarding this program and the impact it has.
.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Unit 8 - Information and Communication Technology (Paper I).pdf
Chapter 9 The People in Information Systems Learning Ob.docx
1. Chapter 9: The People in
Information Systems
Learning Objectives
Upon successful completion of this chapter, you will be
able to:
• describe each of the different roles that people play
in the design, development, and use of information
systems;
• understand the different career paths available to
those who work with information systems;
• explain the importance of where the information-
systems function is placed in an organization; and
• describe the different types of users of information
systems.
Introduction
The opening chapters of this text focused on the technology
behind
2. information systems, namely hardware, software, data, and
networking. The last chapter covered business processes and the
Chapter 9: The People in Information
Systems | 189
U. S. Bureau
of Labor
Statistics –
2020
Projections
key role they can play in the success of a business. This chapter
discusses people, the last component of an information system.
People are involved in information systems in just about every
way. People imagine information systems, people develop
information systems, people support information systems, and,
perhaps most importantly, people use information systems.
The Creators of Information Systems
The first group of people to be considered play a role in
designing,
developing, and building information systems. These people are
generally technical and have a background in programming,
3. analysis, information security, or database design. Just about
everyone who works in the creation of information systems has
a
minimum of a bachelor’s degree in computer science or
information
systems, though that is not necessarily a requirement. The
process
of creating information systems will be covered in more detail
in
Chapter 10.
The following chart shows the U. S. Bureau of Labor Statistics
projections for computing career employment in 2020.
190 | Information Systems for Business and Beyond (2019)
Systems Analyst
The systems analyst straddles the divide between identifying
business needs and imagining a new or redesigned system to
fulfill
those needs. This individual works with a team or department
seeking to identify business requirements and analyze the
specific
4. details of an existing system or a system that needs to be built.
Generally, the analyst is required to have a good understanding
of the business itself, the purpose of the business, the business
processes involved, and the ability to document them well. The
analyst identifies the different stakeholders in the system and
works
to involve the appropriate individuals in the analysis process.
Prior to analyzing the problem or the system of concern, the
analyst needs to a) clearly identify the problem, b) gain
approval for
the project, c) identify the stakeholders, and d) develop a plan
to
monitor the project. The analysis phase of the project can be
broken
down into five steps.
1. Seek out and identify the details
2. Specify requirements
3. Decide which requirements are most important
4. Create a dialog showing how the user interacts with the
existing system
5. 5. Ask users to critique the list of requirements that have been
developed
The analysis phase involves both the systems analyst and the
users. It is important to realize the role the users take in the
analysis
of the system. Users can have significant insights into how well
the
current system functions as well as suggest improvements.
Once the requirements are determined, the analyst begins the
process of translating these requirements into an information
systems design. It is important to understand which different
technological solutions will work and provide several
alternatives
to the client, based on the company’s budgetary constraints,
Chapter 9: The People in Information Systems | 191
technology constraints, and culture. Once the solution is
selected,
the analyst will create a detailed document describing the new
system. This new document will require that the analyst
6. understand
how to speak in the technical language of systems developers.
The design phase results in the components of the new system
being identified, including how they relate to one another. The
designer needs to communicate clearly with software developers
as
well database administrators by using terminology that is
consistent
with both of these specialties. The design phase of the project
can
be broken down into six steps.
1. Design the hardware environment
2. Design the software
3. Design how the new system will interface with the users
4. Design hardware interfaces
5. Design database tables
6. Design system security
A systems analyst generally is not the one who does the actual
development of the information system. The design document
created by the systems analyst provides the detail needed to
7. create
the system and is handed off to a developer to actually write the
software and to the database administrator to build the database
and tables that will be in the database.
Sometimes the system may be assembled from off-the-shelf
components by a person called a systems integrator. This is a
specific type of systems analyst that understands how to get
different software packages to work with each other.
To become a systems analyst, you should have a background
both
in the business analysis and in systems design. Many analysts
first
work as developers and have business experience before
becoming
system analysts. It is vital for analysts to clearly understand the
purpose of the business of interest, realizing that all businesses
are
unique.
192 | Information Systems for Business and Beyond (2019)
8. Programmer/Developer
Programmers spend their time writing computer code in a
programming language. In the case of systems development,
programmers generally attempt to fulfill the design
specifications
given to them by a systems analyst/designer. Many different
styles
of software development exist A programmer may work alone
for
long stretches of time or work as part of a team with other
developers. A programmer needs to be able to understand
complex
processes and also the intricacies of one or more programming
languages.
Computer Engineer
Computer engineers design the computing devices that are used
every day. There are many types of computer engineers who
work
on a variety of different types of devices and systems. Some of
the
more prominent computer engineering jobs are as follows:
9. • Hardware engineer. A hardware engineer designs hardware
and test components such as microprocessors, memory
devices, routers, and networks. Many times, a hardware
engineer is at the cutting edge of computing technology,
creating something brand new. Other times, the hardware
engineer’s job is to re-engineer an existing component to work
faster or use less power. Many times a hardware engineer’s job
is to write code to create a program that will be implemented
directly on a computer chip.
• Software engineer. Software engineers tend to focus on a
specific area of software such as operating systems, networks,
applications, or databases. Software engineers use three
primary skill areas: computer science, engineering, and
mathematics.
Chapter 9: The People in Information Systems | 193
• Systems engineer. A systems engineer takes the components
designed by other engineers and makes them all work
together, focusing on the integration of hardware and
software. For example, to build a computer the mother board,
10. processor, memory, and hard disk all have to work together. A
systems engineer has experience with many different types of
hardware and software and knows how to integrate them to
create new functionality.
• Network engineer. A network engineer understands the
networking requirements of an organization and then designs
a communications system to meet those needs, using the
networking hardware and software, sometimes referred to as a
network operating system. Network engineers design both
local area networks as well as wide area networks.
There are many different types of computer engineers, and often
the job descriptions overlap. While many may call themselves
engineers based on a company job title, there is also a
professional
designation of “professional engineer” which has specific
requirements. In the United States each state has its own set of
requirements for the use of this title, as do different countries
around the world. Most often, it involves a professional
licensing
11. exam.
Information Systems Operations and
Administration
Another group of information systems professionals are
involved in
the day-to-day operations and administration of IT. These
people
must keep the systems running and up-to-date so that the rest
of the organization can make the most effective use of these
resources.
194 | Information Systems for Business and Beyond (2019)
Computer Operator
A computer operator is the person who oversees the mainframe
computers and data centers in organizations. Some of their
duties
include keeping the operating systems up to date, ensuring
available
memory and disk storage, providing for redundancy (think
electricity, connectivity to the Internet, and database backups),
and
12. overseeing the physical environment of the computer. Since
mainframe computers increasingly have been replaced with
servers,
storage management systems, and other platforms, computer
operators’ jobs have grown broader and include working with
these
specialized systems.
Database Administrator
A Database Administrator (DBA) is the person who designs and
manages the databases for an organization. This person creates
and
maintains databases that are used as part of applications or the
data warehouse. The DBA also consults with systems analysts
and
programmers on projects that require access to or the creation
of
databases.
Help Desk/Support Analyst
Most mid-size to large organizations have their own information
technology help desk. The help desk is the first line of support
for
13. computer users in the company. Computer users who are having
problems or need information can contact the help desk for
assistance. Many times a help desk worker is a junior level
employee
who is able to answer basic issues that users need assistance
with.
Help desk analysts work with senior level support analysts or
have a
Chapter 9: The People in Information Systems | 195
computer knowledgebase at their disposal to help them
investigate
the problem at hand. The help desk is a great place to break into
working in IT because it exposes you to all of the different
technologies within the company. A successful help desk
analyst
should have good communications skills and a sincere interest
in
helping users.
Trainer
A computer trainer conducts classes to teach people specific
14. computer skills. For example, if a new ERP system is being
installed
in an organization, one part of the implementation process is to
teach all of the users how to use the new system. A trainer may
work
for a software company and be contracted to come in to conduct
classes when needed; a trainer may work for a company that
offers
regular training sessions. Or a trainer may be employed full
time for
an organization to handle all of their computer instruction
needs.
To be successful as a trainer you need to be able to
communicate
technical concepts clearly and demonstrate patience with
learners.
Managing Information Systems
The management of information-systems functions is critical to
the success of information systems within the organization.
Here
are some of the jobs associated with the management of
information systems.
15. 196 | Information Systems for Business and Beyond (2019)
CIO
The Chief Information Officer (CIO) is the head of the
information-
systems function. This person aligns the plans and operations of
the
information systems with the strategic goals of the organization.
Tasks include budgeting, strategic planning, and personnel
decisions for the information systems function. The CIO must
also
be the face of the IT department within the organization. This
involves working with senior leaders in all parts of the
organization
to ensure good communication, planning, and budgeting.
Interestingly, the CIO position does not necessarily require a lot
of technical expertise. While helpful, it is more important for
this
person to have good management skills and understand the
business. Many organizations do not have someone with the title
16. of CIO. Instead, the head of the information systems function is
called the Vice President of Information Systems or Director of
Information Systems.
Functional Manager
As an information systems organization becomes larger, many
of
the different functions are grouped together and led by a
manager.
These functional managers report to the CIO and manage the
employees specific to their function. For example, in a large
organization there are a group of systems analysts who report to
a manager of the systems analysis function. For more insight
into
how this might look, see the discussion later in the chapter of
how
information systems are organized.
Chapter 9: The People in Information Systems | 197
Gantt Chart
for
managing
projects
17. ERP Management
Organizations using an ERP require one or more individuals to
manage these systems. EPR managers make sure that the ERP
system is completely up to date, work to implement any changes
to
the ERP that are needed, and consult with various user
departments
on needed reports or data extracts.
Project Managers
Information systems projects are notorious for going over
budget
and being delivered late. In many cases a failed IT project can
spell
doom for a company. A project manager is responsible for
keeping
projects on time and on budget. This person works with the
stakeholders of the project to keep the team organized and
communicates the status of the project to management. Gantt
charts, shown above, are used to graphically illustrate a
project’s
schedule, tasks, and resources.
18. A project manager does not have authority over the project
team.
198 | Information Systems for Business and Beyond (2019)
Instead, the project manager coordinates schedules and
resources
in order to maximize the project outcomes. This leader must be
a
good communicator and an extremely organized person. A
project
manager should also have good people skills. Many
organizations
require each of their project managers to become certified as a
Project Management Professional (PMP).
Information Security Officer
An information security officer is in charge of setting
information
security policies for an organization and then overseeing the
implementation of those policies. This person may have one or
more
people reporting to them as part of the information security
team.
19. As information has become a critical asset, this position has
become
highly valued. The information security officer must ensure that
the
organization’s information remains secure from both internal
and
external threats.
Emerging Roles
As technology evolves many new roles are becoming more
common
as other roles diminish. For example, as we enter the age of
“big
data,” we are seeing the need for more data analysts and
business
intelligence specialists. Many companies are now hiring social
media experts and mobile technology specialists. The increased
use
of cloud computing and Virtual Machine (VM) technologies
also is
increasing demand for expertise in those areas.
Chapter 9: The People in Information Systems | 199
http://www.pmi.org/Certification/Project-Management-
20. Professional-PMP.aspx
Career Paths in Information Systems
(click to enlarge)
Career Paths in Information Systems
These job descriptions do not
represent all possible jobs
within an information systems
organization. Larger
organizations will have more
specialized roles, while smaller
organizations may combine
some of these roles. Many of
these roles may exist outside of
a traditional information-
systems organization, as we will
discuss below.
Working with information
systems can be a rewarding
21. career choice. Whether you
want to be involved in very
technical jobs (programmer,
database administrator), or you
want to be involved in working
with people (systems analyst, trainer, project manager), there
are
many different career paths available.
Many times those in technical jobs who want career
advancement
find themselves in a dilemma. A person can continue doing
technical work, where sometimes their advancement options are
limited, or become a manager of other employees and put
themselves on a management career track. In many cases those
proficient in technical skills are not gifted with managerial
skills.
Some organizations, especially those that highly value their
technically skilled employees, create a technical track that
exists in
parallel to the management track so that they can retain
22. employees
who are contributing to the organization with their technical
skills.
200 | Information Systems for Business and Beyond (2019)
https://opentextbook.site/informationsystems2019/wp-
content/uploads/sites/3/2018/07/Career-Paths.png
https://opentextbook.site/informationsystems2019/wp-
content/uploads/sites/3/2018/07/Career-Paths.png
CISCO certification badge
Sidebar: Are Certifications Worth Pursuing?
As technology becomes more important to businesses, hiring
employees with technical skills is becoming critical. But how
can
an organization ensure that the person they are hiring has the
necessary skills? Many organizations are including technical
certifications as a prerequisite for getting hired.
Cisco Certified Internetwork Expert.
Certifications are
designations given by a
certifying body that someone
23. has a specific level of
knowledge in a specific
technology. This certifying
body is often the vendor of the
product itself, though
independent certifying
organizations, such as
CompTIA, also exist. Many of these organizations offer
certification
tracks, allowing a beginning certificate as a prerequisite to
getting
more advanced certificates. To get a certificate, you generally
attend one or more training classes and then take one or more
certification exams. Passing the exams with a certain score will
qualify you for a certificate. In most cases, these classes and
certificates are not free. In fact a highly technical certification
can
cost thousands dollars. Some examples of the certifications in
highest demand include Microsoft (software certifications),
Cisco
24. (networking), and SANS (security).
For many working in IT, determining whether to pursue one or
more of these certifications is an important question. For many
jobs,
Chapter 9: The People in Information Systems | 201
http://certification.comptia.org/home.aspx
http://www.microsoft.com/learning/en/us/certification-
overview.aspx
http://www.cisco.com/web/learning/certifications/index.html
http://www.sans.org/
such as those involving networking or security, a certificate will
be
required by the employer as a way to determine which potential
employees have a basic level of skill. For those who are already
in
an IT career, a more advanced certificate may lead to a
promotion.
For those wondering about the importance of certification, the
best
solution is to talk to potential employers and those already
working
in the field to determine the best choice.
25. Organizing the Information Systems
Function
In the early years of computing, the information-systems
function
(generally called “data processing”) was placed in the finance
or
accounting department of the organization. As computing
became
more important, a separate information-systems function was
formed, but it still was generally placed under the Chief
Financial
Officer and considered to be an administrative function of the
company. By the 1980s and 1990s, when companies began
networking internally and then connecting to the Internet, the
information systems function was combined with the
telecommunications functions and designated as the Information
Technology (IT) department. As the role of information
technology
continued to increase, its place in the organization became more
important. In many organizations today, the head of IT (the
CIO)
reports directly to the CEO.
26. Where in the Organization Should IS Be?
Before the advent of the personal computer, the information
202 | Information Systems for Business and Beyond (2019)
systems function was centralized within organizations in order
to
maximize control over computing resources. When the PC began
proliferating, many departments within organizations saw it as a
chance to gain some computing resources for themselves. Some
departments created an internal information systems group,
complete with systems analysts, programmers, and even
database
administrators. These departmental IS groups were dedicated to
the information needs of their own departments, providing
quicker
turnaround and higher levels of service than a centralized IT
department. However, having several IS groups within an
organization led to a lot of inefficiencies. There were now
several
people performing the same jobs in different departments. This
27. decentralization also led to company data being stored in
several
places all over the company.
In some organizations a matrix reporting structure developed in
which IT personnel were placed within a department and
reported
to both the department management and the functional
management within IS. The advantages of dedicated IS
personnel
for each department must be weighed against the need for more
control over the strategic information resources of the company.
For many companies, these questions are resolved by the
implementation of the ERP system (see discussion of ERP in
Chapter
8). Because an ERP system consolidates most corporate data
back
into a single database, the implementation of an ERP system
requires organizations to find “silos” of data so that they can
integrate them back into the corporate system. The ERP allows
organizations to regain control of their information and
influences
28. organizational decisions throughout the company.
Outsourcing
Frequently an organization needs a specific skill for a limited
period
of time. Instead of training existing employees or hiring new
staff,
Chapter 9: The People in Information Systems | 203
it may make more sense to outsource the job. Outsourcing can
be
used in many different situations within the information systems
function, such as the design and creation of a new website or
the
upgrade of an ERP system. Some organizations see outsourcing
as a
cost-cutting move, contracting out a whole group or department.
New Models of Organizations
The integration of information technology has influenced the
structure of organizations. The increased ability to communicate
and share information has led to a “flattening” of the
organizational
29. structure due to the removal of one or more layers of
management.
The network-based organizational structure is another changed
enabled by information systems. In a network-based
organizational
structure, groups of employees can work somewhat
independently
to accomplish a project. People with the right skills are brought
together for a project and then released to work on other
projects
when that project is over. These groups are somewhat informal
and
allow for all members of the group to maximize their
effectiveness.
Information Systems Users – Types of Users
Besides the people who work to create, administer, and manage
information systems, there is one more extremely important
group
of people, namely, the users of information systems. This group
represents a very large percentage of an organization’s
employees.
If the user is not able to successfully learn and use an
30. information
system, the system is doomed to failure.
Technology adoption user types
204 | Information Systems for Business and Beyond (2019)
Diffusion of Innovation (click to
enlarge)
One tool that can be used to
understand how users will
adopt a new technology comes
from a 1962 study by Everett
Rogers. In his book, Diffusion of
Innovation,[1]Rogers studied
how farmers adopted new
technologies and noticed that
the adoption rate started slowly
and then dramatically
increased once adoption hit a
31. certain point. He identified five specific types of technology
adopters:
• Innovators. Innovators are the first individuals to adopt a new
technology. Innovators are willing to take risks, are the
youngest in age, have the highest social class, have great
financial liquidity, are very social, and have the closest contact
with scientific sources and interaction with other innovators.
Risk tolerance is high so there is a willingness to adopt
technologies thast may ultimately fail. Financial resources help
absorb these failures (Rogers, 1962, p. 282).
• Early adopters. The early adopters are those who adopt
innovation soon after a technology has been introduced and
proven. These individuals have the highest degree of opinion
leadership among the other adopter categories, which means
that these adopters can influence the opinions of the largest
majority. Characteristics include being younger in age, having a
higher social status, possessing more financial liquidity, having
advanced education, and being more socially aware than later
adopters. These adopters are more discrete in adoption
32. choices than innovators, and realize judicious choice of
adoption will help them maintain a central communication
position (Rogers, 1962, p. 283).
• Early majority. Individuals in this category adopt an
innovation
Chapter 9: The People in Information Systems | 205
https://opentextbook.site/informationsystems2019/wp-
content/uploads/sites/3/2018/07/diffusion-of-innovation.png
https://opentextbook.site/informationsystems2019/wp-
content/uploads/sites/3/2018/07/diffusion-of-innovation.png
after a varying degree of time. This time of adoption is
significantly longer than the innovators and early adopters.
This group tends to be slower in the adoption process, has
above average social status, has contact with early adopters,
and seldom holds positions of opinion leadership in a system
(Rogers, 1962, p. 283).
• Late majority. The late majority will adopt an innovation after
the average member of the society. These individuals approach
an innovation with a high degree of skepticism, have below
average social status, very little financial liquidity, are in
33. contact with others in the late majority and the early majority,
and show very little opinion leadership.
• Laggards. Individuals in this category are the last to adopt an
innovation. Unlike those in the previous categories, individuals
in this category show no opinion leadership. These individuals
typically have an aversion to change agents and tend to be
advanced in age. Laggards typically tend to be focused on
“traditions,” are likely to have the lowest social status and the
lowest financial liquidity, be oldest of all other adopters, and be
in contact with only family and close friends.[2]
These five types of users can be translated into information
technology adopters as well, and provide additional insight into
how
to implement new information systems within the organization.
For
example, when rolling out a new system, IT may want to
identify
the innovators and early adopters within the organization and
work
with them first, then leverage their adoption to drive the rest of
the
34. implementation to the other users.
Summary
In this chapter we have reviewed the many different categories
of individuals who make up the people component of
information
206 | Information Systems for Business and Beyond (2019)
systems. The world of information technology is changing so
fast
that new roles are being created all the time and roles that
existed
for decades are being phased out. This chapter this chapter
should
have given you a good idea and appreciation for the importance
of
the people component of information systems.
Study Questions
1. Describe the role of a systems analyst.
2. What are some of the different roles for a computer engineer?
3. What are the duties of a computer operator?
4. What does the CIO do?
35. 5. Describe the job of a project manager.
6. Explain the point of having two different career paths in
information systems.
7. What are the advantages and disadvantages of centralizing
the
IT function?
8. What impact has information technology had on the way
companies are organized?
9. What are the five types of information-systems users?
10. Why would an organization outsource?
Exercises
1. Which IT job would you like to have? Do some original
research and write a two-page paper describing the duties of
the job you are interested in.
2. Spend a few minutes on Dice or Monster to find IT jobs in
your
area. What IT jobs are currently …
16 3
36. 7
viRTual Te ams anD
ouTsouRCing
Introduction
Much has been written and published about virtual teams. Most
define virtual teams as those that are geographically dispersed,
although others state that virtual teams are those that primarily
inter-
act electronically. Technology has been the main driver of the
growth
of virtual teams. In fact, technology organizations, due mostly
to the
advent of competitive outsourcing abroad, have pushed
information
technology (IT) teams to learn how to manage across
geographical
locations, in such countries as India, China, Brazil, Ireland, and
many
others. These countries are not only physically remote but also
present
barriers of culture and language. These barriers often impede
commu-
nications about project status, and affect the likelihood of
delivering a
project on time, and within forecasted budgets.
Despite these major challenges, outsourcing remains attractive
due
to the associated cost savings and talent supply. These two
advantages
are closely associated. Consider the migration of IT talent that
began
37. with the growth of India in providing cheap and educated talent.
The
promise of cost savings caused many IT development
departments to
begin using more India-based firms. The ensuing decline in IT
jobs
in the United States resulted in fewer students entering IT
curricu-
lums at U.S. universities for fear that they would not be able to
find
work. Thus, began a cycle of lost jobs in the United States and
further
demand for talent abroad. Now, technology organizations are
faced
with the fact that they must learn to manage virtually because
the tal-
ent they need is far away.
From an IT perspective, successful outsourcing depends on
effec-
tive use of virtual teams. However, the converse is not true; that
is,
virtual teams do not necessarily imply outsourcing. Virtual
teams can
16 4 INFORMATION TECHNOLO GY
be made up of workers anywhere, even those in the United
States
who are working from a distance rather than reporting to an
office
for work. A growing number of employees in the United States
want
more personal flexibility; in response, many companies are
38. allow-
ing employees to work from home more often— and have found
the
experience most productive. This type of virtual team
management
generally follows a hybrid model, with employees working at
home
most of the time but reporting to the office for critical
meetings; an
arrangement that dramatically helps with communication and
allows
management to have quality checkpoints.
This chapter addresses virtual teams working both within the
United States and on an outsource basis and provides readers
with
an understanding of when and how to consider outsource
partners.
Chapter topics include management considerations, dealing with
multiple locations, contract administration, and in-house
alternatives.
Most important, this chapter examines organizational learning
as a
critical component of success in using virtual teams. Although
the
advent of virtual teams creates another level of complexity for
design-
ing and maintaining learning organizations, organizational
learning
approaches represent a formidable solution to the growing
dilemma of
how teams work, especially those that are 100% virtual.
Most failures in virtual management are caused by poor
communi-
cation. From an organizational learning perspective, we would
39. define
this as differences in meaning making— stemming mostly from
cul-
tural differences in the meaning of words and differing
behavioral
norms. There is also no question that time zone differences play
a role
in certain malfunctions of teams, but the core issues remain
commu-
nication related.
As stated, concerning the Ravell case study, cultural
transformation
is slow to occur and often happens in small intervals. In many
virtual
team settings, team members may never do more than
communicate
via e-mail. As an example, I had a client who was outsourcing
produc-
tion in China. One day, they received an e-mail stating, “ We
cannot
do business with you.” Of course, the management team was
confused
and worried, seeking to understand why the business
arrangement
was ending without any formal discussions of the problem. A
trans-
lator in China was hired to help clarify the dilemma. As it
turned
out, the statement was meant to suggest that the company
needed
16 5vIrtuAl te AMs And outsourCInG
40. to provide more business— more work, that is. The way the
Chinese
communicated that need was different from the Western
interpre-
tation. This is just a small example of what can happen without
a
well-thought-out organizational learning scheme. That is,
individuals
need to develop more reflective abilities to comprehend the
meaning
of words before they take action, especially in virtual
environments
across multiple cultures. The development of such abilities—
the
continual need for organizations to respond effectively to
dynamic
changes, brought about by technology, in this case, e-mail— is
consis-
tent with my theory of responsive organizational dynamism
(ROD).
The e-mail established a new dynamic of communication. Think
how
often specifications and product requirements are changing and
need
virtual teams to somehow come together and agree on how to
get the
work done— or think they agree.
Prior research and case studies provide tools and procedures as
ways
to improve productivity and quality of virtual team operations.
While
such processes and methodologies are helpful, they will not
necessar-
ily ensure the successful outcomes that IT operations seek
unless they
41. also change. Specifically, new processes alone are not sufficient
or a
substitute for learning how to better communicate and make
mean-
ing in a virtual context. Individuals must learn how to develop
new
behaviors when working virtually. We must also remember that
vir-
tual team operations are not limited to IT staffs. Business users
often
need to be involved as they would in any project, particularly
when
users are needed to validate requirements and test the product.
Status of Virtual Teams
The consensus tells us that virtual teams render results.
According to
Bazarova and Walther (2009), “ Virtual groups whose members
com-
municate primarily or entirely via email, computer
conferencing, chat,
or voice— have become a common feature of twenty-first
century
organizations” (p. 252). Lipnack and Stamps (2000) state that
virtual
teams will become the accepted way to work and will likely
reshape
the work world. While this prediction seems accurate, there has
also
been evidence of negative attribution or judgment about
problems that
arise in virtual team performance. Thus, it is important to
understand
how virtual teams need to be managed and how realistic
expectations
42. 16 6 INFORMATION TECHNOLO GY
of such teams might be formed. So, while organizations
understand
the need for virtual teams, they are not necessarily happy with
proj-
ect results. Most of the disappointment relates to a lack of
individual
development that helps change the mindset of how people need
to
communicate, coupled with updated processes.
Management Considerations
Attribution theory “ describes how people typically generate
explana-
tions for outcomes and actions— their own and others”
(Bazarova &
Walther, 2009, p. 153). This theory explains certain behavior
patterns
that have manifested during dysfunctional problems occurring
in man-
aging virtual teams. Virtual teams are especially vulnerable to
such
problems because their limited interactions can lead to members
not
having accurate information about one another. Members of
virtual
teams can easily develop perceptions of each other’ s motives
that are
inaccurate or distorted by differing cultural norms. Research
also shows
us that virtual team members typically attribute failure to the
43. external
factors and successes to internal factors. Problems are blamed
on the
virtual or outside members for not being available or
accountable to the
physical community. The successes then tend to reinforce that
virtual
teams are problematic because of their very nature. This then
estab-
lishes the dilemma of the use of virtual teams and
organizations— its
use will continue to increase and dominate workplace structures
and
yet will present challenges to organizations that do not want to
change.
The lack of support to change will be substantiated during
failures in
expected outcomes. Some of the failures, however, can and
should be
attributable to distance. As Olson and Olson (2000) state: “
Distance
will persist as an important element of human experience” (p.
172). So,
despite the advent of technology, it is important not to ignore
the social
needs that teams need to have to be effective.
Dealing with Multiple Locations
Perhaps the greatest difficulty in implementing virtual teams is
the
reality that they span multiple locations. More often, these
locations
can be in different time zones and within multiple cultures. To
prop-
erly understand the complexity of interactions, it makes sense to
44. revisit
16 7vIrtuAl te AMs And outsourCInG
the organizational learning tools discussed in prior chapters.
Perhaps
another way of viewing virtual teams and their effects on
organiza-
tion learning is to perceive it as another dimension— a
dimension that
is similar to multiple layers in a spreadsheet. This notion means
that
virtual teams do not upset the prior relations between
technology as
a variable from a two-dimensional perspective, rather in the
depth
of how it affects this relationship in a third dimension. Figure
7.1
reflects how this dimension should be perceived.
In other words, the study of virtual teams should be viewed as
a subset of the study of organizations. When we talk about
work-
place activities, we need to address issues at the component
level. In
this example, the components are the physical organization and
the
Technology as an
independent
variable
Creates
45. Virtual organizational
dynamism dimension
Physical organizational
dynamism dimension
Virtual acceleration
dimension
Strategic
integration
Cultural
assimilation
Total
organizational
dynamism
Acceleration of events that
require different
infrastructures and
organizational processes
Virtual cultural
assimilation dimension
Virtual strategic
integration dimension
Figure 7.1 The three-dimensional ROD.
46. 16 8 INFORMATION TECHNOLO GY
virtual organization. The two together make up the superset or
the
entire organization. To be fruitful, any discussion of virtual
organiza-
tions must be grounded in the context of the entire organization
and
address the complete topic of workplace learning and
transformation.
In Chapter 4, I discussed organizational learning in
communities of
practice (COP). In this section, I expand that discussion to
include
virtual organizational structures.
The growing use of virtual teams may facilitate the complete
inte-
gration of IT and non-IT workers. The ability to connect from
various
locations using technology itself has the potential to expand
COP.
But, as discussed in Chapter 4, it also presents new challenges,
most
of which relate to the transient nature of members, who tend to
par-
ticipate on more of a subject or transactional basis, rather than
being
permanent members of a group. Table 7.1 reflects some of the
key
differences between physical and virtual teams.
There has been much discussion about whether every employee
is
suited to perform effectively in a virtual community. The
47. consensus is
that effective virtual team members need to be self-motivated,
able to
work independently, and able to communicate clearly and in a
posi-
tive way. However, given that many workers lack some or all of
these
skills, it seems impractical to declare that workers who do not
meet
these criteria should be denied the opportunity to work in
virtual
Table 7.1 Operating Differences between Traditional and
Virtual Teams
TRADITIONAL OR PHYSICAL TEAMS VIRTUAL TEAMS
Teams tend to have fixed participation and
members.
Membership shifts based on topics and needs.
Members tend to be from the same
organization.
Team members can include people from outside
the organization (clients and collaborators).
Team members are 100% dedicated. Members are assigned to
multiple teams.
Team members are collocated geographically
and by organization.
Team members are distributed geographically and
by organization.
48. Teams tend to have a fixed term of
membership; that is, start and stop dates.
Teams are reconfigured dynamically and may
never terminate.
Teams tend to have one overall manager. Teams have multiple
reporting relationships with
different parts of the organization at different
times.
Teamwork is physical and practiced in
face-to-face interactions.
Teamwork is basically social.
Engagement is often during group events
and can often be hierarchical in nature.
Individual engagement is inseparable from
empowerment.
16 9vIrtuAl te AMs And outsourCInG
teams. A more productive approach might be to encourage
workers to
recognize that they must adapt to changing work environments
at the
risk of becoming marginal in their organizations.
To better understand this issue, I extended the COP matrix,
presented in Chapter 4, to include virtual team considerations in
Table 7.2.
49. Item 7 in Table 7.2 links the study of knowledge management
with
COP. Managing knowledge in virtual communities within an
orga-
nization has become associated directly with the ability of a
firm to
sustain competitive advantage. Indeed, Peddibhotla and
Subramani
(2008) state that “ virtual communities are not only recognized
as
important contributors to both the development of social
networks
among individuals but also towards individual performance and
firm
performance” (p. 229). However, technology-enabled facilities
and
support, while providing a repository for better documentation,
also
create challenges in maintaining such knowledge. The process
of how
information might become explicit has also dramatically
changed
with the advent of virtual team communications. For example,
much
technology-related documentation evolves from bottom-up
sources,
rather than the traditional top-down process. In effect, virtual
com-
munities share knowledge more on a peer-to-peer basis or
through
mutual consensus of the members. As a result, virtual
communities
have historically failed to meet expectations, particularly those
of
management, because managers tend to be uninvolved in
50. communi-
cation. While physical teams can meet with management more
often
before making decisions, virtual teams have no such contact
available.
To better understand the complexities of knowledge
management and
virtual teams, Sabherwal and Becerra-Fernandez (2005) expand
on
Nonaka’ s (1994) work on knowledge management, which
outlined
four modes of knowledge creation: externalization,
internalization,
combination, and socialization. Each of these modes is defined
and
discussed next.
Externalization
Externalization is the process of converting or translating tacit
knowl-
edge (undocumented knowledge) into explicit forms. The
problem with
this concept is whether individuals really understand what they
know
170 INFORMATION TECHNOLO GY
Table 7.2 Communities of Practice: Virtual Team Extensions
STEP
COMMUNITIES-OF-
PRACTICE STEP TECHNOLOGY EXTENSION VIRTUAL
51. EXTENSION
1 Understanding strategic
knowledge needs: What
knowledge is critical to
success.
Understanding how
technology affects
strategic knowledge and
what specific
technological knowledge
is critical to success.
Understanding how to
integrate multiple visions
of strategic knowledge and
where it can be found
across the organization.
2 Engaging practice
domains: Where people
form communities of
practice to engage in
and identify with.
Technology identifies
groups based on
business-related
benefits, requiring
domains to work together
toward measurable
results.
Virtual domains are more
dynamic and can be
52. formed for specific
purposes and then
reconfigured based on
practice needs of subjects
discussed.
3 Developing communities:
How to help key
communities reach their
full potential.
Technologies have life
cycles that require
communities to continue;
treats the life cycle as a
supporter for attaining
maturation and full
potential.
Communities can be
reallocated to participate
in multiple objectives.
Domains of discussion
have no limits to reach
organizational needs.
4 Working the boundaries:
How to link communities
to form broader learning
systems
Technology life cycles
require new boundaries
to be formed. This will
link other communities
that were previously
53. outside of discussions
and thus expand input
into technology
innovations.
Virtual abilities allow for
customer interfaces,
vendors, and other
interested parties to join
the community.
5 Fostering a sense of
belonging: How to
engage people’ s
identities and sense of
belonging.
The process of integrating
communities: IT and
other organizational
units will create new
evolving cultures that
foster belonging as well
as new social identities.
Communities establish
belonging in a virtual way.
Identities are established
more on content of
discussion than on
physical attributes of
members.
6 Running the business:
How to integrate
communities of practice
54. into running the
business of the
organization.
Cultural assimilation
provides new
organizational structures
that are necessary to
operate communities of
practice and to support
new technological
innovations.
The organization functions
more as a virtual
community or team, being
more agile to demands of
the business, and
interactions may not
always include all
members.
(Continued)
171vIrtuAl te AMs And outsourCInG
and how it might affect organizational knowledge. Virtual
communi-
ties have further challenges in that the repository of tacit
information
can be found in myriad storage facilities, namely, audit trails of
e-mail
communications. While Sabherwal and Becerra-Fernandez
(2005)
55. suggest that technology may indeed assist in providing the
infrastruc-
ture to access such information, the reality is that the challenge
is not
one of process but rather of thinking and doing. That is, it is
more a
process of unlearning existing processes of thinking and doing,
into
new modes of using knowledge that is abundantly available.
Internalization
Internalization is a reversal of externalization: It is the process
of
transferring explicit knowledge into tacit knowledge— or
individual-
ized learning. The individual thus makes the explicit process
into his
or her own stabilized thinking system so that it becomes
intuitive
in operation. The value of virtual team interactions is that they
can
provide more authentic evidence of why explicit knowledge is
valu-
able to the individual. Virtual systems simply can provide more
people
who find such knowledge useful, and such individuals, coming
from
a more peer relationship, can understand why their procedures
can be
internalized and become part of the self.
Combination
Combination allows individuals to integrate their physical
processes
56. with virtual requirements. The association, particularly in a
global
Table 7.2 (Continued) Communities of Practice: Virtual Team
Extensions
STEP
COMMUNITIES-OF-
PRACTICE STEP TECHNOLOGY EXTENSION VIRTUAL
EXTENSION
7 Applying, assessing,
reflecting, renewing: How
to deploy knowledge
strategy through waves
of organizational
transformation.
The active process of
dealing with multiple
new technologies that
accelerates the
deployment of knowledge
strategy. Emerging
technologies increase
the need for
organizational
transformation.
Virtual systems allow for
more knowledge strategy
because of the ability to
deploy information and
procedures. Tacit
knowledge is easier to
57. transform to explicit forms.
172 INFORMATION TECHNOLO GY
environment, allows virtual team members to integrate new
explicit
forms into their own, not by replacing their beliefs, but rather,
by
establishing new hybrid knowledge systems. This is particularly
advantageous across multiple cultures and business systems in
coun-
tries that hold different and, possibly complementary,
knowledge
about how things can get done. Nonaka’ s (1994) concept of
combina-
tion requires participants in the community to be at later stages
of
multiplicity— suggesting that this form can only be successful
among
certain levels or positions of learners.
Socialization
As Nonaka (1994) notes, individuals learn by observation,
imitation,
and practice. The very expansion of conversations via
technology
can provide a social network in which individuals can learn
simply
through discourse. Discourse, as I discussed in Chapter 4, is
the basis
of successful implementations of COP. The challenge in virtual
social
networks is the difficulty participants have in assessing the
58. authentic-
ity of the information provided by those in the community.
The four modes of knowledge management formulated by
Nonaka
(1994) need to be expanded to embrace the complexities of
virtual
team COPs. Most of the adjustments are predicated on the team’
s
ability to deal with the three fundamental factors of ROD that I
introduced in this book; that is, acceleration, dynamic, and
unpre-
dictability. The application of these three factors of ROD to
Nonaka’ s
four modes is discussed next.
Externalization Dynamism
The externalization mode must be dynamic and ongoing with
little
ability to forecast the longevity of any tacit-to-explicit
formulation.
In other words, tacit-to-explicit change may occur daily but may
only operate effectively for a shorter period due to additional
changes
brought on by technology dynamism. This means that members
in
a community must continually challenge themselves to revisit
pre-
vious tacit processes and acknowledge the need to reformulate
their
tacit systems. Thus, transformation from tacit knowledge to
explicit
knowledge can be a daily challenge for COP virtual
organizations.
59. 173vIrtuAl te AMs And outsourCInG
Internalization Dynamism
Careful reflection on this process of internalizing explicit forms
must
be done. Given the differences in cultures and acceleration of
busi-
ness change, individualized learning creating new tacit abilities
may
not operate the same in different firm settings. It may be
necessary
to adopt multiple processes depending on the environment in
which
tacit operations are being performed. As stated, what might
work in
China may not work in Brazil, for example. Tacit behavior is
culture
oriented, so multiple and simultaneous versions must be
respected
and practiced. Further expansion of internalization is a virtual
team’ s
understanding of how such tacit behaviors change over time due
to
the acceleration of new business challenges.
Combination Dynamism
I believe the combination dynamism mode is the most important
com-
ponent of virtual team formation. Any combination or hybrid
model
requires a mature self— as specified in my maturity arcs
discussed in
60. Chapter 4. This means that individuals in virtual teams may
need to
be operating at a later stage of maturity to deal with the
complexities
of changing dispositions. Members of COPs must be observed,
and a
determination of readiness must be made for such new
structures to
develop in a virtual world. Thus, COP members need training;
the lack
of such training might explain why so many virtual teams have
had
disappointing results. Readiness for virtual team participation
depends
on a certain level of relativistic thinking. To be successful,
virtual team
members must be able to see themselves outside their own
world and
have the ability to understand the importance of what “ others”
need.
This position suggests that individuals need to be tested to the
extent
that they are ready for such challenges. Organizational learning
tech-
niques remain a valid method for developing workers who can
cope
with the dynamic changes that occur in virtual team
organizations.
Socialization Dynamism
Socialization challenges the virtual team members’ abilities to
understand the meaning of words and requires critical reflection
61. 174 INFORMATION TECHNOLO GY
of its constituents. ROD requires that virtual teams be agile and,
especially, that they be responsive to the emotions of others in
the
community. This may require individuals to understand another
member’ s maturity. Thus, virtual team members need to be able
to understand why another member is behaving as he or she is
or
reacting in a dualistic manner. Assessment in a virtual
collabora-
tion becomes a necessity, especially given the unpredictability
of
technology-based projects.
In Table 5.1, I showed how tacit knowledge is mapped to ROD.
Table 7.3 further extends this mapping to include virtual teams.
The requirements support research findings that knowledge
man-
agement in a virtual context has significant factors that must be
addressed to improve its success. These factors include
management
commitment, resource availability, modification of work
practices,
marketing of the initiative, training, and facilitation of cultural
dif-
ferences (Peddibhotla & Subramani, 2008).
The following are some action steps that organizations need to
take
to address these factors:
1. The executive team needs to advocate the commitment and
support for virtual teams. The chief information officer (CIO)
and his or her counterparts need to provide teams with the
62. “ sponsorship” that the organization will need to endure set-
backs until the virtual organization becomes fully integrated
into the learning organization. This commitment can be
accomplished via multiple actions, including, but not limited
to, a kickoff meeting with staff, status reports to virtual teams
on successes and setbacks, e-mails and memos on new vir-
tual formations, and a general update on the effort, perhaps
on a quarterly basis. This approach allows the organization to
understand the evolution of the effort and know that virtual
teams are an important direction for the firm.
2. There should be training and practice sessions with
collocated
groups that allow teams to voice their concerns and receive
direction on how best to proceed. Practice sessions should
focus on team member responsibilities and advocating their
ownership of responsibility. These sessions should cover les-
sons learned from actual experiences, so that groups can learn
175vIrtuAl te AMs And outsourCInG
Ta
bl
e
7.
3
T
ac
it
97. Topic 1: Define the IT organizational structure and how the IT
organizational structure impacts culture and change
management practices. Additionally, how does the
organizational structure impact competitive advantage?
Topic 2: How do you define operational excellence? What
factors are involved in achieving operational excellence? Who
(within an organization) is responsible for operational
excellence and why is this important?
Submission Requirements
Font: Times New Roman, size 12, double-space
Citation Style: APA
Length: One full page (Less than a page or more than a page
will be not accepted)
References: At-least 3 references
Do NOT use direct quotes, rather rephrase the work and utilize
in-text citations.
Assignment 2
Textbook: Information Systems for Business and Beyond
Please answer the following
From Chapter 9 – study questions 1-10 and Exercise 3
From Chapter 10 – study questions 1-10 and Exercise 1
All the above questions should be submitted in one Word
document
Please understand that Plagiarism will not be tolerated
Submission Requirements
Font: Times New Roman, size 12, double-space
Citation Style: APA
Length: At-least 5 pages, make sure not to limit your work to 5
pages, but answer all the questions.
References: Please use citations and references where
appropriate
No Plagiarism
Assignment 3
Textbook: Information Technology and Organizational Learning
98. Please answer the Following
From Chapter 7 – Review the section on dealing with multiple
locations and outsourcing. Review figure 7.2 and note how
virtual team communications further reiterates the importance
of this model.
From Chapter 8 - Review the Siemens AG case study. Note the
importance of understanding the interrelationships amongst all
the senior leaders at every location. Pay special attention to
Figure 8.1 and Figure 8.2. Note how the corporate CIO should
engage with each of the regional leaders. Why is this
important?
Submission Requirements
Font: Times New Roman, size 12, double-space
Length: At least two pages
Citation Style: APA
References: Please use citations and references where
appropriate
No Plagiarism
Assignment 4
Please answer the following
Discuss the differences between software development and
methods.
Please understand that Plagiarism will not be tolerated
Submission Requirements
Font: Times New Roman, size 12, double-space
Citation Style: APA
Length: At-least 500 words
References: Please use citations and references where
appropriate
No Plagiarism