People and Information
                                                                                                             Systems
Information Infrastructure: A collection of owned, leased and vended hardware,
software, firmware and services, that provide an operational platform for business                           Owners: Provide, fund
applications and information. This is sometimes referred to as Information and                               and sponsor information
Communications Technology, or ICT. (Represented by the gray highlighted area below.)                         systems; develop policies
                                                                                                             for use. They derive value
                                                                                                             in the form of business
                                                                                                             profit and are responsible
Management           Systems               Utility                      Business Applications                to shareholders
Processes:          Management           Applications        Allows users to access, manipulate, and
                     Systems             and Services        organize information. Applications affect the   Users: Apply the
Management                                                   performance of business processes and may       applications and
Procedures used                                              enhance competitiveness                         information to complete
by IT                                   E-mail, DBMS,                                                        job functions. These
professionals to   Systems and          calendaring,                                                         business subject matter
                                                                             Information
maintain           applications that    fax servers,                                                         experts develop functional
                   monitor and          directory                                                            requirements for
information                                                  Scientific information, business databases,
                   control the ‘core’   systems, etc.                                                        applications. They derive
systems:                                                     trade secrets, video programming, images,
                   IT systems                                                                                business value in the form
                                                             sound recordings, and other media
                                                                                                             of applications, services
Fault
                                                                                                             and information.
Configuration
Performance
                                                              Operating Systems                              Custodians: Procure,
Capacity
                                                                                                             construct, operate, and
Security
                                                                                                             maintain information
Asset/Inventory                         Windows 7; Windows XP; MAC OS; iOS; Linux; MVS;
                                                                                                             systems; subject matter
Change                                  embedded functions in firmware and software
                                                                                                             experts in technology.
Installation
                                                                                                             They manage the
Content
                                                                                                             technology base and
Service Level                               Networks              End or User             Peripherals        provide services to users
                                                                   Systems                                   (e.g. training, help desk,
                                        Switches, routers,                                                   installation, etc.)
                                        lines, firewalls,      Smartphones, PCs,       Printers, scanners,
                                        wireless access        tablets, servers,       external hard disks   Vendors: Augment the
                                        points, etc.           mainframes, etc.        cameras, etc.         services provided by
                                                                                                             custodians

Infrastructuregrowing

  • 1.
    People and Information Systems Information Infrastructure: A collection of owned, leased and vended hardware, software, firmware and services, that provide an operational platform for business Owners: Provide, fund applications and information. This is sometimes referred to as Information and and sponsor information Communications Technology, or ICT. (Represented by the gray highlighted area below.) systems; develop policies for use. They derive value in the form of business profit and are responsible Management Systems Utility Business Applications to shareholders Processes: Management Applications Allows users to access, manipulate, and Systems and Services organize information. Applications affect the Users: Apply the Management performance of business processes and may applications and Procedures used enhance competitiveness information to complete by IT E-mail, DBMS, job functions. These professionals to Systems and calendaring, business subject matter Information maintain applications that fax servers, experts develop functional monitor and directory requirements for information Scientific information, business databases, control the ‘core’ systems, etc. applications. They derive systems: trade secrets, video programming, images, IT systems business value in the form sound recordings, and other media of applications, services Fault and information. Configuration Performance Operating Systems Custodians: Procure, Capacity construct, operate, and Security maintain information Asset/Inventory Windows 7; Windows XP; MAC OS; iOS; Linux; MVS; systems; subject matter Change embedded functions in firmware and software experts in technology. Installation They manage the Content technology base and Service Level Networks End or User Peripherals provide services to users Systems (e.g. training, help desk, Switches, routers, installation, etc.) lines, firewalls, Smartphones, PCs, Printers, scanners, wireless access tablets, servers, external hard disks Vendors: Augment the points, etc. mainframes, etc. cameras, etc. services provided by custodians