SlideShare a Scribd company logo
Read and analyze the attached case. You must discuss the case and how Information Technology
is used or misused. Discuss the effectiveness and ineffectiveness of its application if appropriate,
or discuss your opinion of the case and how IT could have been more effectively used.
Each analysis must be at least 1-2 pages in length and no more than 3 pages. It should include a
section summarizing the case (1-2 paragraphs), and then an analysis of how IT was used or
misused. The analysis portion must be the bulk of the feedback. I am looking for your
observations of the case, what you think!!
http://www.gao.gov/assets/680/674906.pdf
Solution
Computer crime is a very vast topic. It includes many mal functions by computer users. It is all
about making bad use of information technology for personal interest or in order to create
troublesome situation for others.
Plagiarism is one aspect. It is passing off the work of other people as your own without giving
any credit to them. Piracy is another topic worth thinking about because people make a lot of
effort and spend lot of money to create or make something where other just make a copy of them
instant of buying the original one. Crackers are basically attention who break into computer
system and make illegitimate use of them. With the rapid evolution in Information Technology,
the numbers of crackers are also growing. It is very difficult to get hold of all these issues that is
why we have some association running, aiming to reduce and stop these concerns.
nformation technology and its systems have become so important that large organization can no
longer operate without them, not to mention operate efficiently. Each organization has its unique
purpose, use of information technology is now becomes one of most important means to achieve
the goals as claimed by Hawkins (2004). Technology could increase an organization’s
effectiveness by refine its operations, business process and internal collaboration. In the context
of education, technology could break down communication barriers between students and
faculties and among students themselves. For example, email system could enable lecturers and
students have effective communication when both of them are remote from campus and located
at different time zone of the world. Technology could also help students have better access to the
learning information, experts and learning communities. In most universities’ library system,
students could now access, view and finding citations of thousands of academic journals which
are integral part of student’s academic study from its online database and database’s associated
subscriptions. Technology could also enable active new learning modes, such as multi-media
teaching, computer lab and virtual learning environment that could connect students from
different parts of the world in one virtual environment simultaneously.
However, technology by itself could not delivery the outcomes desired and pursued by the
organization. The current use of technology in education setting involves developing of new
teaching and learning models and refining administrative operation process chains and today’s
available information technology solutions have an array of capabilities and the potential to both
improve the learning environments and widen teaching methods options.
If use of technology has such substantial impact on the operation of organization, what are the
responsibilities of senior IT post or its Chief Information Officer (CIO) and what characteristics
making an effective or ineffective CIO? Armstrong, Simer, & Spaniol (2011) has identified
following duties that are usually fall into CIO’s domains. First, CIO is responsible for developing
a technology plan for the schools including the budget. Secondly, he is responsible for IT
governance and provisioning IT system/services within the organization. Thirdly, part of CIO’s
provisioning IT system services, which is also one of most significant but often been neglected,
is to introduce new technology systems and make them functional. Fourthly, provide IT training
to staff members who manage and use the IT system both within and outside his department. In
another words, CIO is responsible for matching the needs of education institutions and new or
available technology teaching and learning options. The duties require substantial leadership
from senior IT post who could assembly various technology solutions; implement them in a way
which could better serve the goals of organizations and maintain technology system to operate in
a safe and stable manner.
The implementation of information technology has impact across all areas of organizations; CIO
cannot manage the technology system without concerning and communicating the needs of all
other departments and the overall goals of organization. Thus in Hawkins (2004), it is provided
that an effective CIO must have strong managerial ability. He is able to coordinate all important
units within the organization, allowing them to express each of their unique technology needs
and “harmonize” the differences or conflicts among them. An actual application of CIO’s
managerial skill is given by Grand (1997) which provides senior IT post often encounters
“incompatibility among networks, data structures, software packages etc...” Those incompatible
technology components however may met specific needs of each department, therefore, CIO
must able to pursue each departments to combine each of their “disparate systems” into a new
comprehensive framework that inevitability involve compromises from the users.
However, CIO’s ability of coordinating needs from units of organization is not an end itself; he
exercises his managerial skill for the purpose of achieving the goals of business, most
importantly, its continuous growth. Therefore, CIO must have insight of what is successful
business operation pertain to the organization he is working, for example, in the context of
schools, it means better education quality, growth and sustainable revenues. This CIO
characteristic is confirmed with my experiences with Mr. Mu. (n.d.) from Tai Shang Consultancy
(“Tai Sha”). Tai Sha is a leading education consultancy services company in China. Mr. Mu,
who is the chief IT officer of the company, has been required to participate senior business
operation meetings and been consulted of business operation strategies on a regular basis. But it
should be noted online marketing channel is one of the major marketing tools used by Tai Sha
which may result requiring Mr. Mu (n.d.) to have particular strong business operation
understanding.
The third characteristic ability that a technology manager should have is the sensitivity to new
technology from strategic planner perspective of an organization. For example, it is provided in
Armstrong et al., (2011) IT manager is responsible for selecting and introduce new systems for
the organization. For example, he may decide to make arrangements for introducing and using
"hosted, cloud-based, or even outsourced systems and services" since these newly emerged
technologies can reduce the cost of hardware and installation, or make the costs associated with
maintaining the system more transparent. But whether or not adopting them depends on CIO’s
judgment and careful analysis of organization’s strategic goals, value of the services, and the
budget. For example, in school setting, instead of knowing how the new technologies work and
its technology advantages, CIO is responsible for making decisions based on its degree of
alignment with students learning improvements.
An associated ability that CIO should grip is that he should be skilled in negotiation and
contracts with external service providers. The trend of adopting cloud technology is more
obvious than ever and its applications could be wide spread on all areas of an organization. CIO
may understand the technology itself very well, but procure good bargain from the service
providers would also fall into their duty territories. Person with limited exposure to technologies
may not even able to fully understand the functions of a new system and its implications that
brought by external service providers. On the other hand, CIO with strong technology
background would not be easily misled by external contractors.
An ineffective IT manager lacks the personality and influences that enable him to change
organization’s internal operation culture. Introducing new technologies inevitably involve
change of an organization’s existing practices, such as teaching methods if it is a school or
marketing strategies if it is commercial organization. The change of practices requires extensive
training on the staff members and sometime turn the proficient users of old practice into new
learners. The introduction of new technologies may thus meet resistance from staff members and
spread of rumors of its ineffectiveness. Armstrong et al., (2011) suggests this challenge could be
dealt with through process of lunching pilot program. These pilot users typically go on to
become the proponents of the system and provide the groundwork for developing systemic
training programs.
Another characteristic of ineffective IT manager is provided by Bjelland (2005), CIO's inability
to understand and explain the technologies from layman's perspective. An innovative
technology program may require collaborations from all departments of an organization. The
new IT platform may exert substantial impact on organization's position on the market. But the
creation of the system calls for a "clear, simple vision" to enable people with different
technology backgrounds to coordinate their efforts. The technology questions raised by people
also needs answers that are clear and simple. Mr. Mu. (n.d.) based on personal experiences
unfortunately sometime during the business technology explanation conversation fall into jargon
and implicitly telling non-technical people that a problem is too complex for people to
understand possibly due to his strong technology background. The good technology manager
should able to understand the technology strategy from layman’s perspective first place, so he
could naturally explain the strategy to a non-technical superior in a real and simple way.

More Related Content

Similar to Read and analyze the attached case. You must discuss the case and ho.pdf

wk3 reply to prof.I need help with this question below a 200 words.pdf
wk3 reply to prof.I need help with this question below a 200 words.pdfwk3 reply to prof.I need help with this question below a 200 words.pdf
wk3 reply to prof.I need help with this question below a 200 words.pdf
feetshoemart
 
Typical characteristics of it gradutes
Typical characteristics of it gradutesTypical characteristics of it gradutes
Typical characteristics of it gradutes
Asst Lect Mohammed Salim
 
Typical characteristics of IT gradutes
Typical characteristics of IT gradutesTypical characteristics of IT gradutes
Typical characteristics of IT gradutes
Mohammad Salim
 
Ict applications in school management and record keeping
Ict applications in school management and record keepingIct applications in school management and record keeping
Ict applications in school management and record keeping
Rex Mwamba
 
Digital innovation as a fundamental and powerful concept in the information s...
Digital innovation as a fundamental and powerful concept in the information s...Digital innovation as a fundamental and powerful concept in the information s...
Digital innovation as a fundamental and powerful concept in the information s...
venny55
 
The Future of Enterprises - Social by Birth
The Future of Enterprises - Social by BirthThe Future of Enterprises - Social by Birth
The Future of Enterprises - Social by Birth
Andy Kellam
 
2015_CTI_BSc-IT_Module-Description_Final1
2015_CTI_BSc-IT_Module-Description_Final12015_CTI_BSc-IT_Module-Description_Final1
2015_CTI_BSc-IT_Module-Description_Final1Moses75
 
Future enterprises-social-birth
Future enterprises-social-birthFuture enterprises-social-birth
Future enterprises-social-birthJen Fiocca
 
A Report On The Influence Of Technology On Human Resource Management
A Report On The Influence Of Technology On Human Resource ManagementA Report On The Influence Of Technology On Human Resource Management
A Report On The Influence Of Technology On Human Resource Management
Navitha Pereira
 
Questions On Technical Design Decisions
Questions On Technical Design DecisionsQuestions On Technical Design Decisions
Questions On Technical Design Decisions
Rikki Wright
 
A contrarian view to adoption of collaboration-tools-in-the-global-workplace
A contrarian view to adoption of collaboration-tools-in-the-global-workplaceA contrarian view to adoption of collaboration-tools-in-the-global-workplace
A contrarian view to adoption of collaboration-tools-in-the-global-workplaceSubroto Gupta
 
MELJUN CORTES research lectures_dba_thesis_example_strategic_business_model
MELJUN CORTES research lectures_dba_thesis_example_strategic_business_modelMELJUN CORTES research lectures_dba_thesis_example_strategic_business_model
MELJUN CORTES research lectures_dba_thesis_example_strategic_business_model
MELJUN CORTES
 
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
Running Header  1APPLICATION DEVELOPMENT METHODS2.docxRunning Header  1APPLICATION DEVELOPMENT METHODS2.docx
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
rtodd599
 
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
Running Header  1SYSTEM ARCHITECTURE2Unit .docxRunning Header  1SYSTEM ARCHITECTURE2Unit .docx
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
rtodd599
 
Impact of IT & strategic issue of IT
Impact of IT & strategic issue of ITImpact of IT & strategic issue of IT
Impact of IT & strategic issue of IT
Shubham Upadhyay
 

Similar to Read and analyze the attached case. You must discuss the case and ho.pdf (15)

wk3 reply to prof.I need help with this question below a 200 words.pdf
wk3 reply to prof.I need help with this question below a 200 words.pdfwk3 reply to prof.I need help with this question below a 200 words.pdf
wk3 reply to prof.I need help with this question below a 200 words.pdf
 
Typical characteristics of it gradutes
Typical characteristics of it gradutesTypical characteristics of it gradutes
Typical characteristics of it gradutes
 
Typical characteristics of IT gradutes
Typical characteristics of IT gradutesTypical characteristics of IT gradutes
Typical characteristics of IT gradutes
 
Ict applications in school management and record keeping
Ict applications in school management and record keepingIct applications in school management and record keeping
Ict applications in school management and record keeping
 
Digital innovation as a fundamental and powerful concept in the information s...
Digital innovation as a fundamental and powerful concept in the information s...Digital innovation as a fundamental and powerful concept in the information s...
Digital innovation as a fundamental and powerful concept in the information s...
 
The Future of Enterprises - Social by Birth
The Future of Enterprises - Social by BirthThe Future of Enterprises - Social by Birth
The Future of Enterprises - Social by Birth
 
2015_CTI_BSc-IT_Module-Description_Final1
2015_CTI_BSc-IT_Module-Description_Final12015_CTI_BSc-IT_Module-Description_Final1
2015_CTI_BSc-IT_Module-Description_Final1
 
Future enterprises-social-birth
Future enterprises-social-birthFuture enterprises-social-birth
Future enterprises-social-birth
 
A Report On The Influence Of Technology On Human Resource Management
A Report On The Influence Of Technology On Human Resource ManagementA Report On The Influence Of Technology On Human Resource Management
A Report On The Influence Of Technology On Human Resource Management
 
Questions On Technical Design Decisions
Questions On Technical Design DecisionsQuestions On Technical Design Decisions
Questions On Technical Design Decisions
 
A contrarian view to adoption of collaboration-tools-in-the-global-workplace
A contrarian view to adoption of collaboration-tools-in-the-global-workplaceA contrarian view to adoption of collaboration-tools-in-the-global-workplace
A contrarian view to adoption of collaboration-tools-in-the-global-workplace
 
MELJUN CORTES research lectures_dba_thesis_example_strategic_business_model
MELJUN CORTES research lectures_dba_thesis_example_strategic_business_modelMELJUN CORTES research lectures_dba_thesis_example_strategic_business_model
MELJUN CORTES research lectures_dba_thesis_example_strategic_business_model
 
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
Running Header  1APPLICATION DEVELOPMENT METHODS2.docxRunning Header  1APPLICATION DEVELOPMENT METHODS2.docx
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
 
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
Running Header  1SYSTEM ARCHITECTURE2Unit .docxRunning Header  1SYSTEM ARCHITECTURE2Unit .docx
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
 
Impact of IT & strategic issue of IT
Impact of IT & strategic issue of ITImpact of IT & strategic issue of IT
Impact of IT & strategic issue of IT
 

More from info324235

In a plaque assay, a microbiologist counts 20 plaques on a plate. Ho.pdf
In a plaque assay, a microbiologist counts 20 plaques on a plate. Ho.pdfIn a plaque assay, a microbiologist counts 20 plaques on a plate. Ho.pdf
In a plaque assay, a microbiologist counts 20 plaques on a plate. Ho.pdf
info324235
 
How is Cladophora morphologically similar to Spirogyra How is it di.pdf
How is Cladophora morphologically similar to Spirogyra How is it di.pdfHow is Cladophora morphologically similar to Spirogyra How is it di.pdf
How is Cladophora morphologically similar to Spirogyra How is it di.pdf
info324235
 
How did greek medicine influence medicine todaySolutionGrek m.pdf
How did greek medicine influence medicine todaySolutionGrek m.pdfHow did greek medicine influence medicine todaySolutionGrek m.pdf
How did greek medicine influence medicine todaySolutionGrek m.pdf
info324235
 
Gather information about TinyOS and prepare short report about it.pdf
Gather information about TinyOS and prepare short report about it.pdfGather information about TinyOS and prepare short report about it.pdf
Gather information about TinyOS and prepare short report about it.pdf
info324235
 
Foundation of EthicsWhat does Mill say is the ultimate sanction of.pdf
Foundation of EthicsWhat does Mill say is the ultimate sanction of.pdfFoundation of EthicsWhat does Mill say is the ultimate sanction of.pdf
Foundation of EthicsWhat does Mill say is the ultimate sanction of.pdf
info324235
 
Explain what single human development most contributed to the evolut.pdf
Explain what single human development most contributed to the evolut.pdfExplain what single human development most contributed to the evolut.pdf
Explain what single human development most contributed to the evolut.pdf
info324235
 
Case Study 4 Understanding a Development Miracle China business deci.pdf
Case Study 4 Understanding a Development Miracle China business deci.pdfCase Study 4 Understanding a Development Miracle China business deci.pdf
Case Study 4 Understanding a Development Miracle China business deci.pdf
info324235
 
5. An analog filer has system fnction Ha(s)--a (a) (10 pts,) Comvert .pdf
5. An analog filer has system fnction Ha(s)--a (a) (10 pts,) Comvert .pdf5. An analog filer has system fnction Ha(s)--a (a) (10 pts,) Comvert .pdf
5. An analog filer has system fnction Ha(s)--a (a) (10 pts,) Comvert .pdf
info324235
 
About 71 of young adult Internet users ( ages 18 to 29) use social-.pdf
About 71 of young adult Internet users ( ages 18 to 29) use social-.pdfAbout 71 of young adult Internet users ( ages 18 to 29) use social-.pdf
About 71 of young adult Internet users ( ages 18 to 29) use social-.pdf
info324235
 
A certain ROM has 32 words x 16 bit structure. The input lines to th.pdf
A certain ROM has 32 words x 16 bit structure. The input lines to th.pdfA certain ROM has 32 words x 16 bit structure. The input lines to th.pdf
A certain ROM has 32 words x 16 bit structure. The input lines to th.pdf
info324235
 
________________stakeholders are the ones who most directly interact.pdf
________________stakeholders are the ones who most directly interact.pdf________________stakeholders are the ones who most directly interact.pdf
________________stakeholders are the ones who most directly interact.pdf
info324235
 
4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf
4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf
4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf
info324235
 
Write out a checklist for construction of a good graphic. For Ja.pdf
Write out a checklist for construction of a good graphic.  For Ja.pdfWrite out a checklist for construction of a good graphic.  For Ja.pdf
Write out a checklist for construction of a good graphic. For Ja.pdf
info324235
 
Which TCPIP Application layer protocol provides IP address resoluti.pdf
Which TCPIP Application layer protocol provides IP address resoluti.pdfWhich TCPIP Application layer protocol provides IP address resoluti.pdf
Which TCPIP Application layer protocol provides IP address resoluti.pdf
info324235
 
why do so many genes (20-30 of all genes) encode transport prot.pdf
why do so many genes (20-30 of all genes) encode transport prot.pdfwhy do so many genes (20-30 of all genes) encode transport prot.pdf
why do so many genes (20-30 of all genes) encode transport prot.pdf
info324235
 
Why is the NFP at the venous end a negative number filtration occur.pdf
Why is the NFP at the venous end a negative number  filtration occur.pdfWhy is the NFP at the venous end a negative number  filtration occur.pdf
Why is the NFP at the venous end a negative number filtration occur.pdf
info324235
 
What are 3 changes that occur in dendritic cells once they become ‘a.pdf
What are 3 changes that occur in dendritic cells once they become ‘a.pdfWhat are 3 changes that occur in dendritic cells once they become ‘a.pdf
What are 3 changes that occur in dendritic cells once they become ‘a.pdf
info324235
 
Which of the following traits is considered MendelianSelect one.pdf
Which of the following traits is considered MendelianSelect one.pdfWhich of the following traits is considered MendelianSelect one.pdf
Which of the following traits is considered MendelianSelect one.pdf
info324235
 
What are three risks of not including best HR practices into the man.pdf
What are three risks of not including best HR practices into the man.pdfWhat are three risks of not including best HR practices into the man.pdf
What are three risks of not including best HR practices into the man.pdf
info324235
 
When a persons score on one variable is used to make predictions abo.pdf
When a persons score on one variable is used to make predictions abo.pdfWhen a persons score on one variable is used to make predictions abo.pdf
When a persons score on one variable is used to make predictions abo.pdf
info324235
 

More from info324235 (20)

In a plaque assay, a microbiologist counts 20 plaques on a plate. Ho.pdf
In a plaque assay, a microbiologist counts 20 plaques on a plate. Ho.pdfIn a plaque assay, a microbiologist counts 20 plaques on a plate. Ho.pdf
In a plaque assay, a microbiologist counts 20 plaques on a plate. Ho.pdf
 
How is Cladophora morphologically similar to Spirogyra How is it di.pdf
How is Cladophora morphologically similar to Spirogyra How is it di.pdfHow is Cladophora morphologically similar to Spirogyra How is it di.pdf
How is Cladophora morphologically similar to Spirogyra How is it di.pdf
 
How did greek medicine influence medicine todaySolutionGrek m.pdf
How did greek medicine influence medicine todaySolutionGrek m.pdfHow did greek medicine influence medicine todaySolutionGrek m.pdf
How did greek medicine influence medicine todaySolutionGrek m.pdf
 
Gather information about TinyOS and prepare short report about it.pdf
Gather information about TinyOS and prepare short report about it.pdfGather information about TinyOS and prepare short report about it.pdf
Gather information about TinyOS and prepare short report about it.pdf
 
Foundation of EthicsWhat does Mill say is the ultimate sanction of.pdf
Foundation of EthicsWhat does Mill say is the ultimate sanction of.pdfFoundation of EthicsWhat does Mill say is the ultimate sanction of.pdf
Foundation of EthicsWhat does Mill say is the ultimate sanction of.pdf
 
Explain what single human development most contributed to the evolut.pdf
Explain what single human development most contributed to the evolut.pdfExplain what single human development most contributed to the evolut.pdf
Explain what single human development most contributed to the evolut.pdf
 
Case Study 4 Understanding a Development Miracle China business deci.pdf
Case Study 4 Understanding a Development Miracle China business deci.pdfCase Study 4 Understanding a Development Miracle China business deci.pdf
Case Study 4 Understanding a Development Miracle China business deci.pdf
 
5. An analog filer has system fnction Ha(s)--a (a) (10 pts,) Comvert .pdf
5. An analog filer has system fnction Ha(s)--a (a) (10 pts,) Comvert .pdf5. An analog filer has system fnction Ha(s)--a (a) (10 pts,) Comvert .pdf
5. An analog filer has system fnction Ha(s)--a (a) (10 pts,) Comvert .pdf
 
About 71 of young adult Internet users ( ages 18 to 29) use social-.pdf
About 71 of young adult Internet users ( ages 18 to 29) use social-.pdfAbout 71 of young adult Internet users ( ages 18 to 29) use social-.pdf
About 71 of young adult Internet users ( ages 18 to 29) use social-.pdf
 
A certain ROM has 32 words x 16 bit structure. The input lines to th.pdf
A certain ROM has 32 words x 16 bit structure. The input lines to th.pdfA certain ROM has 32 words x 16 bit structure. The input lines to th.pdf
A certain ROM has 32 words x 16 bit structure. The input lines to th.pdf
 
________________stakeholders are the ones who most directly interact.pdf
________________stakeholders are the ones who most directly interact.pdf________________stakeholders are the ones who most directly interact.pdf
________________stakeholders are the ones who most directly interact.pdf
 
4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf
4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf
4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf
 
Write out a checklist for construction of a good graphic. For Ja.pdf
Write out a checklist for construction of a good graphic.  For Ja.pdfWrite out a checklist for construction of a good graphic.  For Ja.pdf
Write out a checklist for construction of a good graphic. For Ja.pdf
 
Which TCPIP Application layer protocol provides IP address resoluti.pdf
Which TCPIP Application layer protocol provides IP address resoluti.pdfWhich TCPIP Application layer protocol provides IP address resoluti.pdf
Which TCPIP Application layer protocol provides IP address resoluti.pdf
 
why do so many genes (20-30 of all genes) encode transport prot.pdf
why do so many genes (20-30 of all genes) encode transport prot.pdfwhy do so many genes (20-30 of all genes) encode transport prot.pdf
why do so many genes (20-30 of all genes) encode transport prot.pdf
 
Why is the NFP at the venous end a negative number filtration occur.pdf
Why is the NFP at the venous end a negative number  filtration occur.pdfWhy is the NFP at the venous end a negative number  filtration occur.pdf
Why is the NFP at the venous end a negative number filtration occur.pdf
 
What are 3 changes that occur in dendritic cells once they become ‘a.pdf
What are 3 changes that occur in dendritic cells once they become ‘a.pdfWhat are 3 changes that occur in dendritic cells once they become ‘a.pdf
What are 3 changes that occur in dendritic cells once they become ‘a.pdf
 
Which of the following traits is considered MendelianSelect one.pdf
Which of the following traits is considered MendelianSelect one.pdfWhich of the following traits is considered MendelianSelect one.pdf
Which of the following traits is considered MendelianSelect one.pdf
 
What are three risks of not including best HR practices into the man.pdf
What are three risks of not including best HR practices into the man.pdfWhat are three risks of not including best HR practices into the man.pdf
What are three risks of not including best HR practices into the man.pdf
 
When a persons score on one variable is used to make predictions abo.pdf
When a persons score on one variable is used to make predictions abo.pdfWhen a persons score on one variable is used to make predictions abo.pdf
When a persons score on one variable is used to make predictions abo.pdf
 

Recently uploaded

Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 

Read and analyze the attached case. You must discuss the case and ho.pdf

  • 1. Read and analyze the attached case. You must discuss the case and how Information Technology is used or misused. Discuss the effectiveness and ineffectiveness of its application if appropriate, or discuss your opinion of the case and how IT could have been more effectively used. Each analysis must be at least 1-2 pages in length and no more than 3 pages. It should include a section summarizing the case (1-2 paragraphs), and then an analysis of how IT was used or misused. The analysis portion must be the bulk of the feedback. I am looking for your observations of the case, what you think!! http://www.gao.gov/assets/680/674906.pdf Solution Computer crime is a very vast topic. It includes many mal functions by computer users. It is all about making bad use of information technology for personal interest or in order to create troublesome situation for others. Plagiarism is one aspect. It is passing off the work of other people as your own without giving any credit to them. Piracy is another topic worth thinking about because people make a lot of effort and spend lot of money to create or make something where other just make a copy of them instant of buying the original one. Crackers are basically attention who break into computer system and make illegitimate use of them. With the rapid evolution in Information Technology, the numbers of crackers are also growing. It is very difficult to get hold of all these issues that is why we have some association running, aiming to reduce and stop these concerns. nformation technology and its systems have become so important that large organization can no longer operate without them, not to mention operate efficiently. Each organization has its unique purpose, use of information technology is now becomes one of most important means to achieve the goals as claimed by Hawkins (2004). Technology could increase an organization’s effectiveness by refine its operations, business process and internal collaboration. In the context of education, technology could break down communication barriers between students and faculties and among students themselves. For example, email system could enable lecturers and students have effective communication when both of them are remote from campus and located at different time zone of the world. Technology could also help students have better access to the learning information, experts and learning communities. In most universities’ library system, students could now access, view and finding citations of thousands of academic journals which are integral part of student’s academic study from its online database and database’s associated
  • 2. subscriptions. Technology could also enable active new learning modes, such as multi-media teaching, computer lab and virtual learning environment that could connect students from different parts of the world in one virtual environment simultaneously. However, technology by itself could not delivery the outcomes desired and pursued by the organization. The current use of technology in education setting involves developing of new teaching and learning models and refining administrative operation process chains and today’s available information technology solutions have an array of capabilities and the potential to both improve the learning environments and widen teaching methods options. If use of technology has such substantial impact on the operation of organization, what are the responsibilities of senior IT post or its Chief Information Officer (CIO) and what characteristics making an effective or ineffective CIO? Armstrong, Simer, & Spaniol (2011) has identified following duties that are usually fall into CIO’s domains. First, CIO is responsible for developing a technology plan for the schools including the budget. Secondly, he is responsible for IT governance and provisioning IT system/services within the organization. Thirdly, part of CIO’s provisioning IT system services, which is also one of most significant but often been neglected, is to introduce new technology systems and make them functional. Fourthly, provide IT training to staff members who manage and use the IT system both within and outside his department. In another words, CIO is responsible for matching the needs of education institutions and new or available technology teaching and learning options. The duties require substantial leadership from senior IT post who could assembly various technology solutions; implement them in a way which could better serve the goals of organizations and maintain technology system to operate in a safe and stable manner. The implementation of information technology has impact across all areas of organizations; CIO cannot manage the technology system without concerning and communicating the needs of all other departments and the overall goals of organization. Thus in Hawkins (2004), it is provided that an effective CIO must have strong managerial ability. He is able to coordinate all important units within the organization, allowing them to express each of their unique technology needs and “harmonize” the differences or conflicts among them. An actual application of CIO’s managerial skill is given by Grand (1997) which provides senior IT post often encounters “incompatibility among networks, data structures, software packages etc...” Those incompatible technology components however may met specific needs of each department, therefore, CIO must able to pursue each departments to combine each of their “disparate systems” into a new comprehensive framework that inevitability involve compromises from the users.
  • 3. However, CIO’s ability of coordinating needs from units of organization is not an end itself; he exercises his managerial skill for the purpose of achieving the goals of business, most importantly, its continuous growth. Therefore, CIO must have insight of what is successful business operation pertain to the organization he is working, for example, in the context of schools, it means better education quality, growth and sustainable revenues. This CIO characteristic is confirmed with my experiences with Mr. Mu. (n.d.) from Tai Shang Consultancy (“Tai Sha”). Tai Sha is a leading education consultancy services company in China. Mr. Mu, who is the chief IT officer of the company, has been required to participate senior business operation meetings and been consulted of business operation strategies on a regular basis. But it should be noted online marketing channel is one of the major marketing tools used by Tai Sha which may result requiring Mr. Mu (n.d.) to have particular strong business operation understanding. The third characteristic ability that a technology manager should have is the sensitivity to new technology from strategic planner perspective of an organization. For example, it is provided in Armstrong et al., (2011) IT manager is responsible for selecting and introduce new systems for the organization. For example, he may decide to make arrangements for introducing and using "hosted, cloud-based, or even outsourced systems and services" since these newly emerged technologies can reduce the cost of hardware and installation, or make the costs associated with maintaining the system more transparent. But whether or not adopting them depends on CIO’s judgment and careful analysis of organization’s strategic goals, value of the services, and the budget. For example, in school setting, instead of knowing how the new technologies work and its technology advantages, CIO is responsible for making decisions based on its degree of alignment with students learning improvements. An associated ability that CIO should grip is that he should be skilled in negotiation and contracts with external service providers. The trend of adopting cloud technology is more obvious than ever and its applications could be wide spread on all areas of an organization. CIO may understand the technology itself very well, but procure good bargain from the service providers would also fall into their duty territories. Person with limited exposure to technologies may not even able to fully understand the functions of a new system and its implications that brought by external service providers. On the other hand, CIO with strong technology background would not be easily misled by external contractors. An ineffective IT manager lacks the personality and influences that enable him to change
  • 4. organization’s internal operation culture. Introducing new technologies inevitably involve change of an organization’s existing practices, such as teaching methods if it is a school or marketing strategies if it is commercial organization. The change of practices requires extensive training on the staff members and sometime turn the proficient users of old practice into new learners. The introduction of new technologies may thus meet resistance from staff members and spread of rumors of its ineffectiveness. Armstrong et al., (2011) suggests this challenge could be dealt with through process of lunching pilot program. These pilot users typically go on to become the proponents of the system and provide the groundwork for developing systemic training programs. Another characteristic of ineffective IT manager is provided by Bjelland (2005), CIO's inability to understand and explain the technologies from layman's perspective. An innovative technology program may require collaborations from all departments of an organization. The new IT platform may exert substantial impact on organization's position on the market. But the creation of the system calls for a "clear, simple vision" to enable people with different technology backgrounds to coordinate their efforts. The technology questions raised by people also needs answers that are clear and simple. Mr. Mu. (n.d.) based on personal experiences unfortunately sometime during the business technology explanation conversation fall into jargon and implicitly telling non-technical people that a problem is too complex for people to understand possibly due to his strong technology background. The good technology manager should able to understand the technology strategy from layman’s perspective first place, so he could naturally explain the strategy to a non-technical superior in a real and simple way.