Unformatted text preview: Goal of lnfoSec - Find appropriate trade-off between risk of IT Dept. Organization loss and cost of implementing safeguards.
- Protective actions - Use antivirus software.
- Delete browser cookies? - Make appropriate trade-offs to protect yourself
and your business. 1-1
Min: 11-2 Use of IT & Alignment - Align IT in support of the organizational strategy ~ Being aligned is a continuous, never-ending process, but is critical
for an IT dept. to effectively exist. Gross miss-alignment results in
an IT dept. being regarded as simply a “cost oenter“ rather than a
business enabling function. - Porters Competitive Strategies
~ Low Cost vs Differentiated 9mm Arrange arr-rpm: arm- can :23 - Shift from in-house to cloud is a major disruptor for many
srsom IT dept.'s
mom - Much ‘Ieaner‘ depts. Is a common result
S— Dutietsuvia Mallow Webbaed “more malarial Stunned-15
Imus: wads trauma um um um lm: In" Malicious insiders are an increasingly serious security threat. Business disruption and data loss are principal costs of computer crime. Survey respondents believe negligent employees, personal devices connecting to the en
porate network, and the use of commercial cloud-based applications pose a signiﬁcant
security threat. Security safeguards work. 11-3 Outsourcing - “The process of a company (Company A) hiring another
company (Company B) to perform a service for which
Company A is not necessarily an ‘expert‘ in aka Core
Competency . Reasons for outsourcing - save Costs
- Gain Expertise
. Free Management ‘I'rme - "Your back room is someone else’s front room” — Peter Drucker
. Google and cafeteria example 11-3 Outsourcing IT - Reasons STUXN ET - HOWSIUXHH WORKED [Wﬂ
»§»I§->g TQQQ? gs? , 11-3 International Outsourcing
aka Off-Shoring cheaper labor, such as Mexico, India or Philippines and where labor cost 70—60% less than US - Customer Support is often outsourced to other areas with . Anywhere where there's a well—educated, English-speaking people Business Process Management - Business process
- Network of activities. repositories, roles, resources, and ﬂows - Interact to accomplish a business function.
- Process - Network of activities, repositories, roles, resources. and ﬂows
- Interact to accomplish just about everything How do Business Processes, Information Systems,
and Applications Differ and Relate? 1. Different characteristics and components.
2. Business processes to information
systems - N:M. . Business process need not relate to any
information system, but an information
system relates to at least one business
process. 3. At least one application in every IS due to
software component. Development Challenges Four critical factors
1. Coordination 2. Diseoonomies of scale
- Brooks’ Law 3. Conﬁguration control
4. Unexpected events How Do Organizations Use Business Process
Forthe purpose of tho chapter. we will canard the dei‘rnithrr of business 1mm that we used In Chapter 1 Here we will deiirre a bushel: process as a network of activities. repositories.
roles memes. arrdilows that interact to accomplishabrrstneas i'unaion. Asstaled inChapter 3. 1. Infection 2' mh - Amazon has such operations In the US, Costa Rica, Miriam-aims
maniammwamu WMMWIW Ireland, Scotland, Germany, Italy. Beijing, Japan, and mummies:
we hmlmm WBMM‘NWW India to provide for continuous 24/7 coverage ’ ‘
mommiemmnm Mercado/ed mm , , . .
II II speadcrrrtrtil I“ - Besides Customer Support Indra, Russra and Chlna are
troma I l “Mb“... ngM “W also known for also Application Development expertise
. . "with
E] IE - Caps ﬁnancral risk. Mama»
E E _ . 15! Personnel
- Ensures quality or avords substandard mmﬁﬂ‘“ 5.oontrol 6.dooolveand destroy
mmmamnmmro mmmm‘tmm “macro-emanate. mmurtilli‘atoohlatodo
Mopirthanmtofairn. WWI. — 'Ve"d°"s '95P°”S“"e f°' “39” "'5'“- quality. - Less likely to pick wrong hardware,
software, network protocol, or implement
tax law changes incorrectly. activities are oollectims of related tasks that recu've inputs and produce outputs. A repository is a
colleaion ol' mouthing: an inventory Is a physical reposkory and a databmls adata repository.
The new terns in this deﬁnition are roles. which are collectiom of activities. and some,
which are people I! computer applications that are asigrred to roles. Finally, a ﬂow is either a
comalﬂuwthatdtrcctstheordaai’ activitiesora dataﬂowthatshowstheurovernentol'data
mug activities and repositories To clarify thesaurus think of roles as job tides Example roles are salesman". cram "manger
inventory supervisor, and thelike thus, an organimtion might asigu three people (resources) to
the salesperson role. or it might cream an information system (resource) to paform the credit
manager role. ...
View Full Document
- Fall '08
- Management, Business process modeling, business enabling function