Management Information System Chapter 14 GTU MBA

July 14, 2016 | Author: Rushabh Vora | Category: N/A
Share Embed Donate


Short Description

Download Management Information System Chapter 14 GTU MBA...

Description



“How Might cultural, Political, or geoeconomic challenges affect a global company's use of the Internet? Give several examples.

141

Enterprise and Global Management of Information Technology



Identify each of the three components of information technology management ◦ Use examples to illustrate how they might be implemented in a business



Explain how failures in IT management can be reduced by the involvement of business managers in IT planning and management

143





Identify several cultural, political, and geoeconomic challenges that confront managers in the management of global information technologies Explain the effect on global business/IT strategy of the trend toward a transnational business strategy by international business organizations

144





Identify several considerations that affect the choice of IT applications, IT platforms, data access policies, and systems development methods by a global business enterprise Understand the fundamental concepts of outsourcing and offshoring, as well as the primary reasons for selecting such an approach to IS/IT management

145



As the 21st century unfolds, many companies are transforming themselves into global powerhouses via major investments in ◦ Global e-business ◦ E-commerce ◦ Other IT initiatives



There is a need for business managers and professionals to understand how to manage this vital organizational function

146

147



Managing the joint development and implementation of business and IT strategies ◦ Use IT to support strategic business priorities ◦ Align IT with strategic business goals



Managing the development and implementation of new business/IT applications and technologies ◦ Information systems development



Managing the IT organization and infrastructure ◦ Hardware, software, databases, networks, and other resources

148



Three things happened in the past few years ◦ The Internet boom inspired businesses to connect their networks ◦ Companies on on their intranets essential applications without which their businesses could not function ◦ It became apparent that maintaining PCs on a network is very, very expensive



These things created an urgent need for centralization

149



Early Years ◦ Centralization of computing with large mainframes



Next ◦ Downsizing and moving back to decentralization



Current ◦ Centralized control over the management of IT while serving the strategic needs of business units  Hybrid of centralized and decentralized components

1410

1411



Application development management involves ◦ Systems analysis and design

◦ Prototyping ◦ Applications programming ◦ Project management

◦ Quality assurance ◦ System maintenance

1412





IS operations management is concerned with the use of hardware, software, network, and personnel resources in data centers Operational activities that must be managed ◦ Computer system operations ◦ Network management

◦ Production control ◦ Production support

1413



Software packages that ◦ Monitor the processing of computer jobs ◦ Help develop a planned schedule of computer operations that can optimize computer system performance ◦ Product detailed statistics that are invaluable for effective planning and control of computing capacity

1414



Chargeback Systems ◦ Allocates costs to users based on the information service rendered



Process Control Capabilities ◦ Systems that not only monitor but automatically control computer operations at large data centers

1415





 

Recruiting, training and retaining qualified IS personnel Evaluating employee job performance and rewarding outstanding performance with salary increases and promotions Setting salary and wage levels Designing career paths

1416



Chief Information Officer (CIO) ◦ Oversees all uses of information technology in many companies, and brings them into alignment with strategic business goals



Chief Technology Officer (CTO) ◦ In charge of all information technology planning and deployment ◦ Manages the IT platform ◦ Second in command

1417

  



E-commerce architect Technical team leader Practice manager Systems analyst

1418



All information technologies must be managed as a technology platform for integrating business applications ◦ Both internally or externally focused ◦ The Internet, intranets, electronic commerce and collaboration technologies, CRM software, enterprise resource planning, and supply chain management



Often the primary responsibility of a chief technology officer 1419



Business units that support and manage end user and workgroup computing ◦ Can be done with information centers staffed with user liaison specialists or with Web-enabled intranet help desks



Key roles ◦ Troubleshooting problems ◦ Gathering and communicating information ◦ Coordinating educational efforts ◦ Helping with end user application development 1420



The purchase of goods or services from third-party partners that were previously provided internally

1421

1422

 

  

Save money – achieve greater ROI Focus on core competencies – organizations can focus on the business that they are in Achieve flexible staffing levels Gain access to global resources Decrease time to market

1423



Relocation of an organization’s business processes to a lower cost location ◦ This location is typically overseas

◦ Can be either production or service 

Growth of services offshoring is linked to ◦ Availability of large amounts of reliable and affordable communication infrastructure ◦ Digitization of many services

1424



IT not used effectively ◦ Computerizing traditional business processes instead of developing innovative e-business processes



IT not used efficiently ◦ Poor response times ◦ Frequent downtimes ◦ Poorly managed application development

1425



Managerial and end user involvement ◦ Key ingredient to high-quality information system performance



Involve business managers in IT management ◦ Governance structures, such as steering committees

1426

1427



Companies around the world are developing new models to operate competitively in a digital economy ◦ These models are structured, yet agile, global, yet local ◦ They concentrate on maximizing the risk adjusted return from both knowledge and technology assets

1428

1429



Political challenges ◦ Many countries regulate or prohibit the transfer of data across their national boundaries

◦ Others severely restrict, tax, or prohibit imports of hardware and software ◦ Some have local content laws that specify the portion of the value of a product that must be added in that country if it is to be sold there ◦ Others require a business to spend part of the revenue they earn in a country in that nation’s economy 1430



Geoeconomic challenges ◦ Physical distances are still a major problem ◦ It may take too long to fly in specialists

◦ It is difficult to communicate in real time across 24 time zones ◦ Many countries do not have good telephone and telecommunications services ◦ It may be hard to find skilled local workers ◦ There can be great differences in the cost of living and labor costs between countries

1431



Cultural challenges ◦ Languages ◦ Cultural interests

◦ Religions ◦ Customs ◦ Political philosophies

◦ Global IT managers need cultural training before they are sent on assignment ◦ Different work styles and business relationships

1432



Companies are moving toward a transnational strategy ◦ Business depends heavily on information systems and Internet technologies to help integrate global business activities ◦ Requires an integrated and cooperative worldwide IT platform

1433

1434





Business requirements caused by the nature of the industry and its competitive or environmental forces Examples of global drivers: ◦ ◦ ◦ ◦ ◦

Customers Products Operations Resources Collaboration

1435



Hardware Difficulties ◦ High prices ◦ High tariffs

◦ Import restrictions ◦ Long lead times for government approvals ◦ Lack of local service or spare parts

◦ Lack of documentation tailored to local conditions

1436



Software Difficulties ◦ Packages developed in Europe may be incompatible with American or Asian versions

◦ The software publisher may refuse to supply markets that disregard software licensing and copyright agreements

1437

1438



The Internet ◦ An interconnected matrix that reaches tens of millions of users in over 100 countries ◦ Business environment is free of traditional boundaries and limits



Without incurring massive cost outlays for telecommunications, companies can ◦ Expand markets ◦ Reduce communications and distribution costs ◦ Improve profit margins

1439







Will you have to develop a new navigational logic to accommodate cultural preferences? What content will you translate, and what content will you create from scratch to address regional competitors or products that differ from those in the U.S.? Should your multilingual effort be an adjunct to your main site, or will you make it a separate site, perhaps with a country-specific domain?

1440







What kinds of traditional and new media advertising will you have to do in each country to draw traffic to your site? Will your site get so many hits that you’ll need to set up a server in a local country? What are the legal consequences of having your website targeted at a particular country, such as laws on competitive behavior, treatment of children, or privacy?

1441



Transborder Data Flows may be viewed as violating ◦ A nation’s sovereignty because it avoids customs duties and regulations ◦ Laws protecting the local IT industry from competition ◦ Laws protecting local jobs ◦ Privacy legislation

1442



Key data privacy provisions ◦ Notice of purpose and use of data collected ◦ Ability to opt out of third-party distribution of data ◦ Access for consumers to their information ◦ Adequate security, data integrity, and enforcement provisions

1443



The struggle between Internet censorship and openness at the national level revolves around ◦ Controlling the conduits ◦ Filtering the flows ◦ Punishing the purveyors



Most of the world has decided that restricting Internet access is not a viable policy ◦ Restricting access also hurts a country’s opportunities for economic growth and prosperity 1444



High Government Access Fees ◦ Kazakhstan, Kyrgyzstan



Government Monitored Access ◦ China, Iran, Saudi Arabia, Azerbaijan, Ubekistan



Government Filtered Access ◦ Belarus, Cuba, Iraq, Tunisia, Sierra Leone, Tajikistan, Turkmenistan, Vietnam



No Public Access Allowed ◦ Burma, Libya, North Korea

1445



Key development issues ◦ Conflicts over local versus global system requirements

◦ Trying to agree on common system features ◦ Disturbances caused by systems implementation and maintenance activities ◦ Global standardization of data definitions

1446



Key strategies for global systems development ◦ Transform an application used by the home office or a subsidiary into a global application ◦ Set up a multinational development team ◦ Parallel development ◦ Centers of excellence ◦ Offshore development

1447

1448

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF