+1(978)310-4246 credencewriters@gmail.com
  

Chapter 11 – study questions 1-10, Exercise 1

Chapter 12 – study questions 1-11, Exercise 1

Information Technology and Organizational Learning Assignment (Please use APA 7 formatting for these essay questions):

Chapter 9 – Review the section on Establishing a Security Culture. Review the methods to reduce the chances of a cyber threat noted in the textbook. Research other peer-reviewed sources and discuss additional methods to reduce cyber attacks within an organization.

Chapter 10 – Review the section on the IT leader in the digital transformation era. Address how IT professionals and especially leaders must transform their thinking to adapt to the constantly changing organizational climate. What are some methods or resources leaders can utilize to enhance their change attitude?

The above assignments should be submitted in a single Word document. Please use a cover page with all assignments.

The information technology and organizational learning assignment should be in essay form and should be at least two pages in length (one page for each question).

**Remember the APA cover page and the references (if required) do not count towards the page length**

Note the first assignment should be in one section and the second section should have the information from the Information Technology and Organizational Learning assignment. The paper requirements for the two pages applies to the second part of the assignment directly related to the Information Technology and Organizational Learning assignment.

Analyze the methods to reduce the chances of a cyber threat within an organization.

Define how IT professionals must transform their thinking to adapt to the constantly changing organizational climate.

Explain methods that leaders can utilize to enhance their change attitude.

Describe what the term information systems ethics means.

Describe the challenges that information technology brings to individual privacy

School of Computer & Information Sciences
ITS-631- Operational Excellence
Chapter 9 – Information Technology and
Organizational Learning
Introduction
• Forming a Cyber Security Culture
• Senior Leadership needs to make security a
priority
• Salient issues that executives must address
and how to develop a strategy to deal with
various types of cyber attacks
History and Talking to the Board
• Prior to 1990, few
organizations were
concerned with
information security
• Talking to the Board
– Board members must
understand the impact
cyber attacks can have on
business
Security Culture and What Compromise Means
• Security Culture
– Exposure to a cyber attack comes from careless
behaviors of the organization’s employees
– Establish best practices
• Being Compromised
– Organizational security breach plan
– Maximize protection of key company information
Cyber Security Dynamism and Responsive
Organizational Dynamism
• New events and
interactions based on
cyber security threats
can be related to the
symptoms of dynamism.
Figure 9.2 shows the
components of cyber
ROD
Cyber Strategic Integration
• Cyber strategic integration is a process that firms use to
address the business impact of cyber attacks on its overall
processes.
• Complications posed by cyber dynamism (via strategic
integration) occurs when several new cyber attacks overlap
and create various problems in various phases of business
operations.
• Organizations must find way to develop strategies to deal
with cyber threats.
Cyber Cultural Assimilation and OL and AD
• A process that addresses the organizational aspects of how the
security department is internally organized, its relationship with IT,
and how it is integrated within the organization as a whole.
• Organizational Learning and Application Development (OL and AD)
– Behavioral change is one challenge in maximizing protection in an
organization
– Need to design more resilient applications that are better equipped to
protect against threats
– No system can be 100% protected
Cyber Security Risk
•
•
•
•
•
•
Security risk is typically discussed in the form of threats. Threats can be categorized as:
1.Threat agent: Where is the threat coming from, and who is making the attack?
2.Threat goals: What does the agent hope to gain?
3.Threat capability: What threat methodology, or type of approach is the agent
possibly going to use?
4.Threat work factor: How much effort is the agent willing to put in to get into the
system?
5.Threat risk tolerance: What legal chances is the agent willing to take to achieve his or
her goals?
Risk Responsibility
• Risk analysis at the application level requires governance
• When thinking about a security mindset ask…
–
–
–
–
–
–
–
–
–
–
What are the economics to protect systems?
What is the best protection you can get for the amount of money you want to spend?
Can you save more lives by spending that money?
What should you protect?
Can you estimate what it will take to protect your assets?
Should you protect the network or the host?
Is your Cloud secure enough?
Do you guess at the likelihood and cost of a penetration?
How do you evaluate your assets?
Are you thinking like the enemy?
Driver/Supporter Implications
• To excel in the role of a security driver, leaders must:
– Have capabilities, budgets and staffing levels, using benchmarks.
– Align even closer with users and business partners.
– Have close relationships with third parties.
– Extend responsibilities to include the growing challenges in the mobile
workforce.
– Manage virtualized environments and third-party ecosystems.
– Find and/or develop cyber security talent and human capital.
– Have a strategy to integrate millennials with baby boomer and Gen X
managers.
References
• Langer, A. M. (2018). Information Technology
and Organizational Learning. 3rd edition.
Taylor & Francis Group, LLC. ISBN: 978-1-13823858-9
School of Computer & Information Sciences
ITS-631- Operational Excellence
Chapter 10 – Information Technology and
Organizational Learning
Introduction
•
•
•
Digital transformation is defined as the changes associated with the applications of
digital technology within every of human society
The challenge becomes how to get IT more engaged with the buyer community
Review the six approaches for IT to be more engaged:
–
–
–
–
–
–
Sales/Marketing
Third-party market analysis/reporting
Predictive analytics
Consumer support departments
Surveys
Focus groups
Requirements without Users and Input
•
•
•
Technology generates change called digital disruption
Challenge in disruption is the inability to predict the consumers wants and needs
Graphic depiction of the relationship between technology advancements and market needs (figure
10.2)
Porter’s Five Forces
• Competitors
• New Entrants
• Substitutes
• Buyers
• Suppliers
Langer’s Driver/ Supporter model
• Figure 10.6 depicts the life cycle of any
application or product
Organizational Learning and the S-curve
• When designing a new application or system, the status of that product’ s
S-curve should be carefully correlated to the source of the requirements.
• S-curve analysis (Table 10.3)
IT Leader in Digital Transformation Era
• The IT leader must become more innovative.
• Quality requirements will be even more complex
• Dynamic interaction among users and business teams will require the
creation of multiple layers of communities of practice.
• Application analysis, design, and development must be treated and
managed as a living process; that is, it never ends until the product is
obsolete (supporter end). So, products must continually develop to
maturity.
• Organizations should never outsource a driver technology until it reaches
supporter status.
How Technology Disrupts Firms and
Industries
• The world economy is transforming rapidly from an analogue to a digitalbased technology-driven society. This transformation requires businesses
to move from a transactional relationship to one that that is
“interactional”
• Dynamism and Digital Disruption
– how to can anticipate the unexpected threats brought on by technological
advances that can devastate their business.
– There are typically two disruption factors:
• A new approach to providing products and services to the consumer.
• A strategy not previously feasible, now made possible using new technological
capabilities.
Critical Components of Digital Organizations
• Unified digital platform
• Solution delivery
• Analytics capabilities
• Business and IT integration
Assimilating Digital Technology Operationally
and Culturally
• Organizations must create a new architecture when
implementing digital technologies.
• Companies must recognize that speed and comfort of
service can be more important than just the cost.
• Empower workforce to try new ideas without over controls.
• Allow employees and customer to have choice of devices.
• Organizations who force staff to adhere to strict processes
and support structures are exposed to digital disruption.
References
• Langer, A. M. (2018). Information Technology
and Organizational Learning. 3rd edition.
Taylor & Francis Group, LLC. ISBN: 978-1-13823858-9
School of Computer & Information
Sciences
ITS-631 Operational Excellence
Chapter 11 – Information Systems for
Business and Beyond (2019)
Learning Objectives
• explain the concept of globalization;
• describe the role of information technology in
globalization;
• identify the issues experienced by firms as they
face a global economy; and
• define the digital divide and explain Nielsen’s
three stages of the digital divide.
Globalization
• Integration of goods, services, and culture among nations
of the world.
• The internet has allowed for this expansion in a rapid pace
Network Society
• Network Society
– New ways economic activity was being organized around
the networks that new telecommunication technologies
had provided.
• The World is Flat
– Impact the personal computer, Internet, and
communication software has made on business.
– Globalization 1.0, 2.0, and 3.0
The Global Firm
•
•
•
•
Ability to locate expertise and labor around the world
Ability to operate 24 hours a day
Larger market for products
Challenges:
– Infrastructure differences
– Labor laws and regulations
– Legal restrictions
– Language, customs, and preferences
– International shipping
Sidebar: Internet Speeds
Digital Divide
• Separation between those who have access to global network and those
who do not.
• Various categories
– Economic divide
– Usability divide
– Empowerment divide
• Refining the Digital Divide
– Social mobility
– Democracy
– Economic growth
References
• Bourgeous, D., Smith, J., Wang. S., Mortati, J.
(2019). Information Systems for Business and
Beyond. Retrieved from
https://opentextbook.site/informationsyste
ms2019/.
School of Computer & Information Sciences
ITS-631 Operational Excellence
Chapter 12 – Information Systems for Business
and Beyond (2019)
Learning Objectives
• describe what the term information systems ethics means;
• explain what a code of ethics is and describe the advantages
and disadvantages;
• define the term intellectual property and explain the
protections provided by copyright, patent, and trademark;
and
• describe the challenges that information technology brings
to individual privacy.
Intellectual Property (IP), Copyright, and Patent
•
Intellectual Property (IP)
– Property (an idea, invention, or process) that derives from the work of the mind or
intellect.
– Protection of IP is important as it offers people an incentive to be creative (such as
competitive advantage).
•
Copyright
–
–
–
–
•
Protection given to songs, computer programs, books, or other creative works.
Fair Use
Read: Sidebar: The History of Copyright Law
The Digital Millennium Copyright Act
Patent
– Another form of IP that creates protection for new inventions.
Trademark and IS and IP
• Trademark
– A brand, logo, phrase, or sound that
identifies a source of goods or
services.
• Information Systems and IP
– Privacy
– Personally Identifiable Information
(PII)
– Non-Obvious Relationship
Awareness
Restrictions on Data Collecting
• Children’s Online Privacy Protection Act
• Family Educational Rights and Privacy Act
• Health Insurance Portability and
Accountability Act (HIPAA)
• General Data Protection Regulation
(GDPR)
References
• Bourgeous, D., Smith, J., Wang. S., Mortati, J.
(2019). Information Systems for Business and
Beyond. Retrieved from
https://opentextbook.site/informationsystem
s2019/.

Purchase answer to see full
attachment

  
error: Content is protected !!