Department of Defense, DoD Inspector General Report on Information Technology (IT) Resources, FY 1999 Amended Budget Estimate.

1998 ◽  
Author(s):  
DEPARTMENT OF DEFENSE WASHINGTON DC
1997 ◽  
Author(s):  
Samuel Alexander ◽  
Eric Volles ◽  
Neal Levene ◽  
Bruce Miller ◽  
Paul Cohen

Author(s):  
Prantosh Kr. Paul

Cloud is, in today's age, one of the important and valuable names not only in computing but also in all most all the fields of science, technology and engineering and even in several branches of humanities and social science—the reason behind this is its ultimate benefit of virtualization and elasticity of IT products. This is actually a type of virtualization; here computing is geared up with the wonderful virtual platform which provides a remote accessibility of hardware, software, IT resources, as well as application packages. Interestingly, ‘Cloud' also supports the green agenda of the organization and society. There are so many subjects and domains gaining or injecting the cloud benefit to their services. The information field and domain is more close to the computing and information technology, but it has another core agenda of information activities, which include collection, selection, organization, processing, management, and dissemination of information; here, cloud plays a potential and healthy role.


2015 ◽  
pp. 994-1017
Author(s):  
Ioanna Dionysiou ◽  
Angelika Kokkinaki ◽  
Skevi Magirou ◽  
Theodosios Iacovou

This chapter presents the findings of an investigation on current security practices in Cypriot organizations, including enterprises and public sector divisions. In order to gain knowledge on the deployed security technologies by organizations, a survey was conducted and concluded in late 2010. The survey primarily examined compliance of enterprise current security policies and procedures with ISO 27001 security guidelines. A research analysis has been performed and identified that security mechanisms and the management of information technology (IT) resources may be improved on a number of aspects. Based on the research findings, an assessment of the viability of ISO 27001 in Cyprus is given as well as recommendations on the further deployment of ISO 27001.


Author(s):  
Eng K. Chew ◽  
Petter Gottschalk

Over the last several decades, strategy researchers have devoted attention to the question of how corporate elites (i.e., corporate executives and directors) affect corporate strategy. The CEO as a person in position shapes the scope of the firm, while the CIO as a person in another position shapes the scope of IT in the firm. Jensen and Zajac (2004) proposed and tested the notion that while differences in individual characteristics of corporate elites may imply different preferences for particular corporate strategies such as diversification and acquisitions, these basic preferences, when situated in different agency contexts (e.g., CIO, CEO) generate very different strategic outcomes. Strategy can simply be defined as principles, a broad based formula, to be applied in order to achieve a purpose. These principles are general guidelines guiding the daily work to reach business goals. Strategy is the pattern of resource allocation decisions made throughout the organization. These encapsulate both desired goals and beliefs about what are acceptable and, most critically, unacceptable means for achieving them. While the business strategy is the broadest pattern of resource allocation decisions, more specific decisions are related to information systems and information technology. How should IS/IT resources be allocated within business organizations? How can business ensure the IS/IT resources will deliver the desired business value? Hann and Weber (1996) see IS/IT strategic planning as a set of activities directed toward achieving the following objectives: 1. Recognizing organizational opportunities and problems where IS/IT might be applied successfully 2. Identifying the resources needed to allow IS/IT to be applied successfully to these opportunities and problems 3. Developing strategies and procedures to allow IS/IT to be applied successfully to these opportunities and problems 4. Establishing a basis for monitoring and bonding IT managers, so their actions are more likely to be congruent with the goals of their superiors 5. Resolving how the gains and losses from unforeseen circumstances will be distributed among senior management and the IT manager 6. Determining the level of decision rights to be delegated to the IT manager. Empirical studies of information systems/information technology planning practices in organizations indicate that wide variations exist. Hann and Weber (1996) found that organizations differ in terms of how much IS/IT planning they do, the planning methodologies they use, the personnel involved in planning, the strength of the linkage between IS/IT plans and corporate plans, the focus of IS/IT plans (e.g., strategic systems vs. resource needs), and the way in which IS/IT plans are implemented. In this chapter, we will review the principles of strategic alignment and discuss in detail the various methods for IT value and organizational maturity analysis.


Author(s):  
Terry Anthony Byrd

The value of information technology (IT) in today’s organizations is constantly debated. Researchers and practitioners have examined organizations to try to discover causal links between competitive advantage and IT. This paper presents and details a model that depicts a possible connection between competitive advantage and IT. Furthermore, this paper attempts to show how one major component of the overall IT resources, the information systems (IS) infrastructure, might yield sustained competitive advantage for an organization. More precisely, IS infrastructure flexibility is examined as an enabler of “core competencies” that have been closely related to sustained competitive advantage in the research literature. The core competencies enabled by IT that are the focus of this study are mass customization and time-to-market. By showing that IS infrastructure flexibility acts as an enabler of these competencies, the relationship to sustained competitive advantage is demonstrated.


Sign in / Sign up

Export Citation Format

Share Document