StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Information Security Media Group - Essay Example

Cite this document
Summary
This essay "Information Security Media Group" tells us about three levels of maturity that characterize IT leadership. It asserts that type 1of IT leadership relates to functional requirements and individual systems. Type 2 of IT leadership concentrated more on the management of portfolio projects…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.1% of users find it useful
Information Security Media Group
Read Text Preview

Extract of sample "Information Security Media Group"

Download file to see previous pages

ISMG
Response 1-What the Consultant's Report Tell Us about Davies' Firing And Barton's Hiring
Expert consultants wrote a confidential report to Kyle Crawford. The confidential report detailed an assessment of Davies's job as a CIO before his firing (Austin et al 81).
However, Barton would transit to the next level with speed and hence his hiring. The consultants asserted that Davies earned respect from his IT staff but he equally had poor interrelationships in his job as a CIO where he always relied on IT to solve any problem (Austin et al 82). Again, the consultants recommended that sufficient training and counseling would solve this problem. As such, the report tells us that IT investments generate great value for the company and such investment resides in the IT experts that the company hires (Austin et al 81). However, the report favors the significance of the ability to manage portfolio projects, play senior team leadership roles, and manage infrastructure. Indeed, it disregards individualism and advocates for teamwork in management, which leads to Davies' firing and Barton's hiring (Austin et al 81-82).

Response 2-Why It Is Often So Difficult To Assign a Quantitative Value to the Return on an IT Investment
Ideally, IT investments do not generate revenues from external source s ad hence they cannot indicate growth in profits or revenues which measure the quantitative value to returns (Austin et al 71). Indeed, returns on an IT investment only generate value to the internal customers and business units where we cannot establish the quantity of such value (Austin et al 71). More so, the benefits claimed from the success of a proposed project are the same benefits that IT would claim, and hence assigning quantitative value to the return on an IT investment would amount to double claims of value (Austin et al 72). At the same time, where a business unit proposes an IT-enabled change, it would be difficult to allocate some or all the resultant benefits between the business units and IT (Austin et al 72).

Response 3- Examples to Refute the "It Doesn't Matter" Contention
Assuredly, IT plays a very significant part in any company. In fact, the adoption and success of IT in an organization derives a great competitive advantage. For example, Apple invests in IT to produce classy, cool, entertaining, and multipurpose gadgets like iPods and iPad, which gives it a competitive edge over its main competitors. More so, Nestle collaborated with Google to reinforce its digital technology and online presence, which enable Nestle to take its products to a wider market and satisfy the customers’ preferences. As such, it is clear that IT investments can enable an organization to derive capabilities that are not available to relevant competitors.

Response 4-Where My firm Fall on the "Strategic Grid" Presented on pp. 77-78
McFarlan’s Strategic Grid has the vertical and the horizontal axis. The vertical axis depicts the operational dependence of the organization on IT while the horizontal axis represents the competitive differentiation that a company derives from IT (Austin et al 77-78). My reference company is Accenture, which is a management consulting, technology services, and outsourcing company. Ideally, Accenture is in the upper right quadrant as derives a lot of competitive advantage from IT and its operations are highly dependent on IT. Indeed, the company depends on IT to offer a wide range of technological services aimed at helping organizations to enhance their productivity. As a result, the company stands out as one of the world’s leading management consulting, technology services, and outsourcing companies.

Response 5-Whether We Can Generalize On the Percentages of "Competes" Versus "Qualifiers" Applications
Most assuredly, we should not generalize systems into categories of just competes and qualifiers. Indeed, we should analyze systems in reference to the four quadrants in McFarlan’s Strategic Grid. At the same time, we can evaluate systems in terms of cost and value thus negating the general assumption of systems as just competes and qualifiers (Austin et al 78).  

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“ISMG Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/business/1486603-ismg
(ISMG Essay Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/business/1486603-ismg.
“ISMG Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/business/1486603-ismg.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Security Media Group

Vulnerability of an Organizations Information System

All these media, if vulnerable, can lead to cyber intrusions causing cyber threats or attacks, thus affecting the entire information system of the organization.... This paper ''Vulnerability of an Organizations Information System'' focuses on the vulnerabilities those organizational information systems presently challenging the IT managers, with over viewing the most important cyber security vulnerability and considering measures that might protect organizations from such vulnerabilities....
10 Pages (2500 words) Research Paper

Information Security Program

This paper "information security Program" points out what information security governance is in a banking software company, its implementation.... The paper gives an information security policy that provides total control, hence compliance, to ensure effective information security governance.... It has also affirmed the degree of completeness of the security measures that were implemented and provided consultation services on information security particularly monitoring of threats from the internet....
14 Pages (3500 words) Case Study

The Role of Government in Information Assurance and Security

Introduction Background information of the study information security is the continuous protection of information and security apparatuses from any unauthorized access, disruption, alteration, publication or even termination and disruption.... Mobile phones, social media and emails are avenues for individuals to exchange either business or personal information.... This paper ''The Role of Government in Information Assurance and security'' discusses that the protection of private and public information from unwanted access by hackers and criminals has risen tremendously with the growth of information technology....
18 Pages (4500 words) Research Paper

Implementing Network and Personnel Security Measures

Implementing Network and Personnel security Measures 1.... Equipment List of Network security Devices that would be needed to ensure the Integrity and Sensitivity of Private Information The network security devices can be characterized into three major categories namely Internet Router and Firewall, Intrusion Protection System and Traffic Shaping device.... In relation to the present network security manufacturing industry, Cisco and IBM can be considered as the leading corporations which provide safe and steady internet environment within the networks of the different global institutions....
5 Pages (1250 words) Research Paper

Global Insecurity and Digital Media

The paper "Global Insecurity and Digital media" highlights that the traditional purpose of media in a free society was to inform however, nowadays the purpose is not really to inform, but also involves strategizing on violent activities.... The media acts as a platform for voicing concerns.... In situations, terrorists use the media to counter strategies laid down by their opponents.... This shows the impact of media on national security and how it becomes hard to curb insecurity....
7 Pages (1750 words) Essay

Security&Democracy, Popular Culture and Star Wars

The non-elitist group of the society is mainly the downtrodden or the masses that do not control both the political as well as economic power.... Borrowing from the history of the United States, where popular culture was largely associated with the black, the oppression by the culture of the dominant group is normally to proportions that cannot be tolerated.... This is because the elites tend to control media outlets and the culture itself.... This work called "security&Democracy, Popular Culture, and Star Wars" describes the stability of communities and countries through avoidance of cases of insecurity, how to prevent violent activitiesThe author takes into account whether democracy and stability can coexist....
18 Pages (4500 words) Research Paper

Information Security Policies for Organizations

The aim of the following paper is to evaluate several particular information security policies that might be considered in organizations that seek to protect its data, outlining its scopes, purposes, and internal structure (roles, responsibilities, sanctions, and violations).... In today's networked and distributed information sharing environments information security has become an important issue for organizations of all kinds, including universities.... he ISO 27001 information security standard offers companies a risk-based approach to securing information assets....
15 Pages (3750 words) Research Paper

Can Security and Democracy Co-Exist

The non-elitist group of the society is mainly the downtrodden or the class that does not control power and the economic power of the society.... According to this view of popular culture, the elites tend to control media outlets and the culture itself.... This coursework "Can security and Democracy Co-Exist" is going to question whether it is possible for a country to have it both ways.... Through interrogating vast academic sources, the paper will argue that it is not possible to have democracy and security at the same time....
18 Pages (4500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us