Explain roles and responsibilities of information technology

Assignment Help Computer Network Security
Reference no: EM131026741

Rusty Rims CIO Organizational Structure Memo Paper

Before you begin this assignment, be sure you have read the "Rusty Rims Case Study," as well as Chapter 21, Service Management, and Chapter 22, Balancing IT's Workload. You will also need to review any feedback you received on your IT Strategic Plan assignments.

Purpose of this Assignment

This assignment gives you the opportunity to apply the course concepts to address the organizational needed to evolve the information technology (IT) department into a true CIO organization to support the Rusty Rims Distribution Company (RR). This assignment specifically addresses the following course outcome to enable you to:

• Explain the roles and responsibilities of an information technology department to support an organization's IT strategy.

CIO Organizational Structure Memo

For this assignment, you will assume the role of the Chief Information O~cer (CIO) at RR (i.e., you are Carol). Since you are RR's first CIO, the Chief Financial Officer (CFO) has asked you for a plan for the organizational changes you need to make. One of the first things you realize is that the organization that exists is just an SIT Department' and you know that what RR needs, and has hired you to do, is to create an organization that fulfills the broad responsibilities of a Chief Information Officer. You know that your proposal needs to be convincing to the CFO in order for you to get the resources you need.

Assignment

You will develop a memorandum addressed to the CFO that explains how you want to change your IT Department into a CIO organization and why. Your memo will address each of the topics listed below, and should be written so that it flows well from one section to the next. Each of the topics to be included is covered in the te~book readings assigned thus far; use the Index to locate specific relevant portions of the text, and to locate additional ideas that may be included in chapters not yet assigned. In addition to the course materials, at least one external resource (resource other than those provided in the class) must be used. Two or more cited references will earn top credit. Use a separate References page to list just the references you have cited. Remember to use the APA formatting rules and correctly cite and reference your sources with APA format. Use the Grading Rubric to be sure you have covered everything. Submit your memo in a Microsoft Word memo format, or a document that can be read using Word that uses a memorandum format, with your last name included in the filename.

Please include the following in your memorandum, ensuring that each section flows well to the next, and that the overall memo creates a compelling justification for your new organizational structure.

• Introduction and Purpose -Open your memo with a brief (2 or 3 sentences) explanation of why you are writing it.

• Leadership Philosophu -Since you are the CIO and a member of the senior leadership team of RR, it is important for the other members of the team to understand your leadership philosophy and the management style you will use to meet the company's needs. This should be a short paragraph that ties to the priorities and/or issues outlined in the Case Study, and lays the foundation for the organizational structure you will propose below. This is a good area in which to do some eternal research.

Internal IT Strategies - To show how your IT organization will support RR, you will present and explain five internal IT strategies. For Part 2 of your IT Strategic Plan, you provided at least one example of an internal IT strategy. Identify your internal IT strategy from the ITSP #2
assignment, then add four more internal IT strategies, so that you have a total of five. The strategies you develop must address: people, process and technology - at least one strategy for each. Describe each of the five strategies, identify if they address people, process or technology and explain how they will help improve the organization's effectiveness. Refer to Chapter 9. For an explanation of internal and external IT strategies, see the portion of the tee just prior to Table 9.2.

Current IT Department Structure -Use the information provided in the Case Study to draw an organization chart depicting the current roles and responsibilities. You may take some liberties in how you align the staff that is described in the Case Study, but all IT staff positions or groups must be included in the structure. Be sure to introduce or explain your org chart in the memo. Figure 9.2 in Chapter 9 shows one version of an IT organization chart. You may use the Shapes tool or the SmartArt tool to develop your organizational hierarchy chart, or you may paste in your chart from another drawing tool.

• New CIO Organization -Explain in a paragraph or two how a CIO organization is different from an IT Department. Be sure to create a transition from the previous section. This may be an area for you to do same external research. Key Services -List and explain at least five key services (more than five will earn top credit) that need to be included in your new CIO organizational structure. You may eliminate functions or positions from your current organizational structure if you believe it will improve your effectiveness and/or efficiency; these should be explained. You should also add (and explain) any functions that you will need in your new organization. Be sure these services are appropriate to your IT strategies and note how each relates in your discussion.

• New CIO Organization Structure -Briefly explain what changes you will make and why. Draw an organization chart depicting your new CIO organizational structure. Be sure that the key services you listed are covered by the new organizational structure. (Follow the guidelines for drawing the organization chart given above for the current organization.) Key Milestones -Your memo should include at least five key milestones (tasks or events) (more than five will earn top credit) associated with accomplishing the changes that you see are needed to change the IT Department into a CIO organization. Each milestone should be briefly described (in a sentence or two) and a target completion date should be shown. In addition, for each milestone you should identify at least one issue or concern you have with accomplishing it as well
as how it relates to the corresponding key service noted above. An example using a milestone not related to the organization might be: The milestone is to consolidate all servers into a new data center by Oct 2014. Some issues might be: (1) a secure data center must be located, (2) it will require significant downtime for the corporate servers, and (3) the initial cost will be high.

• Conclusion -Provide an appropriate closing to your memo.

The "right" and "wrong" answers have to do with whether or not you correctly incorporated the course concepts and vocabulary from the textbook and addressed all parts of the assignment. You need to do some external research on at least one aspect of the assignment -your choice -and incorporate it and cite/reference it in APA format in your response. The organizational structure you propose is not as important as that it makes sense in light of the course content and the Case Study.

Reference no: EM131026741

Questions Cloud

Question regarding the professor of economics : Amartya Sen, a professor of economics at Harvard University and a Nobel Laureate, has argued: "For India to match China in its range of manufacturing capacity . . . it needs a better- educated and healthier labor force at all levels of society."
Imbalance in biogeochemical cycling : Explain how human activities can cause an imbalance in biogeochemical cycling and lead to problems such as cultural eutrophication and fish kills
Determine whether each of the following is a function or not : Suppose you have a lemonade stand, and when you charge $1 per cup of lemonade you sell 60 cups. But when you raise your price to $2 you only sell 30 cups. Write an equation for the number of cups you sell as a function of the price you charge.
Calculate the standard emf of the haber process : The Haber process is the principal industrial route for converting nitrogen into ammonia: N2(g) + 3H2(g) → 2NH3(g), What is being oxidized, and what is being reduced?
Explain roles and responsibilities of information technology : Explain the roles and responsibilities of an information technology department to support an organization's IT strategy.
How is cloud security different than traditional security : Discuss how security for a traditional information system will change when you transfer that system into the cloud. Specifically what are the security implications of using each of the three cloud service models
How many coulombs of electrical charge would be required : The pontoons would contain cathodes and would be filled with hydrogen gas formed by the electrolysis of water. It has been estimated that it would require about 7 X 108mol of H2 to provide the buoyancy to lift the ship (J. Chem. Educ., 1973, Vol. ..
An analysis model for the mail order company : An analysis model for the mail order company - UML class diagrams and UML sequence diagrams may be prepared using any of the tools listed on the course Library page or with other drawing tools.
What is meant by the term oxidizing agent : What is meant by the term oxidation? On which side of an oxidation half-reaction do the electrons appear? What is meant by the term oxidant?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd