IT Governance at University of the Southeast

Assignment Help Basic Computer Science
Reference no: EM132398046

Case Study 9-1 IT Governance at University of the Southeast.

Describe the IT governance system that was in place at the University of the Southeast using both decision rights and structure as the basis of governance.

Case Study

University of the Southeast 25 was (and still is) one of the largest universities in the United States. It had been growing rap-idly; that growth was spurred, in part, by information technology. The university embraced lecture capture technologies that allowed lectures to be streamed to students in a classroom, in dorm rooms, on the grass near the main campus central foun-tain, and at a variety of other places of the students' choosing whenever they chose to watch. This made it possible to have sections of classes with over 1,000 students without having to build physical classrooms with enough seats to accommodate each person enrolled. It also made it possible to offer classes that were streamed to students at remote campuses. Each stu-dent was charged a technology fee (i.e., $5.16 for undergraduates and $13.85 for graduates per credit hour each semester), which was administered by the Information Technologies and Resources (IT&R) Office to help fund the costs of providing IT to students and faculty

IT&R was responsible for providing computer services, technologies, and telecommunications across the campus (Computer Services and Technology), helping faculty with their instructional delivery and multimedia support (Office of Instructional Resources), helping faculty develop and deliver Web-based and lecture capture courses (Center for Distributed Learning), and the library. The IT&R Office developed IT-related policies with very little input from the faculty and was responsible for deciding and implementing decisions concerning IT architecture and infrastructure. IT&R worked with the university president and other top administrators in making IT investment decisions. IT&R staff also worked with the vari-ous colleges, administrative offices, and an advisory board in making decisions about applications that needed to be devel-oped. However, faculty were not consulted at all when the lecture capture system was selected. As was often the case at large universities, many decision rights on a wide range of issues had been allocated to the colleges. The College of Business Administration had its own server and Technology Support Department (TSD). A recent survey of faculty and staff in the college indicated a high level of satisfaction with the TSD but far less satisfaction with the services provided by the university-level IT&R. Some college respondents indicated their displeasure about IT&R' s support of the technology for the lecture capture courses, help desk, and classroom technologies. The problems with the technology support for lecture capture software were particularly troublesome. The software would not authenticate students who had paid to enroll in some lecture capture courses, making it impossible for them to download the lectures even though they were registered in the course. Further, some university-affiliated housing did not have adequate network bandwidth to allow students to download the lectures. When problems occurred-which they did on a daily basis-the IT&R help desk often referred the students to instructors who could not resolve their problems. One fac-ulty member who was teaching a lecture class with 1,400 students exclaimed, "It is utter chaos for me when something goes wrong with the system and hundreds of my students are trying to call, see or email me in panic to get me to fix something that I can' t fix." To fix some of these issues, the CIO argued that all e-mail accounts should be placed on one central server. This would allow the IT&R greater control and make maintenance easier and more efficient. It also would considerably improve se-curity. But it was not ideal for the faculty. A faculty meeting about e-mail revealed some concerns with this move. First, faculty wanted e-mails sent to the central university server to be forwarded to their accounts on their other university-based servers (i.e., the college, department, or institute servers) but found that this was impossible to do so. Second, faculty wanted to retain their control over archiving e-mails. Third, faculty wanted to have control over their preferred e-mail address. In some cases, the faculty e-mail addresses that they had used for a decade had been changed in the printed university directory to the e-mail address on the central university server without their knowledge. This meant that faculty did not receive (or even know about) messages sent to them via the address on the university server. They could not change the printed e-mail address in the university directory to the address on the college server that they had been using or forward the mail sent to the central server to a different account. The IT&R spokesman said that having a centralized server for e-mail accounts was more secure, reliable and efficient. He said that faculty shouldn' t have control over their preferred e-mail address, even if it were on a campus server, because of the identity management problems that it would create. A frustrated faculty member at the meeting asked the IT&R spokes-man to describe one time when issues about ease of use and functionality of the system by the user were weighted more than security in decisions about e-mail. The IT&R spokesman could not think of an example.

Reference no: EM132398046

Questions Cloud

Develop ideas for improving influence in such circumstances : Identify the pros and cons of such an approach and develop ideas for improving your influence in such circumstances.
What is corporate social responsibility : What is Corporate Social Responsibility (CSR)? What is the value of corporate social responsibility (CSR)?
Define serious issues that administrator of facility present : Review the Case Study: A Love Triangle, located on page 472 of your text. Next, determine the two (2) most serious issues that the administrator.
Evaluate the ethical-moral aspects of your organization : Evaluate the ethical/moral aspects of your organization that protected it from ethical challenges in the past and could protect it in the future.
IT Governance at University of the Southeast : Describe the IT governance system that was in place at the University of the Southeast using both decision rights and structure as the basis of governance.
Contrast hsbc and multinational banks in global business : How do you evaluate HSBC's global reorganization after the 2008 global financial crisis, its position in 2015, and its current position?
What is competitive advantages : What is competitive advantages? What are the strengths and weaknesses of of Caterpillar Inc's competitive advantages?
Why is it important to check data sources for reliability : Why is it important to check data sources for reliability, currency, accuracy, authority, relevance and likelihood of bias?
Summarize all the data visualization techniques : Summarize all the data visualization techniques (and its applications) in R. Please use the textbook and other resources.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd