110 likes | 226 Views
CCT 355: Governance in a Global Market Nov. 19, 2007. Administrivia. Yahoo notes and case study up Case study as core text of long answer question - saves on having to read it during the test at least, gives some time for reflection…. Business Governance.
E N D
Administrivia • Yahoo notes and case study up • Case study as core text of long answer question - saves on having to read it during the test at least, gives some time for reflection…
Business Governance • Leadership roles and responsibilities • Emergence of CIO as C-level executive charged with technology support for mission critical tasks, sourcing issues (e.g., Four Big Questions), knowledge management, strategic direction
Global Governance • Outsourcing and alliances with multiple partners worldwide - new and interesting opportunities - and also threats to existing industries • Regional (e.g., NAFTA, EU) and world (GATT, WTO) trade deals changing the roles of national regulation and national economies • “Governance” increasingly not equaling government
Global Sourcing • Insourcing - in-house development • Onshoring - partners in joint projects/efforts • Nearshoring - transfer to regional partners (e.g., N. American auto manufacturing) • Offshoring - transfer to further labour markets
Issues in Outsourcing • Technology standardization • International data sharing (e.g., transmission of credit or travel information to unsecure locations, USA Patriot Act ramifications) • Cultural and language issues • Conforming to varying national regulations (e.g., SOX, Helms-Burton, EU privacy laws, labor/environmental regulation…)
Abundance, Automation and Asia (Dan Pink) • Role of the creative professional in a globalized space • Abundance - in a world where industrialized countries have everything they need, the focus is on want • Automation - increasing automation of all kinds of tasks - including white-collar jobs • Asia - outsourcing to cheaper talented labour markets (e.g., BRIC)
Information Security • Many threats to appropriate information exchange • Secure systems guarantee to the best possible level authentic transactions - failure to do so can be devastating • Security as risk management - excessive security isn’t better.
Process Control • Segregation of duties • Authorization • Security • Identity management • Verification • Control totals (e.g., checks and balances) • Supervisory review
PPT • People, Process, Technology • Most failures in IS deployment involve some conflict among these foundations • Examples?
Next week(s) • Nov. 26 – Final project presentations • Dec. 3 – Final test • Discussion of article analysis - until Friday Dec. 7