• Home
    • oop-course-page
  • About
  • Courses
    • 2009/2010
    • 20010/2011 >
      • ai-course-page
      • oop >
        • oopregister
        • resources
        • slides
        • csc423
      • itpolicy
      • ei
    • 2011-2012 >
      • csc232
      • csc334
      • csc746
    • 2012-2013 >
      • ai-12-13
      • tecmanagement
      • Internet Technology
      • kbs
      • itpolicy1213
    • 2013-2014 >
      • CSC748-13-14
      • CSC776-13-14
      • MCS735-13-14
      • CSC101
      • itpolicy1314
      • CSC301
      • tecmanagement
    • 2014-2015 >
      • SysProg-14-15
      • CSC101-14-15
      • CSC748-14-15
    • others >
      • Simulation
      • ai-ug
      • OPL
      • project
  • Blog
  • Contact
  • Register
Yetunde Folajimi Teaching

Introduction

 Introduction to Information Technology Policy
Adapted from wikipedia:
Classic political science teaches technology as a black box. Similarly economics treats technology as a residual to explain otherwise inexplicable growth. The creation of the U.S. Office of Science and Technology Policy addressed the fact that policy can not treat all technologies as identical based on their social or economic variables. Technology policy is distinct from science studies but both claim Thomas Samuel Kuhn as a founder, while technology policy recognizes the importance of Vannevar Bush. Technology policy approaches science as the pursuit of verifiable or falsifiable hypotheses, while science studies has a post-modern view whereby science is belief-based and all truths are relative. Technology policy is rarely post-modern. Its goal is the improvement of policy and organizations based on an understanding of the underlying scientific and technological constraints and potential. For example, some clean coal technologies via carbon sequestration and the allocation of electromagnetic spectrum by auction are ideas that emerged from technology policy school

IT STRATEGY (definition from what.com)
IT strategy is a comprehensive plan that information technology management professionals use to guide their organizations.

An IT strategy should cover all facets of technology management, including cost management, human capital management, hardware and software management, vendor management, risk management and all other considerations in the enterprise IT environment. Executing an IT strategy requires strong IT leadership; the chief information officer (CIO) and chief technology officer (CTO) need to work closely with business, budget and legal departments as well as with other user groups within the organization.

Many organizations choose to formalize their information technology strategy in a written document or balanced scorecard strategy map.  The plan and its documentation should be flexible enough to change in response to new organizational circumstances and business priorities, budgetary constraints, available skill sets and core competencies, new technologies and a growing understanding of user needs and business objectives.

Course Outline

INTRODUCTION
  • Introduction to Technology and IT Policy
  • Production, consumption and organizational technology.
  • characteristic features of the technological condition of the Carribean Region
  • IT Strategy
  • Sections of a technology strategy
  • Framework of IT Policy Analysis
  • building blocks of policies in the digital age
  • building blocks of policies in the digital age: Kondratiev waves

Readings:
1) Measuring the Information Society: http://www.itu.int/en/ITU-D/Statistics/Documents/publications/mis2012/MIS2012_without_Annex_4.pdf 
2) Wired for Innovation: How Information Technology is Reshaping the Economy. The MIT Press: https://s3.amazonaws.com/zanran_storage/ia.ucpel.tche.br/ContentPages/107751226.pdf

DIGITAL DIVIDE: diffusion of ICT 
Readings:
http://en.wikipedia.org/wiki/Digital_divide
http://en.wikipedia.org/wiki/Global_digital_divide
http://en.wikipedia.org/wiki/Diffusion_of_innovations

e-GOVERNMENT: the public sector as digital catalyzer 
Readings:
http://en.wikipedia.org/wiki/E-Government
http://en.wikipedia.org/wiki/Corruption_Perceptions_Indexhttp://en.wikipedia.org/wiki/Open_Government

Download Lecture Slides 1

COMPUTER SECURITY ISSUES AND POLICIES
  • Components of computer security
  • Threats
  • Policies and mechanisms
  • The role of trust
  • Assurance
  • Operational Issues
  • Human Issues
  • The nature of policies
           – What they cover
           – Policy languages
  • The nature of mechanisms
          – Types
          – Secure vs. precise
  • Underlying both
– Trust
Reading materials: 
http://en.wikipedia.org/wiki/Computer_security_policy
Chapter 1 & Chapter 4 of Computer security: art and science by Bishop Matt. Addison-Wesley PublishersAdditional readings: http://ljs.academicdirect.org/A13/007_021.htm
 Download Lecture Slides for IT Security Policy

STRATEGY MAPS
  • The Basic Template of a Strategy Map
  • Harmonizing Your Strategy Map and Your Business Strategy
  • Building the strategy maps     

                    Watch video: http://www.youtube.com/watch?v=XgdUv2CF4-Y
  • Examples of good and bad strategy maps    
                    Watch video:   http://www.youtube.com/watch?v=f2hKxLEllg4
Download lecture note   

ADDITIONAL VIDEO RESOURCES:
Ten Myths of ICT for International Development
United Nations E-Government Readiness Knowledge-Base
TEDxIIT - Dr. Laura Hosman - Technology for Development- No Shortcuts

PAST QUESTIONS
Download C/A quiz 2012/2013