IT Policy and Strategy
About the course
The course provides participants with knowledge and skills that will help them understand the concepts of managing technological change within for profit and not-for-profit types of organizations.
The course examines how information technology makes possible new business models, new organizational structures, and new management processes. During the course, students learn different approaches and current practices in dealing with the organizational and human aspects of effective technology transition initiatives. Topics covered include information technology in today's businesses, managing technology, managing people, managing IS organizations, and managing organizational transformation. Discussion of current situations faced by Nigerian organizations and extended case studies from international perspectives are major emphases of this course.
Lecture time:
Thursdays 10:00–12.00 pm in PG hall, Dept of Computer Science
Objectives
Upon completion of this course, students should be able:
1. To describe how to use information technology for rethinking and redesigning business processes and organizations
2. To describe the role of information technology in organizations
3. To analyze the role of individuals and groups in organizations and how they impact the use of technology
4. To evaluate problems in the planning and implementation of organizational change
5. To assess the relationship of process redesigning to other initiatives to improve the performance of organizations
6. To design a process-centered organization and analyze when and where outsourcing is appropriate
Course Project
students ares expected to submit a project at the end of this semester. Project requires both group and individual efforts to analyze problems and/or opportunities in a real organization and proposes changes enabling by appropriate applications of information technology. The case study will be evaluated based on the criteria outlined by the Lecturer. The case study will be graded based on not only the quality of the final product but also the effort that you spent throughout the process, including the oral defense
Course outline
1. Managing in the Future Enterprise
2. Managing Technology
3. Managing People
4. Managing IS Organizations
5. Managing Organizational Transformation
Introduction
http://layoftheland.net/archive/web/mis-575/course_docs/topic_1/M1.T1.ppt
http://layoftheland.net/archive/web/mis-575/course_docs/topic_2/T2.Overview.ppt
IT and Business Strategy
IT and organizational change
The course provides participants with knowledge and skills that will help them understand the concepts of managing technological change within for profit and not-for-profit types of organizations.
The course examines how information technology makes possible new business models, new organizational structures, and new management processes. During the course, students learn different approaches and current practices in dealing with the organizational and human aspects of effective technology transition initiatives. Topics covered include information technology in today's businesses, managing technology, managing people, managing IS organizations, and managing organizational transformation. Discussion of current situations faced by Nigerian organizations and extended case studies from international perspectives are major emphases of this course.
Lecture time:
Thursdays 10:00–12.00 pm in PG hall, Dept of Computer Science
Objectives
Upon completion of this course, students should be able:
1. To describe how to use information technology for rethinking and redesigning business processes and organizations
2. To describe the role of information technology in organizations
3. To analyze the role of individuals and groups in organizations and how they impact the use of technology
4. To evaluate problems in the planning and implementation of organizational change
5. To assess the relationship of process redesigning to other initiatives to improve the performance of organizations
6. To design a process-centered organization and analyze when and where outsourcing is appropriate
Course Project
students ares expected to submit a project at the end of this semester. Project requires both group and individual efforts to analyze problems and/or opportunities in a real organization and proposes changes enabling by appropriate applications of information technology. The case study will be evaluated based on the criteria outlined by the Lecturer. The case study will be graded based on not only the quality of the final product but also the effort that you spent throughout the process, including the oral defense
Course outline
1. Managing in the Future Enterprise
- IT and Organizations
- Alternative Workplace
2. Managing Technology
- IT Role in Organization Change
- Align IT and Business Strategy
3. Managing People
- Managing Individuals
- Managing Groups
4. Managing IS Organizations
- Translate Strategic IT Objectives to a Plan
- Infrastructure Planning
- Managing the Process of Organizational Behavior
5. Managing Organizational Transformation
- Change Management and Process-centered Organizations
- Outsourcing and Innovation
- DIGITAL DIVIDE: diffusion of ICT
- Readings:
http://en.wikipedia.org/wiki/Digital_divide
http://en.wikipedia.org/wiki/Global_digital_divide
http://en.wikipedia.org/wiki/Diffusion_of_innovations
e-GOVERNMENT: the public sector as digital catalyzer
Readings:
http://en.wikipedia.org/wiki/E-Government
http://en.wikipedia.org/wiki/Corruption_Perceptions_Indexhttp://en.wikipedia.org/wiki/Open_Government
COMPUTER SECURITY ISSUES AND POLICIES- Components of computer security
- Threats
- Policies and mechanisms
- The role of trust
- Assurance
- Operational Issues
- Human Issues
- The nature of policies
– Policy languages- The nature of mechanisms
– Secure vs. precise- Underlying both
Reading materials:
http://en.wikipedia.org/wiki/Computer_security_policy
Chapter 1 & Chapter 4 of Computer security: art and science by Bishop Matt. Addison-Wesley PublishersAdditional readings: http://ljs.academicdirect.org/A13/007_021.htm
Download Lecture Slides for IT Security Policy - Components of computer security
- STRATEGY MAPS
- The Basic Template of a Strategy Map
- Harmonizing Your Strategy Map and Your Business Strategy
- Building the strategy maps
Watch video: http://www.youtube.com/watch?v=XgdUv2CF4-Y- Examples of good and bad strategy maps
Download lecture note
Case studies:- IT Security Policy and Cybercrime regulations
- National it policies in developing countries
- Ethics and social issues in IT
- Developing ICT policies in University Libraries
- Emerging ICT framework in Nigeria
- ICT Policy, strategies and mobile etiquette in Nigeria schools
- Higher Educational Institutions and Institutional Information and Communication Technology (ICT) Policy
ADDITIONAL VIDEO RESOURCES:
Ten Myths of ICT for International Development
United Nations E-Government Readiness Knowledge-Base
TEDxIIT - Dr. Laura Hosman - Technology for Development- No Shortcuts
PAST QUESTIONS
Download C/A quiz 2012/2013 - The Basic Template of a Strategy Map
- Case Studies (End of course Project)
Introduction
http://layoftheland.net/archive/web/mis-575/course_docs/topic_1/M1.T1.ppt
http://layoftheland.net/archive/web/mis-575/course_docs/topic_2/T2.Overview.ppt
IT and Business Strategy
IT and organizational change