This week we focus on the concept of the balanced scorecard.? Pl
This week we focus on the concept of the balanced scorecard. Please note what it is and how organizations use balanced scorecards. Note any alternative methods organizations use instead of the balanced scorecard and why they would use these methods over the balanced scorecard.Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion. Please engage early and often.Your response should be 250-300 words. Respond to two postings provided by your classmates.
This is a required assignment worth 15 points (15-points/1000-points). Assignment must be submitted by the due date. No late assignments are allowed. Please discuss the following topics and provide substantive comments to at least two other posts. Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer. The discussion questions this week are from Chapter 7 (Jamsa, 2013).Chapter 7 topics:
- Define collaboration.
- Define and describe cloud-based collaboration.
- The CIO of Ace Accounting Services suggests that the company can save considerable money using VoIP for phone calls. Define and describe VoIP. Then present three companies that provide VoIP offerings. Compare and contrast each company’s offering. Also, discuss whether or not you agree with the CIO and justify why.
- List the questions one should consider when evaluating a cloud-based collaborative solution.
- Week 6 AssignmentInformation Systems for Business and Beyond Questions:
- Chapter 6 – study questions 1-10, Exercise 3, 6, & 7
- Information Technology and Organizational Learning Assignment:
- Chapter 6 – Review the section on knowledge creation, culture, and strategy. Explain how balance scorecards impact knowledge creation, culture, and strategy. Why are these important concepts to understand within an organization?
- The above submission should be one -page in length and adhere to APA formatting standards.**Remember the APA cover page and the references (if required) do not count towards the page length**Note the first assignment should be in one section and the second section should have the information from the Information Technology and Organizational Learning assignment. The paper requirements for the two-pages applies to the second part of the assignment directly related to the Information Technology and Organizational Learning assignment.
Study Questions 1. Briefly define each of the three members of the information security triad. 2. What does the term authentication mean? 3. What is multi-factor authentication? 4. What is role-based access control? 5. What is the purpose of encryption? 6. What are two good examples of a complex password? 7. What is pretexting? 8. What are the components of a good backup plan? 9. What is a firewall? 10. What does the term physical security mean?
Exercises
1. Find favorable and unfavorable articles about both blockchain and bitcoin. Report your findings, then state your own opinion about these technologies
2. Find the information security policy at your place of employment or study. Is it a good policy? Does it meet the standards outlined in the chapter?
3. How diligent are you in keeping your own information secure? Review the steps listed in the chapter and comment on your security status.
School of Computer & Information Sciences ITS-631 Operational Excellence Chapter 6 – Information Systems for Business and Beyond (2019)
Learning Objectives
identify the information security triad;
identify and understand the high-level concepts surrounding information security tools; and
secure yourself digitally.
Information Security Triad and Tools for Information Security
Information Security Triad:
Confidentiality
Integrity
Availability
Tools for Information Security
Authentication
Access Control
Read: Sidebar Password security
Encryption
Blockchain and Bitcoin
Speed of adoption
Governance
Smart Contracts
Bitcoin
Payment system that uses cryptocurrency
Backups
Full understanding of the organization's information resources
Regular backups of all data
Offsite storage of backup data sets
Test of data restoration
UPS (uninterruptible Power Supply)
Alternate or “hot” sites
Firewalls and Intrusion Detection Systems
Used to increase security on an organizational network
Intrusion Detection Systems
Placed on the network to determine if a network is being attacked.
Physical Security and Policies
Physical Security
Locked doors
Physical intrusion detection
Secured equipment
Environment monitoring
Employee training
Security policies
Administrative control
Usability and Personal Information Security
Usability
Balance the need for security and being able to access and use the resources
Personal Information Security
Keep software up to date
Install antivirus software and keep up to date
Be smart about your connections
Backup data
Secure accounts with two-factor authentication
Password management
Be suspicious of strange links and attachments
References
Bourgeous, D., Smith, J., Wang. S., Mortati, J. (2019). Information Systems for Business and Beyond. Retrieved from https://opentextbook.site/informationsystems2019/.
image1.emf
image2.emf
image6.png
image7.png
image8.png
image9.png
,
School of Computer & Information Sciences ITS-631- Operational Excellence Chapter 6 – Information Technology and Organizational Learning
Introduction
Examine the nature of organizational transformation, how it occurs, and how it can be measured
Three possible dimensions
Changes in goals
Changes in boundaries
Changes in activities
Organizational transformation is significant for three reasons:
Orgs that cannot change will be at risk from competition
If the org cannot evolve, it will persist in its norms and will not be able to change
If the community is forced to change, it will be unable to successfully transform and will need to be replaced.
Three Dimensions of Organizational Transformation
Goals
Two types:
Change in the market or target population
Overall goal of the organization itself changes
Boundaries
Activity systems
Driver to supporter life cycle
Aldrich’s Evolutionary Process
Figure 6.2 Aldrich’s Evolutionary Process and its relationship to ROD
Methods of Ongoing Evaluation
Organizational transformation = the retention of knowledge within the body of communities of practice.
Cultural assimilation does not occur immediately, but over periods of transition.
Use a balanced scorecard to transition emerging technologies.
Balanced Scorecard and Technology and ROD
Figure 6.5- utilizes the core balanced scorecard with technology and ROD
Balanced Scorecards and Discourse
Target Areas to integrate language and discourse and communities or practice theory with the balanced scorecard strategy:
Developing of strategy maps
Validating links across balanced scorecard perspectives
Setting Milestones
Analyzing Results
Evaluating Organizational Transformation
Knowledge Creation, Culture, and Strategy
Knowledge creation (especially in technology) has meaning in the relationship between data and information
New information does not ensure new knowledge creation
Knowledge linked to organizational transformation allows for the knowledge to be institutionalized
This process must be linked to business strategy.
The ultimate goal is to accelerate the investment in technology during the reallocation of the company for reasons of economies of scale and competitive advantage.
References
Langer, A. M. (2018). Information Technology and Organizational Learning. 3rd edition. Taylor & Francis Group, LLC. ISBN: 978-1-138-23858-9
image1.emf
image2.emf
image6.png
image7.png
image8.png
image9.png
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.