Hye , this is the next Chapter 5 is organizational structures that support strategic initiatives.
Organizational employees must work closely together to develop strategic initiatives that create competitive advantages. The ethics and security are two fundamental building blocks that organizations must base their businesses upon. IT-related strategic position. Some organizations had many chief officer but it depends on the number of employees .The larger the number of employees, the larger the number of chief office such as :
Chief Information Officer (CIO)
Chief Technology Officer (CTO)
Chief Security Officer (CSO)
Chief Privacy Officer (CPO)
Chief Knowledge Officer (CKO)
Organizational employees must work closely together to develop strategic initiatives that create competitive advantages. The ethics and security are two fundamental building blocks that organizations must base their businesses upon. IT-related strategic position. Some organizations had many chief officer but it depends on the number of employees .The larger the number of employees, the larger the number of chief office such as :
Chief Information Officer (CIO)
- Responsible for overseeing all information technology use and ensure the strategic alignment of IT with business goals and objectives. Always CIO reports directly to the CEO. CIO also works to ensure the delivery of all IT projects, on time and within budget. Ensure IT strategic vision is in line with the strategic vision of the organization and building and maintaining strong executive relationships.
Chief Technology Officer (CTO)
- CTO as the "Big Thinker" spend time to evaluate how technology can be used internally by the business. CTO's responsibilities often include advanced technology, competitive analysis, technology assessment, laboratory prototypes, cooperation, planning, and architectural standards.
Chief Security Officer (CSO)
- Responsible for safeguarding the IT systems and develop strategies and IT protection from hackers and virus attact. CSOs need to know the details of network and telecommunications as hackers and viruses usually find a way to get into the IT system through computer networked. Only experienced people who only knows how to handle security but these days most people have learned how to hack or steal other information.
Chief Privacy Officer (CPO)
- Establish high uniform level of data protection for all personal data, regardless of origin and location, but leave room for adjustments based on local law or specific customer requirements. Establish a complaint procedure and the right. Respond to and deal with requests from individuals. Respond to and deal with customer demand.
Chief Knowledge Officer (CKO)
- Responsible for collecting, maintaining and distributing scientific organizations. Program and system design methodologies CKO create document repositories, organizations, tools and practices, and methods for filtering information establish. They must continually encourage systems employee contributions to keep up-to-date. It is to ensure that employees get the information on time.
No comments:
Post a Comment