The Adventures of an IT Leader

The story follows the professional life of Jimmy Burton, who takes the place of an IT manager though lacking the technical bit of Information Technology. He thus engages the help of his girlfriend, Landis, who introduces him to philosophies about IT value, the wise kid he meets in a local bar as well as his subordinates and friends who sent him technology articles via email (Austin, Nolan & O’Donnell, 2009). He thus finds out that companies that invest in information technology deployed business processes faster, had increased market share and competition was capable of quickly copying new innovations. 

The time and effort that should be dedicated to scanning for and analyzing emerging technologies would be equated to the cost of analyzing all the available data, for instance sales, customers, identifying trends and change of strategy to outwit competition (Mather, Viswanathan, Miller, & Long, 2006). The effort would entail identifying the emerging topics by portfolio analysis, raising the publications of technology push and demand-based developments in the course of the years visible. Moreover, it would entail identifying the geographical distribution of research activities as well as cooperation networks. It would also involve identification of the threats and opportunities that arise in the information technology field and integration of such technological trends into plans and strategies.

Bernie Ruben had asked questions about taking action on the blog issue at IVK, which included what was to be done about the blog entry, the blogging information on inside information from within the company and the process for spotting emerging technologies and their relevance (Austin et al., 2009). The director of customer support and collection systems felt that they should do nothing about the blog entry. Moreover, the director of loans operations and new application development felt that legal and proprietary information was needed for inside information blogging policy. A restrictive policy on blogging was also seen as a good way for spotting emerging technologies.

The new CIO could restore confidence in the new department he has taken by bettering his communication skills with regard to staff from other departments. For instance, he could better the part he had problem communicating with the security personnel because of the technical nature of such a department, which he has little knowledge about. Moreover, there would be need to for the new CIO to find innovative ways of maintaining the company’s integrity with regard to the blogging policy. This therefore would make his department gain repute and restore confidence in thoroughness and dependability.

In answering the questions, Barton should realize that completed staff work is applicable in the information technology field since the functions are intertwined and integrated in a way that requires the employees to possess information in more than one field (Austin et al., 2009). However, Williams might overlook some of Barton’s advice on the information technology issues which may lead to the success or detriment of the organization thus Barton should use every means possible to ensure that decisions are implemented even if it means breaching hierarchy.

The acknowledgement that Barton can fix the issues stemming from the Information Technology department is affirmed by his experience in handling the corporate blunders and dilemmas as he had done in his tenure at the loans operations department. It would therefore be prudent that his experience in solving problems would assist in ending crises in the department in addition to abundant expertise he is surrounded with in terms of employees who could come in handy to solve any serious problems. 

Moreover, the emerging technologies have led to ease of performance of office tasks. Further, such technologies would have improved communication within the organization. This could entail installation of intranet network to fasten and broaden the network across all the departments and branches in the IVK organization. Further, establishing the online incidence at the company website as well as online advertising would increase the customer traffic greatly. Additionally, establishing a customer relationship management system would also alter the way clients are handled within the organization.

Other emerging technologies that may increase security when internet is being used in the organization includes Web 2.0 technologies, for instance Ajax and JavaScript. However, they should be used in a way that ensures a balance between functionality and security since despite having security measures, they may expose the network, the system and the user to security loopholes. The Web 2.0 technologies ensures great traffic once sharing of data and information and interlinking various platforms becomes possible since the technology is good for establishing networks. Moreover, Barton should put an emphasis on spotting and averting frauds, identity theft as well as other forms of security issues in the organization’s business transactions.

The company should sue any incident of security breach that may result in the organization. This may entail shareholder lawsuits, customer lawsuits and government penalties. The hackers could have been stealing the company information thereby contributing to the website being down most of the time.  Carl had proposed to Barton that he should strive to understand the legal ramifications thereby shutting down every computer until they ascertain what was going on in the organization (Austin et al., 2009). The organization would sue upon a breach of the legal infrastructure in case another organization or individual fails to adhere to law reform principles, for instance technology neutrality, market liberalization and regulatory structures. Moreover, legal certainty would also form a basis for suing with regard to the legal status of electronic communications and contracting as means of conducting legal activities.

The company has good infrastructure policy though sometimes a vendor could lead to an adoption of non-standard software and equipment. Standards in the organization seem to enable for a more effective product as well as process development. This is possible through innovation, which transforms good ideas to achieve their business value. Innovations that the business could choose include, soft innovations, for instance culture innovation and communication innovation in addition to hard innovations, for instance model, service, product and business innovations (Steiniger & Hunter, 2012). Moreover, the organization could benefit by adopting standardization of internal reasoning and increasing its flexibility to increase the volume of profits through flexibility and innovation.

Standardization and innovation may be adopted through new products and the existing products, whereby standardization would assist in attaining gains at low cost while innovation would ensure customer perception value (Steiniger & Hunter, 2012). Moreover, the toolkit approach to management would ensure that Barton mitigates any risks arising in the department that could affect the operations of the organization as well as the operational profits. 

This toolkit would ensure that business development in the organization is sustained by protecting the existing value and mitigating any chances of errors due to poor decision making. It would also help in supporting effective evaluation of important decisions through clarification of risks thereby minimizing any chances of inconsequential decisions (Roberts & Grover, 2012). It would also allow for seamless integration of all the systems within the organization and managing the future customizations in-house to meet information technology and business requirements in addition to scaling up operations to support forecasted growth across the organizational services and segments.

Leave a Reply