This week we focus on the concept of the balanced scorecard. Please note what it is and how organizations use balanced scorecards. Note any alternative methods organizations use instead of the balanced scorecard and why they would use these methods over the balanced scorecard.Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion. Please engage early and often.Your response should be 250-300 words. Respond to two postings provided by your classmates.
This is a required assignment worth 15 points (15-points/1000-points). Assignment must be submitted by the due date. No late assignments are allowed. Please discuss the following topics and provide substantive comments to at least two other posts. Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer. The discussion questions this week are from Chapter 7 (Jamsa, 2013).Chapter 7 topics:
- Define collaboration.
- Define and describe cloud-based collaboration.
- The CIO of Ace Accounting Services suggests that the company can save considerable money using VoIP for phone calls. Define and describe VoIP. Then present three companies that provide VoIP offerings. Compare and contrast each company’s offering. Also, discuss whether or not you agree with the CIO and justify why.
- List the questions one should consider when evaluating a cloud-based collaborative solution.
- Week 6 AssignmentInformation Systems for Business and Beyond Questions:
- Chapter 6 – study questions 1-10, Exercise 3, 6, & 7
- Information Technology and Organizational Learning Assignment:
- Chapter 6 – Review the section on knowledge creation, culture, and strategy. Explain how balance scorecards impact knowledge creation, culture, and strategy. Why are these important concepts to understand within an organization?
- The above submission should be one -page in length and adhere to APA formatting standards.**Remember the APA cover page and the references (if required) do not count towards the page length**Note the first assignment should be in one section and the second section should have the information from the Information Technology and Organizational Learning assignment. The paper requirements for the two-pages applies to the second part of the assignment directly related to the Information Technology and Organizational Learning assignment.
Study Questions 1. Briefly define each of the three members of the information security triad. 2. What does the term authentication mean? 3. What is multi-factor authentication? 4. What is role-based access control? 5. What is the purpose of encryption? 6. What are two good examples of a complex password? 7. What is pretexting? 8. What are the components of a good backup plan? 9. What is a firewall? 10. What does the term physical security mean?
1. Find favorable and unfavorable articles about both blockchain and bitcoin. Report your findings, then state your own opinion about these technologies
2. Find the information security policy at your place of employment or study. Is it a good policy? Does it meet the standards outlined in the chapter?
3. How diligent are you in keeping your own information secure? Review the steps listed in the chapter and comment on your security status.
School of Computer & Information Sciences ITS-631 Operational Excellence Chapter 6 – Information Systems for Business and Beyond (2019)
identify the information security triad;
identify and understand the high-level concepts surrounding information security tools; and
secure yourself digitally.
Information Security Triad and Tools for Information Security
Information Security Triad:
Tools for Information Security
Read: Sidebar Password security
Blockchain and Bitcoin
Speed of adoption
Payment system that uses cryptocurrency
Full understanding of the organization’s information resources
Regular backups of all data
Offsite storage of backup data sets
Test of data restoration
UPS (uninterruptible Power Supply)
Alternate or “hot” sites
Firewalls and Intrusion Detection Systems
Used to increase security on an organizational network
Intrusion Detection Systems
Placed on the network to determine if a network is being attacked.
Physical Security and Policies
Physical intrusion detection
Usability and Personal Information Security
Balance the need for security and being able to access and use the resources
Personal Information Security
Keep software up to date
Install antivirus software and keep up to date
Be smart about your connections
Secure accounts with two-factor authentication
Be suspicious of strange links and attachments
Bourgeous, D., Smith, J., Wang. S., Mortati, J. (2019). Information Systems for Business and Beyond. Retrieved from https://opentextbook.site/informationsystems2019/.
School of Computer & Information Sciences ITS-631- Operational Excellence Chapter 6 – Information Technology and Organizational Learning
Examine the nature of organizational transformation, how it occurs, and how it can be measured
Three possible dimensions
Changes in goals
Changes in boundaries
Changes in activities
Organizational transformation is significant for three reasons:
Orgs that cannot change will be at risk from competition
If the org cannot evolve, it will persist in its norms and will not be able to change
If the community is forced to change, it will be unable to successfully transform and will need to be replaced.
Three Dimensions of Organizational Transformation
Change in the market or target population
Overall goal of the organization itself changes
Driver to supporter life cycle
Aldrich’s Evolutionary Process
Figure 6.2 Aldrich’s Evolutionary Process and its relationship to ROD
Methods of Ongoing Evaluation
Organizational transformation = the retention of knowledge within the body of communities of practice.
Cultural assimilation does not occur immediately, but over periods of transition.
Use a balanced scorecard to transition emerging technologies.
Balanced Scorecard and Technology and ROD
Figure 6.5- utilizes the core balanced scorecard with technology and ROD
Balanced Scorecards and Discourse
Target Areas to integrate language and discourse and communities or practice theory with the balanced scorecard strategy:
Developing of strategy maps
Validating links across balanced scorecard perspectives
Evaluating Organizational Transformation
Knowledge Creation, Culture, and Strategy
Knowledge creation (especially in technology) has meaning in the relationship between data and information
New information does not ensure new knowledge creation
Knowledge linked to organizational transformation allows for the knowledge to be institutionalized
This process must be linked to business strategy.
The ultimate goal is to accelerate the investment in technology during the reallocation of the company for reasons of economies of scale and competitive advantage.
Langer, A. M. (2018). Information Technology and Organizational Learning. 3rd edition. Taylor & Francis Group, LLC. ISBN: 978-1-138-23858-9