You are on page 1of 2

1.

STRATEGIC MANAGEMENT OF INFORMATION TECHNOLOGY

Objectives: This course is aimed at developing an understanding of use of Information


technology as Strtegic Tool for business management. The course focuses on development of
Information technology leadership. Also to enable the participants understand the process of
formulating and implementing IT strategies in organizations.

Course Contents:

Module-I: Introduction to IT applications – transaction processing – IS for managerial


decisions-Sustaining competitive Advantage by use of IT-Key isses in information systems
managementand the role of the CIO; Learning Organizations and Role of Information technology
in Business Transformation.

Module-II: Planning for critical success factors –It Planning frame works –Analytical
framework for strategic IT initiatives; Frame work focusingon stages of growth – value chair
analysis-Porter’s five forces model management planning and control needs, creativity.

Module-III: IT implementation – gap analysis –implementation framework – implementation


strategies – BPR managing change-post implementation issues –Framework for appraising IT
implementation – evaluation of Inter organizational systems-project planning with IT-application
with emerging technologies – IT outsourcing strategies, Information partnerships, value added
partnerships.

Module-IV: Introduction to security; Need for security and control, Risks to Information system
data and resources, Definitions of Information security; computer crimes and virus, Internal
control types of security; Physical security threats to security, physical access, Fire and theft
protection Environment hazards; Logical security; Threats to security, access control –
identification, Authentication, AuthorizationPassword control and managementAcess control
software; Data security: Threats to security, Acees controls, Back upand recovery strategies.
Data input/Output control Data encryption; Tele-communication Security physcal Security,
Logical Access Security, Dial- in access security, network management control, Authentication
protocals, internet/ intranet/extranet security; Computer configuration and Operation security
Hardware/software security, Start up/ Shutdown procedures, journals, Back up recovery
strategies; personal security; Threats security, protection from people, Protection of employees;
Security planning; Risk and security policy, Security management, Business continuity
planning, security audit.

Module-V: Group decision organization communication and group work support – impact of IT
on organizations and support – managing in the Market space; national Information
Infrastructure and IT policy at the national Level; Planing for Strategic IT Resource; Managing
the IT function – IT enabled restructuring – Virtual organization, IT innovation and Knowledge
management.
Suggested Readings:

1. Galliers R D Strategic Information Management Challenges and Strategies Information


System, Oxford, Butterworth Heinemann, 1994.
2. McKemmey James: Waves of Change: Business Evolution through Information Technology
Boston, HBS Press 1995
3. Neuman, Seev Strategic Information Systems: Competition through Information
Technologies New York Mac Millan College, 1994
4. Nolan Richard L Creative Destructior: A six stage process for transforming the organization
Boston, HBS Press 1995
5. Parker, Marilyn m Strategic transformation and Information Technology , paradigms for
performing while transforming Englewood Cliffs, New Jersey, Prenetice Hall Inc. 1996
6. Somogyi, E K and Wallers, Robert, Towards Strategic Information systems, Tunbridge, Kent
Publishing 1987
7. Ward, John Strategic planning for Information systems Chichester, John Wiley, 1996

You might also like