Mood's In Control


Saturday, July 18, 2009
Green Campus Computing

Arrow 1. http://www.grist.org/article/rebooting-campus-computing/

This article talks about the UC(University of California) system greens electronics program. According to this article, the UC system got a little greener by passing an “Environmental Sustainability Policy” that includes provisions on energy, global warming, waste, and eco-friendly electronics purchasing.

Same with this school, our university can adopt their practices by following what they are adopting too. Some of these practices are the following:
• adopting guidelines for buying greener electronics
• finding better ways to dispose of e-waste
• initiating “takeback” recycling

Their school system will only buy products registered under the Electronic Product Environmental Assessment Tool, which computer equipment according to a set of environmental standards such as reduction in harmful chemicals, designs that are more easily recycled, and product longevity. I don’t know if we have this in our country but I guess we have our equivalent value for this. They also have integrated a "takeback" requirement in their purchasing contracts that will force electronic manufacturers to take care of used products, and they have also created criteria for responsible recycling for those vendors. This criteria includes a ban on both exporting the e-waste to developing nations and using prison labor in there country.


Arrow 2. http://www.isc.uoguelph.ca/documents/061211GreenComputingFinalReport2006_000.pdf

This url is about Campus Computing and the Environment which is a Report of the Green Computing Task Group to the Information Services Committee(ISC) that identifies green computing policies and best practices elsewhere and benchmark the University of Guelph against these practices, recommends a campus awareness program, identifies energy conservation strategies and practices, examines the need for and nature of computing procurement guidelines, and identifies equipment disposal procedures.

The University of Guelph should take pride in its advanced E-Waste Disposal program and the high level of participation on campus. The well crafted Policy on Environmental Protection could be strengthened and enhanced by the further development of sustainability policies and possibly the establishment of a monitoring board. However, the top priorities identified by the task force involve education, assessment, and collaboration in the establishment of environmental awareness and practice on campus with regards to “green computing” throughout the entire lifecycle of the products.

Top Priorities:

Campus Awareness Program
1) Conduct a survey of the different target audiences on campus to:
a) Gauge awareness of and participation in current energy reduction practices and e-waste management practices.
b) Identify barriers to participation in the above practices.
2) Develop campaign based on social marketing theory, moving beyond information provision to motivation and persuasion techniques, identifying effective shortterm incentives and longterm behaviour modification strategies.
a) Develop a media strategy in conjunction with IT and Communications & Public Affairs (to be developed by Sustainability Coordinator).
b) Ensure campaign informs campus IT professionals of the support and services available through the Sustainability Coordinator and Purchasing in implementation of green computing solutions.
3) Measure and evaluate the success of the awareness program and the adoption of conservation or procurement practices by developing indicators and publicize the results.


Energy Conservation Strategies and Practices
1) Survey current power management policies and practices across campus.
2) Develop a plan, with IT personnel, to reduce the energy consumption of computers across campus.
3) Identify standard practices for implementing an energy reduction plan.
4) Coordinate participation of IT in an energy reduction plan with campus environmental policies and campus awareness programs.
5) Work with Physical Resources on the development of an energy consumption measurement program and energy indicators that break down energy consumption in a way that is easily communicable and relevant to the campus.


Computer Procurement
1) Establish standards and benchmarks with which to define a green purchasing policy for computers.
2) Define Purchasing policy complete with purpose, scope and procedures.
a) Developing a green procurement directive.
b) Construct terms and conditions for future tenders and contracts.
c) Incorporate labeling programs into a university green computing procurement initiative. Adopt standards issued by ecological standards associations and
identify their labeling programs, i.e., Energy Star, EnerGuide, Green Seal, etc.
d) Communicate procurement information resources within the University community via Purchasing Service’s website and provide resource links as
appropriate. Incorporate training and education of new environmental criteria and processes into existing client training program.
3) Report / update purchase activity in support of green initiatives, including progress to
date to Sustainability Coordinator for incorporation into campus awareness program.



Arrow 3. http://www.it.utah.edu/leadership/green/index.html - Green Computing at the U of U.

This site is the University of Utah’s overview about Green Computing. This discusses some techniques and best practices for End Users of Green computing that are easy to incorporate.

With a number of desktop computers in use at the University, there is a great amount of power used and a great amount of both paper and electronic waste produced. Some simple solutions can help to reduce the impact of these deployments.


Paper Waste
• Print as little as possible. Review and modify documents on the screen and use print preview. Minimize the number of hard copies and paper drafts you make. Instead of printing, save information to disks, or USB memory sticks.
• Recycle waste paper, have a recycle bin at each community printer and copier location.
• Buy and use recycled paper in your printers and copiers. From an environmental point of view, the best recycled paper is 100 percent post-consumer recycled content.
• Save e-mail whenever possible and avoid needless printing of e-mail messages.
• Use e-mail instead of faxes or send faxes directly from your computer to eliminate the need for a hard copy. When you must fax using hard copies, save paper using a "sticky" fax address note and not a cover sheet.
• On larger documents, use smaller font sizes (consistent with readability) to save paper.
• If your printer prints a test page whenever it is turned on, disable this unnecessary feature.
• Before recycling paper, which has print on only one side, set it aside for use as scrap paper or for printing drafts.
• When documents are printed or copied, use double-sided printing and copying. If possible, use the multiple pages per sheet option on printer properties.
• When general information-type documents must be shared within an office, try circulating them instead of making an individual copy for each person. Even better, make the document electronically available to the audience and display it on a projector.


Electronic Waste
• Use the campus network where possible to transfer files. This avoids the need to write CDs or DVDs or use floppy diskettes.
• Use USB memory sticks instead of CDs, DVDs, or floppies.
• Use re-writable CDs and DVDs.
• There are hopes of the University Recycling program addressing e-waste in the near future


For
Power Management, by using power wisely and enabling the power management features in your computer's operating system, you can save energy while ensuring that it's available to you when you need it.
Please consider the following:
• Turn off your computer and/or peripherals when they are not in use. Turning on and off will not harm the equipment. If you use a desktop printer, consider leaving it off when not in use.
• Don't run computers continuously unless they are in use continuously.
• Turn your computer off or set it to hibernate at night and on weekends.
• Disable screen savers on LCD monitors/displays - these are no longer necessary and use a lot of energy.
• Look for ways to reduce the amount of time your computer is using energy without adversely affecting your productivity. Follow the simple steps below to turn on computer and monitor/display power management features for Windows and Mac operating systems.

Energy Saving Settings
Energy saving modes can go by many different names, including Stand By (Microsoft Windows 95-XP), Sleep (Mac OS-X)/ (Windows Vista), and Suspend (Linux). When placed in this energy saving mode, aside from the RAM which is required to restore the machine's state, the computer attempts to cut power to all unneeded parts of the machine. Because of the large power savings, most laptops automatically enter this mode when the computer is running on batteries and the lid is closed.


Idea Please make use of these best practices in order to develop a practice that best fits your individual needs. These suggestions are intended for users who manage their own computer.cheers

Posted by ♪_TARIZTA_♪ at 4:30 AM | 0 comments
My thoughts in the coming automated election is a probability of automated election fraud. In our current situation, automated election fraud like manual election fraud can be divided into two parts:

1. Retail cheating in the counting and preparation of precinct election returns.
2. Wholesale fraud in the transmission and canvassing at the municipal, district, city and provincial levels.

In my observation, fraud does not happen at the national level since there are fewer numbers to transmit and canvass, and there are many eyes focused on the process.

I will start discussing on how fraud can be done on the OMR (Optical Mark Reading) counting machines. Then we will discuss how fraud can take place in transmission and canvassing.

The Comelec claims that we finally have clean and honest elections because the 2010 elections will be fully automated.

The old cheaters who are computer illiterate and not in Comelec or with the automated system vendor may indeed find that their old tricks will no longer work.

Misreading and manual tampering of ERs (Election Returns) and COCs (Certificate of Canvass) will no longer be possible.

Now, the beauty of the old system of writing names of candidates voted for, public reading of votes in front of watchers and citizens, tallying and manual preparation of election returns was that it was visible (transparent).

At times there could have been fraud. But it was visible. Maybe sometimes due to guns and goons, people would just keep quiet.

In the new OMR system, voters will feed the ballot into the machine the next thing they will see is the printed election return. Whether their votes were properly counted they will not know.

Transparency at the precinct level is gone. Fraud can take place and the voters and watchers at the precinct will not know if fraud has taken place.

Even if the Comelec claims that the AES (automated election system) cannot be hacked and that the source code will be open for inspection, they do not make automated elections safe from fraud.

The Random House Encyclopedia defines hacking as unauthorized access to a computer, either for fun or for malicious or fraudulent purposes.
Hackers generally use microcomputers and telephone lines to obtain access.

In computing, the term is used in a wider sense to mean using software for enjoyment or self-education, not necessarily involving unauthorized access.

Hacking is not the problem and, therefore, spending time and money to prevent hacking is not very useful.

If only outsiders would rob you in your home then having grilled windows, special locks, alarms, etc. will ensure your safety. But if you live in the company of thieves, you can still be robbed. That is what the police refer to as an “inside job.

The greatest danger of fraud in the 2010 computerized elections will come from insiders in Comelec and computer vendors, not from outsiders.

In the old manual system, the hard copy of the precinct ERs were brought to the municipality to be read and entered in the statement of votes, which was visible to watchers. Watchers could compare the statement of votes with their own copies of the ER. Before the ER was read and added to the statement of votes, the authenticity of the ER was first verified.

This process took time and caused delays when lawyers argued, but at least citizens could see what was going on, hopefully make sure that votes were properly canvassed and at the very least be aware that frauds had taken place.

The Comelec AES has no safeguards against insider-initiated fraud. It assumes that the Comelec and the vendor officials, managers and staff are absolutely honest. It assumes that an automated system will not commit mistakes or fraud.

In the Comelec system, massive fraud can take place, but it will not be discovered until after the beneficiaries of fraud have been proclaimed.

Good luck with the election protests to the real winners who were defrauded!



Reference:
http://inquirer.net/

Posted by ♪_TARIZTA_♪ at 4:28 AM | 0 comments
In recent years, especially because of the growth of online business, corporations have considered protection of there IS resources an increasingly important issue, for good reasons. Downtime, the time during which ISs or data are not available in the course of conducting business, has become a dreaded situation for almost every business worldwide. Such as the different Airlines in Davao International Airport, the online airline reservation business can lose hundred thousands per hour of downtime.

Other risks that the Davao International Airport consider are the Risks to Hardware and the Risks to Data and Application which are the most pervasive risks to there IS operations.

Risks to Hardware

While stories about damage to ISs by malicious Internet attacks grab headlines, the truth about risks to ISs is simply this: the number one cause of systems downtime is hardware failure. Risks to hardware involve physical damage to computers, peripheral equipment, and communications media. The major causes of such damages are natural disasters, blackouts and brownouts, and vandalism.

Natural Disasters

Natural Disasters that pose a risk to ISs include fires, floods, earthquakes, hurricanes, tornadoes, and lightning, which can destroy hardware, software, or both, causing total or partial paralysis of systems or communications lines. Floodwater can ruin storage media and cause short circuits that burn delicate components such as microchips. Lightning and voltage surges cause tiny wires to melt and destroy circuitry. In addition, wildlife and human error occasionally destroy communications lines; animals gnaw cables, and farmers occasionally cut wires inadvertently while tending their crops.

Blackouts and Brownouts

Computers run on electricity. Of power is disrupted, the computer and its peripheral devices cannot function, and the change in power supply can be very damaging to computer processes and storage. Blackouts are total losses of electrical power. In brownouts, the voltage of the power decreases, or there are very short interruptions in the flow of power. Power failure might not only disrupt operations, but it can also cause irreparable damage to hardware. Occasional surges in voltage are equally harmful, because their impact on equipment is similar to that of lightning.
The popular way of handling brownouts is to connect a voltage regulator between computers and electrical network. A voltage regulator boosts or decreases voltage to smooth out drops or surges and maintains voltage within an acceptable tolerance.
To ensure against interruption in power supply, organizations use uninterruptible power supply (UPS) systems, which provide an alternative power supply for a short time, as soon as a power network fails. The only practical measure against prolonged blackouts in a public electrical network is to maintain an alternative source of power, such as generator that uses diesel or another fuel. Once the general power stops, the generator can kick in and produce the power needed for the computer system.

Vandalism

Vandalism occurs when human beings deliberately destroy computer systems, bitter customers damage ATMs, or disgruntled employees might destroy computer equipment out of fear that it will eliminate their jobs or simply to get even with their superiors. It is difficult to defend computers against vandalism. ATMs and other equipment that are accessible to the public are often encased in metal boxes, but someone with persistence can still cause severe damage. In the workplace, the best measure against vandalism is to allow access only to those who have a real need for the system. Sensitive equipment, such as servers, should be locked in a special room. Such rooms usually are well equipped with fire suppression systems and are air-conditioned, and thus protect also against environmental risks.


Risks to Data and Applications

The primary concern of any organization should be its data, because it is often a unique resource. Data collected over time can almost never be recollected the same way, and even when it can, the process would be too expensive and too time consuming to recover the business from its loss. The concern for applications, especially if the applications are not tailor-made, should come second. All data and applications are susceptible to disruption, damage, and theft. While the culprit in the destruction of hardware is often a natural disaster or power spike, the culprit it damage to software is almost always human.

Theft of Information and Identify Theft

Sometimes the negligence of corporations and the careless use of technology, especially on public links to the Internet, create security “holes” or vulnerabilities. In one case, a young man named Juju Jiang installed a program called Invisible KeyLogger Stealth in public-use computers in 14 Kinko’s stores where customers can access the Internet. (Such Internet-connected PCs are also available in public libraries and airports).
Keystroke logging software records individual keystrokes. For one year, his software secretly recorded more than 450 usernames and passwords, which he used to access existing bank accounts and create new ones. Jiang was caught when he used an application called GoToMyPC. Subscribers to the GoToMyPC service can use an application by the same name to link a PC from another PC and fully control the remote one as if they were sitting in front of it. Using the application , he remotely accessed and used one of his victims’ PCs. Using the PC at home, this person noticed that the cursor was moving “by itself”. The cursor opened files and subscribed to an online payment transfer service. Jiang pled guilty in court.

In 2005 keystroke logging was put to work online by a criminal ring on a massive scale. Spyware is used for several purposes. This time spyware was used to install a keystroke logging application that recorded communication with the victim’s bank, insurance company, or other financial institutions. The collected data included credit-card details, Social Security numbers, usernames, passwords, Instant messaging chat sessions, and search terms. Some of the data was then saved in a file hosted on a server that had an offshore-registered domain name. Sunbelt, a company that develops and sells antispam and security software, managed to obtain access to a victim’s computer and track what the spyware did. The company reported that the online thieves obtained confidential financial details of customers of 50 international banks. They keystroke logging software was small (26KB), and took advantage of Internet Explorer browsers. For example, it accessed the browser’s Protected Storage area, in which users often save their usernames and passwords for convenient automatic logins. Sunbelt recommended disabling this feature.

In some cases it is employees who unwittingly give away important information such as access codes. Con artists use tricks known as
social engineering. They telephone an employee who has a password to access an application or a database, introduce themselves as service people from a telephone company, or the organization’s own IT unit, and say they must have the employee’s password to fix a problem. Employees are often tempted to provide their password. The “social engineers” then steal valuable information.

Once criminals have a person’s identifying details, such as a Social Security number, driver’s license number, or credit-card number, they can pretend to be this person. This crime is called
identity theft. the imposter can easily withdraw money from victim’s bank accounts, put charges on the victim’s credit card, and apply for new credit cards. Since an increasing number of applications for such instruments as well as financial transactions are executed online, identity theft has become a serious problem.



Reference:
Oz, E. Management Information Systems (Fifth Edition)

Posted by ♪_TARIZTA_♪ at 4:26 AM | 0 comments
1. Concentrix Technologies, Inc.

Description:
Concentrix Technologies Inc. (CTI) is a collaborative network of worldwide information technology providers and distributors, merging products and services to provide businesses a wide array of IT and outsourcing solutions. Concentrix Technologies Inc. have partners worldwide providing a global mix of products and services that let us expand beyond local boundaries and service wider markets globally.

Concentrix Technologies Inc. carries a very comprehensive portfolio to meet your IT and outsourcing needs. It provides systems integration, call center solutions, value added services like web hosting and web site development, short-messaging-system (SMS) packages, VoIP, outsourcing professional services and various internet access products to our wide range of customers.

Its team leverages on the combined IP based technical experience, pro-active support professionals and research and development to meet evolving business needs. This convergence has allowed us to introduce continuous improvement and quality products and services that are not only practical in application and cost-effective but are still up-to-date with the latest technology and practices.


2. SUREcruit Services Inc.

SUREcruit Services Inc. a total HR solution partners specializing in Call Center Recruitment, training and development. We provide our Clients with winning talents who are Call Center ready, competitive, confident and customer service oriented.

The years of actual experience in Human Resource Management, particularly in the contact center industry, have allowed us to understand the opportunity to build upon our expertise and to implement and manage highly successful recruitment programs, sourcing strategies, and human resource best practices for our clients.


3. APEX IT Innovators

APEX IT Innovators (APEX) is an outsourcing firm company that specializes in Website Design and Development. It was founded and is operated by young but experienced IT professionals. APEX, based in Davao City, Philippines, opened its doors on May 2006 and has been constantly busy not only catering to clients' needs, but also developing innovative online applications.

APEX offers a wide range of services such as Desktop Publishing, Customized Online Application Development, and Website Design and Development. APEX has already built a strong presence in its field. Its reputation for delivering the finest services and products stems from its attitude of giving outmost importance and consideration for their clients' insight before, during and even after a project is implemented. APEX, stands by every product it creates and every service it provides. It has a strict quality control system that ensures it only provides the best.


Services:

Website Applications Programming

APEX develops website applications so that companies can easily interact with their clients. Customized website applications such as Online Registration Forms and Online Feedback Forms allow website owners to easily communicate and respond to the needs of their visitors.

Website Maintenance

APEX provides website maintenance service that is designed to suit the goals of the website owner. It may include but is not limited to content management and continuous search engine optimization.

4. The Bureau of Fisheries and Aquatic Resources (BFAR)

The Bureau of Fisheries and Aquatic Resources (BFAR) is the government agency responsible for the development, improvement, management and conservation of the country's fisheries and aquatic resources. The bureau is under the Department of Agriculture.

In order to facilitate the collection, processing, and reporting of fisheries-related data and information, together with the Fisheries Information Management Center(FIMC), they designed The Philippine Fisheries Information System (PhilFIS) which is a network of distributed information systems.

PhilFIS contains data and information that can be broadly categorized into three components namely, Costal Resource, Fisheries Statistics, Fisheries Licensing and is also composed of various databases.


PhilFIS provides all the following services:

e-Cabinet

e-Cabinet is an electronic data exchange system where files that are too large to be handled by the BFAR e-mail service can be transmitted. Divisions and regional offices have 100 MB of file storage space. The system is available 24 hours a day, seven days a week (24/7), and can be accessed on any computer that is connected to the Internet, using a standard Internet browser.


Document Database

The Document Database is a digital repository of publications and documents on fisheries studies, laws, and policy research in the Philippines.


Export and Quality Control System

The Fisheries Export and Quality Control System (FEQCS) is designed to assist the Fish Inspection and Quality Assurance Section (FIQAS), formerly the Fish Inspection and Quality Control Section (FIQCS), in processing health certification and accreditation of fisheries facilities. The development and implementation of an information system will assist the national government in improving and sustaining food safety through accreditation and monitoring of fisheries facilities, health certification of fish and fishery products, and the construction of an intelligent data warehouse.

The FEQCS maintains a database of fisheries facilities, exporters, importers, accredited laboratories, applications for facilities accreditation, official documents, deficiency and plant inspection rating schemes, audit reports, and applications for health certificates. The system assists the team of evaluators in conducting routine monitoring procedures for facilities by evaluating provided data and cross-referencing these with established criteria. It shall provide the automated determination of the facility's class rating, which determines the frequency of inspection required over a period of time.

The system addresses proximity issues of all facilities across the country by implementing Internet-based services to allow remote data population, cross-referencing, and transaction processing. It also addresses authentication issues of export and import papers through data exchange facilities. With this, for example, a health certificate issued for exporting fresh tuna to any destination in Europe or Asia can be authenticated and posted through a secure web-based transaction.


Commercial Fisheries Licensing System

The Commercial Fisheries Licensing System deals with managing the commercial licensing process. It includes registration and licensing modules for vessels and gears, as well as a violations module, which tracks any violations that are relevant to the licensing process.

CFLS assists the Bureau of Fisheries and Aquatic Resources - Fishery Regulatory and Quarantine Division in regulating the commercial fisheries sector, fisheries resource management, and fisheries statistics. It accommodates registration of fishers and vessels, records license data on fishing activities, vessels, gear types, and violations, and generates licensing reports.

This system is a tool to facilitate the control and regulation of fishing.


Map Database

The Map Database aims to generate geographic graphical representations of fisheries and socio-economic profiles of 18 bays, including management interventions, resource maps, and other biophysical characteristics.

The Map Database contains geo-corrected time-series map images of the 18 Fisheries Resource Management Project (FRMP) bays. It utilizes the Geographic Information System (GIS) and Remote Sensing technology in the interpretation and analyses of the 1989 and 1999 LandSat TM 7+ and HRV SPOT satellite images data. It allows end-users to create and configure thematic maps to better represent composite elements of a geographical area for study.


Geographic Information System

The Geographic Information System (GIS) is a technology that manages, analyzes, and disseminates geographic knowledge. It is a tool to view and analyze data from a geographic perspective. It establishes relationships between geographic locations and other information, such as those between people and addresses, buildings and parcels, and streets in a network. The GIS is implemented through ArcIMS (Internet Map Server), which enables the delivery of geograpahic data through the Internet.


Designing and implementing information system is really a big help on every organization and company.




Reference:
http://www.callcenterdirectory.net/
http://www.surecruit.net/surecruit3.swf
http://www.apexinnovators.com/
http://bfar.da.gov.ph/

Posted by ♪_TARIZTA_♪ at 4:19 AM | 0 comments
June 18, 2009, Thursday, was the first meeting in Management Information System (MIS) subject with Sir Gamboa and everyone had fun.

As expected, the subject was extracted, defined, described, and explained. Even leadership was tackled for as we all know it is an important skill in many aspects of our lives that will make as successful especially when it comes to businesses.

Management involves planning, directing, organizing and controlling. Management implies that someone or something has to be managed just like an employee-manager relationship. The manager must lead, motivate, inspire, and encourage the employees. In other words, if we are the employee, allow ourselves not to be controlled but to be guided. On the other hand, if we are the manager, don't dictate, instead, lead and articulate a vision that will inspire others to act that the key is helping people.
Smile

Posted by ♪_TARIZTA_♪ at 3:41 AM | 0 comments

Changes in both information technology and competition continue to change the role of the information systems executive. CSC (1996) has suggested six new IS leadership roles which are required to execute IS’s future agenda: chief architect, change leader, product developer, technology provocateur, coach and chief operating strategist.

1. Chief architect. The chief architect designs future possibilities for the business. The primary work of the chief architect is to design and evolve the IT infrastructure so that it will expand the range of future possibilities for the business, not define specific business outcomes. The infrastructure should provide not just today's technical services, such as networking, databases and desktop operating systems, but an increasing range of business-level services, such as workflow, portfolio management, scheduling, and specific business components or objects.

2. Change leader. The change leader orchestrates resources to achieve optimal implementation of the future. The essential role of the change leader is to orchestrate all those resources that will be needed to execute the change program. This includes providing new IT tools, but it also involves putting in the place teams of people who can redesign roles, jobs and workflow, who can change beliefs about the company and the work people do, and who understand human nature and can develop incentive systems to coax people into new and different behaviors.

3. Product developer. The product developer helps define the company’s place in the emerging digital economy. For example, a product developer might recognize the potential for performing key business processes (perhaps order fulfillment, purchasing or delivering customer support) over electronic linkages such as the Internet. The product developer must "sell" the idea to a business partner, and together they can set up and evaluate business experiments, which are initially operated out of IS. Whether the new methods are adopted or not, the company will learn from the experiments and so move closer to commercial success in emerging digital markets.

4. Technology provocateur. The technology provocateur embeds IT into the business strategy. The technology provocateur works with senior business executives to bring IT and realities of the IT marketplace to bear on the formation of strategy for the business. The technology provocateur is a senior business executive who understands both the business and IT at a deep enough level to integrate the two perspectives in discussions about the future course of the business. Technology provocateurs have a wealth of experience in IS disciplines, so they understand at a fundamental level the capabilities of IT and how IT impacts the business.

5. Coach. The coach teaches people to acquire the skillsets they will need for the future. Coaches have to basic responsibilities: teaching people how to learn, so that they can become self-sufficient, and providing team leaders with staff able to do the IT-related work of the business. A mechanism that assists both is the center of excellence - a small group of people with a particular competence or skill, with a coach responsible for their growth and development. Coaches are solid practitioners of the competence that they will be coaching, but need not be the best at it in the company.

6. Chief operating strategist. The chief operating strategist invents the future with senior management. The chief operating strategist is the top IS executive who is focused on the future agenda of the IS organization. The strategist has parallel responsibilities related to helping the business design the future, and then delivering it. The most important, and least understood, parts of the role have to do with the interpretation of new technologies and the IT marketplace, and the bringing of this understanding into the development of the digital business strategy for the organization.


Reference:

Petter Gottschalk, "IS/IT Leadership Roles," hicss, vol. 7, pp.7055, 33rd Hawaii International Conference on System Sciences-Volume 7, 2000


Posted by ♪_TARIZTA_♪ at 3:26 AM | 0 comments
Friday, July 17, 2009

Management expert Professor Henry Mintzberg has argued that a manager’s work can be boiled down to ten common roles. According to Mintzberg, these roles, or expectations for a manager’s behavior, fall into three categories: informational (managing by information), interpersonal (managing through people), and decisional (managing through action).

A manager's ten roles are divided into 3 categories: Informational, Interpersonal, and Decisional.

Informational

1. Role: Monitor

Activity: Seek and acquire work-related information

Examples: Scan/read trade press, periodicals, reports; attend seminars and training; maintain personal contacts

2. Role: Disseminator

Activity: Communicate/ disseminate information to others within the organization

Examples: Send memos and reports; inform staffers and subordinates of decisions

3. Role: Spokesperson

Activity: Communicate/transmit information to outsiders

Examples: Pass on memos, reports and informational materials; participate in conferences/meetings and report progress

Interpersonal

1. Role: Figurehead

Activity: Perform social and legal duties, act as symbolic leader

Examples: Greet visitors, sign legal documents, attend ribbon cutting ceremonies, host receptions, etc.

2. Role: Leader

Activity: Direct and motivate subordinates, select and train employees

Examples: Includes almost all interactions with subordinates

3. Role: Liaison

Activity: Establish and maintain contacts within and outside the organization

Examples: Business correspondence, participation in meetings with representatives of other divisions or organizations.

Decisional

1. Role: Entrepreneur

Activity: Identify new ideas and initiate improvement projects

Examples: Implement innovations; Plan for the future

2. Role: Disturbance Handler

Activity: Deals with disputes or problems and takes corrective action

Examples: Settle conflicts between subordinates; Choose strategic alternatives; Overcome crisis situations

3. Role: Resource Allocator

Activity: Decide where to apply resources

Examples: Draft and approve of plans, schedules, budgets; Set priorities

4. Role: Negotiator

Activity: Participates in negotiation activities with other organizations and individuals.


In the real world, these roles overlap and a manager must learn to balance them in order to manage effectively. While a manager’s work can be analyzed by these individual roles, in practice they are intermixed and interdependent. According to Mintzberg: “The manager who only communicates or only conceives never gets anything done, while the manager who only ‘does’ ends up doing it all alone.


Reference:

http://management.atwork-network.com/2008/04/15/mintzberg’s-10-managerial-roles/




Posted by ♪_TARIZTA_♪ at 10:23 PM | 0 comments

I guess Management Information System (MIS) is an appropriate term for the subject because having this subject, it will broaden the knowledge base of the student and they will become an "Intelligent Graduate". These intelligent graduate will use appropriate information in an effective manner to increase the competitive advantages for the organizations in a globalize business world.


Posted by ♪_TARIZTA_♪ at 10:20 PM | 0 comments