Verified Document

Hefty Hardware Case Study Case Study

Computer Science It Leadership At Hefty Hardware Case Study

Companies are made up of different departments with specified functions and responsibilities. For success, it is important to ensure that each of the departments works in collaboration with other departments and that their various functions are supported by the company's general approach and objectives. This appears to be the main confront with the Leadership at Hefty Hardware. The leadership of the IT department was unable to understand the needs of the business department critically and ensuring that they were incorporated into the various sub-departmental levels (McKeen & Smith, 2012).

An analysis of the case study reveals that there lacks effectiveness between IT and Business departments at Hefty Hardware. The first issue relates to the effectiveness of interdepartmental communication. The different departments lack relevant communication channels leading to the presence of a lot of dysfunction. The management further fails to develop an effective plan aimed at driving both IT and business strategy and consequently lacking a reliable information system strategy triangle (Harry & Schroeder, 2000).

As mentioned by both Cheryl and Glen, the IT department has failed in ensuring that the entire staff in that department fully comprehends each of their basic business functions. In such a case, IT personnel are unable to differentiate or relate between their technical work and business needs. This led to the loss of time resource since it took the IT department...

In other cases, the IT department was unable to meet the expectations of the various business strategies. As far as the business department was concerned, the department also lacked effective collaboration and communication with the IT department as the business department failed to communicate their specific and concise requirements to the IT department. Instead, persons in the business department like Glen and Paul expected the people in the IT department to perform various cross-functional duties that were not designated to them (McKeen & Smith, 2012).
It is advantageous for competent technicians to meet with professionals from the business department, especially when the manager cannot communicate clearly and steer the meeting in the right direction. This will also be advantageous when explaining the importance of 3G and 4G or security in the meeting. However, a clear disconnect among the participants will be evident.

There is also some level of ineffectiveness in the part of the CIO as indicated by their constant transfers. This further reveals that the CIOs were either unable to see the importance of cooperating with the business department or were usually too technical. Although the failure in structure arises from IT department's weakness, the company's inability to involve both persons from the technical and business departments in managerial positions is attributed to shortcomings of the business enterprise. Practically, it is critical to ensure that the…

Sources used in this document:
References

Harry, M.J., & Schroeder, R. (2000). Six sigma: The breakthrough management strategy revolutionizing the world's top corporations. New York: Currency.

McKeen, J.D., Smith, H.A. (2012). IT Strategy: Issues and Practices. Upper Saddle River, NJ: Pearson Education, Inc.
Cite this Document:
Copy Bibliography Citation

Related Documents

Healthcare the Impacts of Case
Words: 4123 Length: 12 Document Type: Research Paper

"Studies of the relationship between managed care penetration in the health care market and expenditures for Medicare fee-for-service enrollees have demonstrated the existence of these types of spill over effects" (Bundorf et al., 2004). Managed care organizations generate these types of spillover effects by increasing competition in the health care market, altering the arrangement of the health care delivery system, and altering physician practice patterns. Studies have found that higher

Oregon School District This Is
Words: 855 Length: 3 Document Type: Case Study

IV. Solution KSCD first tried software-based solutions such as Novell's BorderManager and SurfControl's Cyber Patrol, but discovered implementation issues, cumbersome processes and time-consuming updates of content filters and blocked sites. Next, KCSD turned to hardware, purchasing 30 Kentrox ServicePoint Service Delivery Units (SDUs) to serve as DSU/CSUs and to provide the ability to monitor and control bandwidth at the application level by setting policies for use. The systems also supply monitoring

Real Time and Fault Tolerant
Words: 3152 Length: 11 Document Type: Essay

Because the system has a lot of user-defined capabilities, users gain the flexibility to configure the system to meet their specific needs. While there was a lot of detailed information in the case study, there were some information gaps. A definition of the types of faults the system detects, such as transient, permanent, or intermittent, and how the system handled the different faults would have been helpful. Also, knowing how

International Markets the Introduction of
Words: 1085 Length: 3 Document Type: Essay

All that Ms. Chang would do is to apply for the patent protection and then franchise a local company to manufacture the CAD system with full assurance that the product will be right protected and the business will still have the same business profits as it is in Singapore. As a matter of fact, the machine, being so sophisticated will require importation of skills and manpower from the Singapore mother

Humans, Information Technology It Managers
Words: 2030 Length: 7 Document Type: Research Paper

Managers may engage in fraudulent activities by selling company information or details of customers. The manager improperly accesses the company's it system to alter values for citation issued. Fraud is an illegal activity, and the manager that is choosing the bribing vendor over the other vendors is just very wrong. "Most commonly used types of bribes are cash, travel and entertainment rewards," as noted by Dillon (2008, p. 37). Once

Home Depot Vs. Lowes Executive
Words: 8368 Length: 21 Document Type: Term Paper

Apart from that there is another type of risk which can surface even in case the market continues its upward march. In the event employees exercise their ESOPs in huge numbers, external shareholders could oppose the diluting impact of these option grants on the value of their shares. A situation might crop up that old possible tensions among employee interests and shareholder interests are not all of a sudden

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now