Verified Document

Politics Of Information Management The Art Of Essay

Politics of Information Management The art of information management is widely known as the tactic of policy makers guiding the policy followers into doing so. Therein comes the practice of politics and it is known that politics portends power; consequently understanding power and its application to the art of information management is both appropriate and timely. Organizations now have been proliferated by computers to an extent that they control the entire operations and relationship between suppliers and customers in a business transaction. They also shape how the public institutions deal and communicate with individuals and private organizations (Strassman Inc., 1997).

In the process of communication and outside relations, a CIO is frequently found among the most visible executive managers in an organization or corporation. One of the reasons for this frequent appearance in public of the CIO as compared to the other managers is due to the fact that the IT encapsulates all the other sectors and departments according to Donovan, E. (2007). He goes on to point out that the other reason is purely since lots of department managers tend to influence the operations of the IT department to suite or appear to be suiting their own ambitions and visions. These two will arouse the urge of being a good political administrator in as much as they work near technology.

As Strassmann P., (2005) puts it, the CIO should be in control of the expenditure,...

He made it clear that his department and the organization at large were having updates problems and general IT failures and he not only confessed but also took responsibility for the same.
It was not right for him to act as he did at for the cons of such an act far outweighed the pros within public domain. Finney R., (2006) says that most people would like to "commit to a purpose, a goal, a vision that is bigger than themselves, big enough to make them stretch and grow until they assume personal responsibility for achieving it." But paradoxically in the case of the Overstock.com the CIO did the opposite and took public responsibility for the failure of it.

A good professional CIO should be able to determine the working environment and then be in cognizant of the unwritten rules and play by them. Many CIOs like the case in hand keep working towards the greater good tilt het lose sight and touch of the organizational information politics (Finney, R., 2006). This was the other error that…

Sources used in this document:
References

Donovan, E. (2007). Overstock.com: The Perils of Being Too Accountable. Retrieved March,

19, 2011 from http://www.eddiedonovan.com/publications/ITM508MOD1CASE.pdf

Finney, R., (2006). The Politics of Information and Projects. Retrieved March, 19, 2011 from http://www.itmweb.com/essay008.htm

Strassman Inc., (1997). The Politics of Information Management: Policy Guidelines. Retrieved March, 19, 2011 from http://www.infoeconomics.com/info-politics.php
from http://www.cioinsight.com/c/a/Expert-Voices/Check-How-to-Verify-if-You-are-Important/
Cite this Document:
Copy Bibliography Citation

Related Documents

Management and Science Technology
Words: 889 Length: 3 Document Type: Essay

Management/Technology Management, Science, and Technology Who Is a Manager? A manager is someone who knows how to take charge, organize, direct, and be accountable for individuals and groups of people operating under his guidance. Anyone who shows leadership skills can be a manager. A manager's goal is to work towards the common good. This means keeping persons on pace to meet their objectives, budgeting time wisely, and instilling in his inferiors a desire

Information Systems and Technology Issues in Developing Countries
Words: 9969 Length: 30 Document Type: Term Paper

Information Systems (IS) and Technology Issues in Developing Countries Technology has changed society in a manner much like the Industrial Revolution of the 17th century. The technology revolution started in the U.S. And the countries of Western Europe, in a manner similar to the industrial revolutions. The benefits of this revolution were immediately obvious in the improvement of productivity and the quality of life in the countries. Realizing the benefits that

Management Theory Technically Came Into
Words: 2622 Length: 10 Document Type: Literature Review

Eventually, when the rest of Europe became a solid, cultural entity at the end of the Middle Ages, it was no surprise that the Byzantine Empire did not survive since it had failed to hold true to its core values and, eventually, the Empire officially ended upon conquest by the Ottomans. Islamic Golden Age The Islamic Golden Age is also called the Islamic Renaissance and its generally thought of as ranging

New Public Management Reforms the
Words: 4090 Length: 14 Document Type: Term Paper

Indeed, the reference to "institutional sclerosis" concerns the fact that virtually every conceivable interest in contemporary society is protected by a variety of laws that provide for extensive advising, participation and appeal procedures, a process that further exacerbates the inability of public administrators to remain responsive to their constituents (Klijn & Koppenjan 241). These authors emphasize that, "This results, among other things, in the Not In My Backyard (NIMBY)

Building a Secure Workflow Management
Words: 11534 Length: 35 Document Type: Research Proposal

Each onion router removes a layer of encryption to uncover routing instructions, and sends the message to the next router where this is repeated. This prevents these intermediary nodes from knowing the origin, destination, and contents of the message. 1.4. Lecture Survey. The predicted solution of the problems related to e-government administration depends on answering the following questions as brainstorming ideas to solve the problem and the features provided by the system

Computer Security Information Warfare Iw
Words: 5531 Length: 20 Document Type: Research Paper

His study includes the following; The U.S. government through the executive to provide appropriate leadership to steer the country in the domain of cyber security. The state to conduct immediate risk assessment aimed at neutralizing all the vulnerabilities. The creation of an effective national security strategy as well as the creation of an elaborate national military strategy. Molander (1996) uses a qualitative research approach and methodology .The method used is constructive. The constructive

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now