Establish a team work environment

Assignment Help Management Information Sys
Reference no: EM132257263

Biotech Company Situational Analysis

Background:

A growing Biotech company has been in business for approximately three years and is growing rapidly. Over the past five years the lines of business have had unguided and unconstrained approach to dealing with information systems and technology used to support their respective business areas. Each area has their own IT staff all doing their own thing and building systems serving only the needs of that specific business unit with no coordination or collaboration from the IT staff in the other business areas. This ad hoc approach to IT has started to cause operational, security, and cost containment problems. Hence, the Board of Directors of the company has endorsed the CEO's request to hire a new CIO and to address these problems and to establish a world class central IT organization to support their growing business and get things under control. The CEO hired a new CIO a three months ago, who has been meeting with the senior business executives in each of the lines of business and coming up to speed on the business strategy goals and objective as well as how IT is being used and managed to support the business. The CIO met with the CEO and provided his findings and recommendations. The following scenarios below will highlight some of the CIO's findings in which the he has delegated responsibility to you as one of his senior IT managers to resolve.

Situation 2: All twenty-five IT staff now report to the senior IT managers in the central IT organization. Being a newly hired senior IT manager within the first couple of days you realize that you have inherited a wildly dysfunctional team! While the IT staff is highly technical team, very intelligent, technically competent and capable individuals. However, they are out of control acting as independent free lancers within the organization with no sense of team. They do have no sense of direction and are working on things that they feel are important to them with no established deadlines or accountability. They come and go as they please, frequently take extended lunches; some chose not to return to the office at all. They're particularly unruly in staff meetings, never providing accurate or concrete information. They commandeer discussions by questioning every move you make. The other senior IT managers perceive your staff as unprofessional, discourteous, and find in very hard to work with them or rely on your staff to provide timely responses but when they do respond it meets their needs. The CIO has taken notice and has asked you to rein them in.

1. What actions would you take to address the freelance work attitude, lack of direction, and accountability with your staff?

2. What approach would you take to establish a team work environment in your department and install this concept with your staff?

3. What actions would you take to address individuals who frequently take extended lunches and/or fail to return to the office?

4. What actions would you take to address the unruly in staff meetings?

5. What approach would you take to address the perception and concerns of your fellow colleagues and the CIO?

Part B: Create a Charter for the Enterprise Security Committee; Use the guideline outlined below.

IT Governance charter document should be in outline format and contain the following sections:

Governance Entity Name

Purpose

Scope/Jurisdiction

Objectives

Responsibilities

Decision Authority

Membership Chair Person(s) & Members (appointments and rotation)

Deliverables

Structure (meeting frequency and location)

Relationships (Other governing entities)

Executive Signatures (CEO, CIO, COO, etc.) & Dates

Verified Expert

The attached report is the charter for the enterprise security management committee of biotech organization.The charter is presented as per the standard requirements of the enterprise security committee.References are provided as well.

Reference no: EM132257263

Questions Cloud

How could msbi help a company spot trends : Do some research on MSBI (Microsoft Business Intelligence) and discuss what you find. What does it do? What does it allow companies to do?
What is an IMEI number and MAC address : Conduct some research and answer the following questions. What is an IMEI number? What is a MAC address? Write a paper describing the research you found
More successful in terms of fair trade coffee : Which company has been more successful in terms of fair trade coffee?
Introduce your diversity area and introduce millennials : Evaluate the role of identity, diverse segments, and cultural backgrounds within organizations.
Establish a team work environment : ISEM 547 IT Management - Enterprise Management and Entrepreneurship Biotech Company Situational Analysis - Harrisburg University of Science and Technology
Explain how the organization or corporation approached : Select one of the public relations crises from this week's readings. How might the corporation have anticipated the crisis and handled it differently?
Additional discrepancies between estimated cost to place : Moreover there were additional discrepancies between the estimated cost to place and order $200 and what actually cost to place an order $250.
Formulate policies governing health service vendors retained : Consider the approach based on how government reflects public policy (provision of care and indirectly by the funding of health care services).
What are the priority nursing interventions : What are the priority nursing diagnoses to address the concern of fluid retention? What are the priority nursing interventions for these nursing diagnoses?

Reviews

inf2257263

9/14/2019 3:39:55 AM

The solution was required to be in specific formatting pattern and I got the work before the deadline as I required it. Say many thanks to your writer for providing me with great work. Many many thanks to the writer.

len2257263

3/14/2019 11:19:30 PM

Please read through the document "Previously submitted Project".doc and a part of which was worked by you. For now, I require assistance with Part B of the attached document "Current project guidelines".doc There has been some feedback for the previous assignment regarding scholarly references not being used, please make use of either IEEE or google scholar references. Plagiarism free please! Part B: Create a Charter for the Enterprise Security Committee (30 Points); Use the guideline outlined below. . IT Governance charter document should be in outline format and contain the following sections: . Governance Entity Name . Purpose . Scope/Jurisdiction . Objectives . Responsibilities . Decision Authority . Membership Chair Person(s) & Members (appointments and rotation) . Deliverables . Structure (meeting frequency and location) . Relationships (Other governing entities) . Executive Signatures (CEO, CIO, COO, etc.) & Dates

Write a Review

Management Information Sys Questions & Answers

  Discussion - stealing from an employer

Write a post you must have two academic peer-reviewed articles for references. must include in-text citations and references in APA style

  Assessment taskyou are required to complete an academic

assessment taskyou are required to complete an academic essay which critically evaluates the application of either of

  How basic discretion steps can help in countermeasures

A wiki is a collaborative web site that collects and organizes content, created and revised by its users.

  Develop a schedule of activities to prepare for training

Describe the proposed implementation project approval process, identifying stakeholders who will authorize the project team to go forward with the plan.

  Who are the users of the encryption technology

When should this encryption technology be used? Who are the users of the encryption technology? What are the benefits/disadvantages of this technology?

  Discuss the patterns thet mobility xe users have

Do some Internet research on the security implications of HIPPArequirements for hospital networks. Discuss the major types ofsecurity mechanisms that must be.

  Secure socket layers ssl and secure electronic

secure socket layers ssl and secure electronic transactioncompare and contrast the similarities and differences between

  Choose a company that interest you-document their strategy

Choose a company that interest you and document their strategic plan, including:Vision, mission, objectives, goals, strategies, and measures,An industry analysis,A SWOT analysis,Identify two IT - related projects that would be consistent with this pl..

  Accounting information system aishow a new accounting

accounting information system aishow a new accounting information system will meet previously unmet user needs.i know

  Write comparison between two programming languages

Write comparison between at least two programming languages, for example: C, C++, C#, Java, JavaScript, Perl, PHP, Python, Ruby, SQL

  Predict the impact of environmental changes

Suppose that an organization did not use processes that were designed and built to be agile, particularly when it comes to IS / IT technologies.

  Identify and analyse the attack with highest criticality

Identify and analyse the attack with highest criticality, and explain the countermeasures taken to address such attack.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd