Corporate Information Management for the 21st Century and Enterprise Integration; A DoD Strategic Plan and Implementation Strategy

1994 ◽  
Author(s):  
W. H. Leary ◽  
Tufte III ◽  
Yaphe W. ◽  
M.
2021 ◽  
Author(s):  
Claire Scoular ◽  
Ian Teo

This report describes an online course developed to support education systems to build an aligned and sustainable approach to integration of 21st Century Skills (21CS). 21CS are those skills that are considered particularly important to succeed in today’s knowledge-based society in which innovation and technology are predominant. Prominent examples include critical thinking, creative thinking, and collaboration, and such skills need to be better understood in order for them to be integrated. While different countries may have their own frameworks or priorities surrounding 21CS, a consistent approach to integration can still be achieved with a shared understanding from all stakeholders within the system. The course objectives focused on supporting countries to develop a strategic plan for 21CS integration, providing resources to aid that plan, and building capacity to implement the plan. The specific learning objectives were to: Understand components and steps leading to 21CS alignment; Conduct a needs analysis, identifying which steps are currently being met, and which steps need more attention; Develop a strategic plan, identifying which steps are to be prioritized and in which order; Gain insights from other education systems from reflections on successful developments and lessons learned; and Engage in discussion within education systems and with other countries about the emerging area of skills integration, as well as identify future directions. Course participants joined from across 16 Asia Pacific countries and from the Education Quality and Assessment Programme for the Pacific Community (EQAP). The course comprised of eight modules that were spread over three weeks, with content hosted online through the Moodle platform.Each module consisted of pre-recorded video content (30-60 minutes) and team and/or individual activities. The modules were supported by three live sessions that allowed participants to ask questions and share reflections in real time. The course concluded with a webinar that consisted of presentations that were delivered by one member from each Core Strategy Team who shared their team’s strategic plan and reflections from this course.


2019 ◽  
pp. 2145-2167
Author(s):  
Fotios I. Gogoulos ◽  
Anna Antonakopoulou ◽  
Georgios V. Lioudakis ◽  
Dimitra I. Kaklamani ◽  
Iakovos S. Venieris

Web 2.0 technologies have fundamentally reshaped everyday users' perceptions regarding online services by strengthening the importance of individual participation. This profound change is expanding to substantially affect modern enterprise operations and especially corporate information management practices. Well-established business models are upgraded to capture value from the establishment of dynamic coalitions and virtual organizations among remote stakeholders. However, these collaboration formulations dictate the concentration, use, and circulation of corporate information and sensitive personal data, and thus ignite severe security and privacy concerns. Enterprises against this background are more than willing to invest in terms cost and time in order to enforce the necessary countermeasures and thus build and maintain the trustworthiness of involved operations. This chapter studies how legislation and inherent characteristics of this new collaboration paradigm affect the qualities of trust and highlights prominent features of security and privacy protection measures that can deal with emerging trust issues.


Author(s):  
Kevin Johnston

Most organizations have multiple levels of strategic plans (de Kluyver & Pearce, 2006), one of which is the Information Technology (IT) strategic plan. The alignment of an organization’s business strategy with its IT strategy has been a concern of CIOs (Benson & Standing, 2008; Croteau & Bergeron, 2001; Johnston, Muganda, & Theys, 2007; Luftman Kempaiah, & Nash, 2006), CEOs (Armstrong, Chamberlain, Moore, & Hart, 2002; O’Brien & Marakas, 2006), academic researchers (Henderson & Venkatraman, 1999; Kangas, 2003; Pearlson & Saunders, 2004; Reich & Benbasat, 2000), and research companies (Broadbent, 2000; Croteau & Bergeron, 2001; Meta Group, 2001) since the age of vacuum tubes. The Society for Information Management (SIM) studies reveal that ‘IT and Business Alignment’ was the number one management concern in 2003, 2004 and 2005, and has been one of the top 10 concerns since 1983(Luftman et al., 2006). IT and business strategies should not be separate or aligned; organizations should simply have one business strategy: one organization, one strategy.


2019 ◽  
pp. 1442-1463
Author(s):  
Fotios I. Gogoulos ◽  
Anna Antonakopoulou ◽  
Georgios V. Lioudakis ◽  
Dimitra I. Kaklamani ◽  
Iakovos S. Venieris

Web 2.0 technologies have fundamentally reshaped everyday users' perceptions regarding online services by strengthening the importance of individual participation. This profound change is expanding to substantially affect modern enterprise operations and especially corporate information management practices. Well-established business models are upgraded to capture value from the establishment of dynamic coalitions and virtual organizations among remote stakeholders. However, these collaboration formulations dictate the concentration, use, and circulation of corporate information and sensitive personal data, and thus ignite severe security and privacy concerns. Enterprises against this background are more than willing to invest in terms cost and time in order to enforce the necessary countermeasures and thus build and maintain the trustworthiness of involved operations. This chapter studies how legislation and inherent characteristics of this new collaboration paradigm affect the qualities of trust and highlights prominent features of security and privacy protection measures that can deal with emerging trust issues.


Sign in / Sign up

Export Citation Format

Share Document