{"id":36,"date":"2018-07-07T18:09:14","date_gmt":"2018-07-07T18:09:14","guid":{"rendered":"http:\/\/opentextbook.site\/informationsystems2018\/chapter\/chapter-9-the-people-in-information-systems-information-systems-introduction\/"},"modified":"2019-08-23T17:15:43","modified_gmt":"2019-08-23T17:15:43","slug":"chapter-9-the-people-in-information-systems-information-systems-introduction","status":"publish","type":"chapter","link":"https:\/\/opentextbook.site\/informationsystems2019\/chapter\/chapter-9-the-people-in-information-systems-information-systems-introduction\/","title":{"rendered":"Chapter 9: The People in Information Systems"},"content":{"raw":"<div class=\"calibre1\" id=\"chapter-people\">\r\n<div class=\"front-matter-title-wrap\"><\/div>\r\n<div class=\"calibre1\">\r\n<div class=\"textbox textbox--learning-objectives\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\">Learning Objectives<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<p class=\"nonindent\">Upon successful completion of this chapter, you will be able to:<\/p>\r\n\r\n<ul class=\"calibre9\">\r\n \t<li class=\"calibre10\">describe each of the different roles that people play in the design, development, and use of information systems;<\/li>\r\n \t<li class=\"calibre10\">understand the different career paths available to those who work with information systems;<\/li>\r\n \t<li class=\"calibre10\">explain the importance of where the information-systems function is placed in an organization; and<\/li>\r\n \t<li class=\"calibre10\">describe the different types of users of information systems.<\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>\r\n&nbsp;\r\n<h1 class=\"calibre8\">Introduction<\/h1>\r\n<p class=\"nonindent\">The opening chapters of this text focused on the technology behind information systems, namely hardware, software, data, and networking. The last chapter covered business processes and the key role they can play in the success of a business. This chapter discusses people, the last component of an information system.<\/p>\r\n<p class=\"indent\">People are involved in information systems in just about every way. People\u00a0imagine information systems,\u00a0people\u00a0develop information systems,\u00a0people\u00a0support information systems, and, perhaps most importantly,\u00a0people\u00a0<em class=\"calibre7\">use<\/em> information systems.<em class=\"calibre7\"><br class=\"calibre1\" \/><\/em><\/p>\r\n\r\n<h1 class=\"calibre8\">The Creators of Information Systems<\/h1>\r\n<p class=\"nonindent\">The first group of people to be considered play a role in designing, developing, and building information systems.\u00a0These people are generally technical and have a background in programming, analysis, information security, or database design. Just about everyone who works in the creation of information systems has a minimum of a bachelor\u2019s degree in computer science or information systems, though that is not necessarily a requirement. The process of creating information systems will be covered in more detail in Chapter 10.<\/p>\r\n<p class=\"indent\">The following chart shows the U. S. Bureau of Labor Statistics projections for computing career employment in 2020.<\/p>\r\n\r\n\r\n[caption id=\"attachment_684\" align=\"alignnone\" width=\"437\"]<img src=\"https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/2020-projecctions.png\" alt=\"Pie chart showing U. S. Bureau of Labor Statistics - 2020 Projections\" width=\"437\" height=\"259\" class=\"wp-image-684 size-full\" \/> U. S. Bureau of Labor Statistics - 2020 Projections[\/caption]\r\n\r\n<div class=\"wp-caption4\">\r\n<h2 class=\"indent1\">Systems Analyst<\/h2>\r\n<\/div>\r\n<p class=\"nonindent\"><span class=\"calibre15\">The systems analyst straddles the divide between identifying business needs and\u00a0imagining\u00a0a new or redesigned system to fulfill those needs<\/span>. This individual works with a team or department seeking to identify business requirements and analyze the specific details of an existing system or a system that needs to be built. Generally, the analyst is required to have a good understanding of the business itself, the purpose of the business, the business processes involved, and the ability to document them well. The analyst identifies the different stakeholders in the system and works to involve the appropriate individuals in the analysis process.<\/p>\r\n<p class=\"indent\">Prior to analyzing the problem or the system of concern, the analyst needs to a) clearly identify the problem, b) gain approval for the project, c) identify the stakeholders, and d) develop a plan to monitor the project. The analysis phase of the project can be broken down into five steps.<\/p>\r\n\r\n<ol class=\"calibre34\">\r\n \t<li class=\"calibre10\">Seek out and identify the details<\/li>\r\n \t<li class=\"calibre10\">Specify requirements<\/li>\r\n \t<li class=\"calibre10\">Decide which requirements are most important<\/li>\r\n \t<li class=\"calibre10\">Create a dialog showing how the user interacts with the existing system<\/li>\r\n \t<li class=\"calibre10\">Ask users to critique the list of requirements that have been developed<\/li>\r\n<\/ol>\r\n<p class=\"indent\">The analysis phase involves both the systems analyst and the users. It is important to realize the role the users take in the analysis of the system. Users can have significant insights into how well the current system functions as well as suggest improvements.<\/p>\r\n<p class=\"indent\">Once the requirements are determined, the analyst begins the process of translating these requirements into an information systems design. It is important to understand which different technological solutions will work and provide several alternatives to the client, based on the company\u2019s budgetary constraints, technology constraints, and culture. Once the solution is selected, the analyst will create a detailed document describing the new system. This new document will require that the analyst understand how to speak in the technical language of systems developers.<\/p>\r\n<p class=\"indent\">The design phase results in the components of the new system being identified, including how they relate to one another. The designer needs to communicate clearly with software developers as well database administrators by using terminology that is consistent with both of these specialties. The design phase of the project can be broken down into six steps.<\/p>\r\n\r\n<ol class=\"calibre34\">\r\n \t<li class=\"calibre10\">Design the hardware environment<\/li>\r\n \t<li class=\"calibre10\">Design the software<\/li>\r\n \t<li class=\"calibre10\">Design how the new system will interface with the users<\/li>\r\n \t<li class=\"calibre10\">Design hardware interfaces<\/li>\r\n \t<li class=\"calibre10\">Design database tables<\/li>\r\n \t<li class=\"calibre10\">Design system security<\/li>\r\n<\/ol>\r\n<p class=\"indent\">A systems analyst generally is not the one who does the actual development of the information system. The design document created by the systems analyst provides the detail needed to create the system and is handed off to a developer to actually write the software and to the database administrator to build the database and tables that will be in the database.<\/p>\r\n<p class=\"indent\"><span class=\"calibre15\">Sometimes the system may be assembled from off-the-shelf components by a person called a systems integrator<\/span>. This is a specific type of systems analyst that understands how to get different software packages to work with each other.\u00a0<span class=\"calibre15\"><br class=\"calibre1\" \/><\/span><\/p>\r\n<p class=\"indent\">To become a systems analyst, you should have a background both in the business analysis and in systems design. Many analysts first work as developers and have business experience before becoming system analysts. It is vital for analysts to clearly understand the purpose of the business of interest, realizing that all businesses are unique.<\/p>\r\n\r\n<h2 class=\"calibre18\">Programmer\/Developer<\/h2>\r\n<p class=\"nonindent\">Programmers spend their time writing computer code in a programming language. In the case of systems development, programmers generally attempt to fulfill the design specifications given to them by a systems analyst\/designer. Many different styles of software development exist A programmer may work alone for long stretches of time or work as part of a team with other developers. A programmer needs to be able to understand complex processes and also the intricacies of one or more programming languages.<\/p>\r\n\r\n<h2 class=\"calibre18\">Computer Engineer<\/h2>\r\n<p class=\"nonindent\">Computer engineers design the computing devices that are used every day. There are many types of computer engineers who work on a variety of different types of devices and systems. Some of the more prominent computer engineering jobs are as follows:<\/p>\r\n\r\n<ul class=\"calibre9\">\r\n \t<li class=\"calibre10\"><span class=\"calibre56\"><b>Hardware engineer<\/b>. A hardware engineer designs hardware and test components such as microprocessors, memory devices, routers, and networks. Many times, a hardware engineer is at the cutting edge of computing technology, creating something brand new. Other times, the hardware engineer\u2019s job is to re-engineer an existing component to work faster or use less power. Many times a hardware engineer\u2019s job is to write code to create a program that will be implemented directly on a computer chip.<\/span><\/li>\r\n \t<li class=\"calibre10\"><span class=\"calibre56\"><b>Software engineer<\/b>. Software engineers tend to focus on a specific area of software such as operating systems, networks, applications, or databases. Software engineers use three primary skill areas: computer science, engineering, and mathematics.<\/span><\/li>\r\n \t<li class=\"calibre10\"><span class=\"calibre56\"><b>Systems engineer<\/b>. A systems engineer takes the components designed by other engineers and makes them all work together, focusing on the integration of hardware and software. For example, to build a computer the mother board, processor, memory, and hard disk all have to work together. A systems engineer has experience with many different types of hardware and software and knows how to integrate them to create new\u00a0functionality.<\/span><\/li>\r\n \t<li class=\"calibre10\"><span class=\"calibre56\"><b>Network engineer<\/b>. A network engineer understands the networking requirements of an organization and then designs a communications system to meet those needs, using the networking hardware and software, sometimes referred to as a network operating system. Network engineers design both local area networks as well as wide area networks.<\/span><\/li>\r\n<\/ul>\r\n<p class=\"indent\">There are many different types of computer engineers, and often the job descriptions overlap. While many may call themselves engineers based on a company job title, there is also a professional designation of \u201cprofessional engineer\u201d which has specific requirements.\u00a0In the United States each state has its own set of requirements for the use of this title, as do different countries around the world. Most often, it involves a professional licensing exam.<\/p>\r\n\r\n<h1 class=\"calibre8\">Information Systems Operations and Administration<\/h1>\r\n<p class=\"nonindent\">Another group of information systems professionals are involved in the day-to-day operations and administration of IT. These people must keep the systems running and up-to-date so that the rest of the organization can make the most effective use of these resources.<\/p>\r\n\r\n<h2 class=\"calibre18\">Computer Operator<\/h2>\r\n<p class=\"nonindent\">A computer operator is the person who oversees the mainframe computers and data centers in organizations. Some of their duties include keeping the operating systems up to date, ensuring available memory and disk storage, providing for redundancy (think electricity, connectivity to the Internet, and database backups), and overseeing the physical environment of the computer.\u00a0Since mainframe computers increasingly have been replaced with servers, storage management systems, and other platforms, computer operators\u2019 jobs have grown broader and include working with these specialized systems.<\/p>\r\n\r\n<h2 class=\"calibre18\">Database Administrator<\/h2>\r\n<p class=\"nonindent\">A Database Administrator (DBA) is the person who designs and manages the databases for an organization. This person creates and maintains databases that are used as part of applications or the data warehouse. The DBA also consults with systems analysts and programmers on projects that require access to or the creation of databases.<\/p>\r\n\r\n<h2 class=\"calibre18\">Help Desk\/Support Analyst<\/h2>\r\n<p class=\"nonindent\">Most mid-size to large organizations have their own information technology help desk. The help desk is the first line of support for computer users in the company. Computer users who are having problems or need information can contact the help desk for assistance. Many times a help desk worker is a junior level employee who is able to answer basic issues that users need assistance with. Help desk analysts work with senior level support analysts or have a computer knowledgebase at their disposal to help them investigate the problem at hand. The help desk is a great place to break into working in IT because it exposes you to all of the different technologies within the company. A successful help desk analyst should have good communications skills and a sincere interest in helping users.<\/p>\r\n\r\n<h2 class=\"calibre18\">Trainer<\/h2>\r\n<p class=\"nonindent\">A computer trainer conducts classes to teach people specific computer skills. For example, if a new ERP system is being installed in an organization, one part of the implementation process is to teach all of the users how to use the new system. A trainer may work for a software company and be contracted to come in to conduct classes when needed; a trainer may work for a company that offers regular training sessions. Or a trainer may be employed full time for an organization to handle all of their computer instruction needs. To be successful as a trainer you need to be able to communicate technical concepts clearly and demonstrate patience with learners.<\/p>\r\n\r\n<h1 class=\"calibre8\">Managing Information Systems<\/h1>\r\n&nbsp;\r\n<p class=\"nonindent\">The management of information-systems functions is critical to the success of information systems within the organization. Here are some of the jobs associated with the management of information systems.<\/p>\r\n\r\n<h2 class=\"calibre18\">CIO<\/h2>\r\n<p class=\"nonindent\">The Chief Information Officer (CIO) is the head of the information-systems function. This person aligns the plans and operations of the information systems with the strategic goals of the organization. Tasks include budgeting, strategic planning, and personnel decisions for the information systems function. The CIO must also be the face of the IT department within the organization. This involves working with senior leaders in all parts of the organization to ensure good communication, planning, and budgeting.<\/p>\r\n<p class=\"indent\">Interestingly, the CIO position does not necessarily require a lot of technical expertise. While helpful, it is more important for this person to have good management skills and understand the business.\u00a0Many organizations do not have someone with the title of CIO. Instead, the head of the information systems function is called the Vice President of Information Systems or Director of Information Systems.<\/p>\r\n\r\n<h2 class=\"calibre18\">Functional Manager<\/h2>\r\n<p class=\"nonindent\">As an information systems organization becomes larger, many of the different functions are grouped together and led by a manager. These functional managers report to the CIO and manage the employees specific to their function. For example, in a large organization there are a group of systems analysts who report to a manager of the systems analysis function. For more insight into how this might look, see the discussion\u00a0later in the chapter of how information systems are organized.<\/p>\r\n\r\n<h2 class=\"calibre18\">ERP Management<\/h2>\r\n<p class=\"nonindent\">Organizations using an ERP require one or more individuals to manage these systems.\u00a0EPR managers make sure that the ERP system is completely up to date, work to implement any changes to the ERP that are needed, and consult with various user departments on needed reports or data extracts.<\/p>\r\n\r\n<h2 class=\"calibre18\">Project Managers<\/h2>\r\n[caption id=\"attachment_686\" align=\"alignnone\" width=\"504\"]<img src=\"https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/project-managers.png\" alt=\"Screen shot of a Gantt chart\" width=\"504\" height=\"320\" class=\"wp-image-686 size-full\" \/> Gantt Chart for managing projects[\/caption]\r\n\r\n<div class=\"wp-caption4\">\r\n\r\nInformation systems projects are notorious for going over budget and being delivered late. In many cases a failed IT project can spell doom for a company. A project manager is responsible for keeping projects on time and on budget. This person works with the stakeholders of the project to keep the team organized and communicates the status of the project to management. Gantt charts, shown above, are used to graphically illustrate a project's schedule, tasks, and resources.\r\n\r\n<\/div>\r\n<p class=\"indent\">A project manager does not have authority over the project team. Instead, the project manager coordinates schedules and resources in order to maximize the project outcomes. This leader must be a good communicator and an extremely organized person. A project manager should also have good people skills. Many organizations require each of their project managers to become certified as a <a class=\"calibre3\" href=\"http:\/\/www.pmi.org\/Certification\/Project-Management-Professional-PMP.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Project Management Professional (PMP)<\/a>.<\/p>\r\n\r\n<h2 class=\"calibre18\">Information Security Officer<\/h2>\r\n<p class=\"nonindent\">An information security officer is in charge of setting information security policies for an organization and then overseeing the implementation of those policies. This person may have one or more people reporting to them as part of the information security team. As information has become a critical asset, this position has become highly valued. The information security officer must ensure that the organization\u2019s information remains secure from both internal and external threats.<\/p>\r\n\r\n<h2 class=\"calibre18\">Emerging Roles<\/h2>\r\n<p class=\"nonindent\">As technology evolves many new roles are becoming more common as other roles diminish. For example, as we enter the age of \u201cbig data,\u201d we are seeing the need for more data analysts and business intelligence specialists. Many companies are now hiring social media experts and mobile technology specialists. The increased use of cloud computing and Virtual Machine (VM) technologies also is increasing demand for expertise in those areas.<\/p>\r\n\r\n<h1 class=\"calibre8\">Career Paths in Information Systems<\/h1>\r\n[caption id=\"attachment_885\" align=\"alignleft\" width=\"188\"]<a href=\"https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/Career-Paths.png\"><img src=\"https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/Career-Paths-188x300.png\" alt=\"Comparing career paths in Information Systems\" width=\"188\" height=\"300\" class=\"wp-image-885 size-medium\" \/><\/a> Career Paths in Information Systems (click to enlarge)[\/caption]\r\n<p class=\"nonindent\">These job descriptions do not represent all possible jobs within an information systems organization. Larger organizations will have more specialized roles, while smaller organizations may combine some of these roles. Many of these roles may exist outside of a traditional information-systems organization, as we will discuss below.<\/p>\r\n<p class=\"indent\">Working with information systems can be a rewarding career choice. Whether you want to be involved in very technical jobs (programmer, database administrator), or you want to be involved in working with people (systems analyst, trainer, project manager), there are many different career paths available.<\/p>\r\n&nbsp;\r\n<p class=\"indent\">Many times those in technical jobs who want career advancement find themselves in a dilemma. A person can continue doing technical work, where sometimes their advancement options are limited, or become a manager of other employees and put themselves on a management career track. In many cases those proficient in technical skills are not gifted with managerial skills. Some organizations, especially those that highly value their technically skilled employees, create a technical track that exists in parallel to the management track so that they can retain employees who are contributing to the organization with their technical skills.<\/p>\r\n\r\n\r\n<hr class=\"calibre33\" \/>\r\n\r\n<h2 class=\"calibre18\">Sidebar: Are Certifications Worth Pursuing?<\/h2>\r\n<p class=\"nonindent\">As technology becomes more important to businesses, hiring employees with technical skills is becoming critical. But how can an organization ensure that the person they are hiring has the necessary skills? Many organizations are including technical certifications as a prerequisite for getting hired.<\/p>\r\n\r\n<div class=\"wp-caption3\" id=\"attachment_795\">\r\n\r\n&nbsp;\r\n<p class=\"nonindent1\"><em>Cisco Certified Internetwork Expert.<\/em><\/p>\r\n\r\n<\/div>\r\n\r\n[caption id=\"attachment_688\" align=\"alignright\" width=\"200\"]<img src=\"http:\/\/opentextbook.site\/informationsystems2018\/wp-content\/uploads\/sites\/3\/2018\/07\/cisco.png\" alt=\"CISCO certification badge\" width=\"200\" height=\"145\" class=\"wp-image-688 size-full\" \/> CISCO certification badge[\/caption]\r\n<p class=\"indent\">Certifications are designations given by a certifying body that someone has a specific level of knowledge in a specific technology. This certifying body is often the vendor of the product itself, though independent certifying organizations, such as <a class=\"calibre3\" href=\"http:\/\/certification.comptia.org\/home.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">CompTIA<\/a>, also exist. Many of these organizations offer certification tracks, allowing a beginning certificate as a prerequisite to getting more advanced certificates. To get a certificate, you generally attend one or more training classes and then take one or more certification exams. Passing the exams with a certain score will qualify you for a certificate. In most cases, these classes and certificates are not free. In fact a highly technical certification can cost thousands dollars.\u00a0Some examples of the certifications in highest demand include <a class=\"calibre3\" href=\"http:\/\/www.microsoft.com\/learning\/en\/us\/certification-overview.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a>\u00a0(software certifications), <a class=\"calibre3\" href=\"http:\/\/www.cisco.com\/web\/learning\/certifications\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">Cisco<\/a> (networking), and <a class=\"calibre3\" href=\"http:\/\/www.sans.org\" target=\"_blank\" rel=\"noopener noreferrer\">SANS<\/a> (security).<\/p>\r\n<p class=\"indent\">For many working in IT, determining whether to pursue one or more of these certifications is an important question. For many jobs, such as those involving networking or security, a certificate will be required by the employer as a way to determine which potential employees have a basic level of skill. For those who are already in an IT career, a more advanced certificate may lead to a promotion. For those wondering about the importance of certification, the best solution is to talk to potential employers and those already working in the field to determine the best choice.<\/p>\r\n\r\n\r\n<hr class=\"calibre33\" \/>\r\n\r\n<h1 class=\"calibre8\">Organizing the Information Systems Function<\/h1>\r\n<p class=\"nonindent\">In the early years of computing, the information-systems function (generally called \"data processing\") was placed in the finance or accounting department of the organization. As computing became more important, a separate information-systems function was formed, but it still was generally placed under the Chief Financial Officer and considered to be an administrative function of the company. By the 1980s and 1990s, when companies began networking internally and then connecting to the Internet, the information systems function was combined with the telecommunications functions and designated as the Information Technology (IT) department. As the role of information technology continued to increase, its place in the organization became more important. In many organizations today, the head of IT (the CIO) reports directly to the CEO.<\/p>\r\n\r\n<h2 class=\"calibre18\">Where in the Organization Should IS Be?<\/h2>\r\n<p class=\"nonindent\">Before the advent of the personal computer, the information systems function was centralized within organizations in order to maximize control over computing resources. When the PC began proliferating, many departments within organizations saw it as a chance to gain some computing resources for themselves. Some departments created an internal information systems group, complete with systems analysts, programmers, and even database administrators. These departmental IS groups were dedicated to the information needs of their own departments, providing quicker turnaround and higher levels of service than a centralized IT department. However, having several IS groups within an organization led to a lot of inefficiencies. There were now several people performing the same jobs in different departments. This decentralization also led to company data being stored in several places all over the company.<\/p>\r\n<p class=\"indent\">In some organizations a matrix reporting structure developed in which IT personnel were placed within a department and reported to\u00a0both the department management and the functional management within IS. The advantages of dedicated IS personnel for each department must be weighed against the need for more control over the strategic information resources of the company.<\/p>\r\n<p class=\"indent\"><span class=\"calibre15\">For many companies, these questions are resolved by the implementation of the ERP system (see discussion of ERP in Chapter 8). Because an ERP system consolidates most corporate data back into a single database, the implementation of an ERP system requires organizations to find \u201csilos\u201d of data so that they can integrate them back into the corporate system. The ERP allows organizations to regain control of their information and influences organizational decisions throughout the company.<br class=\"calibre1\" \/><\/span><\/p>\r\n\r\n<h2 class=\"calibre18\">Outsourcing<\/h2>\r\n<p class=\"nonindent\">Frequently an organization needs a specific skill for a limited period of time. Instead of training existing employees or hiring new staff, it may make more sense to outsource the job. Outsourcing can be used in many different situations within the information systems function, such as the design and creation of a new website or the upgrade of an ERP system. Some organizations see outsourcing as a cost-cutting move, contracting out a whole group or department.<\/p>\r\n\r\n<h2 class=\"calibre18\">New Models of Organizations<\/h2>\r\n<p class=\"nonindent\">The integration of information technology has influenced the structure of organizations. The increased ability to communicate and share information has led to a \u201cflattening\u201d of the organizational structure due to the removal of one or more layers of management.<\/p>\r\n<p class=\"indent\">The network-based organizational structure is another changed enabled by information systems. In a network-based organizational structure, groups of employees can work somewhat independently to accomplish a project. People with\u00a0the right skills are brought together for a project and then released to work on other projects when that project is over.\u00a0These groups are somewhat informal and allow for all members of the group to maximize their effectiveness.<\/p>\r\n\r\n<h1 class=\"calibre8\">Information Systems Users \u2013 Types of Users<\/h1>\r\n<p class=\"nonindent\">Besides the people who work to create, administer, and manage information systems, there is one more extremely important group of people, namely, the users of information systems. This group represents a very large percentage of an organization's employees. If the user is not able to successfully learn and use an information system, the system is doomed to failure.<\/p>\r\n\r\n<div class=\"wp-caption4\">\r\n\r\n&nbsp;\r\n<p class=\"indent1\"><i>Technology adoption user types<\/i><\/p>\r\n\r\n<\/div>\r\n\r\n[caption id=\"attachment_886\" align=\"alignright\" width=\"395\"]<a href=\"https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/diffusion-of-innovation.png\"><img src=\"https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/diffusion-of-innovation.png\" alt=\"Chart showing the adoption rates of different types of users\" width=\"395\" height=\"296\" class=\"wp-image-886\" \/><\/a> Diffusion of Innovation (click to enlarge)[\/caption]\r\n<p class=\"indent\">One tool that can be used to understand how users will adopt a new technology comes from a 1962 study by Everett Rogers. In his book,\u00a0<i>Diffusion of Innovation<\/i>,<a class=\"calibre3\" href=\"#footnote-31-1\" id=\"return-footnote-31-1\" title=\"Rogers, E. M. (1962). Diffusion of innovations. New York: Free Press\"><sup class=\"footnote1\">[1]<\/sup><\/a>Rogers studied how farmers adopted new technologies and noticed that the adoption rate started slowly and then dramatically increased once adoption hit a certain point. He identified five specific types of technology adopters:<\/p>\r\n\r\n<ul class=\"calibre9\">\r\n \t<li class=\"calibre10\"><span class=\"calibre56\"><b>Innovators<\/b>. Innovators are the first individuals to adopt a new technology. Innovators are willing to take risks, are the youngest in age, have the highest social class, have great financial liquidity, are very social, and have the closest contact with scientific sources and interaction with other innovators. Risk tolerance is high so there is a willingness to adopt technologies thast may ultimately fail. Financial resources help absorb these failures (Rogers, 1962, p. 282).<\/span><\/li>\r\n \t<li class=\"calibre10\"><span class=\"calibre56\"><b>Early adopters<\/b>. The early adopters are those who adopt innovation soon after a technology has been introduced and proven. These individuals have the highest degree of opinion leadership among the other adopter categories, which means that these adopters can influence the opinions of the largest majority. Characteristics include being younger in age, having a higher social status, possessing more financial liquidity, having advanced education, and being more socially aware\u00a0than later adopters. These adopters are more discrete in adoption choices than innovators, and realize judicious choice of adoption will help them maintain a central communication position (Rogers, 1962, p. 283).<\/span><\/li>\r\n \t<li class=\"calibre10\"><span class=\"calibre56\"><b>Early majority<\/b>. Individuals in this category adopt an innovation after a varying degree of time. This time of adoption is significantly longer than the innovators and early adopters. This group tends to be slower in the adoption process, has above average social status, has contact with early adopters, and seldom holds positions of opinion leadership in a system (Rogers, 1962, p. 283).<\/span><\/li>\r\n \t<li class=\"calibre10\"><span class=\"calibre56\"><b>Late majority<\/b>. <span class=\"calibre15\">The late majority will adopt an innovation after the average member of the society. These individuals approach an innovation with a high degree of skepticism<\/span>, have below average social status, very little financial liquidity, are\u00a0in contact with others in the late majority and the early majority, and show very little opinion leadership.<\/span><\/li>\r\n \t<li class=\"calibre10\"><span class=\"calibre56\"><b>Laggards<\/b>. Individuals in this category are the last to adopt an innovation. Unlike those in the previous categories, individuals in this category show no\u00a0opinion leadership. These individuals typically have an aversion to change agents and tend to be advanced in age. Laggards typically tend to be focused on \u201ctraditions,\u201d are likely to have the lowest social status and the lowest financial liquidity, be oldest of all other adopters, and be in contact with only family and close friends.<a class=\"calibre3\" href=\"#footnote-31-2\" id=\"return-footnote-31-2\" title=\"Rogers, E. M. (1962). Diffusion of innovations. New York: Free Press\"><sup class=\"footnote1\">[2]<\/sup><\/a><br class=\"calibre1\" \/><\/span><\/li>\r\n<\/ul>\r\n<p class=\"indent\"><span class=\"calibre15\">These five types of users can be translated into information technology adopters as well<\/span>, and provide additional insight into how to implement new information systems within the organization. For example, when rolling out a new system, IT may want to identify the innovators and early adopters within the organization and work with them first, then leverage their adoption to drive the rest of the implementation to the other users.<\/p>\r\n\r\n<h1 class=\"calibre8\">Summary<\/h1>\r\n<p class=\"nonindent\">In this chapter we have reviewed the many different categories of individuals who make up the people component of information systems. The world of information technology is changing so fast that new roles are being created all the time and roles that existed for decades are being phased out. This chapter this chapter should have given you a good idea and appreciation for the importance of the people component of information systems.<\/p>\r\n\r\n\r\n<hr class=\"calibre33\" \/>\r\n\r\n<h1 class=\"calibre8\">Study Questions<\/h1>\r\n<ol class=\"calibre34\">\r\n \t<li class=\"calibre10\"><span class=\"calibre15\">Describe the role of a systems analyst.<\/span><\/li>\r\n \t<li class=\"calibre10\">What are some of the different roles for a computer engineer?<\/li>\r\n \t<li class=\"calibre10\">What are the duties of a computer operator?<\/li>\r\n \t<li class=\"calibre10\">What does the CIO do?<\/li>\r\n \t<li class=\"calibre10\">Describe the job of a project manager.<\/li>\r\n \t<li class=\"calibre10\">Explain the point of having two different career paths in information systems.<\/li>\r\n \t<li class=\"calibre10\">What are the advantages and disadvantages of centralizing the IT function?<\/li>\r\n \t<li class=\"calibre10\">What impact has information technology had on the way companies are organized?<\/li>\r\n \t<li class=\"calibre10\">What are the five types of information-systems users?<\/li>\r\n \t<li class=\"calibre10\">Why would an organization outsource?<\/li>\r\n<\/ol>\r\n<h1 class=\"calibre8\">Exercises<\/h1>\r\n<ol class=\"calibre34\">\r\n \t<li class=\"calibre10\">Which IT job would you like to have? Do some original research and write a two-page paper describing the duties of the job you are interested in.<\/li>\r\n \t<li class=\"calibre10\">Spend a few minutes on <a class=\"calibre3\" href=\"http:\/\/dice.com\" target=\"_blank\" rel=\"noopener noreferrer\">Dice<\/a> or <a class=\"calibre3\" href=\"http:\/\/monster.com\" target=\"_blank\" rel=\"noopener noreferrer\">Monster<\/a>\u00a0to find IT jobs in your area.\u00a0What IT jobs are currently available? Write up a two-page paper describing three jobs, their starting salary (if listed), and the skills and education needed for the job.<\/li>\r\n \t<li class=\"calibre10\">How is the IT function organized in your school or place of employment? Create an organization chart showing how the IT organization fits into your overall organization. Comment on how centralized or decentralized the IT function is.<\/li>\r\n \t<li class=\"calibre10\">What type of IT user are you? Take a look at the five types of technology adopters and then write a one-page summary of where you think you fit in this model.<\/li>\r\n<\/ol>\r\n<h1 class=\"calibre8\">Lab<\/h1>\r\n<ol class=\"calibre34\">\r\n \t<li class=\"calibre10\">Define each job in the list, then ask 10 friends to identify which jobs they have heard about or know something about. Tabulate your results.<\/li>\r\n \t<li class=\"calibre10\">Chief marketing technologist<\/li>\r\n \t<li class=\"calibre10\">Developer evangelist<\/li>\r\n \t<li class=\"calibre10\">Ethical hacker<\/li>\r\n \t<li class=\"calibre10\">Business intelligence analyst<\/li>\r\n \t<li class=\"calibre10\">Digital marketing manager<\/li>\r\n \t<li class=\"calibre10\">Growth hacker<\/li>\r\n \t<li class=\"calibre10\">UX designer<\/li>\r\n \t<li class=\"calibre10\">Cloud architect<\/li>\r\n \t<li class=\"calibre10\">Data detective<\/li>\r\n \t<li class=\"calibre10\">Master of edge computing<\/li>\r\n \t<li class=\"calibre10\">Digital prophet<\/li>\r\n \t<li class=\"calibre10\">NOC specialist<\/li>\r\n \t<li class=\"calibre10\">SEO\/SEM specialist<\/li>\r\n<\/ol>\r\n\r\n<hr class=\"calibre33\" \/>\r\n\r\n<div class=\"footnotes\">\r\n<ol class=\"calibre34\">\r\n \t<li id=\"footnote-31-1\" class=\"calibre10\">Rogers, E. M. (1962). <i>Diffusion of innovations<\/i>. New York: Free Press<a class=\"calibre3\" href=\"#return-footnote-31-1\">\u21b5<\/a><\/li>\r\n \t<li id=\"footnote-31-2\" class=\"calibre10\">Rogers, E. M. (1962). <i>Diffusion of innovations<\/i>. New York: Free Press<a class=\"calibre3\" href=\"#return-footnote-31-2\">\u21b5<\/a><\/li>\r\n<\/ol>\r\n<\/div>\r\n<\/div>\r\n<\/div>","rendered":"<div class=\"calibre1\" id=\"chapter-people\">\n<div class=\"front-matter-title-wrap\"><\/div>\n<div class=\"calibre1\">\n<div class=\"textbox textbox--learning-objectives\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\">Learning Objectives<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<p class=\"nonindent\">Upon successful completion of this chapter, you will be able to:<\/p>\n<ul class=\"calibre9\">\n<li class=\"calibre10\">describe each of the different roles that people play in the design, development, and use of information systems;<\/li>\n<li class=\"calibre10\">understand the different career paths available to those who work with information systems;<\/li>\n<li class=\"calibre10\">explain the importance of where the information-systems function is placed in an organization; and<\/li>\n<li class=\"calibre10\">describe the different types of users of information systems.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<h1 class=\"calibre8\">Introduction<\/h1>\n<p class=\"nonindent\">The opening chapters of this text focused on the technology behind information systems, namely hardware, software, data, and networking. The last chapter covered business processes and the key role they can play in the success of a business. This chapter discusses people, the last component of an information system.<\/p>\n<p class=\"indent\">People are involved in information systems in just about every way. People\u00a0imagine information systems,\u00a0people\u00a0develop information systems,\u00a0people\u00a0support information systems, and, perhaps most importantly,\u00a0people\u00a0<em class=\"calibre7\">use<\/em> information systems.<em class=\"calibre7\"><br class=\"calibre1\" \/><\/em><\/p>\n<h1 class=\"calibre8\">The Creators of Information Systems<\/h1>\n<p class=\"nonindent\">The first group of people to be considered play a role in designing, developing, and building information systems.\u00a0These people are generally technical and have a background in programming, analysis, information security, or database design. Just about everyone who works in the creation of information systems has a minimum of a bachelor\u2019s degree in computer science or information systems, though that is not necessarily a requirement. The process of creating information systems will be covered in more detail in Chapter 10.<\/p>\n<p class=\"indent\">The following chart shows the U. S. Bureau of Labor Statistics projections for computing career employment in 2020.<\/p>\n<figure id=\"attachment_684\" aria-describedby=\"caption-attachment-684\" style=\"width: 437px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/2020-projecctions.png\" alt=\"Pie chart showing U. S. Bureau of Labor Statistics - 2020 Projections\" width=\"437\" height=\"259\" class=\"wp-image-684 size-full\" srcset=\"https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/2020-projecctions.png 437w, https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/2020-projecctions-300x178.png 300w, https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/2020-projecctions-65x39.png 65w, https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/2020-projecctions-225x133.png 225w, https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/2020-projecctions-350x207.png 350w\" sizes=\"auto, (max-width: 437px) 100vw, 437px\" \/><figcaption id=\"caption-attachment-684\" class=\"wp-caption-text\">U. S. Bureau of Labor Statistics &#8211; 2020 Projections<\/figcaption><\/figure>\n<div class=\"wp-caption4\">\n<h2 class=\"indent1\">Systems Analyst<\/h2>\n<\/div>\n<p class=\"nonindent\"><span class=\"calibre15\">The systems analyst straddles the divide between identifying business needs and\u00a0imagining\u00a0a new or redesigned system to fulfill those needs<\/span>. This individual works with a team or department seeking to identify business requirements and analyze the specific details of an existing system or a system that needs to be built. Generally, the analyst is required to have a good understanding of the business itself, the purpose of the business, the business processes involved, and the ability to document them well. The analyst identifies the different stakeholders in the system and works to involve the appropriate individuals in the analysis process.<\/p>\n<p class=\"indent\">Prior to analyzing the problem or the system of concern, the analyst needs to a) clearly identify the problem, b) gain approval for the project, c) identify the stakeholders, and d) develop a plan to monitor the project. The analysis phase of the project can be broken down into five steps.<\/p>\n<ol class=\"calibre34\">\n<li class=\"calibre10\">Seek out and identify the details<\/li>\n<li class=\"calibre10\">Specify requirements<\/li>\n<li class=\"calibre10\">Decide which requirements are most important<\/li>\n<li class=\"calibre10\">Create a dialog showing how the user interacts with the existing system<\/li>\n<li class=\"calibre10\">Ask users to critique the list of requirements that have been developed<\/li>\n<\/ol>\n<p class=\"indent\">The analysis phase involves both the systems analyst and the users. It is important to realize the role the users take in the analysis of the system. Users can have significant insights into how well the current system functions as well as suggest improvements.<\/p>\n<p class=\"indent\">Once the requirements are determined, the analyst begins the process of translating these requirements into an information systems design. It is important to understand which different technological solutions will work and provide several alternatives to the client, based on the company\u2019s budgetary constraints, technology constraints, and culture. Once the solution is selected, the analyst will create a detailed document describing the new system. This new document will require that the analyst understand how to speak in the technical language of systems developers.<\/p>\n<p class=\"indent\">The design phase results in the components of the new system being identified, including how they relate to one another. The designer needs to communicate clearly with software developers as well database administrators by using terminology that is consistent with both of these specialties. The design phase of the project can be broken down into six steps.<\/p>\n<ol class=\"calibre34\">\n<li class=\"calibre10\">Design the hardware environment<\/li>\n<li class=\"calibre10\">Design the software<\/li>\n<li class=\"calibre10\">Design how the new system will interface with the users<\/li>\n<li class=\"calibre10\">Design hardware interfaces<\/li>\n<li class=\"calibre10\">Design database tables<\/li>\n<li class=\"calibre10\">Design system security<\/li>\n<\/ol>\n<p class=\"indent\">A systems analyst generally is not the one who does the actual development of the information system. The design document created by the systems analyst provides the detail needed to create the system and is handed off to a developer to actually write the software and to the database administrator to build the database and tables that will be in the database.<\/p>\n<p class=\"indent\"><span class=\"calibre15\">Sometimes the system may be assembled from off-the-shelf components by a person called a systems integrator<\/span>. This is a specific type of systems analyst that understands how to get different software packages to work with each other.\u00a0<span class=\"calibre15\"><br class=\"calibre1\" \/><\/span><\/p>\n<p class=\"indent\">To become a systems analyst, you should have a background both in the business analysis and in systems design. Many analysts first work as developers and have business experience before becoming system analysts. It is vital for analysts to clearly understand the purpose of the business of interest, realizing that all businesses are unique.<\/p>\n<h2 class=\"calibre18\">Programmer\/Developer<\/h2>\n<p class=\"nonindent\">Programmers spend their time writing computer code in a programming language. In the case of systems development, programmers generally attempt to fulfill the design specifications given to them by a systems analyst\/designer. Many different styles of software development exist A programmer may work alone for long stretches of time or work as part of a team with other developers. A programmer needs to be able to understand complex processes and also the intricacies of one or more programming languages.<\/p>\n<h2 class=\"calibre18\">Computer Engineer<\/h2>\n<p class=\"nonindent\">Computer engineers design the computing devices that are used every day. There are many types of computer engineers who work on a variety of different types of devices and systems. Some of the more prominent computer engineering jobs are as follows:<\/p>\n<ul class=\"calibre9\">\n<li class=\"calibre10\"><span class=\"calibre56\"><b>Hardware engineer<\/b>. A hardware engineer designs hardware and test components such as microprocessors, memory devices, routers, and networks. Many times, a hardware engineer is at the cutting edge of computing technology, creating something brand new. Other times, the hardware engineer\u2019s job is to re-engineer an existing component to work faster or use less power. Many times a hardware engineer\u2019s job is to write code to create a program that will be implemented directly on a computer chip.<\/span><\/li>\n<li class=\"calibre10\"><span class=\"calibre56\"><b>Software engineer<\/b>. Software engineers tend to focus on a specific area of software such as operating systems, networks, applications, or databases. Software engineers use three primary skill areas: computer science, engineering, and mathematics.<\/span><\/li>\n<li class=\"calibre10\"><span class=\"calibre56\"><b>Systems engineer<\/b>. A systems engineer takes the components designed by other engineers and makes them all work together, focusing on the integration of hardware and software. For example, to build a computer the mother board, processor, memory, and hard disk all have to work together. A systems engineer has experience with many different types of hardware and software and knows how to integrate them to create new\u00a0functionality.<\/span><\/li>\n<li class=\"calibre10\"><span class=\"calibre56\"><b>Network engineer<\/b>. A network engineer understands the networking requirements of an organization and then designs a communications system to meet those needs, using the networking hardware and software, sometimes referred to as a network operating system. Network engineers design both local area networks as well as wide area networks.<\/span><\/li>\n<\/ul>\n<p class=\"indent\">There are many different types of computer engineers, and often the job descriptions overlap. While many may call themselves engineers based on a company job title, there is also a professional designation of \u201cprofessional engineer\u201d which has specific requirements.\u00a0In the United States each state has its own set of requirements for the use of this title, as do different countries around the world. Most often, it involves a professional licensing exam.<\/p>\n<h1 class=\"calibre8\">Information Systems Operations and Administration<\/h1>\n<p class=\"nonindent\">Another group of information systems professionals are involved in the day-to-day operations and administration of IT. These people must keep the systems running and up-to-date so that the rest of the organization can make the most effective use of these resources.<\/p>\n<h2 class=\"calibre18\">Computer Operator<\/h2>\n<p class=\"nonindent\">A computer operator is the person who oversees the mainframe computers and data centers in organizations. Some of their duties include keeping the operating systems up to date, ensuring available memory and disk storage, providing for redundancy (think electricity, connectivity to the Internet, and database backups), and overseeing the physical environment of the computer.\u00a0Since mainframe computers increasingly have been replaced with servers, storage management systems, and other platforms, computer operators\u2019 jobs have grown broader and include working with these specialized systems.<\/p>\n<h2 class=\"calibre18\">Database Administrator<\/h2>\n<p class=\"nonindent\">A Database Administrator (DBA) is the person who designs and manages the databases for an organization. This person creates and maintains databases that are used as part of applications or the data warehouse. The DBA also consults with systems analysts and programmers on projects that require access to or the creation of databases.<\/p>\n<h2 class=\"calibre18\">Help Desk\/Support Analyst<\/h2>\n<p class=\"nonindent\">Most mid-size to large organizations have their own information technology help desk. The help desk is the first line of support for computer users in the company. Computer users who are having problems or need information can contact the help desk for assistance. Many times a help desk worker is a junior level employee who is able to answer basic issues that users need assistance with. Help desk analysts work with senior level support analysts or have a computer knowledgebase at their disposal to help them investigate the problem at hand. The help desk is a great place to break into working in IT because it exposes you to all of the different technologies within the company. A successful help desk analyst should have good communications skills and a sincere interest in helping users.<\/p>\n<h2 class=\"calibre18\">Trainer<\/h2>\n<p class=\"nonindent\">A computer trainer conducts classes to teach people specific computer skills. For example, if a new ERP system is being installed in an organization, one part of the implementation process is to teach all of the users how to use the new system. A trainer may work for a software company and be contracted to come in to conduct classes when needed; a trainer may work for a company that offers regular training sessions. Or a trainer may be employed full time for an organization to handle all of their computer instruction needs. To be successful as a trainer you need to be able to communicate technical concepts clearly and demonstrate patience with learners.<\/p>\n<h1 class=\"calibre8\">Managing Information Systems<\/h1>\n<p>&nbsp;<\/p>\n<p class=\"nonindent\">The management of information-systems functions is critical to the success of information systems within the organization. Here are some of the jobs associated with the management of information systems.<\/p>\n<h2 class=\"calibre18\">CIO<\/h2>\n<p class=\"nonindent\">The Chief Information Officer (CIO) is the head of the information-systems function. This person aligns the plans and operations of the information systems with the strategic goals of the organization. Tasks include budgeting, strategic planning, and personnel decisions for the information systems function. The CIO must also be the face of the IT department within the organization. This involves working with senior leaders in all parts of the organization to ensure good communication, planning, and budgeting.<\/p>\n<p class=\"indent\">Interestingly, the CIO position does not necessarily require a lot of technical expertise. While helpful, it is more important for this person to have good management skills and understand the business.\u00a0Many organizations do not have someone with the title of CIO. Instead, the head of the information systems function is called the Vice President of Information Systems or Director of Information Systems.<\/p>\n<h2 class=\"calibre18\">Functional Manager<\/h2>\n<p class=\"nonindent\">As an information systems organization becomes larger, many of the different functions are grouped together and led by a manager. These functional managers report to the CIO and manage the employees specific to their function. For example, in a large organization there are a group of systems analysts who report to a manager of the systems analysis function. For more insight into how this might look, see the discussion\u00a0later in the chapter of how information systems are organized.<\/p>\n<h2 class=\"calibre18\">ERP Management<\/h2>\n<p class=\"nonindent\">Organizations using an ERP require one or more individuals to manage these systems.\u00a0EPR managers make sure that the ERP system is completely up to date, work to implement any changes to the ERP that are needed, and consult with various user departments on needed reports or data extracts.<\/p>\n<h2 class=\"calibre18\">Project Managers<\/h2>\n<figure id=\"attachment_686\" aria-describedby=\"caption-attachment-686\" style=\"width: 504px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/project-managers.png\" alt=\"Screen shot of a Gantt chart\" width=\"504\" height=\"320\" class=\"wp-image-686 size-full\" srcset=\"https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/project-managers.png 504w, https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/project-managers-300x190.png 300w, https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/project-managers-65x41.png 65w, https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/project-managers-225x143.png 225w, https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/project-managers-350x222.png 350w\" sizes=\"auto, (max-width: 504px) 100vw, 504px\" \/><figcaption id=\"caption-attachment-686\" class=\"wp-caption-text\">Gantt Chart for managing projects<\/figcaption><\/figure>\n<div class=\"wp-caption4\">\n<p>Information systems projects are notorious for going over budget and being delivered late. In many cases a failed IT project can spell doom for a company. A project manager is responsible for keeping projects on time and on budget. This person works with the stakeholders of the project to keep the team organized and communicates the status of the project to management. Gantt charts, shown above, are used to graphically illustrate a project&#8217;s schedule, tasks, and resources.<\/p>\n<\/div>\n<p class=\"indent\">A project manager does not have authority over the project team. Instead, the project manager coordinates schedules and resources in order to maximize the project outcomes. This leader must be a good communicator and an extremely organized person. A project manager should also have good people skills. Many organizations require each of their project managers to become certified as a <a class=\"calibre3\" href=\"http:\/\/www.pmi.org\/Certification\/Project-Management-Professional-PMP.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Project Management Professional (PMP)<\/a>.<\/p>\n<h2 class=\"calibre18\">Information Security Officer<\/h2>\n<p class=\"nonindent\">An information security officer is in charge of setting information security policies for an organization and then overseeing the implementation of those policies. This person may have one or more people reporting to them as part of the information security team. As information has become a critical asset, this position has become highly valued. The information security officer must ensure that the organization\u2019s information remains secure from both internal and external threats.<\/p>\n<h2 class=\"calibre18\">Emerging Roles<\/h2>\n<p class=\"nonindent\">As technology evolves many new roles are becoming more common as other roles diminish. For example, as we enter the age of \u201cbig data,\u201d we are seeing the need for more data analysts and business intelligence specialists. Many companies are now hiring social media experts and mobile technology specialists. The increased use of cloud computing and Virtual Machine (VM) technologies also is increasing demand for expertise in those areas.<\/p>\n<h1 class=\"calibre8\">Career Paths in Information Systems<\/h1>\n<figure id=\"attachment_885\" aria-describedby=\"caption-attachment-885\" style=\"width: 188px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/Career-Paths.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/Career-Paths-188x300.png\" alt=\"Comparing career paths in Information Systems\" width=\"188\" height=\"300\" class=\"wp-image-885 size-medium\" srcset=\"https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/Career-Paths-188x300.png 188w, https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/Career-Paths-65x104.png 65w, https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/Career-Paths-225x359.png 225w, https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/Career-Paths-350x558.png 350w, https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/Career-Paths.png 413w\" sizes=\"auto, (max-width: 188px) 100vw, 188px\" \/><\/a><figcaption id=\"caption-attachment-885\" class=\"wp-caption-text\">Career Paths in Information Systems (click to enlarge)<\/figcaption><\/figure>\n<p class=\"nonindent\">These job descriptions do not represent all possible jobs within an information systems organization. Larger organizations will have more specialized roles, while smaller organizations may combine some of these roles. Many of these roles may exist outside of a traditional information-systems organization, as we will discuss below.<\/p>\n<p class=\"indent\">Working with information systems can be a rewarding career choice. Whether you want to be involved in very technical jobs (programmer, database administrator), or you want to be involved in working with people (systems analyst, trainer, project manager), there are many different career paths available.<\/p>\n<p>&nbsp;<\/p>\n<p class=\"indent\">Many times those in technical jobs who want career advancement find themselves in a dilemma. A person can continue doing technical work, where sometimes their advancement options are limited, or become a manager of other employees and put themselves on a management career track. In many cases those proficient in technical skills are not gifted with managerial skills. Some organizations, especially those that highly value their technically skilled employees, create a technical track that exists in parallel to the management track so that they can retain employees who are contributing to the organization with their technical skills.<\/p>\n<hr class=\"calibre33\" \/>\n<h2 class=\"calibre18\">Sidebar: Are Certifications Worth Pursuing?<\/h2>\n<p class=\"nonindent\">As technology becomes more important to businesses, hiring employees with technical skills is becoming critical. But how can an organization ensure that the person they are hiring has the necessary skills? Many organizations are including technical certifications as a prerequisite for getting hired.<\/p>\n<div class=\"wp-caption3\" id=\"attachment_795\">\n<p>&nbsp;<\/p>\n<p class=\"nonindent1\"><em>Cisco Certified Internetwork Expert.<\/em><\/p>\n<\/div>\n<figure id=\"attachment_688\" aria-describedby=\"caption-attachment-688\" style=\"width: 200px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/opentextbook.site\/informationsystems2018\/wp-content\/uploads\/sites\/3\/2018\/07\/cisco.png\" alt=\"CISCO certification badge\" width=\"200\" height=\"145\" class=\"wp-image-688 size-full\" srcset=\"https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/cisco.png 200w, https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/cisco-65x47.png 65w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><figcaption id=\"caption-attachment-688\" class=\"wp-caption-text\">CISCO certification badge<\/figcaption><\/figure>\n<p class=\"indent\">Certifications are designations given by a certifying body that someone has a specific level of knowledge in a specific technology. This certifying body is often the vendor of the product itself, though independent certifying organizations, such as <a class=\"calibre3\" href=\"http:\/\/certification.comptia.org\/home.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">CompTIA<\/a>, also exist. Many of these organizations offer certification tracks, allowing a beginning certificate as a prerequisite to getting more advanced certificates. To get a certificate, you generally attend one or more training classes and then take one or more certification exams. Passing the exams with a certain score will qualify you for a certificate. In most cases, these classes and certificates are not free. In fact a highly technical certification can cost thousands dollars.\u00a0Some examples of the certifications in highest demand include <a class=\"calibre3\" href=\"http:\/\/www.microsoft.com\/learning\/en\/us\/certification-overview.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a>\u00a0(software certifications), <a class=\"calibre3\" href=\"http:\/\/www.cisco.com\/web\/learning\/certifications\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">Cisco<\/a> (networking), and <a class=\"calibre3\" href=\"http:\/\/www.sans.org\" target=\"_blank\" rel=\"noopener noreferrer\">SANS<\/a> (security).<\/p>\n<p class=\"indent\">For many working in IT, determining whether to pursue one or more of these certifications is an important question. For many jobs, such as those involving networking or security, a certificate will be required by the employer as a way to determine which potential employees have a basic level of skill. For those who are already in an IT career, a more advanced certificate may lead to a promotion. For those wondering about the importance of certification, the best solution is to talk to potential employers and those already working in the field to determine the best choice.<\/p>\n<hr class=\"calibre33\" \/>\n<h1 class=\"calibre8\">Organizing the Information Systems Function<\/h1>\n<p class=\"nonindent\">In the early years of computing, the information-systems function (generally called &#8220;data processing&#8221;) was placed in the finance or accounting department of the organization. As computing became more important, a separate information-systems function was formed, but it still was generally placed under the Chief Financial Officer and considered to be an administrative function of the company. By the 1980s and 1990s, when companies began networking internally and then connecting to the Internet, the information systems function was combined with the telecommunications functions and designated as the Information Technology (IT) department. As the role of information technology continued to increase, its place in the organization became more important. In many organizations today, the head of IT (the CIO) reports directly to the CEO.<\/p>\n<h2 class=\"calibre18\">Where in the Organization Should IS Be?<\/h2>\n<p class=\"nonindent\">Before the advent of the personal computer, the information systems function was centralized within organizations in order to maximize control over computing resources. When the PC began proliferating, many departments within organizations saw it as a chance to gain some computing resources for themselves. Some departments created an internal information systems group, complete with systems analysts, programmers, and even database administrators. These departmental IS groups were dedicated to the information needs of their own departments, providing quicker turnaround and higher levels of service than a centralized IT department. However, having several IS groups within an organization led to a lot of inefficiencies. There were now several people performing the same jobs in different departments. This decentralization also led to company data being stored in several places all over the company.<\/p>\n<p class=\"indent\">In some organizations a matrix reporting structure developed in which IT personnel were placed within a department and reported to\u00a0both the department management and the functional management within IS. The advantages of dedicated IS personnel for each department must be weighed against the need for more control over the strategic information resources of the company.<\/p>\n<p class=\"indent\"><span class=\"calibre15\">For many companies, these questions are resolved by the implementation of the ERP system (see discussion of ERP in Chapter 8). Because an ERP system consolidates most corporate data back into a single database, the implementation of an ERP system requires organizations to find \u201csilos\u201d of data so that they can integrate them back into the corporate system. The ERP allows organizations to regain control of their information and influences organizational decisions throughout the company.<br class=\"calibre1\" \/><\/span><\/p>\n<h2 class=\"calibre18\">Outsourcing<\/h2>\n<p class=\"nonindent\">Frequently an organization needs a specific skill for a limited period of time. Instead of training existing employees or hiring new staff, it may make more sense to outsource the job. Outsourcing can be used in many different situations within the information systems function, such as the design and creation of a new website or the upgrade of an ERP system. Some organizations see outsourcing as a cost-cutting move, contracting out a whole group or department.<\/p>\n<h2 class=\"calibre18\">New Models of Organizations<\/h2>\n<p class=\"nonindent\">The integration of information technology has influenced the structure of organizations. The increased ability to communicate and share information has led to a \u201cflattening\u201d of the organizational structure due to the removal of one or more layers of management.<\/p>\n<p class=\"indent\">The network-based organizational structure is another changed enabled by information systems. In a network-based organizational structure, groups of employees can work somewhat independently to accomplish a project. People with\u00a0the right skills are brought together for a project and then released to work on other projects when that project is over.\u00a0These groups are somewhat informal and allow for all members of the group to maximize their effectiveness.<\/p>\n<h1 class=\"calibre8\">Information Systems Users \u2013 Types of Users<\/h1>\n<p class=\"nonindent\">Besides the people who work to create, administer, and manage information systems, there is one more extremely important group of people, namely, the users of information systems. This group represents a very large percentage of an organization&#8217;s employees. If the user is not able to successfully learn and use an information system, the system is doomed to failure.<\/p>\n<div class=\"wp-caption4\">\n<p>&nbsp;<\/p>\n<p class=\"indent1\"><i>Technology adoption user types<\/i><\/p>\n<\/div>\n<figure id=\"attachment_886\" aria-describedby=\"caption-attachment-886\" style=\"width: 395px\" class=\"wp-caption alignright\"><a href=\"https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/diffusion-of-innovation.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/diffusion-of-innovation.png\" alt=\"Chart showing the adoption rates of different types of users\" width=\"395\" height=\"296\" class=\"wp-image-886\" srcset=\"https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/diffusion-of-innovation.png 800w, https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/diffusion-of-innovation-300x225.png 300w, https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/diffusion-of-innovation-768x576.png 768w, https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/diffusion-of-innovation-65x49.png 65w, https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/diffusion-of-innovation-225x169.png 225w, https:\/\/opentextbook.site\/informationsystems2019\/wp-content\/uploads\/sites\/3\/2018\/07\/diffusion-of-innovation-350x263.png 350w\" sizes=\"auto, (max-width: 395px) 100vw, 395px\" \/><\/a><figcaption id=\"caption-attachment-886\" class=\"wp-caption-text\">Diffusion of Innovation (click to enlarge)<\/figcaption><\/figure>\n<p class=\"indent\">One tool that can be used to understand how users will adopt a new technology comes from a 1962 study by Everett Rogers. In his book,\u00a0<i>Diffusion of Innovation<\/i>,<a class=\"calibre3\" href=\"#footnote-31-1\" id=\"return-footnote-31-1\" title=\"Rogers, E. M. (1962). Diffusion of innovations. New York: Free Press\"><sup class=\"footnote1\">[1]<\/sup><\/a>Rogers studied how farmers adopted new technologies and noticed that the adoption rate started slowly and then dramatically increased once adoption hit a certain point. He identified five specific types of technology adopters:<\/p>\n<ul class=\"calibre9\">\n<li class=\"calibre10\"><span class=\"calibre56\"><b>Innovators<\/b>. Innovators are the first individuals to adopt a new technology. Innovators are willing to take risks, are the youngest in age, have the highest social class, have great financial liquidity, are very social, and have the closest contact with scientific sources and interaction with other innovators. Risk tolerance is high so there is a willingness to adopt technologies thast may ultimately fail. Financial resources help absorb these failures (Rogers, 1962, p. 282).<\/span><\/li>\n<li class=\"calibre10\"><span class=\"calibre56\"><b>Early adopters<\/b>. The early adopters are those who adopt innovation soon after a technology has been introduced and proven. These individuals have the highest degree of opinion leadership among the other adopter categories, which means that these adopters can influence the opinions of the largest majority. Characteristics include being younger in age, having a higher social status, possessing more financial liquidity, having advanced education, and being more socially aware\u00a0than later adopters. These adopters are more discrete in adoption choices than innovators, and realize judicious choice of adoption will help them maintain a central communication position (Rogers, 1962, p. 283).<\/span><\/li>\n<li class=\"calibre10\"><span class=\"calibre56\"><b>Early majority<\/b>. Individuals in this category adopt an innovation after a varying degree of time. This time of adoption is significantly longer than the innovators and early adopters. This group tends to be slower in the adoption process, has above average social status, has contact with early adopters, and seldom holds positions of opinion leadership in a system (Rogers, 1962, p. 283).<\/span><\/li>\n<li class=\"calibre10\"><span class=\"calibre56\"><b>Late majority<\/b>. <span class=\"calibre15\">The late majority will adopt an innovation after the average member of the society. These individuals approach an innovation with a high degree of skepticism<\/span>, have below average social status, very little financial liquidity, are\u00a0in contact with others in the late majority and the early majority, and show very little opinion leadership.<\/span><\/li>\n<li class=\"calibre10\"><span class=\"calibre56\"><b>Laggards<\/b>. Individuals in this category are the last to adopt an innovation. Unlike those in the previous categories, individuals in this category show no\u00a0opinion leadership. These individuals typically have an aversion to change agents and tend to be advanced in age. Laggards typically tend to be focused on \u201ctraditions,\u201d are likely to have the lowest social status and the lowest financial liquidity, be oldest of all other adopters, and be in contact with only family and close friends.<a class=\"calibre3\" href=\"#footnote-31-2\" id=\"return-footnote-31-2\" title=\"Rogers, E. M. (1962). Diffusion of innovations. New York: Free Press\"><sup class=\"footnote1\">[2]<\/sup><\/a><br class=\"calibre1\" \/><\/span><\/li>\n<\/ul>\n<p class=\"indent\"><span class=\"calibre15\">These five types of users can be translated into information technology adopters as well<\/span>, and provide additional insight into how to implement new information systems within the organization. For example, when rolling out a new system, IT may want to identify the innovators and early adopters within the organization and work with them first, then leverage their adoption to drive the rest of the implementation to the other users.<\/p>\n<h1 class=\"calibre8\">Summary<\/h1>\n<p class=\"nonindent\">In this chapter we have reviewed the many different categories of individuals who make up the people component of information systems. The world of information technology is changing so fast that new roles are being created all the time and roles that existed for decades are being phased out. This chapter this chapter should have given you a good idea and appreciation for the importance of the people component of information systems.<\/p>\n<hr class=\"calibre33\" \/>\n<h1 class=\"calibre8\">Study Questions<\/h1>\n<ol class=\"calibre34\">\n<li class=\"calibre10\"><span class=\"calibre15\">Describe the role of a systems analyst.<\/span><\/li>\n<li class=\"calibre10\">What are some of the different roles for a computer engineer?<\/li>\n<li class=\"calibre10\">What are the duties of a computer operator?<\/li>\n<li class=\"calibre10\">What does the CIO do?<\/li>\n<li class=\"calibre10\">Describe the job of a project manager.<\/li>\n<li class=\"calibre10\">Explain the point of having two different career paths in information systems.<\/li>\n<li class=\"calibre10\">What are the advantages and disadvantages of centralizing the IT function?<\/li>\n<li class=\"calibre10\">What impact has information technology had on the way companies are organized?<\/li>\n<li class=\"calibre10\">What are the five types of information-systems users?<\/li>\n<li class=\"calibre10\">Why would an organization outsource?<\/li>\n<\/ol>\n<h1 class=\"calibre8\">Exercises<\/h1>\n<ol class=\"calibre34\">\n<li class=\"calibre10\">Which IT job would you like to have? Do some original research and write a two-page paper describing the duties of the job you are interested in.<\/li>\n<li class=\"calibre10\">Spend a few minutes on <a class=\"calibre3\" href=\"http:\/\/dice.com\" target=\"_blank\" rel=\"noopener noreferrer\">Dice<\/a> or <a class=\"calibre3\" href=\"http:\/\/monster.com\" target=\"_blank\" rel=\"noopener noreferrer\">Monster<\/a>\u00a0to find IT jobs in your area.\u00a0What IT jobs are currently available? Write up a two-page paper describing three jobs, their starting salary (if listed), and the skills and education needed for the job.<\/li>\n<li class=\"calibre10\">How is the IT function organized in your school or place of employment? Create an organization chart showing how the IT organization fits into your overall organization. Comment on how centralized or decentralized the IT function is.<\/li>\n<li class=\"calibre10\">What type of IT user are you? Take a look at the five types of technology adopters and then write a one-page summary of where you think you fit in this model.<\/li>\n<\/ol>\n<h1 class=\"calibre8\">Lab<\/h1>\n<ol class=\"calibre34\">\n<li class=\"calibre10\">Define each job in the list, then ask 10 friends to identify which jobs they have heard about or know something about. Tabulate your results.<\/li>\n<li class=\"calibre10\">Chief marketing technologist<\/li>\n<li class=\"calibre10\">Developer evangelist<\/li>\n<li class=\"calibre10\">Ethical hacker<\/li>\n<li class=\"calibre10\">Business intelligence analyst<\/li>\n<li class=\"calibre10\">Digital marketing manager<\/li>\n<li class=\"calibre10\">Growth hacker<\/li>\n<li class=\"calibre10\">UX designer<\/li>\n<li class=\"calibre10\">Cloud architect<\/li>\n<li class=\"calibre10\">Data detective<\/li>\n<li class=\"calibre10\">Master of edge computing<\/li>\n<li class=\"calibre10\">Digital prophet<\/li>\n<li class=\"calibre10\">NOC specialist<\/li>\n<li class=\"calibre10\">SEO\/SEM specialist<\/li>\n<\/ol>\n<hr class=\"calibre33\" \/>\n<div class=\"footnotes\">\n<ol class=\"calibre34\">\n<li id=\"footnote-31-1\" class=\"calibre10\">Rogers, E. M. (1962). <i>Diffusion of innovations<\/i>. New York: Free Press<a class=\"calibre3\" href=\"#return-footnote-31-1\">\u21b5<\/a><\/li>\n<li id=\"footnote-31-2\" class=\"calibre10\">Rogers, E. M. (1962). <i>Diffusion of innovations<\/i>. New York: Free Press<a class=\"calibre3\" href=\"#return-footnote-31-2\">\u21b5<\/a><\/li>\n<\/ol>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"author":1,"menu_order":3,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-36","chapter","type-chapter","status-publish","hentry"],"part":50,"_links":{"self":[{"href":"https:\/\/opentextbook.site\/informationsystems2019\/wp-json\/pressbooks\/v2\/chapters\/36","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/opentextbook.site\/informationsystems2019\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/opentextbook.site\/informationsystems2019\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/opentextbook.site\/informationsystems2019\/wp-json\/wp\/v2\/users\/1"}],"version-history":[{"count":10,"href":"https:\/\/opentextbook.site\/informationsystems2019\/wp-json\/pressbooks\/v2\/chapters\/36\/revisions"}],"predecessor-version":[{"id":948,"href":"https:\/\/opentextbook.site\/informationsystems2019\/wp-json\/pressbooks\/v2\/chapters\/36\/revisions\/948"}],"part":[{"href":"https:\/\/opentextbook.site\/informationsystems2019\/wp-json\/pressbooks\/v2\/parts\/50"}],"metadata":[{"href":"https:\/\/opentextbook.site\/informationsystems2019\/wp-json\/pressbooks\/v2\/chapters\/36\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/opentextbook.site\/informationsystems2019\/wp-json\/wp\/v2\/media?parent=36"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/opentextbook.site\/informationsystems2019\/wp-json\/pressbooks\/v2\/chapter-type?post=36"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/opentextbook.site\/informationsystems2019\/wp-json\/wp\/v2\/contributor?post=36"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/opentextbook.site\/informationsystems2019\/wp-json\/wp\/v2\/license?post=36"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}