Book description
Unlike many books that only provide a general review of the strategies important to the chief information officer, this volume explains how to execute the guidelines it recommends. It surveys existing strategies and includes detailed problem-solving ideas, such as how to structure optimal IT and telecom contracts with suppliers, the implications of SOP-98, and accounting for software costs. The text integrates the perspective of a CIO coping with the daily pressure for results, with that of an IT auditor focused on governance and internal control. Examples, charts, templates, and anecdotes supplement the material.
Table of contents
- Front cover
- Dedication
- Contents (1/2)
- Contents (2/2)
- Preface
- Acknowledgments
- The Authors
- Chapter 1. Core Skills and Career Development (1/3)
- Chapter 1. Core Skills and Career Development (2/3)
- Chapter 1. Core Skills and Career Development (3/3)
- Chapter 2. Information Technology Governance (1/5)
- Chapter 2. Information Technology Governance (2/5)
- Chapter 2. Information Technology Governance (3/5)
- Chapter 2. Information Technology Governance (4/5)
- Chapter 2. Information Technology Governance (5/5)
- Chapter 3. Information Technology Finance (1/6)
- Chapter 3. Information Technology Finance (2/6)
- Chapter 3. Information Technology Finance (3/6)
- Chapter 3. Information Technology Finance (4/6)
- Chapter 3. Information Technology Finance (5/6)
- Chapter 3. Information Technology Finance (6/6)
- Chapter 4. Project Management (1/6)
- Chapter 4. Project Management (2/6)
- Chapter 4. Project Management (3/6)
- Chapter 4. Project Management (4/6)
- Chapter 4. Project Management (5/6)
- Chapter 4. Project Management (6/6)
- Chapter 5. Creating Good Enough Code (1/2)
- Chapter 5. Creating Good Enough Code (2/2)
- Chapter 6. Enterprise Architecture (1/5)
- Chapter 6. Enterprise Architecture (2/5)
- Chapter 6. Enterprise Architecture (3/5)
- Chapter 6. Enterprise Architecture (4/5)
- Chapter 6. Enterprise Architecture (5/5)
- Chapter 7. Mergers and Acquisitions (1/2)
- Chapter 7. Mergers and Acquisitions (2/2)
- Chapter 8. Sourcing (1/2)
- Chapter 8. Sourcing (2/2)
- Chapter 9. Business Intelligence and Analytics (1/5)
- Chapter 9. Business Intelligence and Analytics (2/5)
- Chapter 9. Business Intelligence and Analytics (3/5)
- Chapter 9. Business Intelligence and Analytics (4/5)
- Chapter 9. Business Intelligence and Analytics (5/5)
- Chapter 10. Security (1/4)
- Chapter 10. Security (2/4)
- Chapter 10. Security (3/4)
- Chapter 10. Security (4/4)
- Chapter 11. Training (1/2)
- Chapter 11. Training (2/2)
- Chapter 12. Effective Use of Consultants (1/2)
- Chapter 12. Effective Use of Consultants (2/2)
- Chapter 13. Operations (1/2)
- Chapter 13. Operations (2/2)
- Chapter 14. Futures (1/2)
- Chapter 14. Futures (2/2)
- Chapter 15. CIO Interviews (1/4)
- Chapter 15. CIO Interviews (2/4)
- Chapter 15. CIO Interviews (3/4)
- Chapter 15. CIO Interviews (4/4)
- Appendix A: Examples of Key IT General Controls (1/2)
- Appendix A: Examples of Key IT General Controls (2/2)
- Appendix B: Examples of Key IT Application Controls (1/2)
- Appendix B: Examples of Key IT Application Controls (2/2)
- Appendix C: Project Management Artifact Examples (1/2)
- Appendix C: Project Management Artifact Examples (2/2)
- Appendix D: IT Risk Assessment Checklist (1/2)
- Appendix D: IT Risk Assessment Checklist (2/2)
- Appendix E: Due Diligence Checklist for Mergers and Acquisitions (Business) (1/5)
- Appendix E: Due Diligence Checklist for Mergers and Acquisitions (Business) (2/5)
- Appendix E: Due Diligence Checklist for Mergers and Acquisitions (Business) (3/5)
- Appendix E: Due Diligence Checklist for Mergers and Acquisitions (Business) (4/5)
- Appendix E: Due Diligence Checklist for Mergers and Acquisitions (Business) (5/5)
- Appendix F: Due Diliegence Checklist for Mergers and Acquisitions - IT
- Appendix G: Example IT Policies and Direction for "XYZ Corp" (1/6)
- Appendix G: Example IT Policies and Direction for "XYZ Corp" (2/6)
- Appendix G: Example IT Policies and Direction for "XYZ Corp" (3/6)
- Appendix G: Example IT Policies and Direction for "XYZ Corp" (4/6)
- Appendix G: Example IT Policies and Direction for "XYZ Corp" (5/6)
- Appendix G: Example IT Policies and Direction for "XYZ Corp" (6/6)
- Appendix H: Recommended Reading
- Index (1/3)
- Index (2/3)
- Index (3/3)
- Back cover
Product information
- Title: The Effective CIO
- Author(s):
- Release date: December 2008
- Publisher(s): Auerbach Publications
- ISBN: 9781420064643
You might also like
book
The Strategic CIO
Recognized as One of the Best Business Books for 2014 by CIO Magazine Based on interviews …
book
The CIO Edge
Great CIOs consistently exceed key stakeholders' expectations and maximize the business value delivered through their company's …
book
The Changing Role of the CIO
Does Big Data represent an existential threat to CIOs? Yes, quite possibly. For the past three …
book
CIO Wisdom II: More Best Practices
World-class IT leadership solutions from working CIOs: detailed, realistic, proven Every year, IT leadership becomes more …