Chevron's Infrastructure Evolution: IT Strategy and Global Expansion

Verified

Added on  2023/06/13

|4
|665
|489
Case Study
AI Summary
This case study examines Chevron Corporation's infrastructure evolution, highlighting the critical role of IT in supporting its global energy operations. It discusses the use of seismic imaging technology for discovering oil and gas reservoirs, the security vulnerabilities of SCADA systems and methods for improvement, and the pros and cons of moving enterprise-wide applications to the cloud. The study also emphasizes the importance of identity management and single sign-on systems in business intranets and extranets, as well as the necessity for CIOs and IT executives to be business literate to effectively oversee geographically distributed enterprise networks. This document is available on Desklib, a platform offering a range of study tools and solved assignments for students.
Document Page
Running head: INFORMATION SYSTEM
Information System
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1INFORMATION SYSTEM
Discussion Points
1. Brief explanation of the working of Seismic Imaging Technology of Chevronand its
effect on Chevron in discovering new oil and gas reservoirs
Seismic Imaging Technology is a technology that Chevron uses to aide to find oil and
natural gases from underneath the earth (Montazeri, Fomel & Nielsen, 2016). This is done by
finding the reservoirs using seismic technology by sending sound waves deep into the earth
and record the reflected signal them when they bounce back up with the use of geophones.
These seismic signals are collected and interpreted by geologists, seismologists and
other experts to decipher the exact location of the new reservoirs for oil and gas. Then
exploration is done to ultimately unearth the found oil and gas reservoirs.
2. Security Vulnerabilities of SCADA, its improvement methodologiesand digital
control systems
Supervisory Control and Data Acquisition or SCADA is an automation system used to
collect data from instruments that are generally located at remote sites. Unlike the past
systems, the latest SCADA technologies are networked, distributed and depend on open
internet protocols(Laudon & Laudon, 2015). This is what makes it susceptible to remote
cyber terrorism, external remote cyber threats and unauthorized access. The methodology that
has been adopted to increase the security of the digital control systems is by implementing
IP-based SCADA systems.
Document Page
2INFORMATION SYSTEM
3. Pros and cons of moving enterprise-wide applications that have traditionally been
supported on premises to the cloud
The primary benefit of implementing cloud-based enterprise-wide applications over
its traditional environment that it is cost effective, improves scalability and makes the
application tolerant to disaster(Cusack&Ghazizadeh, 2016).
The only negative effect it has on an enterprise-wide application is due to its unending
virtual storage capability, the cloud-based system are vulnerable to data security risks.
4. Identity management and single sign-on systems with their importance in business
intranets and extranets
Identity Management and Single Sign-on, although seem similar, but are different
from each other as SSO allows multiple facilities with a single login and Identity
management is the process by which an authorized personnel has the ability to access to
different applications (Cusack&Ghazizadeh, 2016). Both are equally important in business
intranets and extranets since SSO and IM are important for identification an authorization of
an individual.
5. Reasons for the importance for a CIO or IT executive who oversees geographically
distributed enterprise networks to be business literate
There is a gap expected between IT and CIO, that is an IT executive, is essential. CIO
needs to drive an analysis and reengineering of the business processes that are existing along
with identifying enterprises knowledge resources (Laudon & Laudon, 2015). It is the key task
of a CIO and IT executive that it is not limited to technical skills only. CIO’s role is to
provide accurate vision and leadership to develop the IT initiatives in the business. Therefore
a CIO or IT executive needs to be business literate.
Document Page
3INFORMATION SYSTEM
Reference
Cusack, B., & Ghazizadeh, E. (2016). Evaluating single sign-on security failure in cloud
services. Business Horizons, 59(6), 605-614.
Laudon, K. C., & Laudon, J. P. (2015). Management Information Systems: Managing the
Digital Firm Plus MyMISLab with Pearson eText--Access Card Package. Prentice
Hall Press.
Montazeri, M., Fomel, S., & Nielsen, L. (2016, February). Diffraction Seismic Imaging of the
Chalk Group Reservoir Rocks. In AGU Fall Meeting Abstracts.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]