Information Servives within Organization (DIT 203)

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
As the Business Environment Changes... Introduction Your IT systems will not take care of themselves - they must be managed. The MANAGEMENT OF AN IT SYSTEM.
1 An Overview of Computer Security computer security.
1 Chapter 7 IT Infrastructures Business-Driven Technology
Principles of Information Technology
Why Managers Must Understand IT Managers play a key role –Frame opportunities and threats so others can understand them –Evaluate and prioritize problems.
Session 3 – Information Security Policies
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Security in Practice Enterprise Security. Business Continuity Ability of an organization to maintain its operations and services in the face of a disruptive.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 8 Protecting Information.
ORGANIZING IT SERVICES AND PERSONNEL (PART 1) Lecture 7.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
Security and Ethics Safeguards and Codes of Conduct.
 In this unit you will: impact  Assess the impact of TPS on participants.  Identify jobs  Identify jobs that have changed or have been created as a.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Phone:
Information Security and Privacy in HRIS
ETHICAL ISSUES IN HEALTH AND NURSING PRACTICE CODE OF ETHICS, STANDARDS OF CONDUCT, PERFORMANCE AND ETHICS FOR NURSES AND MIDWIVES.
8 – Protecting Data and Security
Payment Card Industry (PCI) Rules and Standards
Information Technology Acceptable Use An Overview
Acceptable Use Policy (Draft)
UNIT 4 NETWORK ENVIRONMENTS.
Chapter 6: Securing the Cloud
WHAT IS A NETWORK TYPES OF NETWORK NETWORK HARDWARE
Ethics & Social Responsibility
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
Payment card industry data security standards
12 Communication.
INFORMATION SYSTEM CATEGORIES
Unit 13 IT Systems Troubleshooting and Repair Anne Sewell
The Office Today.
Unit 4 IT Security.
Welcome to Milton’s Parts Express
Occupational Radiation Protection during High Exposure Operations
DTS Disaster Recovery Service Fact and Fallacy
How to build a good reputation online
UNIT 19 Data Security 2.
Ethics & Social Responsibility
Information Technology (IT) Department
Hello, Today we will look at cyber security and the Internet of Things and how it could impact our business.
Section 15.1 Section 15.2 Identify Webmastering tasks
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Managing Multi-user Databases
Chapter 6 Purchasing and Maintaining a Computer
Computer Ethics.
IT INFRASTRUCTURES Business-Driven Technologies
Systems analysis and design, 6th edition Dennis, wixom, and roth
Systems analysis and design, 6th edition Dennis, wixom, and roth
INFORMATION SYSTEMS SECURITY and CONTROL
Protecting Yourself from Fraud including Identity Theft
Faculty of Science IT Department By Raz Dara MA.
Communicating in the IT Industry
Principles of Information Technology
Presentation transcript:

Information Servives within Organization (DIT 203) Ch 8 Managing Information Technology System Prepared by : Sharma Dhillon

1.0 Introduction Information Technology System Management Providing a stable environment without any stagnation & changes that will upset the information, information technology & KWs. Managing ITS – need to control the ITS components while adjusting them to the effect of changes & protecting the system from internal & external harm.

1.1 Managing information Involves 3 elements: MANAGING INFORMATION Check the role of information in an organization Address the protection of information from loss, damage & abuse Discuss the management of access to information

2.0 Role of Information in an organization Two function: Information as raw material The organization which uses ITS, information itself is a form of raw material which is used to create product or services. Information as a capital Information is considered as capital (asset) because the organization uses them to produce product or services that will fulfill customer’s needs.

2.1 Management in retrieving information Including preparing the organization to: Retrieve the correct / appropriate information – should be correct and legal. At the appropriate time / as needed – should be ready when needed, easily accessible. In the required form – presented in understandable way, logic & easy to manipulate.

3.0 Security : Protection against loss, corruption & abuse Important to safeguard information since a lot of time, money & energy gets invested in finding it. Solution : perform back-up once a week. Media for backup : diskette, CD-ROM, tape. Backup media should be kept in safe place.

Information protection Elements to be avoided: Stolen information Network violation (Internet) Virus

3.1 Stolen information Stolen information will expose confidential information of the organization to others. Solution : Encrypting information – Encrypted information can only be read by those who has the decryption code! File access limitations – using password for file accessing or use additional hardware component.

3.2 Virus A program that is created with intention to destroy another information technology system. Solution: Control information flowing in & out of organization to safeguard against virus. Install anti-virus software.

3.2 Violation through network (internet) Information exchange through network encourages network violation. Important information such as data &v credit card number can be stolen. Solution: Firewall – to restrict unauthorized user from accessing the network of the organization.

4.0 Privacy Employer & employee Business & customer Employer have strong reason to keep employees information as it relates to appointment of the best worker, employee’s action is employer’s responsibility & other personal data. Business & customer Businesses keep customer’s information to identify the customer & customize product or services to meet their needs & to provide continuous service.

5.0 Managing Information Technology Control to information technology component Ensuring disaster that occurs will not destroy the flow of information in the organization Information technology arrangement allowing maximum efficiency environment MANAGING INFORMATION Check the role of information in an organization Address the protection of information from loss, damage & abuse Discuss the management of access to information MANAGING INFORMATION Check the role of information in an organization Address the protection of information from loss, damage & abuse Discuss the management of access to information

Controlling Information Technology Component in Organization Means: Integrate IT component in organization so that it can interact among one another. Information consists of different formats & can create problems when integrated. Solution: buy software & hardware to standardize. Determine cost that is involved. Important to determine cost involved to repair, buy & maintaining the IT equipment. Failure to control will result in financial planning & profit.

Component IT Arrangement that produces Maximum Capacity Environment Component arrangement will affect KW’s health & thinking. Ergonomics – a study on setting the suitable design & workplace arrangement to maximize productivity & reduce health interference to KWs

Ensuring disaster that happens will not destroy the flow of IS in organization. Solution: reformation disaster planning (a planning on how business operation can proceed in case disaster occurs). Used to recover the business & computer operation. Involves: Customers, Facilities, KWs, Business Information, Computer hardware & Communication infrastructure.

Customer Customer plays important role in a business hence they should be informed when disaster occurs as it encourages trust between business & them. Inform via phone or media. Facilities Necessary to identify most important business function &required equipment in order to place new business location in cases of disaster. Hot site – alternate location fully equipped (computer, telephone line, printer etc) Cold Site – alternate location not fully equipped but has security system, backup power supply etc)

Knowledge Worker Business Information KW must know when & where they need to perform their regular work after a disaster. Disaster will affect KW’s life, organization to provide them house if business moves to new location. Longer business period = organization must provide food or resource for the food supply. Business Information Important for KWs to backup business information as it can be used if the disaster occurs.

Communication Infrastructure Computer Equipment Possible major problem that can happen when disaster happens is when a HOT SITE supplier fail to supply perfect server equipment. Reason : network is unique & system software are supplied by different vendors. Communication Infrastructure Organization must supply communication equipment such as cellular telephone & ham radio when disaster occurs. Provide communication planning to coordinate

Managing Knowledge Worker Telecommuting Multicultural Ethics

Telecommuting A condition where the KW performs office task from home. Enables communication & cooperation with anyone & anywhere in the world via phone line. Advantages: Reduce maintenance cost & increases productivity Able to use KWs expertise that has been located far from the business location.

Matters concerning telecommuting Why choosing telecommuting? Because it will improve customer service, reduce maintenance cost & find the suitable worker. Project type/task that can be carried out using telecommuting? Task where its results has unique content (self contained!) ex: accountants, software developer. Who is suitable/can perform telecommuting? Individual who has capability to perform the task at home (known as telecommuter) & capable to manage the time well.

Matters concerning telecommuting How telecommuting is implemented? Organization to provide information technology resources that enables telecommuters to perform task from home. Payment for equipment used, maintenance. Where telecommuting is located? Telecommuters uses virtual office as their workspace & there are 2 types of workspace: Hotelling – fully equipped & reserved for the KW Motelling – space provided for KW on first come first serve basis.

Multicultural Culture Collective personality of a nation or society. Includes: language, traditions, religion, currency, history, acceptable behaviour etc Effect of cross culture diversity = difference in behaviour & attitude among people from different cultures. Culture shock = disorientation & confusion one experiences when his familiarity in regard of culture is different with the new culture he encounters. IT experts & KWs are among the first to be sent abroad when company expands.

Multicultural Culture shock has 3 phases: Early stage of stay = interesting & amusing 2nd phase = differences becomes irritating, feel alone, depressed. 3rd phase = adapting to new environment, make friends, learn to expect & where to find what you need. Being aware of culture shock may help in adjusting or adapting more quickly & reduce negative effect in productivity.

Ethics Basis or standard that assists in giving guidelines to determine attitude, action & choice that are made by an individual. Information technology system manager must provide good guidelines & demonstrate good ethics. Why ethics important? Avoid KW from deception through the information technology system.

Formation of ethics Involves 3 phases: Preadolescent’s phase When you don’t commit error because you are afraid of punishment. Adolescent’s phase When you don’t commit error because you don’t want to be pressured or receive bad assumptions from others. Adult’s phase When you do something right simply because it is right & it is not against the law.