StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Strategic Information Systems ICT - Essay Example

Cite this document
Summary
This paper talks about the selected issue sufficient to show the overall corporate basic aspects and areas regarding security and privacy. This research compares and contracts the possible influences that a data or information breach can place on business…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.7% of users find it useful
Strategic Information Systems ICT
Read Text Preview

Extract of sample "Strategic Information Systems ICT"

?Strategic Information Systems Current ICT Strategic Issues Introduction Digital convergence and globalization in the developing knowledge society has brought complex legal, ethical and societal issues. At the present, people are faced with hard and complex questions about the freedom of access, expression to data and information, the right to confidentiality, intellectual property rights, and intellectual diversity. On the other hand, information and communication technology (ICT) is an active need of the all the humans for the collection of information and knowledge, and for itself, should be guaranteed as a fundamental right to all the human beings. All through the world, rights that are previously and officially defined and implemented are every day being violated, no matter in the name of financial profit, religious reasons, political stability, the operation against terrorism, or for personal hunger and benefit. Abuse of these rules and rights have generated serious issues in the field of ICT, like that the human social and digital security, cyber crime and privacy issues, as well as all those have influenced people’s lives either openly or indirectly (Sembok, 2003). Ready Rural deals in steel related products and has a huge business setup. This corporation uses a large size ICT setup to manage its business operation and this ICT setup is managed by 120 people. However, in order to manage this huge arrangement effectively there is need for the better security and privacy management techniques. This report outlines some of the major aspects and areas regarding ICT issues at the corporate. This report will try to assess some of the key issues regarding technology application and underlying technology issues those can hinder in the overall performance of Ready Rural Business. Part 1 Ready Rural (RR) is a large size business corporation with a huge ICT setup. Currently its employees consist of more than 3000 staff members and 120 of them deal with corporate ICT infrastructure. This section is about discussing how and what type of procedures and methods we utilize to assess the basic issues in ICT based corporate arrangement. This section is about the selected issue sufficient to show the overall corporate basic aspects and areas regarding security and privacy. In this scenario we are aimed at analyzing the basic issues regarding corporate information and data dealing. This kind of issues can emerge while transferring and dispatching and data and information. In addition, these issues can harm the corporate credibility and performance. In this scenario, the basic intention is to assess all the possible impacts that data security issues can place on the corporate market standing and customer relationship management. This research will compare and contracts the possible influences that a data or information breach can place on business. Here we will try to involve all possible stakeholders who can play role in the whole situation. However, major stakeholders that are involved in this scenario include business staff, outsider business rivals and hackers. These all categories will be inspected to assess their possible interest in business working and operational performance. I will make use of the drill down approach to assess and evaluate the overall working and performance related issues. These issues will be about the security and ethical aspects related. Part 2 Ethical Issues in ICT Assessing and determining the influence of a new technology, like that ICT could be extremely complicated task. In fact, ICT does not simply engage technological scenarios, however as well epistemology as the major part of ICT is information that demonstrates information, data and knowledge. In addition, ICT helps expand the capability of mankind to gather, process, store, recognize, utilize, develop, and distribute information at a speed as well as scale that had never been thought probable previously. Additionally, a number of influences as well as transformations of ICT are noticeable, however lots of are subtle (Turban et al., 2005; Laudon & Laudon, 1999). However, this report will discuss some of the main issues with respect to Ready Rural (RR) business arrangement. Here I will present and elaborate some of main areas those need to be addressed in order to better deal with security and privacy concerns brought by ICT at Ready Rural business. Loss of privacy Ready Rural is a large size business corporation. Currently, the business deals with a lot of customers, supplier and involving stakeholders. There is a great chance of the security issues and privacy concerns such as loss of data and security at the corporate arrangement. In fact, the business data is transmitted and sent to a variety of people having major stack in business. In this scenario there is a chance of security breaches and privacy issues. Transactions are transferred and recorded in database of Ready Rural business at main data centers. The contents of e-communications and databases and other private information can be accessed by prohibited individuals and organizations if they are not strongly protected (United Nations, 2003; Sembok, 2003; International Social Security Association, 2004). Errors The huge business setup of Ready Rural Business deals with a lot of business transactions every day. In this scenario there are greater chances of having some error during entry of data feeding level. In addition, the information inserted into business databases is prone to device and human faults and error. Addition, the computer programs that execute different processes can hold thousands of issues and errors. As a result, these issues and errors are able to produce wrong as well as confusing information regarding organizations and individuals. Moreover, the information and programs errors might consequence in financial loss at Ready Rural Business, or even the loss of lives because Ready Rural Corporation has steel processing plant that has a really dangerous working environment (United Nations, 2003; Sembok, 2003; International Social Security Association, 2004). Intellectual Property Rights At the present, Ready Rural Business has a complete ICT business arrangement which is operated by 120 people. This business setup consists of a large number of applications, data and working information. In addition, this data could be financial and customer related. The customer information is a really critical resource of business that needs to be protected in order to construct loyal customer bonds. In case of theft of Ready Rural Business’s customer or financial data there could be massive business damage. There is great need for the enhanced technology based support for maintaining the development of technology. The majority are significantly for the reason of development in native ICT modernism and development, local software businesses (United Nations, 2003; Sembok, 2003; International Social Security Association, 2004). Professional Ethics At the present, Ready Rural Corporation consists of 3000 employees. Thus, an organization with such a huge setup must have appropriate business resources to manage staff. On the other hand, there are many business and corporate areas that can be accessed by these staff members. There are a lot of chances of security breaches and illegal access to such arrangements due to higher staff rate. In this scenario one question needs to be answered by Ready Rural Business’s HR management “how well trained as well as ethical are ICT professionals in carrying out their duties? In addition, useless and faulty systems that cause disasters and hardships to users might be developed by unskilled ICT professionals. In provision their responsibilities ICT professionals have to show their most excellent performances and standards as established by professional bodies intended for quality assurance for Ready Rural Business betterment (United Nations, 2003; Sembok, 2003; International Social Security Association, 2004). Denial of Service (DoS) Attacks Denial of service (DoS) based security attacks are techniques which are used to break the suitable working of any business and corporate working arrangement that is attached with any website or network. For example in case of Ready Rural Business the attack on the business network can engage transmission of huge volumes of bogus data and information requests to slow down the performance of the website or can excess it to the point where the corporate network system hosting the website will collapse. In addition, in an attempt to perform similar attacks namelessly the activity will frequently engage utilization of 3rd party computers those are controlled by the perpetrator without the owner’s (Ready Rural Business) awareness. Additionally, these systems are initiated to attack a website in anticipation of the system is no longer capable to perform job (UNITED NATIONS, 2007; Shelly et al., 2005; Turban et al., 2005). Viruses and Malicious Code Ready Rural Business network is all the time in danger from virus and malicious attacks from outside and inside the business structure. In this scenario, the danger is about effecting the business working and overall corporate working areas with virus attacks. These attacks can cause a serious damage to the business process. Thus, these attacks can permanently or temporarily disable Ready Rural corporate network and computers. In addition, a number of programs such as worms have self replicating nature as well as are able to consequently influence huge numbers of systems in an extremely short space of time (UNITED NATIONS, 2007; Shelly et al., 2005; Turban et al., 2005). Unauthorized Access Ready Rural Business has a large volume of business data with numerous information access points. Thus, in case if an illegal person tries to access such access points, there can emerge many serious issues regarding effective business working and operational management. Such issues can also lead to possible damages like, deletion, duplication or conversion of secret business information. These all issues are really critical for the business working and effective working. In addition, the unauthorized accesses to Ready Rural Business’s electronic data or to a computer system can also cause the abuse of that data. For instance there have been a number of examples where the businesses databases of a variety of companies have been illegally accessed as well as the business and customer details of the entire of clients of the businesses posted online (UNITED NATIONS, 2007; Shelly et al., 2005; Turban et al., 2005). Technology Risks Ready Rural Business can also face some sort of technological issues. There are more chances of major risks when dealing with technology. However, some of the important risks could be regarding performance, scalability, stability and lock in aspects regarding Ready Rural Business arrangement. In addition, if lock-in happens at the smooth working of Ready Rural Business then the business might face high costs as the suppliers might take benefit of their lock in as well as maybe even their control of solutions for that particular lock-in. In case of less effective resources handling and non-proper technology resource updating the business can face huge business damage. For example if Ready Rural Business is taking constant database backups, in case of possible disaster the whole business data can be lost. In this scenario there is need for effective technology management (CriticalICT, 2010). Financial Risks Ready Rural Business is also in danger of financial risk due to ICT technology application. It is assessed that most of ICT technology projects fail due to less effective project management and technology based limitation. In such scenario any new initiative of the Ready Rural Business regarding implementation of some new technology can demand some handsome investment. If such scenario, the project is not managed in a better way, as a result the whole development fails to cause huge corporate damage. This happen because: usually IT projects are assessed wrongly. They are estimated as functioning processes i.e., by using return on investment method. Businesses might need to spend and keep spending in an IT and ICT based technology based project for being able to make profit from it later (prospects). In addition, return on investment method is a major aspect to assess IT projects however should not be the alone factor to utilize to assess IT projects (CriticalICT, 2010). People Risks As people respond differently on the application and implementation of new ICT and information systems they require to be considered a risk also. In this scenario, managers have a propensity to prohibit the workers (humans) as a risk. In addition, the method to manage “people” as a security risk is to engage them in the decision making as well as certainly to pay attention on constructing the right circumstance intended for require for transformation (CriticalICT, 2010). Business Process Risks At the Ready Rural Corporation the risks of misconduct will take toward the lack of flow in the business might guide to the shutdown of the corporation. In addition, this lack of confidence usually happens if the top management of the business is out of touch due to the daily processes. In case of Ready Rural Business working and operational arrangement the business process needs to be aligned with ICT and business technology based system. Here is need for the better management of the ICT projects (CriticalICT, 2010). Management Risks Ready Rural Business can also face some of the management related risks those need to be well managed. In addition, weak or ineffectual management will have its influences on the company as well as thus it is a security risk for the business that weak management might ignore business prospects or undervalue the value of technology joint by business process (CriticalICT, 2010). External Risks Currently, Ready Rural Corporation deals with more than 150 external suppliers. The business links and communication system are open to those supplier and outsiders. In case of breaching or illegal access to the business systems can cause damage to business working and operations. The supplier might be a risk as they might not be conscious of care regarding the organizations culture, resources and other problems and circumstances. If the Ready Rural Corporation decides to outsource a business ICT based solution to an outsourcing businesses then it will lose the control over software and system selection. Thus, the risks tackles by that business might cause costly contracts as well as a weakening service and then the risk of lock-in to the outsourcing partner and their system selection (CriticalICT, 2010). Sustainability Issues Suitable technology should never denote lesser or backward technology, however rather technology that will productively take the majority of us best from the current to the future. Current economic cost can be significant, however in a fast-moving ICT based arrangement, support, total life-cycle as well as social costs are as well significant (Aluko, 2004; EIE, 2003). In addition, all the levels and departments of corporate have to be occupied in one means or the other in ICT training, education and usage. However, the concern should for all time be placed from the extremely beginning in making sure that some features of ICT that is geared towards mass deployment have to encompass a plan intended for untimely local assembly as well as local grounds-up manufacturing of the organized technologies, by means of terms for local content in material as well as personnel (Aluko, 2004; EIE, 2003). Conclusion Digital convergence and globalization in the developing knowledge society has brought complex legal, ethical and societal issues. At the present, people are faced with hard and complex questions about the freedom of access, expression to data and information, the right to confidentiality, intellectual property rights, and intellectual diversity. On the other hand, information and communication technology (ICT) is an active need of the all the humans for the collection of information and knowledge, and for itself, should be guaranteed as a fundamental right to all the human beings. Ready Rural deals in steel related products and has a huge business setup. This corporation uses a large size ICT setup to manage its business operation and this ICT setup is managed by 120 people. However, in order to manage this huge arrangement effectively there is need for the better security and privacy management techniques. The ICT needs higher management and protections for the superior corporate operational management. In addition, there is need for high level protection and application of the security measures and staff training for the better management and accomplishment of better corporate performance. References Aluko, M.E., 2004. Some Issues in ICT for Nigerian Development. [Online] Available at: http://www.dawodu.com/aluko98.htm [Accessed 22 October 2011]. CriticalICT, 2010. Risk Management in IT. [Online] Available at: http://criticalict.com/ [Accessed 20 October 2011]. EIE, 2003. Mapping the moral future of ICTs. [Online] Available at: http://eiex.eu/docs/EIEX03ETICA.pdf [Accessed 22 October 2011]. International Social Security Association, 2004. Information and communications technology (ICT) social security project management. [Online] Available at: http://www.issa.int/pdf/IT/2IBM.pdf [Accessed 18 October 2011]. Laudon, K.C. & Laudon, J.P., 1999. Management Information Systems, Sixth Edition. New Jersey: Prentice Hall. Sembok, T.M.T., 2003. ETHICS OF INFORMATION COMMUNICATION TECHNOLOGY (ICT). In The Regional Meeting on Ethics of Science and Technology. Bangkok, 2003. Shelly, Cashman & Vermaat, 2005. Discovering Computers 2005. Boston: Thomson Course Technology. Turban, E., Leidner, D., McLean, E. & Wetherbe, J., 2005. Information Technology for Management: Transforming Organizations in the Digital Economy. New York: Wiley. United Nations, 2003. Youth and Information and Communication Technologies (ICT). [Online] Available at: http://www.un.org/esa/socdev/unyin/documents/ch12.pdf [Accessed 12 October 2011]. UNITED NATIONS, 2007. information and communication technology policy and legal issues for central asia. [Online] Available at: vi.unctad.org/digital-library/?task=dl_doc&doc_name=99-ict [Accessed 18 October 2011]. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Strategic Information Systems ICT Essay Example | Topics and Well Written Essays - 2500 words”, n.d.)
Retrieved de https://studentshare.org/information-technology/1391911-strategic-information-systems-ict
(Strategic Information Systems ICT Essay Example | Topics and Well Written Essays - 2500 Words)
https://studentshare.org/information-technology/1391911-strategic-information-systems-ict.
“Strategic Information Systems ICT Essay Example | Topics and Well Written Essays - 2500 Words”, n.d. https://studentshare.org/information-technology/1391911-strategic-information-systems-ict.
  • Cited: 0 times

CHECK THESE SAMPLES OF Strategic Information Systems ICT

Strategic Information System in an Organization

An information system comprises of transaction processing systems, management information systems, systems for decision-making support as well as strategic information systems.... In information systems, the basic element is data which basically refers to raw, unevaluated details, figures, symbols, events and other resourceful facts concerning the origination's needs.... information systems help the manager in their daily routine operations so that they function properly and effectively....
12 Pages (3000 words) Essay

Information System and Information Technology Strategy

With this background this paper makes a detailed report on the role the information system and information technology strategies play in the development of a business along with the potential benefits that may arise to the business out of the implementation of the information systems strategies along with the business strategies.... Role of information systems Strate... It is also imperative for any organization to have its systems regarding the collection and dissemination of information in place so that the top management of the firm is supplied with valid inputs for making effective managerial decisions affecting the business of the firm....
11 Pages (2750 words) Essay

Present and Future Scenario of IM&T Development

In future what specific requirements will be needed is to BE analyzed for implementing any strategic information and technological changes.... Evaluate the present information tech.... Discuss at length about the shortcoming or bottlenecks to implement the strategies to achieve the objectives of the implementation of information management and technology.... How these shortcomings could be eradicated and finally how we will achieve the required aims/ goals to develop a prudent information tech....
13 Pages (3250 words) Assignment

The Strategic Issues Which Are Associated with Information Systems

rominent examples of strategic information systems have included the use of SABRE and APOLLO by the US Airlines in the past for the increase in travel bookings of these Carriers by making sure their names appeared on the first screens of the travel agents.... This essay defines and appreciates the strategic and organisational issues which are associated with information systems.... Galliers 1991)During the early nineties these information systems emerged as serving a special purpose....
8 Pages (2000 words) Essay

Fundamentals of Information and Information Systems

The concept behind e-services is there's a particular task, asset, or capability that you want to gain access to, that now can be made available to you over the Net, because it's now being created as an Internet service. This report pertains to the current position of Hewlett Packard (HP) information systems, its current business problems and the way ahead for this business organization.... At this point HP's corporate software and support division and corporate systems...
15 Pages (3750 words) Essay

Analysis of Strategic Information Systems

  This paper discusses the strategies adopted for information management, knowledge management and information system management.... Data is collected at all points which act as sources of data which is then converted into needed information during the data processing phase and this, in turn, is made available at an appropriate time when people managing the company needs it.... Essentially, information management is all about providing the right information to the right person at the right time....
9 Pages (2250 words) Research Paper

Impact of Global Management Information Systems on Strategy

This essay "Impact of Global Management information systems on Strategy" dwells on the information management systems of worldwide enterprises.... In doing so, it accords a blueprint for existing literature on management information systems.... Lastly, the budding global village is made more integrative through information systems and technology, expediting the interaction among markets instead of continuing with conventional organization bureaucracies (Bradley, 1994)....
18 Pages (4500 words) Essay

Hospital Health Information Systems: Are Failures Problems of the Past

This coursework "Hospital Health information systems Are Failures Problems of the Past?... describes problems in health information systems.... This paper outlines salient facts, reasons why information systems are so important for organizations like the NHS today.... The article also maintains that it is disturbing that several complex ict plans experience some degrees of failure (Lane, Snaith& Lane, 2007).... In addition, the article states that little difference exists in the performance of the private and the public sector regarding development in ict projects....
8 Pages (2000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us