StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

New Technology in the Workplace - Research Paper Example

Cite this document
Summary
This paper “New Technology in the Workplace” will analyze the changes that have occurred in the past decade due to advanced technology particularly Information technology. There are various IT tools which can protect as well as optimize office systems…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.7% of users find it useful
New Technology in the Workplace
Read Text Preview

Extract of sample "New Technology in the Workplace"

New Technology in the Workplace Abstract Employees working in organization, corporations or in any office systems will use the technological tools in various ways to complete their works effectively, easily and quickly. In the last decade, mainly information technology (IT) products are being invented and developed for office use, as they can help the organizations optimize their productivity and thereby earn good profits. However, at the same time, employees could use the technological tools, specifically Information Technology products negatively to gain undue advantages for themselves, and thereby cause damages to the organizations. In that worst case scenario also, technologies will play a very prominent role to avert those scenarios and optimally protect the organization. Apart from protecting the organization, they can also enable the actualization of barrier free communication channels for the management as well as the employees. Thus, this paper will analyze the changes that have occurred in the past decade due to advanced technology particularly Information technology. The changes that have occurred in office systems in the past decade due to advanced technology Introduction When one speaks or thinks of an office in an organization, the ‘mental picture’, one visualizes is of papers, telephones, typewriters, computers, cabins etc, etc. The crucial thing that the mind ‘crops out’ is the picture of a working human. So, it clearly proves that in an office environment, prominence is always attached to the technological products. In an organization, workers will normally be apportioned or “structurized” into different departments and importantly into different offices for better arrangement and streamlining of work. The management and the employees will manage or will be managed with the aid of various tools. The tools to manage could be manual or technological. Through out the 20th century and particularly in the first decade of the 21st century, many technological products including many IT products were developed through out the world, which had and is still having applications in all spheres of human lives. Out of the many technological products, a good number is being used in office management. That is, offices of today have used or integrated communications systems in every aspect of their functioning. From opening a simple door to carrying out advanced operations, technology has become an omnipresent entity in offices, with their entire operations hinging on the support provided by technology, particularly Information Technology. As mentioned above, 20th century is the ‘gateway’ for the entry of many new technologies in all spheres of life. As early 20th century saw the full effects of Industrial Revolution, many new technological products made their presence felt in organizations or factories or offices. Particularly in offices, technology was at its fullest use. That is, only in the early 20th century, people ‘organized’ themselves into a structured setup like offices to carry out their duties. While carrying those duties only, the technological products came into the picture and started to aid them in the early part of the 20th century. The first of the new breed of technological machines, which started making presence in the office environment, is the Adding machines. Adding machines carried out additions and other mathematical calculations and in turn replaced many employees who were specifically employed for doing these calculations. That is, by carrying out various calculations, Adding machines minimized the number of employees, thereby changing the structure or the interior of the offices in many fields like banking and accounting. The use of these tools continued till the advent of electronic calculators and computers. Next on the list were the Typewriters, which made its presence as an effective tool in the early 20th century. The typewriters started doing manual works like writing with greater effect, speed and ease, becoming a prominent part of office environments. “The advantages that electric typewriters brought to the workplace were greater speed and legibility. The machines enabled businesses to increase their efficiency.” (museumoflondon.org.uk). The other technological tool which made its entry into the office environment in the early 20th century and is still evolving in the current times as an effective communicative tool is the telephones. Even though, telephone was invented in 19th century, its applications became extensive only in the early 20th century. That is, as the new century dawned and with the establishment of many commercial trading companies, organizations extended their operations within the home country and also beyond the borders. So, when the organizations extended, it lead to offices being located a various distant places. This is when telephone was started to be optimally used. The communication structure was developed using telephone and that technology ‘shrunk’ or shortened any distant physical distances Research Role of technology in protecting the office systems Employees with ulterior motives and importantly using Information technology tools could wreck and cause immense losses to the companies ranging, from loss of money, data, contracts, etc. The employees could wreck the Corporations in which they are working, by using Information Technology in many ways. That is, they could alter or break down the Information Technology products functioning inside the organizations, and also they could ‘bring in’ other tools or threats from outside to disable the technologies used in the organization. Apart from those harmful and disgruntled employees, external elements in the form of competitors, thieves, hackers, etc, could also attack or intrude or rob using Information Technology. “…usually crimes are carried out by disgruntled employees who feel the company has treated them unfairly. Data theft can often occur by employees leaving to set up a rival company or data is stolen to sell on to rival companies.” (CY4OR). Every company or office systems will have what they call Critical Information Assets. The attack or breach into the corporation’s technology corridor could be mainly in the form of Virus attacks targeting Critical Information Assets. With more complicated and virulent Viruses created every day, using advanced computer programs, the technology of corporations are exposed to constant threats. Apart from these hardwares, the system will also be connected and also interconnected, using virtual networks in the form of internet or intranet. But, if a Virus infiltrates into this system through loopholes, then it will crash the entire system or a part of the system, bringing down the functioning of the company. When this happens, apart from the stoppage or crash of the information technology components, there will also be loss or stealing of data through the affected system Apart from the Virus attacks initiated by the employees or external threats, the security of the companies can be compromised, if the same employees and other external people steal the data storage devices or steal data using portable data storage devices. That is, when the storage devices are not kept under safe environment, it can be easily taken away or tampered by the culprits. Also, if the culprits have access to the secure locations of the information system through power, knowledge, etc, they could easily infiltrate it and take away the data. In case, if the locations are ‘protected’ by physical structures and weak passwords, then the culprits can decipher the passwords and can enter the locations. Also, if the data is transferred in an unencrypted form, the data can be easily accessed. If the data contains financial information, then the culprits can easily steal the companies’ finances. If the data is about the Corporations’ strategic plans and policies, then it can easily used by the competitors against them. One of the first ways in which companies can review and test their security status is by monitoring their employees. That is, as discussed above, employees or ex-employees of the companies due to one reason or other will try to breach the information technology system of the companies. They should be given sanctions to enter or access those secure installations after technologically fool proofing the security apparatus of the installations. That is, security measures like Closed Circuit TV Camera systems, authorized entry mechanisms, trackers, etc should be installed in all the sensitive installations, to monitor the employees and prevent them from becoming security threats. “Agencies shall develop, document, and implement policies and procedures for the selection, orientation, and supervision of employees and contractors who have access to agency IT resources. The objective is maintained and to promote an awareness of security matters” (Washington State Department of Information Services). One of the technologies used for surveillance and which is showing optimal results is the CCTV (Closed Circuit TV). This technology is one time investment, and thus cheaper compared to personnel but at the same time more effective. CCTV’s can also function round the clock without any lapse in ‘concentration’, unlike humans. So, security measures like CCTV installed in all the sensitive installations of the organization will help the organization immensely in countering any security threat. Technology can aid the organizations by making the system of authorized personnel foolproof. The entry of authorized personnel into physical structures can be made safer by having hardened passwords. "Hardened passwords shall be used and enforced whenever technically and operationally feasible. After a maximum of five incorrect login attempts, accounts will be locked for a specified period of time, or until administrator reset" (Washington State Department of Information Services). So, if organizations use more automated technologies that correlate and integrate information from a wide array of security solutions, it will translate to higher productivity and growth (CRA Reports). If all the parts of an organization conduct this way, their security will be guaranteed and can fully utilized to have ubiquitous presence all over the world for the organization. The main problem of Virus infiltration and other infiltrations can be solved, if a fail-safe Anti-Virus Protection system is implemented. The Anti-Virus Protection system should be able to address the three processes of Virus prevention, detection and removal, including signature currency. As internet and email are the rich source of viruses, the protection system should be able to block the entry of any viruses, from these sources. With new viruses being created every day, the protection system should be upgraded often to neutralize the challenge from the new viruses. Apart from these measures, steps should be taken to ensure that all the softwares, used to access or transmit through the Internet are approved by an authorized agency authority, inside the Corporation (Washington State Department of Information Services). The next step through which the Corporations can test and review their security status is by having a fool proof and safe data protection and sharing mechanism. That is, while sharing the company's data including critical information assets, the involved parties should sign a service level agreement (SLA). In that agreement, all the intricate and in-depth details about the ways in which the data should be protected and shared have to be spelled out. Firstly, steps should be taken by the Corporation to protect its data in its original form and also the authorized changed data. "Secure data storage is defined as the protection of data content and changes in data state from its original storage on electronic media by using encryption processes" (Washington State Department of Information Services). The first step to protect the data is by using a strong encryption process. That is, the data should be encrypted in a strong way, so that the intended receiver only accesses the data, with third persons having no chance to access the data, illegally. Role of technology in optimizing the communication channels and recommendations Providing a perfect and barrier environment to the workers will develop communication in an effective manner. With many organizations diversifying physically with units and sister concerns being established at different places, there has to be seamless communication for the effective functioning of the organization. In these situations, where physical distances could be the barrier, technology and the IT products will only break that barrier and will help to maintain the communications, thereby benefiting the organization in many ways. Among the many Information technological tools that can be used in the effective management of organization’s communication structure are VoIP and MPLS. VoIP short for Voice over Internet Protocol is a method, using which long-distance phone calls can be made with internet as the connecting and transferring medium. “…is a technology that allows you to make voice calls using a broadband Internet connection instead of a regular (or analog) phone line” (Federal Communications Commission). That is, internet will function as the transferring medium by transferring voice from computers to phones, computers to computers and vice versa. MPLS short for Multi protocol Label Switching is a network based technology which can speed up the traffic flow in the complicated maze of networks. It does that by establishing or adjusting the network paths for a given sequence of packets through labeling. As operations of global companies are widespread, transfer of voice signals and data has to be handled in a combined format, to actualize the formation of virtual self-managed teams. This need can be easily fulfilled by VoIP. So, optimum voice and data transfer including video conferencing facility between company’s headquarters and the branch offices will be possible. Like in the case of VoIP, MPLS can also be used to transfer voice, data and video in a combined or converging format. It can actually fasten the transfer of these combined materials by labeling it, which can result in smooth communication between the management and the teams at various parts of the world. Importantly, as MPLS circuits are not Internet circuits, security can be guaranteed. That is, even though MPLS networks work with internet, they are of secluded and privatized nature with a private IP address. “While these circuits usually ride the same backbone as the carrier's Internet traffic, they aren't public circuits, and they have a private IP address” (Davis, 2006). So, these two technologies are viable options that can be implemented by leaders to establish effective communication channels inside an organization. Conclusion and Recommendation From this analysis of technological tools from early 20th century till the past decade, it is clear that their entry brought out major developments in the functioning, efficiency as well as infrastructures of office systems. Although, technological tools were introduced mainly to help the clerical and manual work and to reduce labor, its introduction had a massive impact in the productivity of the organizations. However, with the entry of IT tools in the last part of the 20th century and particularly in the past decade, certain security issues started plaguing the computer. On the positive side, the same technology is being used to nullify those security issues. As analyzed in the paper, there are various IT tools which can protect as well as optimize office systems. Along with IT’s role in communication, technology is actualizing best case scenarios in many office systems. Unison of many employees under single organization to reach a target can always be aided by technology, importantly information technology. The information technology and its related products can be used optimally, if there is no security threat to it. So, to nullify the security threats, office systems can no longer ignore the importance of information security. That is, if corporations use more automated and proactive management strategies that correlate and integrate information from a wide array of security solution, it will translate to higher productivity and growth. And, if all the parts of an organization conduct this way, they can be fully utilized to have ubiquitous presence all over the world for the organization. References CRA Reports. Security Threat Management (STM). Retrieved November 25, 2009 from http://www.high-tower.com/docs/Security_Threat_Management.pdf. CY4OR. Computer Forensics Companies Can Help with Security Breach. Retrieved November 25, 2009 from http://www.cy4or.co.uk/pr-computer-forensics-security-breach.htm Davis, D. (2006). Learn the pros and cons of MPLS. Retrieved November 25, 2009 from http://articles.techrepublic.com.com/5100-1035_11-6058602.html Federal Communications Commission. IP Enabled Services. Retrieved November 25, 2009 from http://www.fcc.gov/voip/ museumoflondon.org.uk. New Technology in the Workplace 1900 to 1950. Retrieved November 25, 2009 http://www.museumoflondon.org.uk/English/Collections/OnlineResources/X20L/Themes/1376/1191/ Washington State Department of Information Services. Information Technology Security Standards. Retrieved November 25, 2009 from http://isb.wa.gov/policies/portfolio/401S.doc Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(New Technology in the Workplace Research Paper Example | Topics and Well Written Essays - 2500 words, n.d.)
New Technology in the Workplace Research Paper Example | Topics and Well Written Essays - 2500 words. Retrieved from https://studentshare.org/information-technology/1730424-the-changes-that-have-occurred-in-office-systems-in-the-past-decade-due-to-advanced-technology
(New Technology in the Workplace Research Paper Example | Topics and Well Written Essays - 2500 Words)
New Technology in the Workplace Research Paper Example | Topics and Well Written Essays - 2500 Words. https://studentshare.org/information-technology/1730424-the-changes-that-have-occurred-in-office-systems-in-the-past-decade-due-to-advanced-technology.
“New Technology in the Workplace Research Paper Example | Topics and Well Written Essays - 2500 Words”, n.d. https://studentshare.org/information-technology/1730424-the-changes-that-have-occurred-in-office-systems-in-the-past-decade-due-to-advanced-technology.
  • Cited: 0 times

CHECK THESE SAMPLES OF New Technology in the Workplace

Technology Change

eins, Barnaby (2010), "What is the impact of technology in the workplace" Retrieved from http://www.... om/items/1049218-what-is-the-impact-of-new-technology-in-the-workplace... technology has invaded our homes and workplaces in an overwhelming number of ways in the past five years.... hellip; Such are the likes of the WiFi technology, data storages and 4G celullar communications.... Peter Drucker, the progress in technology made workers in factories, employees in offices and even mobile CEOs become more productive and efficient in their work (Drucker, 1973, p....
1 Pages (250 words) Coursework

The Advantages of Modern Technology

This paper takes time to visit the advantages and disadvantages of the changes to get… Technological changes encompasses a wide range of improvement in the way things are things, products are produces, services served and delivered and in many other areas of The advantages of modern technology like time and money savings are traditional reasons for business entities as they make decisions in implementing New Technology in the Workplace (Jones, 2011).... The market is also a product of innovation and people or customers would always go for those advertised benefit of new products arising from new technology....
6 Pages (1500 words) Essay

W 3: Electronic Messages and Memorandums -(Effective Writing in the Workplace) The Impact of Technology

?The naked employee: How technology is compromising workplace privacy.... Numerous great discoveries… ave been made in medical, agriculture, education but at the same time it has made employee's dependant on it meaning, when a computer crashes or the power goes down it makes people almost disable till the problem is rectified. This has put people at a great disadvantage How Have Technological Advances Affected Work Place There is no doubt that advancement in technology has brought great success but it has also ruined great organizations....
1 Pages (250 words) Essay

IT in the Workplace and how It Affects Work-life Balance

The impact and introduction of sophisticated technology in the workplace like messenger, online portals, easily accessible email servers, official internal instant messaging network accessible from external networks etc have made it difficult for one to switch off after work (The impact of technology on work life balance 1)Disappearing boundaries between work and lifeThe increased dependency of technology at work and in life has led to the smudging of work times and time for family, a community gathering, a social get together, time with friends, a quiet chat or dinner with family or perhaps a family vacation....
2 Pages (500 words) Research Paper

Laws on Tattoos in the Workplace

An author of the essay "Laws on Tattoos in the workplace" claims that the law supports the presence of body tattoos in visible areas as it is embedded in the constitution that every individual is subject to the universal human rights that cannot be taken away.... hellip; There is a profound will by employers to ban visible tattoos in the workplace, where there has been divided opinion on the matter.... Aside from this, there is the valid support for the ban of visible tattoos in the workplace based on the professional code of ethics and code of dress dictated by the employer....
4 Pages (1000 words) Essay

Role of Technology in the Workplace

In the paper “Role of technology in the workplace” the author evaluates the latest inventions in technology, which continue to facilitate the cutting edge within the workplace, constituting various IT services and equipment that accomplish tasks within record time.... Another notable role of technology in the workplace is the aspect of mobility while at work.... hellip; The author states that the trend in the business and work area is the application of technology in all aspects of working within the workplace in the rush to adopt modernization and remain competitively relevant within the marketplace....
5 Pages (1250 words) Assignment

The Changes in Office Systems Due to Advanced Technology

This essay "The Changes in Office Systems Due to Advanced technology" discusses technological products that are being used in office management.... From opening a simple door to carrying out advanced operations, technology has become an omnipresent entity in offices.... hellip; The information technology and its related products can be used optimally if there is no security threat to it.... From opening a simple door to carrying out advanced operations, technology has become an omnipresent entity in offices, with their entire operations hinging on the support provided by technology, particularly Information technology....
9 Pages (2250 words) Essay

Technology Impact on Business and Customer

The paper "Technology Impact on Business and Customer" comprehensively analyzes some of the main features of technology and the impact of new technology on the customers.... hellip; The research aims to analyze some of the main areas regarding the new technology application and its possible advantages to the business and customers.... For example, online shopping is one of the new technology-based effective approaches to introducing new products to customers....
5 Pages (1250 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us