You are in charge of IT planning for your company. What planning method would you use and why? Evaluate prototyping and why it is used. How do you determine when to use prototyping on your project? What are three advantages and three disadvantages of prototyping? How would you go about using the IS function for security in a corporation with regards to the Internet? Give examples of the measures and technologies you would use.
In this paper, the finer points of Management Information System will be explained, touching upon the significant changes that Information Technology has brought about in the structural and the functional level of the organisation. An enquiry will also be conducted on the necessity of implementing Information Technology at the CEO level.
The progress achieved by Information Technology has given birth to several tools adept at the effective management of information. Thus business houses have come to rely on information systems for the storage, management and analysis of data, Information system, a collection of several sub-systems that work together to achieve the tasks of collecting, store, managing, retrieving, distributing and transferring of information (Burke, 1980). Information Systems aid business grow their productivity by enhancing the operational efficiency of their business operations through the automation of vital informational procedures. He is also of the opinion that business mangers become more effective with their information demands are satisfied by information system.
Information System function has penetrated very deep into the organisational structure of large business houses across multi- functional levels such as Marketing, Finance, Human Resources, Research and Development. The information demanded varies with the organisational levels (Layton, 2007). Different business levels like strategic, operational and planning level require subsystems of Information system in order to have their demand for information satisfied. The various subsystems are listed below (Burke, 1980):
Information systems influence the organisations in which they work and is also in turn influenced by the organisation (Burke, 1980). Once a new information system is introduced, the structure, goal, work design and value design of the organisation also gets affected. The information must made in such a way it caters to the demands of the various organisational groups and is also shaped by the unique features of the organisation such as its culture, vision, activities and policy (Anderson 1992). It should cut down the costs of transaction and agent. Information System should also be such that it provides managerial support to plan, organise, decide and control the various departments. It should facilitate speed and accuracy in the monitoring, planning and forecasting process (Layton, 2007).
Information Systems in aiding business level strategy helps the business become low cost operators and effectively differentiate products and achieve a healthier relationship. It establishes achieve a great customer/supplier relationship through the use of customer response and supply chain management tools (Layton, 2007). Further, at the firm level strategy, information system facilitates the achievement of new efficiencies for better services (Austen 2006). At an industry level, Information Systems can attain a competitive advantage through the creation of a platform with the other businesses in the field for sharing information and facilitating easier co-ordination and transaction (Layton, 2007).
With the advent of IT revolution in the current decade, the inevitable structuring of all things correlating to it has become a living part of our society. As per the Cadbury recommendation, the chief executive has a pivotal role in any organization. The Information Security functioning has a tremendous effect on am organization. It also has its roots deeply spread on a wider role as it is necessary for any successful utilization of resources be it finance, human or physical. At the highest level connectivity is as important as innovation. It may be safe to say that at a CEO level information system will provide the necessary connection that will take the organization forward towards the goal of achieving a global exposure.
As per the recent journals, the best method to be implemented for the best results would be the management information system. A system that automates the results, analyses the data and generates reports (Heinrich, 2002).
Information Technology planning is of crucial importance when it comes to the success of any business organisation because it gives the business a sense of direction and connects to different business processes (Burke 1980). It helps the organisation further by reducing cost implications and minimizing wastage of time in the review process and the implementation of lifecycles of recent Information Technology resources (Beltran 1998). It ensures efficient allocation of the Information Technology resources, facilitates better flow of information in the Information Technology department (Heinrich, 2002). Financial and Information Technology departments also get better connected and co-ordinated.
In choosing an Information Technology plan for my company, I select the Plan-Driven method over the Agile development method (Baase 1996). The Plan-Method concentrates on making plans for the future. It outlines the steps and the features in a manner that everything can be traced and minute attention is paid to the details. This variety of documentation and planning leads to greater standards and minimal interruption even if any important staff leaves the company (Beekman et al 2002). The organisational requirement is analysed by the head of the organisation and using information systems coupled with software product, he tries bringing forth solutions to meet these business requirements.
The areas where Plan-Method scores over the Agile Development method are given below (Burke, 1980):
The Plan Method aims at getting timely solutions. It formalizes the system of documentation in the retention of knowledge thus providing seamless co-ordination between management team and the customer to bring about products that meet all customer requirements (Heinrich, 2002).
Prototyping is referred to as the process to build a model in the system (Englander 2000). With respect to information system, the employment of prototypes are done for helping the designers of system for building a system of information that is intuitive in nature and easy for manipulating the end users (Burke, 1980). Prototyping is referred to as a process that is iterative in nature that is a significant part in the phase of analysis related to the life cycle for the development of systems (Layton 2007). In the duration of the portion for determination of requirements related to the phase for analysis of systems, the analysts of system have been gathering information regarding the present procedures of organization and the processes of business and current procedures of the organization in relation to the system of information being proposed, if there is an involvement of one, and conducting the interviews of user and the documentation being collected (Layton, 2007). This has contributed in helping the analysts for the development of an initial combination of requirements in the system. Prototyping can result in augmenting these as there is conversion of these basic, yet these are somewhat intangible (Layton, 2007). There are specification in the tangible ones but restricted model to work with respect to the desired system of information (Viskovic et al 2008). These feedback of used gained from the development of a physical system that the users should be coming in touch, and a response of evaluation that can be employed by the analyst for the modification of present requirements along with the ones developing newly (Heinrich, 2002). Prototyping is evident in a number of different forms, from the sketches of low technology or screens of paper, from which developers and users can paste objects and controls, towards operational systems of high technology utilizing languages of different generation and across everywhere in the organization (Figierdo et al 1996).
Prototyping is a stage in software development where a basic working model of an information system or one product is built for demonstrative purposes. It is a part of the System Development Life Cycle, where a rudimentary version of a system is constructed and tested (Grotta et al 1998). Changes are kept being incorporated till the desired prototype is made. A complete system or a product is developed from this prototype. Prototyping is again best suited for human computer interface systems (Heinrich, 2002). This is because prototyping makes sure that the end user regularly works with the system thus providing constant feedback to create a user friendly system. It formalizes the system of documentation in the retention of knowledge thus providing seamless co-ordination between management team and the customer to bring about products that meet all customer requirements (Burke, 1980). The organisational requirement is analysed by the head of the organisation and using information systems coupled with software product, he tries bringing forth solutions to meet these business requirements (Ketabchi 1988).
Information is a valuable business asset which needs to be kept confidential. Information Security has thus, mammoth importance in the success of an organisation. Information Security ensures that the confidentiality, quality and the accessibility of the business information is not compromised (Heinrich, 2002). Information Security is achieved through imposing of various security measures across physical, technical and operational environment. Its main function is thus to make sure that a business handles the exchange of information in a secure system.
1. The first step towards internet security is a risk assessment analysis. Knowing the threats that are posed to the Information Technology System of the company, along with their results, will equip the company with the ability to counter these threats, if they happen (Ketabchi, 1988).
2. A good anti-virus is an absolute requirement when it comes to securing the network of the computer (Heinrich, 2002).
3. A firewall similarly is one the most basic security measures in the building up of internet security defence.
4. Anti-viruses and Firewalls require frequent and timely updating. Otherwise they are of no value. The intensity and the reach of internet threats are dynamic and to keep up with them it is absolutely essential that the antivirus and the firewall software and fully working and up-to date. It is ideal, that is function is set to run in the background automatically (Layton, 2007).
5. Authentication is a great measure to prevent unwanted access to the computer network. There are different levels in this and hence the selection of the authentication solution should be dependent on the specific needs of the business.
6. Providing secure access to the remote workers is of paramount importance. A remote weakness stands to be exploited by the attacker (Layton, 2007).
7. Encrypted VPNs are needed to effectively manage wireless technologies which pose serious technology threats.
8. Encryption is the need of the hour, considering the amount of laptops with classified information. A unified encryption approach at a staged level of implementation is essential.
9. Anti-spam solutions be used to counter the threat of spam. There is the option of outsourcing spam management but the need for the proper control and reporting of spam needs to be considered (Layton, 2007).
10. Unified threat management systems provide the entire gamut of security solutions in a cohesive product. But the fact which has to be considered that malfunctioning of any one aspect will also mean the loss of an entire security system
11. Penetration testing is an effective means of scrutinising the security of the corporate networks are and consequently identifying the points of latent weakness.
12. The people factor should be borne in mind, all the given security measures will work only with user co-operations (Heinrich, 2002). The user should be aware of all the company security policies. These security policies should be enforced at all employee level including the top management.
References
1. Aitken, P., 2000, Tips on Scanning), Available:https://www.pgacon.com/tips_on_scanning.htm#Introduction (Accessed: 2000, April 21)
2. Anderson, D., 1999, The PC Technology Guide), Available: https://www.pctechguide.com/18scanners.htm (Accessed: 2000, April 6)
3. Anderson, S., 1992, Computer Literacy for Health Care Professionals. Albany, NY: Delmar
4. Austen, I., 2006, A Scanner Skips the ID Card and Zeroes In on the Eyes, nyt.com, https://topics.nytimes.com/2003/05/15/technology/circuits/15howw.html (accessed August 17, 2006).
5. Beltran, R.A., 1998, Beyond flatbeds: unusual scanning solutions, PC Magazine, vol. 17, no. 18, October, pp. 188-189.
6. Burke, M., 1980, The NYU Ada Translator and Interpreter, ACM SIGPLAN Notices – Proceedings of the ACM-SIGPLAN Symposium on the Ada Programming Language15 (11): 194–201.
7. Baase, S., `1996, A Gift of Fire: Social, Legal, and Ethical Issues in Computing. Upper Saddle River, NJ:Prentice-Hall, 1996.
8. Beekman, G., Computer Confluence: Exploring Tomorrow’s Technology. 5th ed. Upper Saddle River, NJ: Prentice Hall, 2002.
9. Bureau of Labor Statistics, 2007, Occupational Outlook Handbook (OOH), 2006–07 Edition. https:// www. bls.gov/oco/ (accessed November)
10. Blatner, D., Fleishman, G. and Roth, S., 1998, Real world scanning and halftones, 2nd ed., Peachpit Press, New York.
11. Divis, D.A., 2003, Bill would Push Driver’s License with Chip, The Washington Times
12. Eisenberg, A., 2007, When the Athlete’s Heart Falters, a Monitor Dials for Help, nyt.com, https://query.nytimes.com/gst/fullpage.html?res= 9B03E0DE113EF93AA35752C0A9659C8B63 (accessed November 12, 2007).
13. Englander, I., 2000, The Architecture of computer hardware and systems software, John Wiley, New York.
14. Figeiredo, P., McIllree. J. and Thomas, N., 1996, Introducing information technology, 2nd ed., Jacaranda Press, Singapore.
15. Grotta, D., and Wiener, S., 1998, “What’s now, What’s next,” ( PC Magazine), Available: https://www.zdnet.com/pcmag/features/scanners98/intro.html (Accessed: 2000, April 8).
16. Ketabchi, L., 1988, A Computer-Aided Prototyping System. IEEE Software5(2): 66–72.
17. Layton, P., 2007, Information security: design, implementation, measurement and compliance.
18. Heinrich, L.J., 2002, Informations management. 7th ed.. Munich: Oldenbourg.
19. Plummer, D., 2008, Gartner’s Top Predictions for IT Organizations and Users, 2008 and Beyond: Going Green and Self-Healing,” Prentice Hall
20. Viskovic, D., Varga, M., and Curko, K., 2008, Bad practices in complex IT projects’, ITI 2008 – 30Th International Conference On Information Technology Interfaces, p. 301, Publisher Provided Full Text Searching File, EBSCO host
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download