Galaxy Software Inc. is a startup software company situated in Melbourne Australia. This organization has been started four years back. We are dealing in software products related with information and network security. Our clients are basically from Australia and belong to small and medium sized organizations. (natrajan, 2013) Right now, the company is working on two types of projects: the in house projects which are being developed in company and some are off the shelf projects from larger vendors. Company is planning to grow its business across the country through new branches. The main concern in this new venture is that company will deal with critical organizations which are from pharmaceutical and health industry and most of the new clients are demanding the information and network security implementation in their business. Main requirements are from online presence of organization, security of websites and databases. (Hogg, 2016) The clients of these organizations can access their websites from anywhere and they must register themselves before any services they want to access. The security of these websites are the top concern, as the clients of Galaxy Software Inc. want authentication of their clients and prevention of any type of security breaches. (walton, 2015)
The purpose of this report is to analyze the requirements of clients of company and plan accordingly to implement them with maximum efficiency and best quality services. The owner of Galaxy Software Inc. Mr. Roger Philips wants to use the latest technology to fulfill the needs of the customers. In today’s world of Internet, the technology is drastically changing day by day. Every organization is in the race of online presence and for the same they need best technology with maximum security. The main concerned area for Galaxy Software Inc. is the financial status of company, which must be analyzed properly so that company can plan about the expansion in their business.
Information And Network Security is a term which consists of some protocols about to restrict and monitor the unwanted access and modification of any organization’s resources which may be databases, network devices etc. (D., 2014).The implementation of network security is the responsibility of network administrator. It can be implemented through hardware and software tools which are being used in the organization. The aim of information and network security is to protect the information from unauthorized access and security breaches. For any organization, the security of personal information of clients and their databases is must be the highest priority. (James, 2009). The latest innovations in the field of ICT consists of cloud computing and digitization.
Cloud computing is used to store the whole data of any organization which may include documents, files, programs, database and other most important resources on cloud (Internet). This technology may be used by Galaxy Software Inc. to fulfill the needs of their clients if they have critical and large amount of information to save. Using this they can store the data on Internet which can be accessed anytime from anywhere. The extra overhead of saving this data on their premise database server will be saved in cloud computing. Some of the websites which are using this concept of cloud computing are:
Google Docs is an application of Google which offers the facility to use office applications (Smith, 2013). It is available on Internet, and there is no need of installation. If any document is shared by Google docs, it can be modified online from anywhere.
It is a popular music streaming website, where music is saved on remote server and can be accessed through website only. User must log in if wants to access the music file. These files can be played online and the user cannot download it. (S., 2013)
One latest innovation of ICT is E-books, which is the revolution in the world of digitization. Today almost books and magazines are available online in form of E-books. It can be accessed from any smart device and gadgets through compatible applications like Amazon kindles. These books may be downloaded on user’s device for future reference. (torbjornzetterlund, 2015)
Business growth is a catalyst to improve the competitive advantage of any business. Innovations in business can be driven by the necessity of problem solving zeal and hunger of new opportunities. There may be different strategies to find out the best way for the growth of business. One of them is ICT. (Patterson, 2014). In the past 20 years the small business organizations have extensively used the computer technology in their day to day activities. Now not only the desktop but also the laptops and smart gadgets are mostly used by the companies. The Galaxy Software Inc. is planning to deal with large organizations and now it is necessary to represent themselves as the technological masters. Till now all the business communications with clients was very formal and it was lacking of modern technology but with the growing phase, and to gain the maximum benefits from their business it is now preferable factor. This report will keep focus on this factor.
To setup the ICT infrastructure, the organization must need some of the commonly used hardware devices, which are mostly used by other businesses as well. Some of the hardware devices preferred for this setup are:
Software is the set of programs, which can be used to accomplish a specific task. Mainly in business two types of software are needed while implementing ICT. It may be system software and application software. System software provides an interface between user and hardware. Mostly it is provided by the vendor or manufacturer. On the other hand the application software are used to fulfill specific need of user. Such applications may be Microsoft office suite, web browsers and Mailing utilities. (Khidzir, 2010) along with antivirus programs for ethical security detection, prevention and analysis.
Although the new technology is growing constantly and promoted smartly, but the purchasing of new technology without consideration the need is not a wisest move. (harry, 2015). The objective of business must be analyzed properly before doing any selection. The objectives of small business organizations for the adopting of ICT may be: (Gary Stoneburner, 2014)
The new technology can also be used to change the working environment and work practices. (codd, 2016). The training of existing employees if required must be handled on priority basis. It must be kept in mind that all these activities may not put extra cost overhead on business.
The main reasons of using ICT in small businesses: (peanupaps, 2006)
The conceptual framework of ICT can be illustrated as shown below. The models represent the factors which may affect the adoption of ICT. (Henderson, 2016)
The study done in this report is showing that if the chances of benefits gained by the small businesses are high then the adoption rate of ICT will also be increased. Perceived benefits, cost of ICT implementation, the cost consumed on the training and skills development of employees, the competitive advantages in market and the support of government will decide the level of adoption of information and network security parameters in small and medium sized organization.
The number of applications which can be used for the better information and network security in small business can be:
It can be used to improve the profitability and efficiency of business documentation. This will be a standard format of letters and business documentation.
It can be used to generate reports of every financial transactions, which generated the appropriate control level in business.
Cloud computing is the latest innovation in today’s scenario of digitization. Organizations can use infrastructure, services and platform as their cloud resources to save their money and extra overhead of managing them.
As per the case study the clients of Galaxy Software Inc. are related with pharmaceutical and hospitality sector. (Ion, 2010). If the software of these organizations are best on automated information system, then surely the quality of care will improve. The HELP system of clinics will be more efficient and reliable to store any kind of information related with patients, doctors and medicines. With the help of information and network security system, automated reminders can be generated for both doctors and patients. Before implementing the ICT projects for the small and medium sized businesses, the number of studies must be done by the Galaxy Software Inc. and some models have been prepared for the approval, following factors can affect the ICT projects as per the analysis:
Technological integration of ICT into business organization can be beneficial for the growth, customer preferences and other shifts. To achieve the target of business, the strategies and information network security aspects must be aligned properly. In today’s scenario, the companies are paying more attention towards the implementation of on-demand business and SOE (service oriented enterprise). The SOA (Service oriented architecture) can be used to implement the ICT in business information system. To develop the business strategy, the focus must be on service strategy and the infrastructure of organization. (Habib, 2016)
As per the client’s requirements, the Galaxy Software Inc. is planning to implement the information and network security in their applications. For this the in depth analysis of the current trends about information and network security is done. Following types of security concerns are mainly focused: (Antlova, 2009)
The main problems in ICT adoption for small and medium sized organizations are: (Prasad, Lalitha, & Srikar, 2015)
Conclusion
The conclusion of this report is that ICT can be beneficial for small and medium sized organizations in multiple services. For the expansion of business in Galaxy Software Inc. the ICT adoption can be the positive decision, if it is taken with some precautions. As the ICT implementation for a small business cannot be easy due to the need of finance and other security concerns. It must be planned accordingly.
The recommendations for Galaxy Software Inc. for successful adoption of ICT technology is recommended through following points:
It is recommended that using cloud computing technology, the small scale business organizations can save their huge amount of money. As there is no need of database storage setup and backup. In absence of database, even there is no requirement of technical person to handle the database. Company can choose any of the cloud model migrate their database.
In ICT, the most crucial factor is security, which can be easily handled by using preventive measures. Appropriate network operating system with authentication feature must be installed for the security reasons. Unauthorized access of database can be controlled by using Firewall, malware and virus detection tools.
For the official documents, presentations and mailing services, recommended tool is Google docs. It provides all time accessibility to concerned peoples with concept of sharing data.
For any organization, the technical changes are always critical. Current employees of company protest to change as they are comfortable with their current working behaviour. It must be handled cautiously. Proper guidance and encouragement is required for the same. Technical training in interesting way must be deliver to the employees so they can prepare themselves for new responsibilities.
References
Antlova, K. (2009, January 20). 285985767_Motivation_and_barriers_of_ict_adoption_in_small_and_medium-sized_enterprises. Retrieved from www.researchgate.net: https://www.researchgate.net/publication/285985767_Motivation_and_barriers_of_ict_adoption_in_small_and_medium-sized_enterprises
codd, P. (2016, october 6). Consultation+Paper+on+Guidelines+on+ICT+Risk+Assessment+under+the+SREP.pdf. Retrieved from www.eba.europa.eu: https://www.eba.europa.eu/documents/10180/1608089/Consultation+Paper+on+Guidelines+on+ICT+Risk+Assessment+under+the+SREP.pdf
D., J. (2014, october 10). what-are-ict-security-issues-information-technology-essay.php. Retrieved from www.uniassignment.com: https://www.uniassignment.com/essay-samples/information-technology/what-are-ict-security-issues-information-technology-essay.php
Gary Stoneburner, A. G. (2014). Risk Management Guide for information technology system. NIST, 55.
Habib, M. H. (2016). ICT Adoption in Small and Medium Enterprises. Journal of Economics, Business and Management, 4. Retrieved from https://www.joebm.com/vol4/439-JB47.pdf
harry, J. (2015, december 3). Information and communications in small business. Information and communications in small business, p. 32.
Henderson, K. J. (2016, december 12). disadvantages-information-technology-business-4020.html. Retrieved from smallbusiness.chron.com: https://smallbusiness.chron.com/disadvantages-information-technology-business-4020.html
Hogg, S. (2016, december 9). scott-hogg-s-2017-technology-predictions.html. Retrieved from www.networkworld.com: https://www.networkworld.com/article/3148871/internet-of-things/scott-hogg-s-2017-technology-predictions.html
Ion, P. (2010). USE OF ICT IN SMES MANAGEMENT WITHIN THE SECTOR OF services. Academy of Economic Studies Bucharest, 7.
James. (2009, march 10). read/9675/chapter/8. Retrieved from www.nap.edu: https://www.nap.edu/read/9675/chapter/8
Khidzir, N. (2010). Information security risk factors: Critical threats vulnerabilities in ICT outsourcing. IEEE explore library, 16.
natrajan, s. (2013, july 12). recent_developments.htm. Retrieved from www.ictlounge.com: https://www.ictlounge.com/html/recent_developments.htm
Patterson, B. (2014, september 6). Benefits of Computer Use in Health Care Systems. Benefits of Computer Use in Health Care Systems, p. 2.
peanupaps, V. (2006). 09699980610680171. Bankok: emerald insight. Retrieved from www.emeraldinsight.com: https://www.emeraldinsight.com/doi/abs/10.1108/09699980610680171
Prasad, C. V., Lalitha, P., & Srikar, P. V. (2015, July 23). /barriers-to-the-use-of-information-and-communication. Retrieved from www.questia.com: https://www.questia.com/library/journal/1P3-3660148911/barriers-to-the-use-of-information-and-communication
S., C. (2013, december 12). the-role-of-ict-in-improving-healthcare. Retrieved from www.igovernment.in: https://www.igovernment.in/articles/20112/the-role-of-ict-in-improving-healthcare
Smith, K. (2013, November 23). advantages-and-disadvantages-of-using-ict-in-healthcare. Retrieved from faz97.wordpress.com: https://faz97.wordpress.com/2011/12/12/advantages-and-disadvantages-of-using-ict-in-healthcare/
torbjornzetterlund. (2015, may 7). how-to-setup-up-your-small-business-it-infrastructure-like-an-enterprise. Retrieved from torbjornzetterlund.com: https://torbjornzetterlund.com/how-to-setup-up-your-small-business-it-infrastructure-like-an-enterprise/
walton, A. (2015, August 17). advantages-disadvantages-information-communication-technology-66948.html. Retrieved from smallbusiness.chron.com: https://smallbusiness.chron.com/advantages-disadvantages-information-communication-technology-66948.html
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download