Skip to main content

Management, Opportunities, Challenges, and Solutions


Opportunities

Natural disasters such as fires and earthquakes can strike at any time. A spilled cup of coffee can also do some damage! Waiting until disaster strikes isn't the best time to figure out how to recover your systems. Smart organizations create a disaster recovery plan ahead of time and/or use firms specializing in disaster recovery.

Management Challenges

There's a reason why we explain all those methods and procedures and processes in future chapters for building good, solid information systems. They ensure system quality so that the product produced by the system is as good as it can be.

Designing Systems that are Neither Over-controlled nor Under-controlled

You should be realistic about security and system controls. If you institute five layers of entry into your Web site, people probably won't use it that much. They'll either ignore it or find a way around your controls. You have to analyze the system and determine those areas that should receive more security and controls and those that probably can use less. You probably don't want to go to the expense of checking absolutely every transaction that is entered into the system, so you check a sampling of the data. Just make sure the sampling is large enough to detect any exceptions.

Implementing an Effective Security Policy

Does your company devote enough resources to information systems security? If your company is like the majority, sadly the answer to that question will be no.

Solution Guidelines

While there is no surefire way to protect systems and data from every threat, great and small, businesses need to take a more firm-wide approach to security. Every person in the organization, from the CEO down, needs to be involved in security. Organizations must control access through firewalls, transaction logs, access security, and output controls. Software programs that track "footprints" of people accessing the system can be a good way to detect intruders, what they did, what files they accessed, and how they entered your system initially.

A few methods an organization can use to beef up security are:

· What firm resources are the most critical to control and secure?

· What level of system downtime is acceptable?

· What is the minimum acceptable level of performance for software and systems?

· How much is the business willing to invest to protect its information assets?




NOOPUR GARG
BBA/4536/07

Comments

Popular posts from this blog

Inter-Organizational Value Chain

The value chain of   a company is part of over all value chain. The over all competitive advantage of an organization is not just dependent on the quality and efficiency of the company and quality of products but also upon the that of its suppliers and wholesalers and retailers it may use. The analysis of overall supply chain is called the value system. Different parts of the value chain 1.  Supplier     2.  Firm       3.   Channel 4 .   Buyer
Advantages and Disadvantages of EIS Advantages of EIS Easy for upper-level executives to use, extensive computer experience is not required in operations Provides timely delivery of company summary information Information that is provided is better understood Filters data for management Improves to tracking information Offers efficiency to decision makers Disadvantages of EIS System dependent Limited functionality, by design Information overload for some managers Benefits hard to quantify High implementation costs System may become slow, large, and hard to manage Need good internal processes for data management May lead to less reliable and less secure data

System Analysis and Design (SAD)

Introduction to System Analysis and Design (SAD) System are created to solve Problems. One can think of the systemsapproch as an organised way of dealing with a problem. In this dynamic world , the subject system analysis and design, mainly deals with the software development activities. This post include:- What is System? What are diffrent Phases of System Development Life Cycle? What are the component of system analysis? What are the component of system designing? What is System? A collection of components that work together to realize some objectives forms a system. Basically there are three major components in every system, namely input, processing and output. In a system the different components are connected with each other and they are interdependent. For example, human body represents a complete natural system. We are also bound by many national systems such as political system, economic system, educational system and so forth. The objective of the system demands tha...