Thursday, July 25, 2019

Discussion Questions Essay Example | Topics and Well Written Essays - 500 words - 21

Discussion Questions - Essay Example If one element would be selected for replacement or upgrade, it would be the software system because this is the system that needs most regular updates. This element should be updated regularly to ensure that all applications are being accessed and to be apprised of the most advanced developments that would facilitate the functioning of the unit. A consistent set of policies and procedures that would ensure the protection of information systems in the workplace should include intensifying authorizations to work areas, including access to information systems, through the use of advanced technological breakthroughs in ID checking, monitoring, and access. As such, these policies and procedures should be regularly reviewed and updated to reflect changing conditions in the workplace and to incorporate new technologies that intensify needed protection of privacy and confidentiality of personal, professional and organizational information. In one’s organization, as soon as biometric identification services were offered in the market, this was immediately implemented to strictly enforce security measures as part of the policies and procedures. IT managers, just like any other managers in any organization, could possibly fail when the functions and responsibilities expected of the position and role are not carried out, as required. This included being apprised of current and future trends in technology that would potentially impact and influence the operations of the organization. Therefore, managers must be aware of being too complacent with current operations, regardless of how efficient current operations are. To avoid these pitfalls, these managers must exemplify skills of introspection, information-processing, as well as resource generation and allocation skills that focus on being proactive, rather than reactive. When implementing both technical and organizational changes, some variables that need to be considered and incorporated are scanning the environment

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.