Tuesday, September 29, 2009

ASSIGNMENT 2



Based on the organization(s) that you visited, what do you think are the risks associated with business and IS/IT change?



We have visited GH Office Depot to conduct an interview regarding with the risks associated with business and IS/IT change,the IT staff said that it has a big effect if there is a changed in IS/IT,most of their transactions used technology with that a sudden changed would affect their business.

Given the serious security risks to information technology (IT) assets, managing those risks effectively is an essential task for the University and its departments. The process is one that will benefit both the individual department and the University as a whole. Completing such a risk management process is extremely important in today’s advanced technological world. It is important that management understand what risks exist in their IT environment, and how those risks can be reduced or even eliminated.

Like fire insurance, ITS-RM is a form of protection that the University simply can not afford not to have. The University has business processes, research and instructional efforts, and legally protected data that depend on IT assets, which UVa cannot afford to lose or have exposed. Unfortunately, these IT assets are subject to an increasing number of threats, attacks and vulnerabilities, against which more protection is continually required. The ITS-RM program is an essential component in this overall effort.

Although the IT Security Risk Management (ITS-RM) program will likely be welcomed by departments that have already experienced loss of mission-critical IT resources, many will not fully appreciate the need for assessment and planning. Consequently, a University policy regarding participation is necessary.



Effects of Technology on Business

Businesses have been at the forefront of technology for ages. Whatever can speed production will draw in more business. As computers emerged in the 20th century, they promised a new age of information technology. But in order to reap the benefits, businesses needed to adapt and change their infrastructure [source: McKenney]. For example, American Airlines started using a computerized flight booking system, and Bank of America took on an automated check-processing system.
Obviously, now, most business is conducted over personal computers or communication devices. Computers offer companies a way to organize dense databases, personal schedules and various other forms of essential information

As information travels faster and faster and more reliably, barriers of distance disappear, and businesses are realizing how easy it is to outsource jobs overseas. Outsourcing refers to the practice of hiring employees who work outside the company or remotely -- and even halfway across the world. Companies can outsource duties such as computer programming and telephone customer service. They can even outsource fast-food restuarant service -- don't be surprised if you're putting in your hamburger order with a fast-food employee working in a different country entirely. Outsourcing is a controversial practice, and many believe that U.S. companies who take part are hurting the job market in their own country. Nonetheless, from a business perspective, it seems like the wisest route, saving companies between 30 and 70 percent [source: Otterman].

Another technology that's starting to revolutionize business is actually not very new -- it's just cheaper these days. Radio frequency identification (RFID) technology is infiltrating and changing business significantly in a few ways. Microchips that store information (such as a number equivalent of a barcode and even an up-to-date history of the chip's travels) can be attached to product, and this helps companies keep track of their inventory.

Some businesses have even begun to use RFID chip implants in humans to tighten security. An access control reader detects the chip's signal and permits the employee access to the door. But many people are concerned about privacy issues if this were to become widespread practice.


references:

http://www.itc.virginia.edu/security/riskmanagement/
http://communication.howstuffworks.com/technology-changed-business1.htm

0 comments:


karl © 2008. Free Blogspot Templates Sponsored by: Tutorial87 Commentcute