Skip to main content

Information System Management


The functions and the organization of  IS Department
·         Plan use of IS to accomplish organizational goals and strategy.
·         Manage outsourcing relationships.
·         Protect information assets.
·         Develop, operate, maintain computing infrastructure.
·         Develop, operate, maintain applications.

How IS Department Managed
·         Know factors driving IS standards and policies.
·         Know user responsibilities and organization of your future profession.
·         Help guide employees IS-related behavior.
Ethics Guide : Dilemma of BYOD (Bring Your Own Devices) in Productivity and Privacy
·         Misconception about restricting mobile devices to improve productivity.
·         IS Staff role is to guide the users on acceptable or unacceptable use and suggest the configuration of people’s personal devices.
·         Company must concern in data thefts and malwares.
·         Employee need to concern the personal privacy such as keylogger, monitoring softwares.
·         Need an ethic/procedure/rules to control the use of devices.
Outsourcing is process of hiring another organization to perform services in the the business, the advantages are :
1.       Save cost, and the expertise of the organization.
2.       Save direct/indirect management  time and attention.
3.       Risk Reductions
a.       Caps financial risk.
b.       Ensures quality or avoids substandard quality.
c.       Less likely to pick wrong hardware, software, network protocol, or implementing tax law changes incorrectly.
d.      Vendor’s responsible for managing risks.


Security Guide : Selling Privacy
·         Everything can be tracked, traced, recorded, and distributed around the world in a matter of seconds.
·         Your personal information disclosed to thousands, or millions, of people instantaneously.
·         Privacy violated quickly, private data collected and sold for quick profit.
·         80% concerned about advertisers gaining access to their social media data;
·         61% want to keep their data secure.
·         Service providers looking for ways to monetize privacy.
Promoting Privacy
·         Get encrypted end-to-end email service.
·         Premium privacy service from ISP.
·         Use a public computer.
·         Use Tor (The Onion Router) networks.
·         Access your data and sell it.
Outsourcing considerity
·         Pay premium for services of former employees, now managed by strangers and paid by vendor.
·         Vendor managers evaluated on how well they follow vendor’s profit-generating procedures.
·         Turn your operation into clone of their other clients.
·         All critical knowledge in vendor’s employees, prohibited from going to work for you.
·         Expensive leap away from responsibility.

Comments

Popular posts from this blog

About Me

My name is Kevin Octavianus Halim. I am BINUSIAN 2020 I lived in Penjaringan, North Jakarta. Currently, I am studying in Binus University, in faculty Information System and right now, I am in semester 3. I make this blog is to let everyone know what i am doing in Binus University, to aknowledge people to increase their insight about Binus University, and also if someone need to learn more about Binus University. With this, I attached my binusmaya profile, #if anyone doesn't know about binusmaya, binusmaya is a website for BINUSIAN that contains about lecturers, staffs , and students. This is my first time to make a blog, and I don't have any experience about journalism so i hope you guys (aka. Reader) can help me by give me a support or suggestion to makes me a better person. Thank you.

Movie Review : Uchiage Hanabi, Shita kara Miru ka? Yoko kara Miru ka? (Fireworks, Should We See It from the Side or the Bottom?)

My first opinion when i watch the trailer on the youtube is like "Woah, maybe this one is same like any other movies" meaning my opinion thinks that the movie is mainstream and has a normal/usual storyline like other movies. But when i watching this movie, i was interested on the story. The movie hook me up so well, where the fantasy become real. And unpredictable storyline. The graphic of this movie, i can give point 8/10, the drawing good, but some scene there is lack of drawing and they let the scene become "manga" drawing where the background is changed into white & black. The story of this movie, i give it 7/10. The story is unique, but more often its kinda sad for me since they didnt finished all story in 1 movie, meaning they make me hanging for the story, maybe i will read the manga for this movie (Since the movie is adaptation from manga) and maybe the manga will completely finished the story. I totally recommend this movie for you gu...

Testing and System Implementation Assignment #2

This is my 2nd assignment for Testing and System Implementation course, the first assignment was do on class and I have no documentation about it. This assignment come from my lecturer Daniel Kartawiguna with NIDN D2431. I am terribly sorry if i mentioned my lecturer name without his Bachelor or in Indonesia "Gelar" because i dont have a note to write his full name. === /// === Assignment# 02 [Individual] 1.      Please explain the Software Quality Characteristics and Sub Characteristics(ISO 9126) according to ISO9126! 2.Please explain the advantage and disadvantage of each service organization models according slides no.  42, 43, 44, and 45! 3.    What are the advantages and disadvantages of “Skills-based Test Organization” and “Project-based Test Organization ”? === /// === The answer will be posted soon. Thank you for reading :D. Please leave a note for Suggestion or Critics