The functions and the organization of IS Department
·
Plan use of IS to accomplish organizational
goals and strategy.
·
Manage outsourcing relationships.
·
Protect information assets.
·
Develop, operate, maintain computing
infrastructure.
·
Develop, operate, maintain applications.
How IS Department Managed
·
Know factors driving IS standards and policies.
·
Know user responsibilities and organization of
your future profession.
·
Help guide employees IS-related behavior.
Ethics Guide : Dilemma of BYOD (Bring Your Own Devices) in
Productivity and Privacy
·
Misconception about restricting mobile devices
to improve productivity.
·
IS Staff role is to guide the users on
acceptable or unacceptable use and suggest the configuration of people’s
personal devices.
·
Company must concern in data thefts and
malwares.
·
Employee need to concern the personal privacy
such as keylogger, monitoring softwares.
·
Need an ethic/procedure/rules to control the use
of devices.
Outsourcing is process of hiring another organization to
perform services in the the business, the advantages are :
1.
Save cost, and the expertise of the
organization.
2.
Save direct/indirect management time and attention.
3.
Risk Reductions
a.
Caps financial risk.
b.
Ensures quality or avoids substandard quality.
c.
Less likely to pick wrong hardware, software,
network protocol, or implementing tax law changes incorrectly.
d. Vendor’s responsible for managing risks.
Security Guide : Selling Privacy
·
Everything can be tracked, traced, recorded, and
distributed around the world in a matter of seconds.
·
Your personal information disclosed to
thousands, or millions, of people instantaneously.
·
Privacy violated quickly, private data collected
and sold for quick profit.
·
80%
concerned about advertisers gaining access to their social media data;
·
61%
want to keep their data secure.
·
Service providers looking for ways to monetize
privacy.
Promoting Privacy
·
Get encrypted end-to-end email service.
·
Premium
privacy service from ISP.
·
Use
a public computer.
·
Access
your data and sell it.
Outsourcing considerity
·
Pay premium for services of former employees,
now managed by strangers and paid by vendor.
·
Vendor managers evaluated on how well they
follow vendor’s profit-generating procedures.
·
Turn your operation into clone of their other
clients.
·
All critical knowledge in vendor’s employees,
prohibited from going to work for you.
·
Expensive leap away from responsibility.
Comments
Post a Comment