.

Saturday, June 8, 2019

LEsson VII Research Paper Example | Topics and Well Written Essays - 750 words

LEsson VII - Research Paper ExampleTo achieve this, it is important to understand the return on the investment of the ICT infrastructure. The IS surgical incision is also accountable for providing the operating parameters for the users of the ICT component through training, and for providing data assurance (Kawalek2007). Another responsibility of the IS department is to ensure the functionality of the infrastructure. This is achieved through proper installation and sustainment of the ICT components, developing operating applications and assisting the users in data management and software use. The information systems department is comprised of various groups namely technicians help desk staff, business analysts and programmers. The desktop technicians are responsible for maintaining and repairing the ICT hardware equipment. This involves repairing faulty equipment and installing new equipment. Business analysts are involved in the strategic planning within an brass, and in executin g plans to ensure the organization achieves its objectives. The programmers are involved in developing and repairing operating applications. They are also responsible for providing system applications. ... These are some of the actions I would take in reception to the following irregularities on the use of the ICT equipment. If someone from the IS department notifies me that one of my employees is spending 3 hours a day writing messages on twitter, I would ask them to key the employee that has been spending time on twitter, and send them to the management.I would also ask the IS department to suspend all the internet connections on the employees computer. I would then penalize the employee by suspending all internet relate tasks for them over a specific period of time (Kroenke 2007). If I ask how the IS department knows ab disclose the employee and find out that it is by secretly monitoring the computer usage, I would not be against such monitoring of internet usage because the u se of the internet should be for issues related to the telephoner, and should be used for the benefit of the company (Kawalek2007). I would, however, limit the monitoring of the internet usage to only one trustworthy staff member in the IS department or implement an application that automatically alerts the management when the user accesses certain sites. If someone from the IS department notifies me that one of my employees is sending many personal emails, and admits to drill the mails as a precautionary measure against any suspicious emails, I would be against such monitoring because it invades the privacy of the other employees. It would also be contraband because all the employees have the right to communication. Ethically speaking, it would not be correct to view the messages personally directed to another person (Kroenke 2007). I would, however, caution the employee because it is against the companys rules to send and receive personal emails. If as an employee

No comments:

Post a Comment