Unit VIII Unit VIII

  • Uncategorized

5

Unit VIII

Unit VIII

The most important and rapidly changing aspect of the modern world isinformation and communication technologies. Trends in IT have aninfluence on all sectors and aspects of daily life, includingpolitical, social, economic, religious, and health care activities.No institution can ignore the role of technology. Therefore, there isa need for best practices that guide use of IT, especially incorporate organizations. This includes the role of individuals,mainly IT managers and users, in the adoption and management ofinformation technology systems. While some people, such asadministrators, are trained and experienced, the users may not haveadequate technical knowledge. Therefore, the IT manager and his orher support staffs have the responsibility of supervising thedevelopment of information systems, ensuring that they areoperational, training the end users, and providing backups andsecurity (Bakshi, 2013).

Additionally, there are standards that can be adopted to promote bestpractices in information systems management. Some of them have hadhuge impacts on the general performance of organizations. Theyinclude “ITIL, CMMI, CobiT, eTom, ISO 9000, ISO/IEC 17799, MalcolmBaldrige, Six Sigma and many more” (Soomro &amp Hesson, 2013).Several benefits are associated with these approaches to ITadministration. These include improved service delivery and customersatisfaction, enhanced competence among technical staff, reduced costof training and employee turnover, and alignment of the IT functionswith the organizational goals (Soomro &amp Hesson, 2013).

In the modern business environments, organizations have adoptedinformation technology in basic operations. However, IT is verydynamic. Due to the dependence of corporate entities on technology,there are strategic decisions that are essential in the next fiveyears. They involve IT trends that organizations need to watch outfor in the near future. Some of the most important strategiesinclude improvement of systems and security architectures. Theemergence of highly technical hackers has resulted in increasedthreats to sensitive digital data. Additionally, new and smartercomputing architectures are being developed, which will make thecurrent ones absolute. Thus, organizations need to upgrade theirsystems continuously. This will have a direct impact on theorganization performance. It will enhance the security ofinformation, improve efficiency, and ease the transfer of information(Parsons, 2015).

There are several innovations and technologies that are likely totransform the IT industry in the near future. They includeenhancement in cloud computing, no-touch interfaces, supercomputers,augmented realities, and possible disappearance of computers.However, based on the recent trends, the future cannot be accuratelypredicted (Parsons, 2015).

Additionally, the internet is an inevitable platform for entities inthe modern society. It allows fast and efficient transfer of data.Consequently, online information has numerous risks, which includesinternal attacks from rogue employees, carelessness, `bring your owndevices` policies and cloud computing security. An organization canmitigate these threats by using stronger encryption, employeeeducation, adequate policies on mobile devices, and having privilegedaccounts. This has a direct impact on the decision-making strategies(Kim &amp JouKov, 2016). For example, it is essential forinformation technology experts to be involved in the development oforganizational plans and policies. This will ensure that the securityconsiderations are incorporated.

Electronic data is also exposed to external threats. This includesthe mechanical destruction of storage devices, power failures, andtheft of computers. They can be avoided by having an auxiliarysystem. It will ensure that lost data can be recovered with ease.This has policy implications (Kim &amp JouKov, 2016). For example,decision makers should incorporate power backups as well as physicalsecurity in the implementation of information systems. The hardwareshould also be protected from malicious damage.

References

Bakshi, S. (2013). Information Technology Managers Role andresponsibility: A Study at Selection Hospitals. Global Journal ofComputer Science and Technology Network,Web &amp Security,13(10).

Kim, K. &amp JouKov, N. (2016). Information science andapplications (ICISA) 2016. Singapore: Springer.

Parsons, J. (2015). New Perspectives on Computer Concepts 2016,Comprehensive. Boston, MA: Cengage Learning.

Soomro, T. &amp Hesson, M. (2012). Supporting Best Practices andStandards for Information Technology Infrastructure Library. Journalof Computer Science 8 (2): 272-276.

.

Close Menu