Wednesday, April 17, 2019

LEsson VII Research Paper Example | Topics and Well Written Essays - 750 words

LEsson VII - Research Paper ExampleTo give this, it is important to understand the return on the investment of the ICT infrastructure. The IS department is also responsible for providing the operating parameters for the users of the ICT helping through training, and for providing data assurance (Kawalek2007). Another responsibility of the IS department is to mark the functionality of the infrastructure. This is achieved through proper adeptness and maintenance of the ICT components, developing operating applications and assisting the users in data management and software use. The information administrations department is comprised of confused groups namely technicians help desk staff, business analysts and programmers. The desktop technicians are responsible for maintaining and repairing the ICT hardware equipment. This involves repairing faulty equipment and inst totallying refreshed equipment. Business analysts are involved in the strategic planning within an organization, a nd in executing plans to ensure the organization achieves its objectives. The programmers are involved in developing and repairing operating applications. They are also responsible for providing system applications. ... These are some of the actions I would take in response to the following irregularities on the use of the ICT equipment. If mortal from the IS department notifies me that one of my employees is spending 3 hours a day writing messages on twitter, I would charter them to identify the employee that has been spending time on twitter, and send them to the management.I would also ask the IS department to suspend all the internet connections on the employees computer. I would then penalize the employee by suspending all internet associate tasks for them over a specific period of time (Kroenke 2007). If I ask how the IS department knows about the employee and honor out that it is by secretly monitor the computer usage, I would not be against such monitoring of internet us age because the use of the internet should be for issues related to the connection, and should be used for the benefit of the company (Kawalek2007). I would, however, limit the monitoring of the internet usage to only one trustworthy staff fragment in the IS department or implement an application that automatically alerts the management when the user accesses certain sites. If person from the IS department notifies me that one of my employees is sending many person-to-person emails, and admits to reading the mails as a precautionary banner against any suspicious emails, I would be against such monitoring because it invades the privacy of the other employees. It would also be illegal because all the employees have the right to communication. Ethically speaking, it would not be correct to view the messages personally directed to another person (Kroenke 2007). I would, however, caution the employee because it is against the companys rules to send and receive personal emails. If a s an employee

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.