Tuesday, July 23, 2019
LEsson VII Research Paper Example | Topics and Well Written Essays - 750 words
LEsson VII - Research Paper Example To achieve this, it is important to understand the return on the investment of the ICT infrastructure. The IS department is also responsible for providing the operating parameters for the users of the ICT component through training, and for providing data assurance (Kawalek2007). Another responsibility of the IS department is to ensure the functionality of the infrastructure. This is achieved through proper installation and maintenance of the ICT components, developing operating applications and assisting the users in data management and software use. The information systems department is comprised of various groups namely; technicians help desk staff, business analysts and programmers. The desktop technicians are responsible for maintaining and repairing the ICT hardware equipment. This involves repairing faulty equipment and installing new equipment. Business analysts are involved in the strategic planning within an organization, and in executing plans to ensure the organization ac hieves its objectives. The programmers are involved in developing and repairing operating applications. They are also responsible for providing system applications. ... These are some of the actions I would take in response to the following irregularities on the use of the ICT equipment. If someone from the IS department notifies me that one of my employees is spending 3 hours a day writing messages on twitter, I would ask them to identify the employee that has been spending time on twitter, and send them to the management.I would also ask the IS department to suspend all the internet connections on the employeeââ¬â¢s computer. I would then penalize the employee by suspending all internet related tasks for them over a specific period of time (Kroenke 2007). If I ask how the IS department knows about the employee and find out that it is by secretly monitoring the computer usage, I would not be against such monitoring of internet usage because the use of the internet should be for issues related to the company, and should be used for the benefit of the company (Kawalek2007). I would, however, limit the monitoring of the internet usage to only one t rustworthy staff member in the IS department or implement an application that automatically alerts the management when the user accesses certain sites. If someone from the IS department notifies me that one of my employees is sending many personal emails, and admits to reading the mails as a precautionary measure against any suspicious emails, I would be against such monitoring because it invades the privacy of the other employees. It would also be illegal because all the employees have the right to communication. Ethically speaking, it would not be correct to view the messages personally directed to another person (Kroenke 2007). I would, however, caution the employee because it is against the companyââ¬â¢s rules to send and receive personal emails. If as an employee
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.