Sunteți pe pagina 1din 12

Running Head: INFORMATION TECHNOLOGY IN ORGANIZATION

Implications of Introducing Information Technology in an Organization Excelsior Community College Fundamentals of Information Technology Author: Shadae Collins ID#: 20111841 Lecturer: Mr C Rose Date: October 21, 2011 Group: 301A

Running Head: INFORMATION TECHNOLOGY IN ORGANIZATION Table of Contents

ABSTRACT .................................................................................................................................... 3 IMPLICATIONS OF INTRODUCING INFORMATION TECHNOLOGY IN AN ORGANIZATION .......................................................................................................................... 4 Social Implications ...................................................................................................................... 4 Legal Implications ................................................................................................................... 4 Economic Implications ............................................................................................................ 5 ROLES OF EACH NETWORK IN AN ORGANIZATION ......................................................... 7 Internet ........................................................................................................................................ 7 Intranet ..................................................................................................................................... 7 Extranet .................................................................................................................................... 7 COMPUTER SECURITY .............................................................................................................. 9 Differences between Logical and Physical Computer Security .................................................. 9 Human Error ............................................................................................................................ 9 Technical Error .......................................................................................................................... 10 Unauthorized Access ............................................................................................................. 10 DEFINITIONS .............................................................................................................................. 11 Encryption ................................................................................................................................. 11 Biometric Software ................................................................................................................ 11 REFERENCE ................................................................................................................................ 12

Running Head: INFORMATION TECHNOLOGY IN ORGANIZATION ABSTRACT

This assignment indicates the social, legal and economic implications of introducing Information Technology in an organization. There is also information provided which explains the use of internet, intranet and extranet in an organization and the globalize society. Moreover, it also consists of an explanation of the term computer security and the differences between logical and physical computer security. A definition is also given for human error, technical error and unauthorized access. Finally, a brief definition is provided for the terms encryption and biometric software, which also includes examples of each.

Running Head: INFORMATION TECHNOLOGY IN ORGANIZATION IMPLICATIONS OF INTRODUCING INFORMATION TECHNOLOGY IN AN ORGANIZATION National Commercial Bank (NCB) Social Implications In an organization employees can stay home and send their work to the company by the use of the internet. The National Commercial Bank (NCB) also makes the process easier for their customers, by allowing them to do their transactions and banking in their account by using their website (internet banking), instead for them to stand in a line. For example, suppose the system is down at the NCB branch, customers can now have access to their website and do their business online. Benefits Speed of doing things, such as internet banking. Allows customers to have conference and shopping online.

Drawbacks The internet can be very addictive. Important documents can be lost if information is not stored properly and the internet is disconnected. Legal Implications In the National Commercial Bank, whenever a customer is at the teller depositing money, the bank has a money machine that detects and sees if the money is forgery or real. People in todays society tend to do printing of money themselves and expect that they wouldnt get caught.

Running Head: INFORMATION TECHNOLOGY IN ORGANIZATION Technology has improved over the past few years, so therefore every organization has a money machine which detects if the deposited money is forgery. Hence, with the improvement of technology intruders have created a new breed of criminal activities, such as identity theft. This is when a criminal steals someone elses identity and has access to their bank account; which allows them to buy stuffs without their consent and then their account becomes bankrupt. In this

case to cease such terrible action towards their customers, technology can now solve crime easier by checking database of fingerprints on the computer, which helps them to catch these criminals. Benefits

Solving crime easier by using the computer to check database of fingerprints. Providing a suitable machine to detect if the deposited money is forgery.

Drawbacks Improvement of technology allows persons to print fake money. A problem which occurs in the organization is leaked on the internet and the information goes around, which customers hold it against the company.

Economic Implications In majority of these organizations they sometimes make it cheaper for their valid customers and new comers by offering substantial services. Persons seeking for jobs can go on the NCB site and there will be a list of jobs available online, whereas there will be an application form that should be submitted back to them. This is an advantage, because it saves the applicants their money from purchasing the form at the NCB branch.

Running Head: INFORMATION TECHNOLOGY IN ORGANIZATION Benefits Better customer satisfaction, which enables customers to apply and do transactions online. Advertising the company on the internet.

Drawbacks Cost of internet access. Purchasing facilities (computers) for the organization on sites like EBay.

Running Head: INFORMATION TECHNOLOGY IN ORGANIZATION ROLES OF EACH NETWORK IN AN ORGANIZATION Internet The Internet is a network of networks that connects computers worldwide via a huge set of telecommunications link. An organization views the internet as a very important and useful network, whereas it allows them to access, share and exchange information to other employees within the organization. One of the greatest features of an internet is electronic mail. This is so because, with e-mail, everyone on a network within the organization can easily keep others posted about important information. King, G. & Forbes T. (Eds.). (2001). Information Technology Made Simple 2nd Edition, p.110 Intranet The Intranet is a network that belongs to an organization and is accessible only by

members of that organization. In an organization, the intranet enables employees to have quicker access to internal information and to share knowledge so that they can do their jobs better. The employees information stored on intranets may include their e-mail address and telephone numbers, product information, sales data, employee benefit information, and lists of jobs available within the organization. E.g. The workers at Digicel, store their personal information on the intranet, also they keep a file of the jobs available in case someone has applied and have fulfilled the requirements needed for the position. King, G. & Forbes T. (Eds.). (2001). Information Technology Made Simple 2nd Edition, p.110 Extranet The Extranet is a private intranet that connects not only internal personnel but also selected suppliers and other strategic parties. Extranets have become popular for standard

Running Head: INFORMATION TECHNOLOGY IN ORGANIZATION

transactions such as purchasing. For example, Digicel, for instance, has an extranet that connects more than 5,000 of their dealers in Jamaica. The extranet supports sales and proving good network service for their valid customers. Sawyer, C.S. & Williams, B.K. (Eds.). (1999). Using Information Technology 4th Edition, p.178

Running Head: INFORMATION TECHNOLOGY IN ORGANIZATION COMPUTER SECURITY Computer Security is the protection of computer resources from intentional or unintentional damage. Most security measures involve data encryption and password. The resources of the computer include: Computer Hardware Computer Software Computer Data/Procedures Computer Users King, G. & Forbes T. (Eds.). (2001). Information Technology Made Simple 2nd Edition, p.169 Differences between Logical and Physical Computer Security Logical Security consists of software safeguards for an organizations systems, including user identification and password access, authentication, access rights and authority levels. Whereas, the Physical security describes measures that are designed to deny access to unauthorized

personnel (including attackers or even accidental intruders) from physically accessing a building, facility, resource, or stored information. King, G. & Forbes T. (Eds.). (2001). Information Technology Made Simple 2nd Edition, p.166 Human Error Human error has been cited as a cause or contributing factor in disasters and accidents in industries as diverse as nuclear power.
Examples:

Running Head: INFORMATION TECHNOLOGY IN ORGANIZATION errors in problem diagnosis errors in action planning and execution Sawyer, C.S. & Williams, B.K. (Eds.). (1999). Using Information Technology 4th Edition, p.226

10

Technical Error Technical error is mistake made by the computer system. Example: 1. User not authorized to carry out an operation and object accepts exception this means error occurred while accessing an object. (Retrieved 2011, from http://www.thefreedictionary.com/computer+error.) Unauthorized Access Unauthorized Access is when a person who does not have permission to connect to or use a system gains entry in a manner unintended by the system owner. The popular term for this is hacking. Unauthorized access to computer entails approaching, trespassing within, communicating with, storing data in, retrieving data from, or otherwise intercepting and changing computer resources without consent. (Retrieved 2011, from http://www.businessdictionary.com/definition/unauthorized-access.html.)

Examples:

Unauthorized access to computer systems Access that exceeds a persons authorized limits

Running Head: INFORMATION TECHNOLOGY IN ORGANIZATION DEFINITIONS Encryption

11

Encryption is the process of making information useless by converting it into secret codes called cipertext. It is also the altering of data so it is not usable unless the changes are undone. Examples: Symmetric Encryption Asymmetric Encryption (http://www.ehow.com/about_4815816_types-of-encryption.html) Biometric Software Biometric security devices identify a person through a finger print, voice intonation, or other biological characteristic. It is also used in some computer security systems, to restrict user access. Examples: Retinal-identification devices use a ray of light to identify the distinctive network of blood vessels at the back of ones eyeball. Fingerprint/Palm Print (http://www.griaulebiometrics.com/en-us/book/understandingbiometrics/introduction/types)

Running Head: INFORMATION TECHNOLOGY IN ORGANIZATION REFERENCE Sawyer, C.S. & Williams, B.K. (Eds.). (1999). Using Information Technology 4th Edition, p.178, 226. King, G. & Forbes T. (Eds.). (2001). Information Technology Made Simple 2nd Edition, p.110, 166,169. The Free Dictionary, Retrieved 2011, from http://www.thefreedictionary.com/computer+error. Business Studies.com, Retrieved 2011, from http://www.businessdictionary.com/definition/unauthorized-access.html.

12

E How, Retrieved 1999-2011, from http://www.ehow.com/about_4815816_types-ofencryption.html Griaule Biometrics, Retrieved 2008, from http://www.griaulebiometrics.com/enus/book/understanding-biometrics/introduction/types.

S-ar putea să vă placă și