Bài tập  /  Bài đang cần trả lời

Topic talk about the uses of information technology

3 Xem trả lời
Hỏi chi tiết
4.862
3
4
Nghiêm Xuân Hậu ( ...
14/12/2017 18:52:02

Information technology and the associated computer based systems are ubiquitous within virtually every part of society and business.  The impact and effects of the underlying systems may be invisible and are often taken for granted by many of the populace.

Both opportunities and challenges face the sector.

Business change projects
  • An important mistake that is often made is to consider “IT Projects” as an entity in themselves.  In practice these activities should be considered as “Business change” projects facilitated by new IT systems.  It is usual that the underlying systems are key to normal business function or are to provide new or additional business benefit.  Understanding this principle helps in gaining a holistic view so enabling resources to be allocated correctly to maximise business benefit.  “IT” is typically 20% of the cost of a business change project so failing to plan and budget adequately for the remaining 80% (people, process and change issues) will usually guarantee project failure.
  • Current UK Government transformational projects are amongst the largest and most complex such projects ever undertaken.  An example case is that of the “Smart Meter” initiative.  A holistic view and special care needs to be taken in considering viability, design, test, service introduction, training, process, maintenance and end of life.  Since some of these projects are so vast or ambitious, project planners/ system implementers can often find themselves in un-chartered territory that in turn can lead to unexpected costs or worse.
  • Regular, candid, communication between the senior responsible owner and the board level project sponsor (stake holder) is vital.
  • The availability of high quality skills in systems engineering, application architects, project management, financial management and business change are key requirements.
Personal identity and authentication

The increasing trends by government agencies to utilise online services drives a need to provide robust, secure and reliable means of asserting identity to the necessary degree.  Some of the typical issues faced are;

  • The citizen should not be required to disclose more personal information than is necessary for a particular purpose.
  • For most purposes, policy should move away from proving identity and towards establishing authority to access or transact.  Proof of absolute identity is seldom really required, only entitlement as part of a group.  For example, a young person may need to prove they are over 18 to buy alcohol but not their name and other details.
  • Any business case involving identity management should give a clear statement of the intended benefits, how they are to be realised and how any risks to individuals are to be minimised.
  • It is essential that IT systems for proving identity are built using sound engineering principles.  Aspects such as security, dependability and acceptable failure rates should be specified at the outset.
  • Government needs to consider what forms of redress will be available for anyone whose identity is compromised.
Resilience and robustness of communications networks that form part of the national critical infrastructure
  • Communications networks include both fixed and mobile systems. Their increasing interdependency and their dependency on other critical infrastructure, such as power, means that they are potentially liable to cascades of failure with very serious consequences.  This needs to be taken into account when considering their role.
Data integrity

As both society and the individual are reliant on IT based systems and the data they contain it is critical that data is stored in a secure manner, i.e.;

  • It is only accessed by authorised staff.
  • It shall be kept safe and not disclosed or accidentally made available to other parties that are not authorised to view or use the data.
  • Its integrity shall be a key requirement.  This means the data shall not be corrupted or lost by system failure, unauthorised access or unintended changes.
  • Processes and good working practices shall be in place along with training of personnel to ensure effective data management and security.
  • Processes exist for individuals / businesses to correct data in the light of errors.
Software engineering

Software development and the quality of the final product has not always been at the front on peoples minds or apparent.  However recent events in the automotive industry has bought this matter to the attention of the public on a global scale.

Often underlying systems only become apparent when something goes wrong and then the impact is usually significant both in financial and operational terms or worst case life threatening.

With increased convergence as well as the steady move to services and business processes that rely on data sharing and communications it is critical that communications, applications and embedded systems software is engineered to the highest standards.

The implementation of Open standards for both communications and Application Interfaces (API) is another facet of software engineering that needs to be addressed in today’s converging world.  Large UK and global IT and communications business transformation programs will only be achievable by collaboration and the adoption of open standards and high quality systems development programmes that utilise an engineering approach for design, test and system verification.

Security

Security can mean many things to many people.  In terms of IT, the importance of security cannot be understated both in a physical and virtual sense.  As stated previously the function of software is critical in today’s society.  Security is another dimension whereby failure can result in at best inconvenience, to data loss, fraud, Identity theft, or system failure due to cyber attacks via malware or Denial of Service (DOS) type threats.  

Bearing in mind some today’s current and future systems will control Critical National Infrastructure security needs to be considered utilising a holistic approach and treated as a key design requirement rather than an add-on.

Mở khóa để xem toàn bộ nội dung trả lời

(?)
Bạn đã đạt đến giới hạn của mình. Bằng cách Đăng ký tài khoản, bạn có thể xem toàn bộ nội dung trả lời
Cải thiện điểm số của bạn bằng cách đăng ký tài khoản Lazi.
Xem toàn bộ các câu trả lời, chat trực tiếp 1:1 với đội ngũ Gia sư Lazi bằng cách Đăng nhập tài khoản ngay bây giờ
Tôi đã có tài khoản? Đăng nhập
2
4
Linh's Chồn's
14/12/2017 18:52:11

Privacy can be an issue in the workplace, as well. As technology advances, employers are able to easily and inexpensively install and operate surveillance—from security cameras and motion detectors to software that tracks employee internet usage. Companies have several motivators for using these tools. Monitoring employees allows businesses to keep tabs on the dissemination of potentially confidential information, track productivity and even prevent lawsuits by watching for harassing behavior.

Many questions arise from these practices. How much privacy, if any, are employees entitled to when using company equipment? Is it acceptable to conduct personal business at work? Do employers have a right to penalize employees for conduct and information relayed through social media while off the clock?

As the law begins to catch up with the digital age, some of these questions will find concrete answers. For now, information technology personnel are the watchdogs and the gatekeepers.

10
2

Bạn hỏi - Lazi trả lời

Bạn muốn biết điều gì?

GỬI CÂU HỎI
Học tập không giới hạn cùng học sinh cả nước và AI, sôi động, tích cực, trải nghiệm

Hôm nay bạn thế nào? Hãy nhấp vào một lựa chọn, nếu may mắn bạn sẽ được tặng 50.000 xu từ Lazi

Vui Buồn Bình thường
×
Trợ lý ảo Trợ lý ảo
×
Đấu trường tri thức | Lazi Quiz Challenge +500k
Gửi câu hỏi
×