1 higher administration information technology for management outcome 2: the impact of ict on...

Post on 03-Jan-2016

213 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

1

Higher AdministrationInformation Technology for Management

Outcome 2: The impact of ICT on workflow, working practices and the

management and security of information.

2

What is workflow? “… the movement of information or material

from one activity to another.” “… a term used to describe the tasks,

procedural steps, people, systems, inputs and outputs of information in a business process.”

3

Workflow is usually seen in terms of:

Input Process

Output

4

Input (using ICT) Information is:

gathered from a wider area keyed in only once and can then be used by

many people gathered more quickly from within and outwith

the organisation

Intranets (LANs) – Internet (WANs) – E-mail – Electronic Diaries – Mobile Technologies

5

Process (using ICT) Work gets done more quickly and

accurately. Productivity is increased. Less staff required for routine

tasks.

Spreadsheets – Databases – Word Processing – Electronic Diaries

6

Output (using ICT) Finished documents/communications can be

sent 24/7. Data/documents can be updated regularly and

quickly. Information can be accessed by authorised

users wherever they are based. Output can be standardised by templates

making it easier to understand.

Intranets (LANs) – Internet (WANs) – E-mail – Electronic Diaries – Mobile Technologies – Presentation Software - Templates

7

The impact of ICT on workflow can result in: De-layering of organisations Reduced need for movement of people Faster communication Reduced need to accommodate people in

specific areas Reduced amount of lost/misplaced

documents Reduced costs/less time wasted

8

Impact of ICT on working practices

Hot-desking The reduction in the need to physically move

people and paper has reduced the requirement to lay out offices specifically with workflow in mind.

Related staff/departments do not have to work alongside each other.

Many organisations now ‘hot-desk’ where no-one ‘owns’ a desk.

9

Impact of ICT on working practices Homeworking/

Teleworking Increased numbers able

to work wholly or partly at home.

Improved communications (mobile technologies).

10

Impact of ICT on working practices Video OR Audio

Conferencing Remote meetings are

much more cost-effective way of conducting business than traditional methods.

11

What is a Data Management System? Setting up systems,

procedures and controls relating to: the input, storage and

retrieval of data, who it is accessed by, how it is kept up-to-date

and how it is kept secure.

12

Data Management Systems involve:

Centralised Systems Hardware Software

13

Centralised Systems Many organisations will have a central

department dealing with IT Data Management: Management Information Systems Department

OR Information Systems Department OR Computer Services Department

14

Management Information Services Purchasing hardware & software Maintaining hardware & software Setting up systems and procedures Training User policies Codes of practice Support systems

15

Data Integrity Centralised systems allow:

Data to be controlled and updated centrally Data to be used by employees depending on

their different access rights Ensures employees are accessing accurate data

Ensuring data integrity is maintained!

16

Advantages of centralised data management Standardisation of computer hardware & software Standardised systems and procedures Ability to prioritise purchase of new hardware and

software across the company Control of what is being used and how Build-up of expertise and specialisation keeping

up with new developments.

17

Choice of Hardware The efficiency of data systems depend on

Processing speeds and Hard-drive/memory capacity of computers Storage and retrieval devices

Rolling updates of hardware are required to ensure the optimum effectiveness of data systems

18

Choice of Software – Operating System Controls and monitors the operation of the computer system. Controls the filing system - loading and saving of programs

and data from backing storage Checks input devices like keyboard and mouse, eg each time

you press a key on the keyboard the OS checks to see which key and displays that character on the screen

Sends data to output devices like the screen and printer. Error Reporting - lets you know if any mistakes have been

made, eg no paper in printer Provides the Human Computer Interface (HCI) for the user. Controls the security of the system – eg in MS Windows you

can add multiple users each with their own password

19

Examples of Operating Systems

Windows Linux Mac OS Unix for large file servers and networks

20

Choice of Software – Utility Programmes

File management activities such as: Searching for lost files Re-organising files on disk to free space

(defragmenting) Checking for viruses Checking user IDs and passwords

21

Choice of Software – Performance Management Software

Monitors, analyses and reports on the performance of a computer system.

Helps managers monitor current and future hardware requirements.

22

Choice of Software – Communications Software

Used in a mainframe environment to control the flow of data to and from remote sites.

23

Choice of Software – Applications Software

General Purpose Packages – wp, ss, db, dtp, etc

Integrated Packages – eg MS Works Software Suites – eg MS Office Customised Software

24

Choice of Software – Database Management System

Centralised database resource for whole organisation

Common database file – different tables – linked together

Each table designed to meet needs of all different users

Accessed by everyone

25

Advantages of a Database Management System

Data not stored several times in separate files

Data is consistent Greater security – different levels of access Reduces time spent inputting data because

data is held in one file only Data accuracy (integrity) through validation

26

Security & Integrity of Data Security – theft, damage and destruction of

data Integrity – correctness of data, the

prevention of inaccurate data entry or alteration (whether accidental or malicious)

27

Physical Security - Hardware Security mark equipment Keep inventories Secure equipment to desks Safe storage of disks/CDs

28

Physical Security - Software Procedures for logging off/locking machines

when left unattended Password protected screen savers

29

Security of Data – Back-up Procedures

Ensures a second copy of data is taken in case of accident or damage to the original

Regular back-ups of data should be made automatically

30

Security of Data – Access Rights

Authorised users do not normally have the right to see all data held on company databases

Rights can be set at different levels including: read-only, read/write or particular terminals/time of day.

31

Security of Data – Help-desk/technician support

Responds to user queries or technical problems speedily.

32

Security of Data – File Management Systems

To ensure data is stored and retrieved effectively. This will include: Archiving old data, Regular back-ups

Good house-keeping procedures

33

Security of Data – Monitoring of e-mails

Some organisations have software in place to monitor e-mails

This may hold messages if they contain anything worthy of scrutiny.

For example: certain types of words or unusually large attachments.

34

Integrity of Data – User Policies

Formal written policies and procedures which staff often have to sign and agree to. Usually state the do’s and don’ts of using the

computer system (eg misuse of the Internet or unauthorised installation of software) and

advise on such things as back-up, file management, access, storage and security requirements.

35

Integrity of Data – Staff Training

Many of the problems relating to misuse of data are not caused intentionally but happen because of users not knowing any better.

A very important factor in data management is educating staff in the use of data systems and software and good file-management practices.

36

Integrity of Data – Minimising errors of input

Limit who is able to input data

Verify data (data is keyed in twice by different operators)

Validate data (data types/lengths)

37

38

Integrity of Data – Restricting Access

Authorised people only

39

Integrity of Data – Protection against viruses/corruption

Anti-virus software installed and regularly updated.

Not permitting software/USB flash drives to be brought into or removed from the office

40

All these Database Management features have an impact on:

Speed Accessibility Security and integrity of data Responsiveness Customer satisfaction Staff morale and motivation Quality of information

41

Consequences of poor data management

Cost Reduced effectiveness Poor reputation Legal action Loss of customers

top related