Upload
neil-patrick-conocono
View
219
Download
0
Embed Size (px)
Citation preview
8/4/2019 Top Ten IT Issues
1/5
TOP TEN IT ISSUES, 2011
Funding IT
Funding IT is the top-most issue in the Information Technology field due to its importance anddifficulty. Information Technology is one of the most rapidly evolving fields in the industry
because of the endless possibilities of new software and systems developed in order to cater the
needs of human kind. Because of this, systems may be considered obsolete after a few years or
so forcing the need to replace it. Due to constant replacements, a considerable amount of
money is sacrificed. Not only that, IT is also difficult to maintain because of the possibility of
different kind of attack or problems that may arise. This calls for different persons to be hired in
order to prevent of these things to happen. Another reason why Funding IT is difficult to do so is
the price IT is needed in order to be purchased. Because of the high positive effects one can
have once IT systems are implemented, the price of IT is quite expensive.
Despite of the reasons stated, it is advisable that a company may turn to other activities that
may become a source of funds such as extended funds and fund raising.
Administrative / ERP / Information Systems
Administrative / ERP / Information Systems are the top two IT issue simply because of its
questionable importance. As it has been surveyed, these three are strategically important but its
significance is questioned. This is because as an institution enlarges, its significance decreases.
Not only that, these systems are the kind of systems that require a large amount of financial
resource which leads us to the question whether its worth it to devote an amount of money to
something with decreasing significance. Yes, ERP systems and alike are quite useful but think of
this, ERP systems and alike have regular upgrade cycles in order for it to be able to adapt to its
subjects business processes. Not only that, personell are needed to operate and maintain these
systems effectively which means another batch of financial resources to be sacrificed. In addition
to this, as an organization expands, ERP systems should be able to expand as well which doesnt
guarantee us the maintenance of its significance. In this case, a company should consider the
size of the company and its financial resources before applying an Administrative / ERP /
Information system. If it is feasible, then one should go with all the risks considered.
Learning with Technology
How this did became an issue? First, it is a new kind of field. Primarily, Information Technology
has been developed in order to answer the problems that arose in the areas of communication,
8/4/2019 Top Ten IT Issues
2/5
business, and administration. Applying it in order to facilitate learning within the premises of the
academic institution is relatively new. Though the positive effects of this kind of application are
without any doubt, maintenance is therefore questioned and its ability to reach the goals of the
institution is doubted. Another reason is that IT leaders may not be able to best support such
tools that constantly change in order for it to be able to answer the academic needs of a school.It is also questioned whether IT will be able to adapt with the instructional technologies or
whether the components involved will be able to adapt with the new application of technology.
It is known that such technology may cause hazards such as access to social networking sites
and games during class hours. Will these hazards be controlled? Are students and teachers have
access to such technologies of have enough knowledge to be able to effectively learn using
these technologies? These questions arise as the subject is pursued.
Security
Computer security refers to the capability of ensuring that a data stored in a computer cannot
be read or taken by anyone without proper authorization. This security measures involves
encryption and decryption. Data encryption is translating a data into something that is
unintelligible without a deciphering mechanism. A password is a secret phrase that a user uses
to access a specific program or system. Sometimes, computer security works for the protection
of a computer. Everything that is in the computer remains safe and unharmed. A home
computer is a popular target of intruders, because they want what you have in your computer.
They try to look for useful information like credit card number, bank account information, and
anything else that can be useful. Stealing those information, the intruders can use your account
to use it to buy products for their own good or even use that information against you. How they
get in your system is with the help of viruses and emails, it makes your computer vulnerable. So
if your computer is not properly secured, it will be prone to intruders.
Mobile Technologies
No doubt, another concept in Information Technology that has been rapidly changing up until
now is mobility. Mobility is the ability of a certain technology to be able to easily transfer from
one place to another thru physical or digital means. This can be achieved by reducing the
physical size of a gadget so it can be easily carried by human hands. As you may have observed,
one of the most mobile gadgets available in the market are the cellular phones. They have quite
reached a state where they are really small and convenient to carry around anywhere thus they
have been given certain capabilities a laptop can do in order to achieve the goal of mobility.
Cellular phones now can browse the internet and even take pictures and play music. Some are
even given the ability to view computer documents such as word documents and office
8/4/2019 Top Ten IT Issues
3/5
presentation. How this became an issue? There have been doubts of the strategic direction of
mobile technologies and whether such technologies are fully capable of doing things a laptop is
capable of. Despite of these, mobility is still pursued.
Agility / Adaptability / Responsiveness
Agility / Adaptability / Responsiveness are three of the most pursued goal in developing
technologies. First, it should be agile enough to be able to keep up with the changes of its
subject. Second, it should be adaptable to business processes since system should fit in with the
business process not the other way around. Lastly, it should be responsive enough not to waste
the time of the user. How these three did become an issue in the Information Technology
Industry? Well, there is always the endless possibility of going further than what is presently
considered as agile, adaptable, and responsive. We may achieve a status further than what we
have presently achieved thus we may have a system further agile, adaptable, and responsive. But
the question is, how and when we will achieve it? How can we determine that we have reached
the extreme?
Governance / Project Management
It relates to decisions that define expectations, grant power, or verify performance. It describes
methods for analyzing and collectively managing a group of current or proposed projects based
on numerous key characteristics. It has fundamental objective that determine the optimal mix
and sequencing of proposed projects to best achieve the organization's overall goals - typically
expressed in terms of hard economic measures, business strategy goals, or technical strategy
goals - while honoring constraints imposed by management or external real-world factors. It is
therefore without any doubt that it has been increasingly strategically important. In spite of this,
there are questions that have been raised regarding with these. Is it reliable and secure? How it
is prioritized? Is it worth the funds and effort? Such questions are not yet answered but still,
governance and project management is still confidently important in a firm.
Infrastructure / Cyberinfrastructure
Infrastructure is the physical structure of the firm while the cyber infrastructure is the digital
structure of the company involved. The reason why this became an issue is because it shares a
property with those mentioned first: strategic importance. Most of the areas in Information
Technology are developed because of its strategic importance. And as usual, it is quite
expensive. First, there are disasters and risks involved with the physical structure of a company
such as natural disasters. One good example of this is the recent earthquake that happened in
8/4/2019 Top Ten IT Issues
4/5
Japan. Quite a large amount of money was wasted and a large amount of money is needed in
order to build the repairs. Not only that the infrastructure is affected but also the
cyberinfrastructure because the physical components of the cyber component of the company
was also destroyed. Because of this, a company should be knowledgeable regarding with
disaster and risk management in terms of its physical and cyber infrastructure.
Disaster Recovery / Business Continuity
The best example for this issue is the recent earthquake in Japan. A magnitude of 8.0 something
earthquake has hit Japan thus causing millions and millions of money wasted. The question thus
arise, will Japan be able to recover from the damage? Not only that it wasted a lot of financial
resources, but also it has other risks such as leaked radiation, killed lives, and the continuity of
business. How can a company be able to recover such loss? This is one of the issues that are not
answered specifically which is the reason why it made it to the top ten list of IT issues. One may
have different ways on how to recover but a bundle of monetary resources must be considered.
Also, the possibility of not being able to recover from the disaster is not eradicated thus leaving
us standing on the shades of grey.
Strategic Planning
Strategic planning also made it in the list because of the endless possibilities that may be
considered involved in Information Technology. Not only that, some risks should also be
considered. There are many processes to be considered in planning strategically when it comes
to IT such as the cost benefit of applying such issues. Also, all those mentioned above should
also be considered. Will funding it feasible? Will the company be able to recover if disaster
strikes? Not only that, the question whether every company should consider the opinion of all
its components is also a large consideration.As a method, strategic planning may provide justenough structure to act decisively, allowing IT leaders to support their institutions in making
decisions on how technology enables priorities more than on what priorities to enable. Another
issue with it is there is no conformity when it comes to strategic planning. Different phases may
be conceptualized when doing strategic planning and these phases are not guaranteed effective
depending on the situation.
8/4/2019 Top Ten IT Issues
5/5
LYCEUM OF THE PHILIPPINES LAGUNA
54 KM. Makiling, Calamba City, Laguna
Top Ten IT Issues, 2011
Submitted by:
Mr. Neil Patrick Conocono
Submitted to:
Ms. Mirafe Prospero
College of Computer Studies
Date:
July 15, 2011