Top Ten IT Issues

Embed Size (px)

Citation preview

  • 8/4/2019 Top Ten IT Issues

    1/5

    TOP TEN IT ISSUES, 2011

    Funding IT

    Funding IT is the top-most issue in the Information Technology field due to its importance anddifficulty. Information Technology is one of the most rapidly evolving fields in the industry

    because of the endless possibilities of new software and systems developed in order to cater the

    needs of human kind. Because of this, systems may be considered obsolete after a few years or

    so forcing the need to replace it. Due to constant replacements, a considerable amount of

    money is sacrificed. Not only that, IT is also difficult to maintain because of the possibility of

    different kind of attack or problems that may arise. This calls for different persons to be hired in

    order to prevent of these things to happen. Another reason why Funding IT is difficult to do so is

    the price IT is needed in order to be purchased. Because of the high positive effects one can

    have once IT systems are implemented, the price of IT is quite expensive.

    Despite of the reasons stated, it is advisable that a company may turn to other activities that

    may become a source of funds such as extended funds and fund raising.

    Administrative / ERP / Information Systems

    Administrative / ERP / Information Systems are the top two IT issue simply because of its

    questionable importance. As it has been surveyed, these three are strategically important but its

    significance is questioned. This is because as an institution enlarges, its significance decreases.

    Not only that, these systems are the kind of systems that require a large amount of financial

    resource which leads us to the question whether its worth it to devote an amount of money to

    something with decreasing significance. Yes, ERP systems and alike are quite useful but think of

    this, ERP systems and alike have regular upgrade cycles in order for it to be able to adapt to its

    subjects business processes. Not only that, personell are needed to operate and maintain these

    systems effectively which means another batch of financial resources to be sacrificed. In addition

    to this, as an organization expands, ERP systems should be able to expand as well which doesnt

    guarantee us the maintenance of its significance. In this case, a company should consider the

    size of the company and its financial resources before applying an Administrative / ERP /

    Information system. If it is feasible, then one should go with all the risks considered.

    Learning with Technology

    How this did became an issue? First, it is a new kind of field. Primarily, Information Technology

    has been developed in order to answer the problems that arose in the areas of communication,

  • 8/4/2019 Top Ten IT Issues

    2/5

    business, and administration. Applying it in order to facilitate learning within the premises of the

    academic institution is relatively new. Though the positive effects of this kind of application are

    without any doubt, maintenance is therefore questioned and its ability to reach the goals of the

    institution is doubted. Another reason is that IT leaders may not be able to best support such

    tools that constantly change in order for it to be able to answer the academic needs of a school.It is also questioned whether IT will be able to adapt with the instructional technologies or

    whether the components involved will be able to adapt with the new application of technology.

    It is known that such technology may cause hazards such as access to social networking sites

    and games during class hours. Will these hazards be controlled? Are students and teachers have

    access to such technologies of have enough knowledge to be able to effectively learn using

    these technologies? These questions arise as the subject is pursued.

    Security

    Computer security refers to the capability of ensuring that a data stored in a computer cannot

    be read or taken by anyone without proper authorization. This security measures involves

    encryption and decryption. Data encryption is translating a data into something that is

    unintelligible without a deciphering mechanism. A password is a secret phrase that a user uses

    to access a specific program or system. Sometimes, computer security works for the protection

    of a computer. Everything that is in the computer remains safe and unharmed. A home

    computer is a popular target of intruders, because they want what you have in your computer.

    They try to look for useful information like credit card number, bank account information, and

    anything else that can be useful. Stealing those information, the intruders can use your account

    to use it to buy products for their own good or even use that information against you. How they

    get in your system is with the help of viruses and emails, it makes your computer vulnerable. So

    if your computer is not properly secured, it will be prone to intruders.

    Mobile Technologies

    No doubt, another concept in Information Technology that has been rapidly changing up until

    now is mobility. Mobility is the ability of a certain technology to be able to easily transfer from

    one place to another thru physical or digital means. This can be achieved by reducing the

    physical size of a gadget so it can be easily carried by human hands. As you may have observed,

    one of the most mobile gadgets available in the market are the cellular phones. They have quite

    reached a state where they are really small and convenient to carry around anywhere thus they

    have been given certain capabilities a laptop can do in order to achieve the goal of mobility.

    Cellular phones now can browse the internet and even take pictures and play music. Some are

    even given the ability to view computer documents such as word documents and office

  • 8/4/2019 Top Ten IT Issues

    3/5

    presentation. How this became an issue? There have been doubts of the strategic direction of

    mobile technologies and whether such technologies are fully capable of doing things a laptop is

    capable of. Despite of these, mobility is still pursued.

    Agility / Adaptability / Responsiveness

    Agility / Adaptability / Responsiveness are three of the most pursued goal in developing

    technologies. First, it should be agile enough to be able to keep up with the changes of its

    subject. Second, it should be adaptable to business processes since system should fit in with the

    business process not the other way around. Lastly, it should be responsive enough not to waste

    the time of the user. How these three did become an issue in the Information Technology

    Industry? Well, there is always the endless possibility of going further than what is presently

    considered as agile, adaptable, and responsive. We may achieve a status further than what we

    have presently achieved thus we may have a system further agile, adaptable, and responsive. But

    the question is, how and when we will achieve it? How can we determine that we have reached

    the extreme?

    Governance / Project Management

    It relates to decisions that define expectations, grant power, or verify performance. It describes

    methods for analyzing and collectively managing a group of current or proposed projects based

    on numerous key characteristics. It has fundamental objective that determine the optimal mix

    and sequencing of proposed projects to best achieve the organization's overall goals - typically

    expressed in terms of hard economic measures, business strategy goals, or technical strategy

    goals - while honoring constraints imposed by management or external real-world factors. It is

    therefore without any doubt that it has been increasingly strategically important. In spite of this,

    there are questions that have been raised regarding with these. Is it reliable and secure? How it

    is prioritized? Is it worth the funds and effort? Such questions are not yet answered but still,

    governance and project management is still confidently important in a firm.

    Infrastructure / Cyberinfrastructure

    Infrastructure is the physical structure of the firm while the cyber infrastructure is the digital

    structure of the company involved. The reason why this became an issue is because it shares a

    property with those mentioned first: strategic importance. Most of the areas in Information

    Technology are developed because of its strategic importance. And as usual, it is quite

    expensive. First, there are disasters and risks involved with the physical structure of a company

    such as natural disasters. One good example of this is the recent earthquake that happened in

  • 8/4/2019 Top Ten IT Issues

    4/5

    Japan. Quite a large amount of money was wasted and a large amount of money is needed in

    order to build the repairs. Not only that the infrastructure is affected but also the

    cyberinfrastructure because the physical components of the cyber component of the company

    was also destroyed. Because of this, a company should be knowledgeable regarding with

    disaster and risk management in terms of its physical and cyber infrastructure.

    Disaster Recovery / Business Continuity

    The best example for this issue is the recent earthquake in Japan. A magnitude of 8.0 something

    earthquake has hit Japan thus causing millions and millions of money wasted. The question thus

    arise, will Japan be able to recover from the damage? Not only that it wasted a lot of financial

    resources, but also it has other risks such as leaked radiation, killed lives, and the continuity of

    business. How can a company be able to recover such loss? This is one of the issues that are not

    answered specifically which is the reason why it made it to the top ten list of IT issues. One may

    have different ways on how to recover but a bundle of monetary resources must be considered.

    Also, the possibility of not being able to recover from the disaster is not eradicated thus leaving

    us standing on the shades of grey.

    Strategic Planning

    Strategic planning also made it in the list because of the endless possibilities that may be

    considered involved in Information Technology. Not only that, some risks should also be

    considered. There are many processes to be considered in planning strategically when it comes

    to IT such as the cost benefit of applying such issues. Also, all those mentioned above should

    also be considered. Will funding it feasible? Will the company be able to recover if disaster

    strikes? Not only that, the question whether every company should consider the opinion of all

    its components is also a large consideration.As a method, strategic planning may provide justenough structure to act decisively, allowing IT leaders to support their institutions in making

    decisions on how technology enables priorities more than on what priorities to enable. Another

    issue with it is there is no conformity when it comes to strategic planning. Different phases may

    be conceptualized when doing strategic planning and these phases are not guaranteed effective

    depending on the situation.

  • 8/4/2019 Top Ten IT Issues

    5/5

    LYCEUM OF THE PHILIPPINES LAGUNA

    54 KM. Makiling, Calamba City, Laguna

    Top Ten IT Issues, 2011

    Submitted by:

    Mr. Neil Patrick Conocono

    Submitted to:

    Ms. Mirafe Prospero

    College of Computer Studies

    Date:

    July 15, 2011