Security Issues in Organizational ISs

An information system is defined as the process that involves the gathering, organization, storage, and hence communication of information. Furthermore, in the process of gathering, filtering, processing, producing, and distributing data, individuals and businesses supplement information systems to a large extent (Wiley, 2016). As a result, an information system refers to the chain of components whose interaction results in the generation of information, which includes the hardware, software, network, inputs and outputs, storage, processors, and users. All operations in an organization, as well as the decision-making and management, are founded on the concept of information communication technology in the guest to supporting the business entity (Veenstra & Ramilli, 2011a). Whereas the information system is critical to capture, store, retrieve, manipulate, and display data, it should be noted that the work system is a combination of both the human personnel and the machine interactions in the process of the production of goods and services for the consumer consumption and hence satisfaction.


To succeed in business, there is a great need in the strategic utilization of information available. Information about workflow is very essential for monitoring and following up business operations. For instance, the human workforce and all the processes involved entailed in the systematic or paralleled production of goods and services. The synergistic effect could be utilized to attain a more productive outcome by combining several distinct sequences. Furthermore, the information about the productivity and effectiveness of the organizational operatives should be channeled toward the concept of business process re-engineering (Veenstra & Ramilli, 2011a). The information available should be strategically engaged in the study, identity, change, and monitoring of organizational operations and processes to ensure an efficient and smooth outcome. With time, this should be an improving cycle to graduate into an established business process management. The other concept that should be engaged to ensure strategic utilization of information for the benefit of the firm is the knowledge management. This process of knowledge management entails the organized use of information between the interaction of machines and people in the corporate entity so that an external party can easily learn and comprehend the system on permission. Consequently, the identification, evaluating, capturing, retrieving and sharing of the critical data with instrumental quarters for improvement is necessitated. Total quality management is another approach to the strategic utilization of information to ensure the smooth running of business. This enables the consistent development of business goods and services output in quality, hence meeting the specific needs of the consumers, and this is an asset in reducing the chain of wastage in production. Finally, the information technology segment is very lucrative for the business entities, especially in the strategic utilization of information, which is an indispensable enabler of all processes and functions in a business entity (Veenstra & Ramilli, 2011b). Therefore, all these aspects in a concerted utilization are critical in strategically tailoring the information for the advantage and development of the business organization.


There is a variety of information that should take a particular form, and that is needed to build a business. Some of these data entail the organization profile. Furthermore, the organization logo, the portal name, industry, and company address are critical, as well as the primary contact (Wiley, 2016). Moreover, the computer-based information tools are needed to build a business, and they include information systems, data, information, systems, computer base as well as operational skills. The strategic access and retrieval of all these information for the business are very critical and sensitive a process, because of the solemn decision-making, visualization, control, coordination, as well as the analysis of data.


There are many approaches to which the networks and telecommunications can be utilized to ensure effective communication. Network systems are critical in conveying information between and among different users, either within the same region or far beyond across oceans, to enable a consistent communication and operationalization (Veenstra & Ramilli, 2011a). The most significant step is to analyze the weaknesses as well as the strength of each form of networking and telecommunication. For instance, one could want to know why to use social media; linked in, Facebook, or tweeter, when voice mail, video conferencing, phone calls, as well as instant messaging are available. When the advantages and disadvantages are rated on a similar scale, this is the preliminary step toward an efficient approach in the effective utilization of telecommunicating options (Niranjanamurthy & Chahar, 2013). The nature of the message to pass across and the effect of the technology on the meaning in the message is critical to examine. Telecommuting in most cases deny access to human contact and facial expression that so much instill confidentiality and mitigate worry, the absence of these leads to weary of the human mind, as well as misinterpretation of the information conveyed. As such, an effective approach is cardinal in telecommuting. Therefore, the more people can have contact, the more facial expressions can be exchanged, and the more content is ratified through reception, the more efficient a method of telecommunication becomes (Ryan, 2013). On this basis, for instance; Videoconference, Virtual meeting, Phone call, Voice mail, E-mail can come in this order of effectively in communication. Therefore, all these elements are critical in considering and increasing the effectively of the internet and telecommunicating processes.


The Organization, storage, and extraction of useful organizational information gathered by members of an organization entity is a very critical process. The computers are highly efficient machines that can be utilized for the storage and management systems of data (Pearce, Zeadally, & Hunt, 2013). Nevertheless, this works on one condition, that the operator of the computer system should be capable of setting up a practical framework, a filing structure for the grouping, ordering, and preservation of the information as a preliminary move. The universal approach o data storage is critical, for instance, the data involving the financial reporting (Niranjanamurthy & Chahar, 2013). This enables the ease of access to information by all parties termed eligible, hence making the operations profitable. On the contrary, when every individual is left on their own to independently file their data, then retrieving such sensitive information as it were, could be more cumbersome for other parties, making the computerization process a major contributor to the problems rather than the benefits. Therefore, a stable framework for filing data in the computer systems is essential for an easier retrieval and utilization of information. An orderly storage enables the voluminous data stored by the systems to be retrieved with ease. Furthermore, the users, for instance, the employees in an organization, should diligently utilize the information without predisposing systems to any malicious, destructive, or corrupting elements (Niranjanamurthy & Chahar, 2013). All these efforts enable an efficient and well-functioning computerized operations rather than seemingly disadvantageous processes that offer hindrance, diversion, and uncalled for pressure.


Information management is very essential in all information functions. Managers and executive officers from many organization in the twenty-first century have voluminous information to manage, one component to convey to other ends, and the other segments for the purpose of decision making and action implementation (Ryan, 2013). A good example would be the analysis of a marketing manager with an objective of strategizing and fine tuning the firm`s sales and has to deal with a lot of information concerning the market, products and customer profile, as well as the pricing strategies of the competitors. As such, there are a couple of various levels of management and the corresponding types of information required. The first is the top level of management, which is characterized by unstructured problems in decision making. The requirements regarding information include the strategic data from both the inside of and the outside of the organization. Secondly is the middle-level management (Ryan, 2013). This phase is associated with problems in decision making, for instance, the decision making is based on situations present and not on the historical past, lack of a precise definition of the variables in decision making, both structured and semi-structured problems, as well as decisions made on consistent issues. The information required for the middle level of management include; information about extraordinary circumstances and that can handle in a diverse approach, regularly summarized as well as exception reports, and information that call for a keen and extensive insight. Finally is the operational level of management, which entails decision making challenges like structured problems, making decisions on particular and tactical issues, and making choices based on laid down rules and regulations (Pearce et al., 2013). The types of information required for the operational level include; the related information to isolate peculiar and unique reports to be forwarded to the top management, rule-based and principle guided data based on catalogs and handbooks in the information operation channels.


Sharing of information across organizational boundaries is very essential for the success of an organization. The twenty fist century is characterized by advanced computer operations, a technology which renders every single agency, public or private, incapable of detecting, realizing, and containing all cyber threats, incidents, and vulnerabilities in the systems (M. Siponen & Willison, 2009). Therefore, there is no doubt that sharing of such information has been instrumental in protecting the core values and operation frameworks of many firms, essential to the needed business success, by countering the cyber-attacks that could vandalize and destabilize all related processes. Therefore, the collaboration of all stakeholders, including the media, the government, the private sector, and individual organizations remains a paramount step in information sharing and hence a strategized mechanism of problem-solving (M. Siponen & Willison, 2009). On the other hand, exchange of information is critical in enabling partnered firms to realize the market forces of supply and demand of individual commodities across the global platform. This is important in decision making, strategizing, and regulating sales from organizations. Furthermore, shared information is key to formulating a strategic competitive edge, so as to tailor customized goods and services while meeting the organizational short and long term objectives. On a critical approach, if the confidentiality of the private information shared is maintained, and trust between the sharing organizations is ascertained, then the businesses entities are bound to benefit a lot from the process.


There are many reasons and a variety of approaches employed when it comes to the business application of expert systems and artificial intelligence in decision making, and more so in problem-solving. Artificial intelligence refers to the sophisticated programming and hence the scientific engagement of machines in operations that could be as well be done by human intelligence. Unlike the science of robotics, artificial intelligence is very critical in realizing the reduction in errors and increased expertise in efficient production systems. Beyond reasonable limits, artificial intelligence is capable of scrutinizing stoke exchange data, manage the social media data and the press releases to comparative strike an acceptable level of biding that matches the forces of supply and demand in the corporate segment. Therefore, artificial intelligence is used because as a process it makes work more efficient. Furthermore, the computerized systems do not get fatigued, as opposed to human intelligence, hence increasing the output scale on a 24-hour basis in a day, while experiencing no standard errors due to exhaustion in operations. The accuracy, reliability, and precision of artificial systems can be regulated, and hence gives a better prediction into the future, making it an efficient system to adopt (Veenstra & Ramilli, 2011). As such, problem solving and decision making becomes effective and evidence-based, as human bias is eliminated and quality delivery ensured.


The ways in which organizations develop new information and systems are diverse in establishments. Nevertheless, the approach and basic principle are often standard. The first step is the preliminary analysis. The suitability of the project to the organization and whether it is a solution provider (Modi, Patel, Borisaniya, Patel, & Rajarajan, 2013). Furthermore, the legal, economic, and ethical feasibility I did to ascertain its legitimacy. Second if the system analysis. In this phase, stakeholders come together, to question the procedure and approach of the scheme, to culminate into documentation. The third is the system design phase. Designers engage the document in two above, to develop the user, data input, and output, and the interface is done. All technical work is incepted to suit the organization details, hence a system design document. Fourth is the programming phase, whereby the system analysis and design documents are put in practice to deliver the initial program of the scheme. The fifth step is the testing segment, and the installed software in four above is subject to both the unit test and the system test to ensure code errors present and how different units work together efficiently respectfully. Then comes the user acceptance mock tests to confirm the suitability of the system to the firm. In this phase, all software errors are checked and confirmed. Sixth is the implementation process, users are trained, and the information from other systems incorporated to begin working (Modi et al., 2013). Documentation and ownership of the system by the firm is done in this phase. The seventh and last step is the maintenance segment. At this level, the system already has a structured support, and all system failures and inconsistencies have been fixed. Furthermore, the backup system is in place, and all that can be done is ensuring system updates in a regular mode, and hence the development of a new information system in an organization.


The integrity of the data and the reliability of information systems are so critical to every Organization’s success. As a principle, integrity maintains that the information stored should be conveniently in a state of efficient retrieval, in a realistic and authentic nature of records, free of malicious alteration. The information stored is the core asset in decision making, developing a competitive niche in the market forces of supply and demand for its goods and services, and in supporting corporate operations (Modi et al., 2013). Therefore, it is significant for administrations to consistently monitor the security, trustworthiness, quality, and authenticity of the information to avoid any alterations of the information stored. As such, authenticity, reliability and the integrity of the information monitors elements like the technological tools and instruments utilized in retrieving the data, the quality, and reliability of the process as well as the groups of individuals involved. The processing of extracted information and its impact on the organization too is confirmed. Therefore, data integrity and reliability is very key to the success of a business entity.


There are diverse responses to managerial and organizational issues stemming from development, implementation, and use of computer-based information systems. Managers across the world are currently using a broad spectrum of systems to implement decisions. Even though the systems could be different from the established data electronic tools, most of them are tailored to consumer-specific needs, hence the appropriateness in utilization (Zissis & Lekkas, 2012). Nevertheless, the challenge is that the designing engineers do not have the competence to use the systems, while the managers who engage the systems do not come in direct contact with the manufacturers, leading to a chain of problems that could be collaboratively dealt with. Therefore, the adaptability of the systems and joint effort could offer a synergistic effect, hence the appropriate utilization of the same.


Both economic and cultural challenges are a common experience to the stakeholders when it comes to the implementation of international information systems. Information systems have become a typical characteristic of firms across the globe, and collapse in these structures could lead to tens of million dollars in revenue lost (van der Linden, Kalra, Hasman, & Talmon, 2009). A robust, and secure approach thus is needed for the maintenance of system availability, integrity, and confidentiality. In the recent years, international business has become very vulnerable to the economics and the diverse cultures around the world. The flow of goods, services, equipment, knowledge, and capital across the international borders is highly subject to cultural and economic uncertainties (Zissis & Lekkas, 2012). Therefore, globalization founded on the computer information systems has become a common place of new interactions of various stakeholders across the world, making it a major target for all forms of interruptions. International transactions make commodities to lose their nationality, hence the distribution of the values chain across nations, thus compromising and putting at stake economic balances. The culture is diverse based on how different countries design, supply, and transport of the goods and services. Furthermore, the variability in engineering and content tailoring matters, hence all these differences in culture could compromise the standards of other partners or vice versa.


There are a couple of core ethical and social issues that should be observed in the development and utilization of information technology (van der Linden et al., 2009). Information technology is very indispensable to the twenty-first-century human race. However, there are ethical challenges that interrupt the services delivered. Elements of copyright infringements, lack of privacy, and increased computer crimes have compromised the systems. Because of the central role the technology systems are playing in the corporate world, almost all organizations are at risk of cyber-attacks because of the digital network. Furthermore, even the employees in companies could use the information on their private gains, and intentionally or inadvertently lead to a compromise in the integrity of data. The ethical issues that border social elements include the human factors like planning, utilization, and development of information systems (Khurana, Hadley, Lu, & Frincke, 2010). All these ethical and social issues impact a lot when it comes to the development of information technologies.


References


Khurana, H., Hadley, M., Lu, N., & Frincke, D. A. (2010). Smart-grid security issues. IEEE Security and Privacy, 8(1), 81–85. https://doi.org/10.1109/MSP.2010.49


Lacey, D. (2010). Understanding and transforming organizational security culture. Information Management & Computer Security, 18(1), 4–13. https://doi.org/10.1108/09685221011035223


Modi, C., Patel, D., Borisaniya, B., Patel, A., & Rajarajan, M. (2013). A survey on security issues and solutions at different layers of Cloud computing. Journal of Supercomputing, 63(2), 561–592. https://doi.org/10.1007/s11227-012-0831-5


Niranjanamurthy, M., & Chahar, D. (2013). The study of E-Commerce Security Issues and Solutions. International Journal of Advanced Research in Computer and Communication Engineering, 2(7), 2885–2895.


Pearce, M., Zeadally, S., & Hunt, R. (2013). Virtualization: Issues, Security Threats, and Solutions. ACM Comput. Surv., 45(2), 17:1–17:39. https://doi.org/10.1145/2431211.2431216


Ryan, M. D. (2013). Cloud computing security: The scientific challenge, and a survey of solutions. Journal of Systems and Software, 86(9), 2263–2268. https://doi.org/10.1016/j.jss.2012.12.025


Siponen, M. T. (2005). Analysis of modern IS security development approaches: Towards the next generation of social and adaptable ISS methods. Information and Organization, 15(4), 339–375. https://doi.org/10.1016/j.infoandorg.2004.11.001


Siponen, M., & Willison, R. (2009). Information security management standards: Problems and solutions. Information & Management, 46(5), 267–270. https://doi.org/10.1016/j.im.2008.12.007


Smith, S., Winchester, D., Bunker, D., & Jamieson, R. (2010). Circuits of Power: a Study of Mandated Compliance To an Information Systems Security De Jure Standard in a Government Organization. MIS Quarterly, 34(3), 463–486. https://doi.org/Article


van der Linden, H., Kalra, D., Hasman, A., & Talmon, J. (2009). Inter-organizational future proof EHR systems. A review of the security and privacy related issues. International Journal of Medical Informatics. https://doi.org/10.1016/j.ijmedinf.2008.06.013


Veenstra, A. F., & Ramilli, M. (2011a). Exploring Information Security Issues in Public Sector Inter-organizational Collaboration. Electronic Government: Proceedings of the 10th IFIP WG 8.5 International Conference, EGOV 2011. Retrieved from http://www.springerlink.com.offcampus.lib.washington.edu/content/388524q2515g6161/


Veenstra, A. F., & Ramilli, M. (2011b). Exploring Information Security Issues in Public Sector Inter-organizational Collaboration. In Electronic Government (Vol. 6846, pp. 355–366). Retrieved from http://www.springerlink.com.offcampus.lib.washington.edu/content/388524q2515g6161/


Wiley, J. (2016). Wiley Introduction to Information Systems, 6th Edition. Ebook Rainer. Retrieved from http://eu.wiley.com/WileyCDA/WileyTitle/productCd-EHEP003501.html


Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583–592. https://doi.org/10.1016/j.future.2010.12.006


Works Consulted


Chang, Shuchih Ernest, and Chienta Bruce Ho. “Organizational Factors to the Effectiveness of Implementing Information Security Management.” Industrial Management & Data Systems 106, no. 3 (2006): 345–61. doi:10.1108/02635570610653498.


Kraemer, Sara, Pascale Carayon, and John Clem. “Human and Organizational Factors in Computer and Information Security: Pathways to Vulnerabilities.” Computers and Security 28, no. 7 (2009): 509–20. doi:10.1016/j.cose.2009.04.006.


Lacey, David. “Understanding and Transforming Organizational Security Culture.” Information Management & Computer Security 18, no. 1 (2010): 4–13. doi:10.1108/09685221011035223.


Siponen, Mikko T. “Analysis of Modern IS Security Development Approaches: Towards the next Generation of Social and Adaptable ISS Methods.” Information and Organization 15, no. 4 (2005): 339–75. doi:10.1016/j.infoandorg.2004.11.001.


Smith, Stephen, Donald Winchester, Deborah Bunker, and Rodger Jamieson. “Circuits of Power: A Study of Mandated Compliance To an Information Systems Security De Jure Standard in a Government Organization.” MIS Quarterly 34, no. 3 (2010): 463–86. doi:Article.

Deadline is approaching?

Wait no more. Let us write you an essay from scratch

Receive Paper In 3 Hours
Calculate the Price
275 words
First order 15%
Total Price:
$38.07 $38.07
Calculating ellipsis
Hire an expert
This discount is valid only for orders of new customer and with the total more than 25$
This sample could have been used by your fellow student... Get your own unique essay on any topic and submit it by the deadline.

Find Out the Cost of Your Paper

Get Price