You are on page 1of 2

MSIA Semester 1: Term Paper Essay Subject: "Our organization has well defined policies for most business

and IT processes, and the interactions between the various groups. This paper looks at the missing communications that will help glue together the organizations processes and people together better for better understanding and improved performance." Author: Mani Akella Date: August 14, 2006. Introduction: During the past nine weeks, as I was working on discovering and understanding the various policies in place to protect and safeguard our digital information and technologies, I got a much better understanding of the processes and policies in place to safeguard the organizations assets and provide necessary guidance to protect the organizations reputation and functions. However, one aspect kept coming up very often a lack of clear discussions between the various functional groups within the organization aimed at helping everyone understand and question the other groups policies, procedures and functions. Having spoken to some of the groups in detail these past nine weeks, I have found my own functionality improved within the organizations context understanding what a group does and why it does it in a specific manner, or why it has specific policies in place, have helped me frame my interactions with that group in the proper context, and given me the ability to better understand and handle work flowing to me from the group. I am sure that others will also be able to show similar improvements in their daily functions with such understanding, leading to better functional performance and improved efficiencies across the organization. This paper attempts to highlight my findings, and presents possible opportunities (with examples) to improve cross-functional communications. To that end, this paper will discuss my findings in the following areas: 1) 2) 3) 4) 5) 6) 7) 8) 9) Classification & Surveys Information Warfare The Psychology of Computer Criminals Penetrating Computer Systems and Networks Malicious Code, Mobile Code&Denial-of-Service Attacks Cyberspace Law&Computer Forensics Intellectual Property Cryptography Public Key Infrastructure and Certificate Authorities

1) Classifications and Surveys

You might also like