You are on page 1of 8

MIS UNIT-5

Managing Information Resources and Technologies

What is information resources and technologies (IRT) management?

Information resources and technologies (IRT) management is the process of


planning, organizing, and controlling the use of information resources and
technologies within an organization. IRT management encompasses a wide
range of activities, including:

 Developing and implementing IRT strategies: IRT strategies should align with
the organization's overall business goals and objectives.
 Acquiring and managing IRT resources: This includes acquiring
hardware, software, and other IRT assets, as well as managing the contracts
with vendors and suppliers.
 Deploying and maintaining IRT infrastructure: This includes installing and
configuring IRT systems and networks, as well as providing ongoing
maintenance and support.
 Developing and implementing IRT security policies and procedures: This is
essential to protect the organization's information assets from unauthorized
access, use, disclosure, disruption, modification, or destruction.
 Managing IRT projects: This includes planning, executing, and monitoring
IRT projects to ensure that they are completed on time and within budget.

Importance of IRT management

IRT management is important for a number of reasons, including:

 To improve the efficiency and effectiveness of business operations: IRT can be


used to automate tasks, streamline processes, and improve communication
and collaboration.
 To gain a competitive advantage: IRT can be used to develop new products
and services, improve customer service, and expand into new markets.
 To reduce costs: IRT can be used to reduce costs associated with
labor, materials, and energy.
 To improve compliance: IRT can be used to comply with industry regulations
and government laws.

Best practices for IRT management

Here are some best practices for IRT management:

 Align IRT strategies with business goals and objectives: IRT strategies should
be developed in alignment with the organization's overall business goals and
objectives. This will ensure that IRT is used to support the organization's core
business processes and activities.
 Invest in the right IRT resources: Organizations should invest in the right
IRT resources to support their business needs. This includes acquiring
hardware, software, and other IRT assets that are reliable, scalable, and
secure.
 Implement IRT security policies and procedures: Organizations should
implement IRT security policies and procedures to protect their information
assets from unauthorized access, use, disclosure, disruption, modification, or
destruction.
 Manage IRT projects effectively: Organizations should use effective project
management practices to ensure that IRT projects are completed on time and
within budget.
 Regularly review and update IRT strategies and plans: IRT strategies and
plans should be regularly reviewed and updated to ensure that they are
aligned with the organization's changing business needs and the evolving IRT
landscape.

Conclusion

IRT management is essential for any organization that wants to use


information resources and technologies effectively to support its business
goals and objectives. By following the best practices outlined above,
organizations can improve their IRT management practices and gain the full
benefits of IRT.
Global information technology (IT)

Global information technology (IT) is the use of IT to support business


activities and operations across national borders. This includes the use of IT
to communicate and collaborate with employees, customers, and suppliers
around the world, as well as to develop, produce, and deliver products and
services to global markets.

Global IT is becoming increasingly important as businesses become more


globalized. In order to compete effectively in the global marketplace,
businesses need to be able to use IT to efficiently and effectively manage their
global operations.

Here are some of the key benefits of using global IT:

 Reduced costs: Global IT can help businesses to reduce costs by enabling


them to outsource IT services to lower-cost countries.
 Improved efficiency: Global IT can help businesses to improve efficiency by
enabling them to automate tasks and streamline processes across their global
operations.
 Increased productivity: Global IT can help businesses to increase productivity
by enabling employees to collaborate and communicate more effectively with
each other, regardless of where they are located.
 Expanded market reach: Global IT can help businesses to expand their
market reach by enabling them to sell their products and services to
customers around the world.
 Improved customer service: Global IT can help businesses to improve
customer service by enabling them to provide customers with support
24/7, regardless of their location.

However, there are also some challenges associated with using global IT, such
as:

 Security: Businesses need to take steps to protect their information assets


from unauthorized access and use when using global IT.
 Compliance: Businesses need to comply with all applicable laws and
regulations in the countries where they operate their global IT infrastructure.
 Data sovereignty: Businesses need to be aware of the data sovereignty laws in
the countries where they store and process their data.
 Cultural differences: Businesses need to be aware of the cultural differences
between the countries where they operate their global IT infrastructure.

Despite the challenges, global IT can offer a number of benefits to businesses


of all sizes. By carefully planning and implementing their global IT strategies,
businesses can take advantage of these benefits and gain a competitive
advantage in the global marketplace.

Here are some examples of how businesses are using global IT:

 Amazon: Amazon uses global IT to support its e-commerce platform and to


deliver products to customers around the world.
 Google: Google uses global IT to support its search engine, email service, and
other online products and services.
 Microsoft: Microsoft uses global IT to support its software products and
services, such as Windows Office and Azure.
 International Business Machines (IBM): IBM uses global IT to support its
consulting, IT services, and software businesses.
 Accenture: Accenture uses global IT to support its management consulting, IT
services, and outsourcing businesses.

These are just a few examples of how businesses are using global IT. As the
world becomes increasingly interconnected, we can expect to see even more
businesses using global IT to support their business activities and operations.

Security and control Issues in Information system

Security and Control Issues in Information Systems


Information systems are essential to businesses of all sizes. However, they also
present a number of security and control challenges. These challenges can
arise from a variety of factors, including:

 Technological vulnerabilities: Information systems are complex and


constantly evolving, which can make them vulnerable to attack.
 Human error: Employees can accidentally introduce security vulnerabilities
into information systems by clicking on malicious links, opening infected
attachments, or using weak passwords.
 Social engineering attacks: Social engineering attacks are designed to trick
employees into revealing sensitive information or performing actions that
could compromise the security of information systems.
 Malicious insiders: Malicious insiders are employees who intentionally abuse
their access to information systems for personal gain or to harm the
organization.

Common security and control issues in information systems include:

 Unauthorized access: This is when someone gains access to information


systems without authorization.
 Data breaches: This is when sensitive data is stolen or lost from information
systems.
 Denial-of-service attacks: These attacks are designed to make information
systems unavailable to authorized users.
 Malware attacks: Malware is malicious software that can damage or disable
information systems or steal data.
 Ransomware attacks: Ransomware is a type of malware that encrypts data
and demands a ransom payment in exchange for the decryption key.

Organizations can mitigate these security and control risks by implementing a


variety of measures, including:

 Access control: Access control policies and procedures should be implemented


to restrict access to information systems and data to authorized users.
 Data protection: Data should be encrypted and stored securely to protect it
from unauthorized access, use, disclosure, disruption, modification, or
destruction.
 Network security: Firewalls and other network security measures should be
implemented to protect information systems from unauthorized access and
attack.
 Security awareness training: Employees should be trained on security best
practices to help them avoid introducing security vulnerabilities into
information systems.
 Incident response plans: Incident response plans should be developed and
tested to ensure that the organization is prepared to respond to security
incidents quickly and effectively.

By implementing these and other security measures, organizations can reduce


the risk of security breaches and other security and control incidents.

Here are some additional tips for improving security and control in
information systems:

 Keep software up to date: Software updates often include security patches


that address known vulnerabilities.
 Use strong passwords and multi-factor authentication: Strong passwords and
multi-factor authentication can help to prevent unauthorized access to
information systems.
 Be careful about what information you share online: Avoid sharing sensitive
information, such as financial information or personal identification
information, on public websites or social media platforms.
 Be suspicious of unsolicited emails and phone calls: Do not click on links in
emails or open attachments from unknown senders. Also, be cautious about
providing personal information to people who call you unsolicited.

Ethical and Societal challenges of IT

Information technology (IT) has revolutionized the way we live and work, but
it has also created new ethical and societal challenges. Some of the most
pressing ethical and societal challenges of IT include:
 Privacy: IT has made it easier than ever to collect, store, and share personal
data. This raises concerns about how this data is used and protected. For
example, companies may collect data about our online activity and use it to
target us with advertising or sell it to third-party data brokers. Governments
may also collect data about our movements, communications, and online
activity. This raises concerns about mass surveillance and the potential for
our data to be misused by governments or other powerful actors.
 Security: IT systems are vulnerable to attack by hackers and other
cybercriminals. This can lead to data breaches, financial losses, and
disruptions to critical infrastructure. IT can also be used to spread
misinformation and disinformation, which can have a negative impact on
democracy and social cohesion.
 Bias: IT systems can be biased, reflecting the biases of the people who design
and develop them. This can lead to unfair outcomes for individuals and
groups. For example, facial recognition software has been shown to be less
accurate at identifying people of color and women.
 Job displacement: Automation and other IT-driven changes in the workplace
are displacing some workers. This can lead to economic inequality and social
unrest.
 Digital divide: Not everyone has equal access to the benefits of IT. This can
lead to inequality and social exclusion. For example, people living in rural
areas or low-income households may have less access to high-speed internet
and other IT resources.

In addition to these general challenges, there are also specific ethical and
societal challenges associated with emerging IT technologies, such as artificial
intelligence (AI), machine learning, and big data. For example, AI systems can
be used to develop autonomous weapons that could kill without human
intervention. Machine learning algorithms can be used to create social media
filters that promote unrealistic beauty standards and body image issues. Big
data can be used to track and monitor people's movements and activities in
ways that violate their privacy.

It is important to address these ethical and societal challenges in order to


ensure that IT is used for good. Some possible solutions include:
 Developing and enforcing strong privacy laws and regulations: These laws
and regulations should protect individuals' privacy and give them control
over their personal data.
 Investing in cybersecurity: Governments and businesses need to invest in
cybersecurity measures to protect IT systems from attack.
 Promoting diversity and inclusion in the tech industry: This will help to
reduce bias in IT systems.
 Retraining workers for new jobs: Governments and businesses need to invest
in retraining workers who are displaced by automation and other IT-driven
changes in the workplace.
 Expanding access to IT: Governments and businesses need to work to expand
access to IT resources for everyone, regardless of their location or income
level.
 Developing ethical guidelines for emerging IT technologies: These guidelines
should help to ensure that emerging IT technologies are used in a responsible
and ethical manner.

You might also like