Dependency on the Computers
In the era of information technology, all organizations nowadays are very dependent on computers in many aspects. It is now a must for a manager to choose computer software and hardware for his organization in the beginning of its running or when a need for a technological change arises. The selection is of uttermost importance for two main reasons.
First, as computers now take part in most activities of an organization ranging from communication to bookkeeping, the software as well as hardware has a direct impact on the effectiveness of the organization’s operational performance. Second, the highest priority of an enterprise is a rational use of its assets, which constitutes a restriction on its expenditures and investments. However, the costs of technology applications are still very high for the time being and very complicated as life-cycle costs are also usually involved. Therefore, financial factors also play a great role in a manager’s selection of computer software and hardware for his organization. Besides these main factors, an organization should also consider and create many other criteria to successfully choose a software and hardware system that best fits its goals and characteristics.
In an NSIT guide to selecting information technology security products, the authors mentioned a variety of considerations that an organization should take before making the final decision (Grance, Stevens, & Myers, 2003). Although the guide mainly dealt with security products, the considerations can be applied to all information systems. They included organizational, management, and technical issues such as the accordance between the products with the organization’s mission, policies and procedures; risk management and vulnerability; user community identifications; the data sensitivity; maintenance; staff adaptation to new technologies and changes including training and tasks allocation; total life-cycle costs; ease of use; scalability; testing and evaluation; harmony with the current infrastructure; interoperability requirements and design considerations.
References
Grance, T., Stevens, M., Meyers, M. (2003). Guide to selecting information technology security products. Recommendations of the national institute of standards and technology. Retrieved from Download Full Essay Show full preview