Dependency on the Computers example

Haven't found the essay you need?

We can write it for you. On time. 100% original.

Order Now
Text Preview

Dependency on the Computers

In the era of information technology, all organizations nowadays are very dependent on computers in many aspects. It is now a must for a manager to choose computer software and hardware for his organization in the beginning of its running or when a need for a technological change arises. The selection is of uttermost importance for two main reasons.

First, as computers now take part in most activities of an organization ranging from communication to bookkeeping, the software as well as hardware has a direct impact on the effectiveness of the organization’s operational performance. Second, the highest priority of an enterprise is a rational use of its assets, which constitutes a restriction on its expenditures and investments. However, the costs of technology applications are still very high for the time being and very complicated as life-cycle costs are also usually involved. Therefore, financial factors also play a great role in a manager’s selection of computer software and hardware for his organization. Besides these main factors, an organization should also consider and create many other criteria to successfully choose a software and hardware system that best fits its goals and characteristics.

In an NSIT guide to selecting information technology security products, the authors mentioned a variety of considerations that an organization should take before making the final decision (Grance, Stevens, & Myers, 2003). Although the guide mainly dealt with security products, the considerations can be applied to all information systems. They included organizational, management, and technical issues such as the accordance between the products with the organization’s mission, policies and procedures; risk management and vulnerability; user community identifications; the data sensitivity; maintenance; staff adaptation to new technologies and changes including training and tasks allocation; total life-cycle costs; ease of use; scalability; testing and evaluation; harmony with the current infrastructure; interoperability requirements and design considerations.

References

Grance, T., Stevens, M., Meyers, M. (2003). Guide to selecting information technology security products. Recommendations of the national institute of standards and technology. Retrieved from Download Full Essay Show full preview

Disclaimer

Examples provided by Homework Lab are intended for the motivation and research purposes only. Do not submit any paper as your own piece of work. Every essay example belongs to students, who hold the copyright for the written content. Please, mind that the samples have been submitted to the Turnitin before and may show plagiarism in case of the repeated submission. Homework Lab does not bear any responsibility for the unauthorized submission of the examples.