Question and answers
The three areas that the security plan should address are the management control, technical control, and operational control. The management control tends to focus on the management of the information system and also the management of the risk for the system. They include the concerns and techniques addressed by the management and driven by the process and policy. The operational controls tend to address the security methods that focus on the mechanisms implemented and executed by people. The controls are put in place so as to improve the security of the system. Technical controls tend to focus on controls that the computer system executes. They provide automated protection for the unauthorized access or misuse, support security requirements for application and data, and facilitate the detection of the security violation.
The difference between the fully functional 13 step SDLC and fully functional three steps SDLC is that the three-step model tends to be suitable for the large and complex projects as there are detail analysis and a lot of testing that is normally done so as to ensure that the software works accordingly. The 13 step model tends to be suitable for the easy and small projects. With a fully functional three step model, it tends to be possible to add some elements of the product when they become available or known.
The extended ERP components include EBusiness, business intelligence, customer relationship management, and supply chain management. The business intelligence ERP component tends to collect information being used by the whole organization, organize it, and then apply analytical tools to help managers in making a decision. The EBusiness ERP component has Elogistics and EProcurement. Elogistics is about transportation and storage of goods while Eprocurement is the business to business purchase and sale of services and suppliers over the internet. The customer relationship management-ERP component offers overall information about the customer data and interactions with clients so as the organization may be more responsive to their needs. The supply chain management-ERP component helps the supply chain of the organization from its acquisition of raw materials to the receipt of the finished goods by the clients by organizing a plan, schedule control, and optimization.
The system theory model is a doctrine of describing the systems as abstract organizations independents of the type, substance, time, and space. It is a modeling device that tends to accommodate the interrelationships and overlap between the separate disciplines. The system theory model indicates the value of integration of parts of the problem. With the model, it is not possible to solve problems if they are considered in isolation from the interrelated components. Interdependence between systems is an important concept in the system theory. For instance, the engine of a jet tends to depend on the turbulence of the burning fuel for its propulsion.
The three critical resources linked to business success when focused on the business driven technology are people, information, and information technology. The information includes the data converted into meaningful and useful context so as to make business decisions. The people include those employed at the business and also those outside such as contractors, customers, and suppliers whose actions or activities may affect the business. Information technology includes the tools and the applications used in making things works in a smooth manner. The three critical resources are linked so as to achieve success and when one fails, the chances are that the business will fail.
A scholarly resource is one which the content is written by experts in a particular field of study. It is important to use scholarly resources because of the rigorous peer-review process. These are resources written by people who studied the subject for many years, and the resources have been reviewed by other people with the same experience. It is also important to use a scholarly resource when doing research because these resources tend to share an important quality of credibility. A scholarly resource is normally most likely to be accurate and reliable. Due to the level of credibility and authority evident in these resources, they usually contribute a great deal to the overall quality of paper.
Sources citation is important when documenting and sharing research because it helps the reader to see what inspired the writer and check the validity of their work. Citing helps to provide evidence for your argument and tend to add credibility to the work through demonstrating that the writer has sought out and considered various viewpoints on a particular topic. The citation also works to provide evidence that the position was well-researched. Readers normally want to relocate the work you cited either to verify the information or just to learn about the issue addressed. Thus, it is essential that the reader should be able to relocate your source work efficiently and easily from the information included in the citation.
The common IT metrics for strategic initiatives include website metrics, supply chain management metrics, and enterprise resource planning metrics. With the website metrics, most companies tend to measure the traffic on the website as the main determinant of the success of the website. The web-centric metric is the measure of the success of the ebusiness initiative and the web. A supply chain management may help the organization to understand how it is operating over a certain time. Supply chain measurement may cover areas that include distribution, production, procurement, transportation, inventory, and warehousing. Success using the supply chain is through measuring customer order actual cycle time, back order, customer order promised cycle time, and inventory turns. Measuring the enterprise resource planning metrics is possible through the balanced scorecard. It enables the organization to clarify their strategy and vision and translate them into action.
As the world tends to be adopting the new technology, the need for ethics arises so as to sustain the proper growth and minimize risks of wrong uses. It is important that people should learn how to use information ethically. An example involves plagiarism where one copies the work of others, but the author presents it as their work. Such is an example of unethical practice and it is easy to plagiarize considering all the information available on the internet.
The critical success factors are the cause of success while the key performance indicators are the effects of the actions. There tends to be a tight relationship between the two. If one identifies the CSF and have been executing on them and properly identified the KPIs, one should be meeting or even getting close to meeting the KPIs. The KPIs and the CSF refer to the levels of performance necessary to reach the goal.