What Needs To Reflect Objectives of an Organization for Security?
For potential growth of an organization, it is crucial to develop policies that would be helpful to minimize the risks in the organization. Policy is predetermined course of action that can be developed to provide an appropriate guidance towards accepting the business strategies as well as objectives. Present study deals with the developing information security policies as well as controls, which can address the potential threats and vulnerabilities. In addition, the study has objectives to develop awareness of ethical as well as social considerations for strategic solutions to Myer.
Information security policies
It is important to develop effective information system security policy in an organization like Myer. Hence, it is required to develop proper plan that would allow guiding operations without continuous intervention of management (Lowry et al. 2016). Hence, in order to comprehend the importance of policies and process and differences between them in Myer. On the other hand, the policy identifies the key activities as well as provides a general strategy to the decision makers on the process of handling the issues (Bell et al. 2015). It is accomplished through giving the users with limitations as well as a choice of alternatives, which can be utilized for guiding the process of decision-making as attempting for overcoming the issues in Myer.
As cloud, as well as mobile computing, are publishing the IT landscape away from the organization, emerging internet of things is usually expending the area of a surface of defensive riddle with the holes. On the other hand, Myer embraces various technologies like Internet of things, big data, cloud as well as mobility. However, in a digital era, the concentration requires shifting from perimeters of the network in order to provide safeguarding data spreading across the systems, cloud as well as devices. Technologies like big data analytics and Internet of Things are important to be considered in the organization. Block chain along with mobile computing are reinventing the way that can be handled by the organizations from decision making to the customer service. Automation of the procedure, as well as increasing digital connectedness of entire agility of value chain, raise risks in cyber security as well as threat levels.
Hence, running IT systems of Myer is supported by cloud needs the flexibility of the organization. The volume of end points and are vulnerable than ever. Hence, it is important to provide security in IT system at Myer.
It is important to explain that the process has affected the design of Myer as well as work systems. Articulation of relation between the business models as strategy is required to analyze Myer. Understanding the business model, which is existed in the network economy, is one of the major parts for evaluating strengths and weakness in the organization (Matt et al. 2017). Development of information security policies is needed in Myer.
Wilensky (2015) stated that information system has been considered as one of the essential evils where specialist knowledge is considered a cost. However, at present days, the information system is regarded as one of the important elements that transcend all functions of business. Intelligent discussion regarding information is generally expected from every layer of management. In order to create value from the information system, managers of an organization need to comprehend the process of working in Myer and recognize how the information system can be integrated across the functions. Fast technological changes need to be recognized in order to analyze the opportunities. However, there is a balanced view of the business in order to able for anticipating the changes.
Figure 1: The Hierarchy of Data
(Source: Peltier 2016 p.554)
In an organization, information system managers do not require technical skill because of communication, planning and supporting people are the areas to be focused on this purpose. On the other hand, information technology is involved with capturing as well as manipulating data that includes hardware, software, peripherals as well as communication media (Yang et al. 2013). The information system can be defined as a united set of business systems that has aimed to have certain results. IT comprises IT, people and business process along with context.
In addition, it is required to implement IT facilitated collaboration through social media, virtual worlds, wikis, groupware, and weblogs. There are also different services for making money online. Saaty and Kearns (2014) asserted that pay for service in an organization gives a service to Myer. Therefore, it is important to consider that that subscription for Myer offers content based service, which is based on the subscriber access to user pay. On contrary, advertisement supports the content of an organization like Myer through attracting with the broad audience as well as advertising space that can be sold on the pages. Affiliation of the modes is useful to the site of the seller and earns commission whether reference leads to a certain scale.
Gathering, storing as well as manipulating and communicating data have revolutionized the utilization as well as the spread of the information. Hence, creating ethical dilemmas and speed as well as the efficiency of the electronic information system include local and global networks. The databases as well as programs process the information and creating ethical dilemmas in Myer. In addition, speed, as well as efficiency of electronic information system, includes local as well as global networks and databases along with programs. Hence, it is required to consider local as well as global networks with the databases and programs confront the rights as well as responsibilities in using the information and consider the standards of conducting shaped before adverting of the computers.
As information is one of the sources of power as well as increasingly the key to prosperity with accessing to the process. Developments in the information system involve social as well as political relationships in order to make ethical considerations in the process utilized in an important way. The electronic systems have the levels of the Government needs to involve with the workplace as well as private lives to a great extent. Hence, it is important to have ethical as well as legal decisions that are essential to make balance the requirements as well as rights of the persons.
In order to implement information system and policies in an organization like Myer, various challenges are faced. In human-centered management, technology will cope and people will struggle (Galegher et al. 2014). In addition, there are subtle differences in the meaning as information system permeates all the functions. On the other hand, there are also some pitfalls in the application of IT in Myer. The business development managers understand the process of business works in the better way compared to technical people. In addition, failure in tapping the resources defines as the system that does not reflect the actual requirements of the business. For an example, the difference in the comprehending of basic terms like date of sales defines that dependence of position in Myer.
The requirements and investment in the investment divide the investment into several categories such as infrastructure, communications, machines, and networks (Holsapple 2013). In addition, there are the transactional procedure for repetitive tasks and replacing the manual processing with the automation system. In addition, as per informational needs, it is required to provide information on management in order to manage the business. The IT investment pyramid is used in order to compare the alternate mixes of information technology in distinctive businesses. In addition, developing of evaluation method needs more knowledge of the business compared to computing (Riley et al. 2016). For an example, cabinet manufacture has strong development strategy and has values as well as flexibility for responsive to the market changes.
Analysis of IS for compliance with ethical and legal frameworks
An organization needs to follow learning curve in order to apply some changes in the organization. Initiation of the technologies is generally introduced into the particular organization in order to perform simple functions of administration like payroll automation and general ledger function (Peters et al. 2013). The functions can be categorized through reducing involvement of the user and low expenditure for data proceeding as well as functional applications, which are helpful to minimize costs. On the other hand, contagion deals with enthusiastic utilization of technology that commits resources compared to lack of control and development of budget rapidly. Controlling the managers realize that there is a great control over the process is required and documentation of the system is upgraded with reviewing the budgets as well as full control over the resources of information technology. Integration of the incompatible systems as well as frustration of users is involved in it. Integration of the management succeeds through making interaction in technology into the business process of the organization. However, data administration is concerned with sharing of data resources as well as manages the data (Bloom et al. 2014). The management of an organization needs to focus on the shift from it to information systems.
The concept of responding the standard as well as a template for the corporate governance, it is important to consider all the policies and procedures that are associated with the organization. In addition, the corporate governance has a specialized mechanism in order to regulate risks that can address the activities averting the corporate disasters and scandals along with consequential damages to the investors, employees, staffs as well as society. The corporate governance is sophisticated as well as a flexible concept that can address the basic purposes of the organizations. Hence, it is important to have proper understanding and questioning as well as refining the basic economic systems as well as philosophies.
On the other hand, vision statement of an organization explains the ideas of a business manager for the final position of the organization and when it will achieve its target. For an example, vision Statement of Dell (Xu et al. 2014). Hence, it is required to interact with the community and interpret as well as understand demands of the customers as well as global technology. Hence, Dell requires providing full customer satisfaction to become the most successful computer organization. In this purpose, adoption of newest technology as well as loyal customers will be helpful to achieve the target.
Bretschneider and Parker (2016) argued that strategy of an organization refers to the design, setup as well as capabilities of Myer in order to act out the strategic plan for achieving the target of the organization. In this perspective, a simple framework in order to understand the design of an organization would be helpful, which is a business diamond. Business diamond addresses the plan of Myer as its processes of business and its values as well as beliefs. The management control systems, as well as task along with structures, have a vital role in this issue (Bigdeli et al. 2014). Example: JetBlue. It reviews the details of the previous day’s flights. In addition, it inspects each of the operations in order to enhance its efficiency.
Evaluation of strengths and limitation
Applying information security policy in Myer enhances the opportunities of business as well as performance. It helps to keep abreast of the competitive forces and minimize costs for operating. In order to gain timely as well as accurate information, the system would be useful for gaining competitive advantages in Myer. Thus, the creation of new distribution channels and improvement in relation with the suppliers would be helpful for the organization. In the perspectives of e-business, being first to the market and opening the opportunities for direct marketing are required for the development of business. A new channel of distribution, connection with the customers and driving nature of change in technology would be useful for the business.
However, the effect of deploying information system in an organization can be useful in order to achieve the organizational target for paying IS vital in the parts of data collection, assessment, and communication. In data collection, information systems are generally used for collecting data like a number of key strokes and pr?cising the time spent on particular tasks. There are usually such amount of data are collected in order to monitor works of the employees. In the part of evaluation, data is evaluated against historical data. The manager of the organization can analyze the gathered data in order to compare the productivity of staffs. The collected information is analyzed and used for providing feedback to the staffs.
Adoption of business models and framework would be helpful for the organization in increasing its productivity and achieve the goal. There are four types of business models such as Business-to-consumer (B2C), Business-to-business (B2B), Consumer-to-consumer (C2C) and Consumer-to-business (C2B). In Business-to-consumer (B2C) model, communication between business and consumers is focused. Examples: Amazon.com and RosesOnly.com.au. On contrary, Business-to-business (B2B) deals with two businesses and they are the main players involved. The transactions have a tendency to be less frequent as well as higher-value. Example: Chemconnect web. Consumer-to-consumer (C2C involves two consumers who interact directly (Yinan et al. 2014). In addition, communication between those stakeholders is focused. Example: eBay.com. On the other hand, social networking is also included in the category. Example: E-bay, the giant web auction site. It enables people for selling their products to others and the process is achieved by auctioning off their merchandise off to the highest paid bidder. However, there is also a fixed price in the products. Consumer-to-business (C2B) occurs during interacting with the customers and businesses is not as buyers but suppliers. For an example, eLance.com allows experts in order to tender expertise for completion of jobs that are offered to businesses.
In different ways, business models are categorizing in Bricks and mortar, bricks and clicks and pure plays. Brick and mortar model deal with the traditional business having the physical presence. On the other hand, Bricks and clicks allow online grocery process of ordering. For an example, Colesonline.com.au is a supermarket icon in Australia. However, Pure Plays have a business that offers the existed online process like Google, Facebook, and Skype. Hence, it is required to selectee appropriate business models in Myer so that the business of the organization can implement the information system properly.
The design of producers, as well as building products along with services, is required to be done as per the market or consumer demands. For examples, Ford Motor Company, American Express as well as Qantas try to fulfill the demands of the customers. In addition, distributors enable the buyers as well as sellers to connect and communicate along with transacting. The organizations have inventory as well as resell like retailer, wholesalers. They may simply act as the agents like aggregators, exchanges as well as marketplaces (Fattah 2016). On the other hand, examples of distributors are involved in the e-business such as Autoweb. In these businesses, effective network infrastructure is provided. Infrastructure providers and infrastructure portals are included in this category. Business is developed on proper network infrastructure that includes the chain of producers, focused distributors, and suppliers. Infrastructure portals are linked with the buyers to the widest range of networking as well as computing along with providers for application hosting. The link buyers, as well as sellers, sell products to the widest possible range of the providers. It can be categorized as horizontal and vertical for application service providers.
Horizontal portals consist of ISPs, outsourcing for data-centre, providers of network-service and services of web hosting. The revenue is derived from the access as well as maintenance fees. In addition, subscription services along with transaction fees are included in that. The key costs consist of data as well as network operations. The software development as well as maintenance, sales along with administration is involved with the operation. Example: BigPond.
In addition, the vertical portal is also known as Application Service Providers' (ASPs). It hosts as well as maintains the applications of software. The focus is generally towards the businesses. Hence, advertising is not an important source of revenue. Example: IBM. In this perspective, a strategy is a set of actions in order to fulfill the objectives as well as for purposes and targets of the organization (Peltier 2013). The mission of the organization needs to be clear as well as compelling with the statement, which unifies the particular organization as well as explains about the organization.
From the above discussion, it can be concluded that it is important to analyze strengths of an organization and its strategies that can be achieved with making following issues. The important structures as well as reporting of the relationships of the organization, holding the decisions right for making critical decisions, the characteristic as well as experiences and levels skills of the employees and the key process of business. Hence, information system policies have an important for the success of an organization.
Bell, S., Holgersson, S., Melin, U., Pollack, J. and Pollack, R., 2015. This study investigated whether teaching HIV/AIDS Health Educators about Viktor Frankl’s theory of finding meaning in life, results in a significant improvement in their psychological well-being. The participants were 24 volunteers from the Information, Education and Communication (IEC) cluster of a Non-Governmental Organization (NGO) in South Africa (age range= 20–39 years, females= 67%, majority... Systemic Practice and Action Research, 28(1), pp.37-49.
Bigdeli, M., Peters, D.H., Wagner, A.K. and World Health Organization, 2014. Medicines in health systems: advancing access, affordability and appropriate use.
Bloom, N., Garicano, L., Sadun, R. and Van Reenen, J., 2014. The distinct effects of information technology and communication technology on firm organization. Management Science, 60(12), pp.2859-2885.
Bretschneider, S. and Parker, M., 2016. Organization formalization, sector and social media: Does increased standardization of policy broaden and deepen social media use in organizations?. Government Information Quarterly, 33(4), pp.614-628.
Fattah, E.A. ed., 2016. From crime policy to victim policy: Reorienting the justice system. Springer.
Galegher, J., Kraut, R.E. and Egido, C., 2014. Intellectual teamwork: Social and technological foundations of cooperative work. Psychology Press.
Holsapple, C. ed., 2013. Handbook on knowledge management 1: Knowledge matters (Vol. 1). Springer Science & Business Media.
Lowry, P.B., D’Arcy, J., Hammer, B. and Moody, G.D., 2016. “Cargo Cult” science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels. The Journal of Strategic Information Systems, 25(3), pp.232-240.
Matt, M., Gaunand, A., Joly, P.B. and Colinet, L., 2017. Opening the black box of impact–Ideal-type impact pathways in a public agricultural research organization. Research Policy, 46(1), pp.207-218.
Peltier, T.R., 2016. Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press.
Peltier, T.R., 2013. Information security fundamentals. CRC Press.
Peters, D.H., Adam, T., Alonge, O., Agyepong, I.A. and Tran, N., 2013. Implementation research: what it is and how to do it. Bmj, 347, p.f6753.
Riley, L., Guthold, R., Cowan, M., Savin, S., Bhatti, L., Armstrong, T. and Bonita, R., 2016. The World Health Organization STEPwise approach to noncommunicable disease risk-factor surveillance: methods, challenges, and opportunities. American journal of public health, 106(1), pp.74-78.
Saaty, T.L. and Kearns, K.P., 2014. Analytical planning: The organization of system (Vol. 7). Elsevier.
Wilensky, H.L., 2015. Organizational intelligence: Knowledge and policy in government and industry (Vol. 19). Quid Pro Books.
Xu, B., Da Xu, L., Cai, H., Xie, C., Hu, J. and Bu, F., 2014. Ubiquitous data accessing method in IoT-based information system for emergency medical services. IEEE Transactions on Industrial Informatics, 10(2), pp.1578-1586.
Yang, Y.P.O., Shieh, H.M. and Tzeng, G.H., 2013. A VIKOR technique based on DEMATEL and ANP for information security risk control assessment. Information Sciences, 232, pp.482-500.
Yinan, Q., Tang, M. and Zhang, M., 2014. Mass customization in flat organization: The mediating role of supply chain planning and corporation coordination. Journal of Applied Research and Technology, 12(2), pp.171-181.