• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The potential risks that are involved when organisations implant a new IT system are

Extracts from this document...

Introduction

Q1 The potential risks that are involved when organisations implant a new IT system are electric shock, loss of data, compatibility issues, loss of services, security and computer crashes. The company can offset the potential risks involved in implementing new information technology by having electrical equipments tested by an election, backing up all electronic data and store backups in a fireproof safe. Having a contingency plan in place helps business, governments and councils in case of something going wrong then it can help to recover from serious incidents reducing the time spent on resolving the issues or problems with minimum costs and disruptions. Employing IT Specialist to be on hand encase of an emergency, will also pick the company back up. High level security measures both electronically and physically can help prevent and mishaps and systems loss of data. ...read more.

Middle

Existing employees could have their work pattern disrupted by the amount of work load could increase, and for some lucky employees decrease. There could be a change of role so some employees will need retraining, this may not be down to qualification, but adapting to the new surroundings and new systems. Some employees will have longer hours or have to work nights; this could lead to strain on social life and most properly home life. Employees may need to change location; this again has a huge stress especially employees who have families and young children who are in the most important time in their education, employees will not want to travel miles every day to get to and from work, so some employees may resign or even not go into work and then the organisation will have to pay more to employee more staff, however the organisation will be paying for employees travel expenses. ...read more.

Conclusion

The benefits of using this software are that it changes in market and the business is alerted immediately. There are also special tools to help others to understand the market. Decision support software helps with the decisions using raw data and personal knowledge and also documents. The main factors of DSS are that it compares the weekly sales on a weekly basis. It views the projectective revenue (which plays an important part in any business) the business may achieve on the basis of sales. This really useful software helps any business it increases organisational control over threats and files Q4) Assess the short term and long term effects on the council as a result of implementing the IT changes Development Short Term Long term Comment Website Easy access for customers and clients. Easy access to information ?? ?? ?? ?? Craig Waters Task 3 - Risks 1 OF 2 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    details held in the old system, with a few new helpful fields created in addition to one new file. From the interview with Fred, it has been decided that unique identification numbers will be assigned to each record in the Customer, Staff, Vehicle, Rental and Manufacturer files.

  2. Marked by a teacher

    Investigating a Transactional Website (www.latestdvd9.com)

    4 star(s)

    After having tested the website in four different Internet browsers (Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, and Apple Safari) I have found out that all its features work perfectly on all four of these without the need of any add-on.

  1. Peer reviewed

    Internet Risks and Reliability Issues

    4 star(s)

    the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has.

  2. The Impact of Mobile Phones on social Interaction

    However, input from the focus group showed that although this may have initially been the case when SMS first became common, nevertheless as the service and its popularity grew, the language became much more unified and such symbols that were originally used to differentiate communities are now commonly recognised and

  1. Analysis Tools

    Dataflow diagrams can be used to provide the end user with a physical idea of where the data they input ultimately has an effect upon the structure of the whole system from order to dispatch to report. How any system is developed can be determined through the use of a dataflow diagram.

  2. Implementing a new system for Mastercare.

    ______________________________________________________________________________________________________________________________________________________________________________ 9. What types of output does the new system need to have? ________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ 10. How often do you think reports will need to be produced? (Please Tick) [] Once a Day [] Once a Week [] Once a Fortnight [] Once a Month [] Less than Once a Month 11.

  1. Explain the potential risks to an organisation of committing to an e-commerce system

    This can be done by HTTPs or certificate-based authentication. RSA is a cryptosystem for public-key encryption, and is widely used for securing sensitive data, particularly when being sent over an insecure network such as the Internet. The RSA certificate provides knowledge, skills and credentials that enables people to keep up with security systems within a businesses.

  2. Explain the security risks and protection mechanisms involved in website performance.

    Identity theft can happen with all websites without knowing. People can use malicious software to gain information on online shopping payment pages even if the website have good protocols in place to stop it from happening. There are many methods that can protect websites. One way is to use Firewalls.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work