• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The potential risks that are involved when organisations implant a new IT system are

Extracts from this document...

Introduction

Q1 The potential risks that are involved when organisations implant a new IT system are electric shock, loss of data, compatibility issues, loss of services, security and computer crashes. The company can offset the potential risks involved in implementing new information technology by having electrical equipments tested by an election, backing up all electronic data and store backups in a fireproof safe. Having a contingency plan in place helps business, governments and councils in case of something going wrong then it can help to recover from serious incidents reducing the time spent on resolving the issues or problems with minimum costs and disruptions. Employing IT Specialist to be on hand encase of an emergency, will also pick the company back up. High level security measures both electronically and physically can help prevent and mishaps and systems loss of data. ...read more.

Middle

Existing employees could have their work pattern disrupted by the amount of work load could increase, and for some lucky employees decrease. There could be a change of role so some employees will need retraining, this may not be down to qualification, but adapting to the new surroundings and new systems. Some employees will have longer hours or have to work nights; this could lead to strain on social life and most properly home life. Employees may need to change location; this again has a huge stress especially employees who have families and young children who are in the most important time in their education, employees will not want to travel miles every day to get to and from work, so some employees may resign or even not go into work and then the organisation will have to pay more to employee more staff, however the organisation will be paying for employees travel expenses. ...read more.

Conclusion

The benefits of using this software are that it changes in market and the business is alerted immediately. There are also special tools to help others to understand the market. Decision support software helps with the decisions using raw data and personal knowledge and also documents. The main factors of DSS are that it compares the weekly sales on a weekly basis. It views the projectective revenue (which plays an important part in any business) the business may achieve on the basis of sales. This really useful software helps any business it increases organisational control over threats and files Q4) Assess the short term and long term effects on the council as a result of implementing the IT changes Development Short Term Long term Comment Website Easy access for customers and clients. Easy access to information ?? ?? ?? ?? Craig Waters Task 3 - Risks 1 OF 2 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    I also noticed that the filing cabinets were not regularly locked after use, probably for the convenience of not having to turn a key every time a record is required. This is a lazy oversight, as theoretically anyone could just dander into the office and look at their records!

  2. Implementing a new system for Mastercare.

    and these will need to be produced for every job, every day. The engineers will be using the system on their laptops, which were bought less than two years ago. The laptops have Microsoft Office 2000 that contains the necessary programs that could be needed on order to create and use the system.

  1. Review articles that take a complex approach to new organisational structures and proposed several ...

    The problem here will be to know the importance of the hierarchy and its 'strength'. Adler (1999) argues that in more dynamic and more complex systems, "we need organisational designs that do more to empower everyone". Reducing the hierarchical structure may be necessary in some cases, but most managers recognise

  2. Data Processing Task. Mr Peters, the man who runs this particular Samsung store ...

    This should be the same for products so if you went to search for a product you would be able to see the quantity. Objectives of the new system Having interviewed Mrs Bingham and having documented current working practices the following end-user requirements (system objectives)

  1. Analysis Tools

    o Data flow - A data flow shows the flow of information from its source to its destination. A data flow is represented by a line, with arrowheads showing the direction of flow. Information always flows to or from a process and may be written, verbal or electronic.

  2. Explain the potential risks to an organisation of committing to an e-commerce system

    One certificate is used to sign data with a private key and a matching verification certificate is given to the user of the data. The user uses the verification certificate to verify that the file matches its signature. RSA certificates are an efficient encryption method that be a strong security method.

  1. Explain the security risks and protection mechanisms involved in website performance.

    Identity theft can happen with all websites without knowing. People can use malicious software to gain information on online shopping payment pages even if the website have good protocols in place to stop it from happening. There are many methods that can protect websites. One way is to use Firewalls.

  2. BTEC IT Organisational Systems Security - outline of potential threats to an online business.

    It may reproduce itself and spread from application to application to prevent detection and removal. A virus may also copy, alter or delete data contained on the Hard Drive. Trojans: This is a type of malware which appears to perform a desirable function to the user, but actually allows unauthorized access to the system or network.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work