• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The potential risks that are involved when organisations implant a new IT system are

Extracts from this document...

Introduction

Q1 The potential risks that are involved when organisations implant a new IT system are electric shock, loss of data, compatibility issues, loss of services, security and computer crashes. The company can offset the potential risks involved in implementing new information technology by having electrical equipments tested by an election, backing up all electronic data and store backups in a fireproof safe. Having a contingency plan in place helps business, governments and councils in case of something going wrong then it can help to recover from serious incidents reducing the time spent on resolving the issues or problems with minimum costs and disruptions. Employing IT Specialist to be on hand encase of an emergency, will also pick the company back up. High level security measures both electronically and physically can help prevent and mishaps and systems loss of data. ...read more.

Middle

Existing employees could have their work pattern disrupted by the amount of work load could increase, and for some lucky employees decrease. There could be a change of role so some employees will need retraining, this may not be down to qualification, but adapting to the new surroundings and new systems. Some employees will have longer hours or have to work nights; this could lead to strain on social life and most properly home life. Employees may need to change location; this again has a huge stress especially employees who have families and young children who are in the most important time in their education, employees will not want to travel miles every day to get to and from work, so some employees may resign or even not go into work and then the organisation will have to pay more to employee more staff, however the organisation will be paying for employees travel expenses. ...read more.

Conclusion

The benefits of using this software are that it changes in market and the business is alerted immediately. There are also special tools to help others to understand the market. Decision support software helps with the decisions using raw data and personal knowledge and also documents. The main factors of DSS are that it compares the weekly sales on a weekly basis. It views the projectective revenue (which plays an important part in any business) the business may achieve on the basis of sales. This really useful software helps any business it increases organisational control over threats and files Q4) Assess the short term and long term effects on the council as a result of implementing the IT changes Development Short Term Long term Comment Website Easy access for customers and clients. Easy access to information ?? ?? ?? ?? Craig Waters Task 3 - Risks 1 OF 2 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    list of vehicles due back on a certain day, a list of all overdue vehicles, the contact details of a particular customer, staff member or manufacturer contact and whatever else is considered during the design of the system. Problem with Current System After a careful analysis of the results from

  2. Data Processing Task. Mr Peters, the man who runs this particular Samsung store ...

    The biggest factor and the biggest expense is the amount of paper that the company have to go through with this kind of system. * There could be an invalid address given to a delivery man when he goes out to deliver the products and he will be left stuck with nowhere to go.

  1. Analysis Tools

    o Data flow - A data flow shows the flow of information from its source to its destination. A data flow is represented by a line, with arrowheads showing the direction of flow. Information always flows to or from a process and may be written, verbal or electronic.

  2. Role of different departments at Bedrooms4U, personnel involved. Main processes carried out by Bedrooms4U,inputs, ...

    Public, hotels, House builders Customer details, order requirements, size, measurements Final design and quotation. Face to face Companys that supply; - Wardrobes and cuboards - Handles - Coth rails curtains carpets etc Quantity, size colour measurements and product description. Face to face Face to Face email post Post Types of

  1. ICT Spreadsheet System

    Also, the money given by the customer will be deducted from the total price. Finally, the change will calculate. When entering customer details it will made very easy. There will various menus and selections to choose from making it easy to navigate.

  2. Free essay

    ICT organisation project

    Each page includes a page number. The graphics used throughout the magazine are photographs which help to promote the community ethos of the magazine. Font style The main font style used is traditional and clear, Times New Roman. This shows clarity and is easy to read, which is a requirement as such a wide range of people will access the magazine.

  1. Explain the security risks and protection mechanisms involved in website performance.

    Identity theft can happen with all websites without knowing. People can use malicious software to gain information on online shopping payment pages even if the website have good protocols in place to stop it from happening. There are many methods that can protect websites. One way is to use Firewalls.

  2. BTEC IT Organisational Systems Security - outline of potential threats to an online business.

    Access causing damage: If someone gains unauthorised access to your systems or network, the way in which they achieve this may cause damage to data or restrict system and network resources. There are several ways in which this could be achieved.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work