answersLogoWhite

0

Answer: I will assume that your question pertains to corporate systems as opposed to home based PC systems. Internal Security: As most businesses currently rely on computerized systems in virtually all aspects of their operations, it is imperative to ensure that "down time" is kept to a minimum. While these systems have qualified technical staff to ensure that "down time" is kept to a minimum, US studies have shown that 68% of systems are not protected from natural or man-made disasters such as fire, floods, etc. Depending on a given business's requirement to maintain computer operations during the above described disasters, provisions should be made to have a remote mirror site which can be switched to if the primary site becomes inoperable. It's analogous to having a backup generator automatically kick in when there is a power failure. There are several third party companies that offer mirrored backup facilities. Information Security: While most companies take pride in believing that information that is stored on their computerized systems is well protected from all forms of unauthorized intrusion; such is not necessarily the case. While unauthorized access from the internet is fairly tight, studies have shown that 22% of companies are vulnerable to unauthorized information access from within. Growth Management: The are several companies that anticipate substantial growth in the number of their employees and the scope of their operations, resulting in increased responsibilities for management and added pressure on these companies' operating and financial systems. To manage growth effectively, such companies must continue to improve their operational, financial and management information systems and will need to hire, train, motivate, and manage a growing number of employees. Unfortunately, very few companies take a proactive approach in ensuring that their computerized systems keep pace with both actual growth as well as anticipated growth. More often than not, many companies, virtually overnight, find themselves confronted with computerized systems that are unable to handle increased company growth as well as new requirements (i.e.: company decides to introduce a new product line, etc.). Under these circumstances, panic sets in and companies usually address this unpleasant situation by what's effectively termed as "management by crises".

User Avatar

Wiki User

16y ago

What else can I help you with?

Related Questions

What are the risks associated to management information systems?

What are the risks associated to management information system


Where is the focus for information systems management?

Information systems Management focuses on Minimising risks,Adding value to information.


How would you describe comprehensive risk assessment?

The CPA identifies and assesses the various risks facing an organization, such as the operating environment, operating systems, or information systems. The risks might be internal, external, or regulatory.


Are new information systems with sensitive data or to which changes are made that might create new privacy risks must have a PIA?

Yes, new information systems with sensitive data or to which changes are made that might create new privacy risks must have a PIA.


Do boys take more risks than girls?

They both take equal risks. Riskiness is not determined by gender, it is determined by personality.


What are the potential risks that may be evident for the client and or the service provider under the provision of determined care?

potential risks for client and service provider under a provision of determined care


Residual risks is determined?

Residual risk is determined after you reassess the hazards as if the controls were in place.


Possitive and negative aspects of information technology and information systems?

Positive aspects of information technology and information systems include improved efficiency, increased productivity, and enhanced communication. On the other hand, negative aspects may include privacy concerns, security risks, and the potential for job displacement due to automation.


What is risk analysis and risk exposure and what are the techniques you can use to mitigate risk?

Once the risks have been identified, you need to answer two main questions for each identified risk: 1. What are the odds that the risk will occur, 2. If it does occur, what will its impact be on the project objectives? You get the answers by performing risk analysis. There are two main forms of Risk Analysis: 1. Qualitative Risk Analysis & 2. Quantitative Risk Analysis You Mitigate Risks by first analyzing the risks and then taking steps to ensure that the risks are prevented.handled during the course of your project execution


What are the objectives of investment analysis?

This analysis is important to determine the risks of the investment. This is important before making an investment decision.


Did Amelia Earhart overcome obstacles take risks or get lucky?

She took risks and was lucky, but most of all she was determined to succeed.


Which is NOT one of the primary areas for risk and feasibility analysis?

deployment risks