Introduction
Recent data from the Security Breach Survey conducted by the Department of Business, Innovation, and Skills (2014) indicate that approximately 80% of all organizations believe that security is of great importance to their organizations particularly, to the senior management. Indeed, this is true as the shift towards modern technology such as machines and computers as well as conducting business online through the internet connections puts organizations at risk. It is why it has become important for many organizations to put in place contingency plans that can be put in place in case of such risks coming to life (Okeke & Shah, 2016). This paper aims at identifying the role of end users in the creation of a contingency plan with a focus of IBM.
IBM is an organization that among many things is involved in Information System Development (ISD). Indeed, it has been identified that one of the biggest reasons for failure during research is the lack of user participation in the ISD projects. Particularly, the participation of the end user in matters feedback and the general level of satisfaction have been identified as major pitfalls towards the success of Information Systems. It is clear that the end user of a product or project should be involved in the creation of a contingency plan that will properly suit his/her needs in the event of danger, system failure or loss of data. IBM as an organization has put in place measures to ensure that the end user plays a pivotal role in the creation of a contingency plan as it is meant to help say, the individual in situations of great distress. Having the input of the end user will ensure that rather than have the systems well safeguarded, the end user is well aware of how to implement them which ensures that risks and dangers are averted in a manner that safeguards his/her information and the organization at large (Childs & Dietrich, 2003).
On the flip side, it is also important to note that not all organizations with contingency plans should have such information left out to the end-users or other persons. It is clear that contingency planning is essential in ensuring that organizations, as well as products and services, run smoothly after something or a particular event affects the normal running of things. It could be termed as a "Plan B" in layman terms (Childs & Dietrich, 2003). There are particular instances where the involvement of the end user in the creation of a contingency plan puts the organization at more risk. It is best to stick to information technology systems as they pose the biggest risk especially in this day and age where nearly all information and transactions are conducted online. The internet is a very wide arena that has with it many risks associated with it. We will still use IBM as an example but in this case for arguing why it could well be worth it to hold off some information to the end user about contingency planning.
Considering that IBM is involved in many areas of Information technology particularly for businesses, they have different levels of clearances for different products. It is why they are used concurrently arguing for and against the involvement of end users in the creation of contingency plans. Indeed, particular systems are more prone to risks and have to be handled with much more care needing clearances from higher offices to access such systems. IBM, for instance, is involved in running election systems for many nations across the globe. Such systems that involve sensitive information cannot have the inclusion of the end users in contingency planning as it may well expose the whole system to risk. As such, even as it is important to have end users participate in preparation and planning of contingencies, there are instances where the involvement of these is detrimental to the overall safety and security in the long run.
References
Information Security Breaches Survey Technical Report. (2014). Retrieved from https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/307296/bis-14-767-information-security-breaches-survey-2014
Childs, D. R., & Dietrich, S. (2003). Contingency Planning and Disaster Recovery: A Small Business Guide. John Wiley & Sons.
Okeke, R., & Shah, M. (2016). Information Theft Prevention: Theory and Practice. London, England: Routledge.
Cite this page
Essay Sample on Role of End-Users in Creation of a Contingency Plan. (2022, Nov 20). Retrieved from https://proessays.net/essays/essay-sample-on-role-of-end-users-in-creation-of-a-contingency-plan
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Public Health Campaign - Research Paper
- Research Paper on Competing in the Advertising Sector: Logos and Pathos Strategies
- Essay on Making La Mela Leaner: Applying Lean Principles to an Italian Restaurant
- Paper Example on Marketing Campaign: Financial Solutions for All
- Essay on KitchDirec: Eliminating Intermediaries to Lower Cost of Kitchen Wares
- Essay Sample on McDonald's Outsources Drive-Thru Orders: A New Strategy For Increased Sales?
- Achieving Professional Excellence: A Local School Experience - Essay Sample