Requirements for The Cooperate Computing Function

Paper Type:  Report
Pages:  5
Wordcount:  1198 Words
Date:  2022-06-19

Introduction

Communication in any business organization plays a significant role among all the units in the business set up. However, the communication network that interconnects the facets all is another aspect that needs to be implemented with a lot of care because communication is what defines the success or failure of a business. The external and internal communication network needs to in this addressed in this mission so that we can achieve an all-inclusive and complete communication channel. These channels need to be for the best of the business hence relevance is a crucial factor to put into play when devising this plan. But, for the complete mission to be a functional system, it requires to be rolled in phases whereby phase one will have three points that are important while addressing the security factor.

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

Analysis of point five, "Meet the information requirements of management" to see why it is included in the list of the CIO's nine points. According to Stallings, et al. (2013), the executive management need to be able to access business data easily from within the organization. However, when the activities of data processing are developed at the level of departments, this top management will have a lot of difficulties in accessing the data and even if the access it anyway, the chances of misinterpretation are high. When different departmental means of data summarization and standards applied are adopted, uniform data collection procedures are compromised, and this makes the generation of reports for the top management a hard task. Therefore, in my opinion, the reason behind the CIO's emphasis to this point is to ensure that we understand that there are large volumes of data produced and need the neat presentation to the managers. Again, the CIO needs us to know how complicated the data is and also get to see the process of data presentation is too involved and hence the whole process should be as smooth as possible to handle this voluminous data. Being that streamlined, the CIO will have an easy task going through the information within a short time. At the same time, the CIO will be able to make better and informed business decisions.

Items to Be Implemented in The First Phase

The first phase of the mission will contain only three points out of the CIO's nine. I would argue that the following three points need to be prioritized to be implemented in phase one each having a reason for its priority:

Point 1: Means identifying those departments that legitimately require those computing power capabilities. The first item I would include in my first rollout plan. This is because it is within the bounds of our mandate of offering IT services to every corporate customer within the business organization and also to the departments within this organization. For this department to exercise this mandate effectively, the cost factor cannot be overlooked. This task needs to be accomplished in such a way that there is saving on cost. To achieve the cost-effectiveness, I see it necessary to acquire those systems that are efficient and also is cost-effective. These software systems could be procured as a package that has servers, personal desktops, and laptops, etc. such that the kit costs less than securing each type of system independently (Shan & Shaheen, 2013).

Point 9: The working environment of employees need to be conducive and enjoyable. I would suggest this be included in the first rollout phase because when the employees are satisfied with their work environment, the output will increase because the workers would be motivated. I firmly have the belief that the employees we have in this organization are our primary asset and hence need to be treated as essential and valuable players in this organization. The employees need to be considered as useful as those hardware and software assets in the IT systems. To make the employees enjoy their tasks, they need to be provided with all that they need for their jobs, and fundamentally, it is a crucial aspect of production processes (Dooley, 2005).

Point 7: Achieves the autonomy of organizations departments in an effort to maximimize the creativity and work performance at the level of department. This would make up my three points for phase one rollout plan. According to Stallings, et al., the use of small computers for the organization units provides for highly personal service to the departments that need the computing services. This allows the users of these small PCs to maintain an established autonomy in performing their duties with their machines. The employees also enjoy a hands-on chance of computing services while raising the productivity at the departmental level. (Stallings, W., Case, T., Bhattacharjee, A., & Mukherjee, S., 2013).

Having addressed the three items that enter the first rollout plan of the CIO's mission, let me discuss the security item. Security to the organization's system is a very key role and also a duty of the IT department to ensure that all the necessary measures are put in place to ensure data security and also cybercrimes. According to (Fernandes et al. (2014), the need to implement the cybersecurity initiative in this phase is a critical part that require early enough implementation before rolling out the other phases. I also recommend these security measures to the applied on the customer information including all the confidential data in the organization's database. Also, the financial information also require security so that this data does not fall under unauthorized hands. Additionally, secure the product's information. The problem of insecure systems comes through many ways such as stolen credit card numbers that results to lack of trust with the organization and also the legal part of the problem comes in. (Fernandes, D., Soares, L., Gomes, J., Freire, M. & Inacio, P., 2014).

Conclusion

To conclude my report, these nine points lack the security aspect to make it an excellent mission. Therefore, I would add another one more point of security to make it ten-point mission and also rank its implementation in the first phase. Generally, this first phase roll-out plan has items that need to be implemented first before embarking to the next stage, mainly because some of the points in the first phase are being depended on by those items in the next step. Therefore, there is a relationship between the items in the CIO's list. All the Aspects touched in this paper features the employee welfare for excellent service delivery as well as the kind of system that will provide the computing capabilities to the organizational units that need them. These aspects are deployed to the departments and the top managers and designing of a streamlined channel to follow for the departments to communicate reports to the management and vice versa. This would be my report to the CIO.

References

Dooley, A. (2005). Business data communications. Upper Saddle River, NJ: Pearson/Prentice Hall.

Fernandes, D., Soares, L.., Gomes, J., Freire, M., & Inacio, P., (April 01, 2014). Security issues in cloud environments: a survey. International Journal of Information Security, 13, 2, 113-170.

Shan, S., & Shaheen, M. (2013). Change management in the information age: approaches of academic library administrators in Pakistani Universities' Libraries.

Stallings, W., Case, T., Bhattacharjee, A., & Mukherjee, S. (2013). Business data communications: Infrastructure, networking and security.

Cite this page

Requirements for The Cooperate Computing Function. (2022, Jun 19). Retrieved from https://proessays.net/essays/requirements-for-the-cooperate-computing-function

logo_disclaimer
Free essays can be submitted by anyone,

so we do not vouch for their quality

Want a quality guarantee?
Order from one of our vetted writers instead

If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience and 25% off!

24/7 online support

NO plagiarism