What Do You Think About Business Computing?

Introduction
Four decades ago people using computer to maintain information and data. The implementation of computer helps ease the burden of recording and save up a lot of space for storage. The role is significant. Only large organisation and government agencies needed it.

In early 1990’s, computer system is massively used in every organisation. Knowledge based company rely even more to the computer system. The system makes recording work in order, shorten the communication cycle, fasten work procedure, save up cost and storage space, gaining of new knowledge and etc. At that point of time, it is a supporting role for an organisation.

In 21st century, the computer system is enhanced by additional roles of internet (World Wide Web), electronic commerce, advertising, social media and networking, on top of the existing offered benefits. It is known as information system. It has been upgraded from a supporting character to the lead function of day to day operation.


With increasingly weightage place on computing, the computing system helps organisation to well conducting and planning the product information. It also helps to save up time and effort retrieving old data, and results in cost reduction. It is used to run an organisation, and as a platform to generating revenue.

Business Computing is the integration of business and information systems. It is about solving problems and support business processes with computer based system, such as marketing and business resource management. Business computing comprises of online and offline function that help to ease the burden of an organisation employee. Online function indicates the internet connection of World Wide Web for resource finding, communication, advertising, marketing outreach and business trading. Offline function means information storage in spreadsheet and power point, statistics and analysis.


The implementation of internet brings tonnes of goodness to the business world. As minor as electronic mail usage have shorten the message and correspondence delivery duration and provide better management of information. It is hassle free as compared to the tradition snail mail.

It also promotes continuous learning for Manager and Executives at the click of finger. It enables information to be received immediately and gain better exposure to the outside world without physically presence.

Electronic commerce opens up new market and business for an organisation. It allows the organisation to penetrate further geographical area i.e. globalisation, and larger customer group. It increases the business opportunity with the advancement of information technology and raises the organisation image to a higher extent. It is used as a platform to introduce company product and services, and even trading online. Purchasing is made more easy in the modern day, without traffic congestion and difficulty finding parking lot.

Marketing tools have evolved from the traditional way into the digital era. Organisation uses internet as a medium to advertise product and services. Most of the organisation will opt for appropriate corporate website and catalogue product and services for the choice of customer. To go more in depth, personal selling could be targeted with the internet services from individual to a designated group of potential customer. Social media such as online networking – ‘Facebook’ is the latest tool acquire for marketing.

More and more online activity is equal to lesser paper usage. Benefits such as saving the storage place and saving up cost, information system also contribute to the environmental concern issue that is the global warming topic.

Challenges of Business Computing
The implementation of business computing has improved company’s day to day operations and activities, as well as individual lives by reducing cost, energy and resources. While the benefits are being enjoyed widely, the downside of its implementation is relatively affecting the user. Some common downside of business computing includes power failure (no power supply, no usage of computer facility), abusing of data, virus attack, computer crime and etc. These posing threats could lead to major disaster to an organisation that could result in millions dollar of recovery plan.

The implementation of electronic commerce has opened a lot of business opportunities, easing work burden and saving resources, but it also brings in issues that can be ethically challenged to the Management team, and the society.

High cost in maintenance and security update is a segment not to be left out. The maintenance of software and hardware system could be an enormous fee for an organisation. Security system must be updated from time to time to avoid virus resistance to the network system.

Consistent training to existing staff and new comer is another investment for an organisation. This helps to create the awareness of the security of information system to the IT employee, and employee.

Electric commerce has raised further security questions as debit and credit transaction will be carried out on internet. Chances of information get exposed thru internet is established and threat is possessed.

The existence of IT has made work easy for people and saves up a lot of resources. Thus, the employment rate of hiring manpower can be reduced. Reshuffling of manpower inter departmentally could be an option but the sense of belonging of staff could be put up to test.

Apart from that, there are a lot of health issues occurrence when associated with the usage if information technology. Common issues such as Repetitive Strain Injury (RSI), Computer Vision Syndrome (CVS) and Techno stress are often seen relating most employees dealing with computer.


Conclusion
The role of computer has occupied business, commerce and internet in today business world. Great emphasis is placed by the organisation on how computers are used within them. The importance of business computing is seen and feels in any organisation. It is strongly believed that the technology has never stopped developing and in times to come, more goodness is shared by all level of the society. Hopefully, the challenges associated with the growing of business computing could be reduced to safe level.


Last but not least, Business Computing is really very important and all organisations should be widely using Business Computing without a single doubt. Due to the important roles, it has become a subject that needs to be mastered by every organisation.










The Importance of Securing Information System

¬Definition and Overview:
Information System refers to the network supports the transformation of raw data and information into useful knowledge, by gather, process, store, and disseminate for business operation, decision making, reporting, planning and etc. Generally, the information system contains people, procedure, hardware and software. The formation of information system can be in manual or computerized, or a mixture of both types.

Information system is a very important business asset and property to an organisation. Just like other business property, it needs to be protected and guarded from any harms and damages. Information system plays a significant role in maintaining day to day business operations in today business world. The direction of current business environment is most likely to be technology based where organisation rely and survive on information system. While the benefit of information system is widely spread, unfortunately, the awareness of securing the information system is not high.

Many might think it is difficult in securing the information system. Yes, it is technically. But a common user like me and you, can too help to secure the information system. The basic damage of information system can line up from physical damage to the hardware, such as a fire in the server room, an intentionally vandalism on the computer Central Processing Unit (CPU), spreading viruses online, and even a drink spilled over the computer keyboard can put a stop to the function of information system.

In this post, discussion will be made on the importance of securing information system, mainly computerised information system, for organization in today’s business world.

¬Introduction:
Statistic in recent economy studies shows consistent growth in information industry. The success of information industry has proven to organisations the usage and importance of incorporated information system which gives benefits to day to day business operation.

Following the revolution in technology and globalisation of market, many organisations place great emphasis on the establishment of information system. With the advent of information system and increasing usage of the system in an interconnected business environment, controls and security have become an important main topic to study. The accountability of maintaining a secure information system can no longer lay in the hand of information technology experts, but it is now an indicator in which the whole management team needs to be monitored.

Business operations of many organisations are depending solely on the information stored in the computers. Confidential and sensitive information such as customer details, staff information, account details and product information may all be stored on the database. Failing to retrieve such information will cause difficulty in running daily business. Effective information security systems must be implemented.

There is no doubt that with the improvement of information technology and system in the 21st century, the world has been living at great convenience. Instead of elaborating the goodness of the information advancement, let’s think it reversely as to how the people would have worked without it. Work progress gets slower, difficulty in retrieving information from database, limitation of communication flow and etc.

Take a look at the condition if the organization’s information’s system is not properly functioning (also known as system down time) for few days and everything needs to go on manual: majority of the operations unit will be disrupted, causing loss in business opportunity and client’s confidence, and possible lawsuit may occur. Additional time spends and burden onto the shoulder of employee further reflects the raising stress level without much say.

Actual chaos as mentioned could turn out to be the worst case scenario. A wisdom quote by Albert Einstein once tell us : ‘Smart People Solves Problem, Wise People Avoid It.’ While solving the problem could be time and cost consuming, everyone now wants to play the wise man role. To avoid interruption to organisation’s computerised information system, the best way is to prevent it from happening by a series of security activity. Securing the information system is important as to prevent an organization’s ‘heart attack’. It is not only a technology issue to zoom in, but a business issue to take care of.

¬Common Crises
The two major and common crises seen in an organisation’s information system are:
(i) System Malfunction (Failure)
System Malfunction (Failure) happens when the information system is overload which leads to low effectiveness and efficiency of the system. Power stoppage could contribute to failure of the information system too. Infection of viruses can paralysed the system and erupt the information system and cause files and data to be missing.

(ii) Database and Information Intrusion (also known as Hacking/Cybercrime)
Database and information Intrusion talks about the ‘force entry’ of third party getting confidential information and data illegally for the use of competition and trading purposes.

¬What is Information Security?
Information security is the procedures of protecting information, from unauthorized access, use, apply, disclosure, alteration, disruption, interference and destruction, by practice and application of policies.

Information security helps to guard the confidentiality, integrity, and availability of the information system, as its core principle. It is common known as CIA. A well maintained CIA gives great advantage and benefits to an organisation.

Confidentiality – User must be vested authority to access to the information. Authority level varies from position and responsibility in the organisation.

Integrity – To ensure the information and processing method is correct and comprehensive. Information must be presented in completeness.

Availability – Information must be accessible and able to retrieve when it is required. Updating of information must be performed in timely manner to make sure latest and updated information is ready at all times.



¬ Protecting The Information System: The Importance of Investing and Updating the Security Structure
The investment on security structure is not limited to monetary contribution on purchasing, renewal and updating of hardware and software, but also includes the effort of the information technology department to closely monitor and run thorough checking on the system.

Secured information system ensures the stability of business operations. The continuity of business performance and its efficiency level is at stake should the information system is disturbed due to power failure. Data and information must be available when it is required. Operation flow cannot be performed as usual will lead to the direct impact of damage, that is productivity lost and eventually missing the business opportunity. Apart from that, the possibility of lawsuit occurs should the interrupted business performance have resulted in a breach of contract in terms of productivity volume and the date of delivery. Legal consultation and assistance involve high expenses that add on to the productivity lost.

The reputation of an organisation is most likely to be affected if the business performance is interrupted especially for a multinational organisation. Corporate client tends to lose confidence in the partnership and customer will probably seek for competitor’s product or substitution. These issues results in losing customer confidence and brand image as an indirect damage. Although loosing in business opportunity means organization suffers from monetary aspect, it could eventually be picked up by a series of marketing and promotion effort.

On the other hand, the reputation and image of an organization would not be recovered by a short period of time. Massive effort is required to rebuild the confidence of client and customer.

Stealing of confidential information such as trade secret an organisation is of great annoyance of all organisations’ leader. The sustainability of competitive advantage lies on the trade secret which keeps one organisations as who they are today. Giving an example, the secret recipe of KFC is leaked and the formula is now widely shared by a lot of restaurant. It is not exclusively belongs to the top selling fast food chain. Will customer still visit KFC or rather go to other fast food outlet that offers the same meal as KFC? The answer is most likely not anymore. Situation gets worst if competitor offers the similar with much lower price.

Other than that, leakage in trading information is a huge threat not only to the organization itself, but the corporate partner as well. Others threatening information such as price list, client payment details, material and ingredient could further affect an organisation and its partnership to a different extent. All of those could provide great benefit and insight information to the industry rival.

Any types of sensitive and confidential data and information disclosed without authorisation is subject to legal proceeding. More harm will occur if the negligence of the organisation has caused damage to client and customer, the organisations may face more severe legal actions. Customer information such as credit card number could raise the interest of illegal syndicate. The members of the illegal syndicate can either steal the information during transaction is being made online or hacking into the information system to trace data. The data is then being processed for fraud transaction without the knowledge of card holder. Whichever form of intrusion gives no security and confidence for customer to trade online with the organisation.

Having an integrated security system can help to monitor and trace any abnormality of information transaction internally and externally. Antivirus software is crucial to detect and eliminate any form of intrusion by internet virus. Keeping the security system updated is a must due to the rapid changes of technology.

In the aspect of internal security, monitoring of the people who operates the information system is worth to look into. Most of the security breach incident happens due to the cooperation of the insider. Authorisation to gain access must be properly studied. Password should be changed from time to time to maintain the safety net of the security. Employee should be made understand and fully aware of the importance of information security. Confidentiality of business, client and customer information must be protected due to unforeseen and unpredictable circumstance and losses should it be violated.

Another reason to update the information security system is to comply with the local law and regulations. As an example, The Federal Information System Security Manager’s Act (FISMA) in the United States of America imposed submission of report on information system security awareness and training conduction on annual basis by government agencies.

With frequent monitoring, security system can play a part in alerting the ascending level of data capacity and ensure data is kept and stored at appropriate location. Deletion of unnecessary data and information guarantee the traffic is smooth and no congestion to slow down the system flow. This is a pro active approach for electronic commerce deal and online customer service.

Interconnectivity between business environments contributed to a high extent as to why updating information security is crucial. The growing technology made business convenient and easy for many organisations, but at the same time, this has made the information system exposed to a wide variety of threat. Whatever harm that made to the information system is ‘contagious’ to another part of the business environment due to the connection. The vulnerability of information system must be suitably protected to ensure the business risk is being minimized, and the business opportunity and business continuity is maximised. Updating the security system from time to time could be viewed as a pre caution measure.

¬Conclusion
The advancement of Information technology grows every single day. In order to keep up with the newest technology, constant updating of the security system is very much needed. Although the fees for maintaining the information system is high, but the intention to keep the information system at secure level is even higher. Recovery plan for any information system disruption might achieve ten times more than the maintenance cost. Last but not least, the unwanted chaos of suffering brand image is priceless.

As mentioned earlier, there are a lot of organisation understand the importance of information system, and how it add value to the organisation’s day to day operation, thus allocating high emphasis on the establishment of information system. Sadly, not every organisation realise the importance of securing the information system. On the other hand, some of the organisation do secure the information system, but constant updating the security is viewed as an additional work and cost, putting the system in a vulnerable level and exposed it to a wide spread of threat.

Some organization thinks that the security is reliable enough to secure the information system, but here is the advice: The security technology is constantly growing, so does the approach and tactic to put threat onto the information system.

To succeed in the implementation of effective information system security, the security awareness must be raised and information must be cascaded to all level of employee. It helps the organisation to reduce unpredictable costs, achieve competitive advantage and as a fulfilment to governance laws and regulations. Information security management must be implemented and continually improved and updated.

How Safe Is Electronic Commerce?

“2009 was the first year since 2005 that the number of data breach incidents recorded actually dropped. If that makes you feel a little more secure—there is a counter side. The same site reports on personal records that have been exposed: 220 million records in 2009 as compared with 35 million in 2008.” By Pankaj Kumar, E-Commerce Times, 18th January 2010.

The advancement of technology has successfully mitigated the commit of data breach incidents since 2009. As it gives a relief to the CEO from the organizational point of view, common user like me and you is now worried about the violation of our personal records.

Is online transaction safe enough? What harm might we suffered from the breach of personal records?

New Born Day

Today is the new born day of my blog: " The I.T. Planet". I hope to share my views and thoughts with everyone, and hope everyone will share theirs with me.

"Act As What You Do Makes A Difference. It Does." by William James