Chose accept the position the chief information officer cio
Communication Network
1Communication Network
Aretha C. Scott
INF325: Telecommunications & Networking Concepts
Instructor: Nizar Dajani
May 22, 2017
3
Technical policies: Security staff members use technical policies as they carry out their security responsibilities for the system. These policies are more detailed than the governing policy and are system or issue specific (for example, access control or physical security issues). In terms of detail, technical policies answer the “what,” “who,” “when,” and “where” security policy questions. The “why” is left to the owner of the information.
Protecting smartphones against security threats is a multidimensional problem involving
Communication Network
5 available to discuss the issue. On-site workers like to communicate too, that’s why they choose to work in a traditional office environment. At times, it can be nice to work around people and share a joke or two to laugh and build camaraderie. Remote workers must be even more contactable than their office-based colleagues or trust goes out the window. Keeping on-site worker computers secure is of no concern because the user does not have a problem with software being installed on their computers because it is their computer for work. However, users who work remotely are nine times out of then using their own personal computers and will be hesitant to allow company security software on their personal hardware.According to (Scippacercola & Sepe, 2016), “Technical Efficiency (TE) is a basic tool for determining the factors that slow down production.” For the last part of this paper, we are asked to evaluate the elements critical for a successful implementation of such communication systems and tell if there is more technical such as hardware, software, network infrastructure, security, and cloud computing or more managerial such as project management, change management, logistics, and user involvement? I feel that it is a little bit of both required because you can’t have the technical side without the managerial side taking part in making everything happen.
Experienced project leaders know they must resolve the business, technical, and personnel problems inherent in any change effort to be successful. As stated by (Levasseur, 1993), “Three ways to improve the odds of success are to (1) understand the culture of the organization, (2) take a broad, systems view of the problem, and (3) do an organization assessment before recommending any changes.” Project managers are crucial when it comes to communication systems because they are the leaders of organization and know how to identify and analyze business and organizational issues with clarity.
When it comes to the definition of user involvement, it is defined as, according to (Newman & Noble, 1990), “a process of interaction between systems specialists and users or their representatives.” Computing equipment is physically located close to users, they have a greater opportunity to affect system design, operation, and use (Stallings & Case, 2013). Without user involvement, software projects will fail. The software is developed for the users; therefore, user involvement is imperative.
Reference
Internal communication is key during breach probe. (2012). Same-Day Surgery, 36(7), 72-73.
Stallings, W., & Case, T. (2013). Business data communications: Infrastructure, networking and security (7th ed.) [Electronic version]. Upper Saddle River, NJ: Prentice Hall.
Stringfellow, A. (2016). Cellphone security. Retrieved from https://www.tccrocks.com/blog/cell- phone-security-tips/