Discussion: Security of Key Assets
Discussion: Security of Key Assets
the work that people do and the way they interact with each other. Appropriately incorporating IS into the design of a business model enables managers to focus their time and resources on issues that bear directly on customer satisfaction and other revenue‐ and profit‐generating activities.
Adding a new IS to an existing organization, however, requires the ability to manage change. Skilled business managers must balance the benefits of introducing new technology with the costs associated with changing the existing behaviors of people in the workplace. There are many choices of technology solutions, each with a different impact. Managers’ decisions must incorporate a clear understanding of the consequences. Making this assessment doesn’t require detailed technical knowledge. It does require an understanding of short‐term and long‐term con- sequences risk mitigation, and why adopting new technology may be more appropriate in some instances than in others. Understanding these issues also helps managers know when it may prove effective to replace people with technology at certain steps in a process.
Integrating Business with Information Systems IS are integrated with almost every aspect of business and have been for quite some time. For example, the CTO of @WalmartLabs, Jeremy King, wrote in a blog,
There used to be a big distinction between tech companies: those that develop enterprise technology for businesses, and the global companies that depend on those products. But that distinction is now diminishing for this simple reason: every global company is becoming a tech company. . . . we’re seeing technology as a critical component for business success.5
IS enable or inhibit business opportunities and new strategies.
IS can be used to combat business challenges from competitors.
IS enable customers to have greater pull on businesses and communities by giving them new options for voicing their concerns and opinions using social media.
IS can support data‐driven decision making.
IS can help ensure the security of key assets.
4 http://www.gartner.com/newsroom/id/2959717/ (accessed March 5, 2015).
cintro.indd 3 11/26/2015 7:38:29 PM
You must proofread your paper. But do not strictly rely on your computer’s spell-checker and grammar-checker; failure to do so indicates a lack of effort on your part and you can expect your grade to suffer accordingly. Papers with numerous misspelled words and grammatical mistakes will be penalized. Read over your paper – in silence and then aloud – before handing it in and make corrections as necessary. Often it is advantageous to have a friend proofread your paper for obvious errors. Handwritten corrections are preferable to uncorrected mistakes.
Use a standard 10 to 12 point (10 to 12 characters per inch) typeface. Smaller or compressed type and papers with small margins or single-spacing are hard to read. It is better to let your essay run over the recommended number of pages than to try to compress it into fewer pages.
Likewise, large type, large margins, large indentations, triple-spacing, increased leading (space between lines), increased kerning (space between letters), and any other such attempts at “padding” to increase the length of a paper are unacceptable, wasteful of trees, and will not fool your professor.
The paper must be neatly formatted, double-spaced with a one-inch margin on the top, bottom, and sides of each page. When submitting hard copy, be sure to use white paper and print out using dark ink. If it is hard to read your essay, it will also be hard to follow your argument.