ITFM – Preparation for Prelim

Download Report

Transcript ITFM – Preparation for Prelim

Impact of ICT on Work Practices and Management of Info

ITFM – Outcome 2

Impact of ICT on Workflow

Workflow

 The impact of ICT can be seen clearly in each of these areas  The most noticeable effects are:   Speed – information can be located, produced, updated and transmitted much more quickly Ease of access – it is relatively easy to find information within and outwith the organisation

3

Input

 Information can be

keyed in once

and then used by many people  Data

held in different formats can be input

eg keyed inl copied in; scanned in; OCR; optical marks 

Input can be restricted

greater accuracy through use of logins and paswords – this can help to ensure data integrity and contributes to  The use of drop-down lists, check boxes, radio buttons and validation checks

can help to reduce the number of errors

made during data input.

4

Processing

 The

same data can be processed in different ways

: eg customer data could give lists; labels; or, merged letters  It is possible to

extract data that meets specific criteria

from a huge database in seconds 

Data can be held centrally

, so that all staff can access and process it to suit their purposes 

Files can be accessed by several members of staff

at the same time – less wasted time – don’t need to wait for someone else to finish first.

5

Output

Standard layout and templates

ensures a corporate look for company documents which helps to create a professional image  Output can be

distributed at any time of the day

– particularly suitable when working across time zones  The output can be

sent to different media

eg paper, website, PDA, email  Information can be

transmitted very quickly

– by email if it is already in an electronic format or fax if it isn’t.

6

Main Features of Software Applications

Word Processing Software

Purpose:

production of letters, reports, minutes, forms (paper-based and electronic) 

Features:

tables, mail merge, standard text, columns, page layouts, electronic forms, integration with other software 

Advantages:

speed and accuracy (standard text; amendments easily made; mail merge), alternative layouts easily achieved, data collected via forms could populate a database

8

Spreadsheet Software

Purpose:

perform calculations, analyse and present numeric data 

Features:

wide range of advanced calculations possible eg SUMIF, COUNTIF, LOOKUPs, charting capabilities 

Advantages:

routine calculations can be automated, accuracy with correct formulae used, what-if scenarios, replication of formulae, wide range of charting options

9

Database Software

Purpose:

stores cast amounts of data eg customers, suppliers, staff 

Features:

sorted quickly, data can be extracted, information can be displayed in reports 

Advantages:

all staff can access the database (with correct access rights), up-to-date data used by everyone

10

Other Software Applications (and ICT)

 Presentation  Email  E-Diary  Local Area Network (LAN)  Wide Area Network (WAN) How could an Administrative Assistant use ICT in order to carry out their job?

• • • • • Customer Service?

Market Research?

Arranging Meetings?

Recruiting Staff?

Company Policies and Template Files?

 Internet Websites  Mobile Phones  Modern Technology eg iPads

11

Disadvantages of Business Software

While advantages far outweigh disadvantages remember these: 

Cost of purchasing

software  The time and expense of

staff training

 Requirement to implement

procedures for security and confidentiality

 If upgrades: the time/cost in

transferring data to a new system

.

12

Networks

ITFM – Outcome 1

Types of Networks

Peer-to-peer

: individual computers linked together by cable (only very small networks) 

Client-Server:

Servers are used for file storage, print management, managing network traffic. Each user (client) is linked to the server

14

Local Area Network

 Connects computers and peripherals

within a local area eg a building.

 May use

network cables or connect via WiFi

.

 Access to a central storage area makes it

easier to share files

and databases.

Backups can be taken

of all data – less likely that data gets lost

15

Wide Area Network

 Connects computer systems over a

wide geographical area

.

 Often associated with the Internet – but can be used to

connect different branches of an organisation

anywhere in the world.

 It is

possible to have a ‘secure’ link

to sites that transmit sensitive data eg financial transactions

16

Network Disadvantages

 The

cost of installing and supporting

the network 

If the network ‘goes down’

no-one can access files needed for their work  If the

file server is damaged or stolen

, all data may be lost – BACKUPS!

 A

virus

can quickly spread across a LAN  Could be easy for an unhappy employee

to damage or corrupt company data

– backups and access restrictions.

 WAN: potentially gives people outside the organisation a route to your company data  WAN: other websites that you have used in the past may change and no longer be available

17

E-Commerce

ITFM – Outcome 1

E-Commerce

 This is the buying and selling of goods and services electronically, usually over the Internet  Some organisations use e-commerce for all their business eg Amazon, others use it to attract additional customers.

E-Commerce (Organisation)

Advantages

 Global customer base  Grow without expanding business premises  Opening 24/7  Decreased overheads  Potentially reduced marketing costs

Disadvantages

 Time/Cost of a good website design (and maintenance)  Ensuring secure payment methods

20

E-Commerce (Individual)

Advantages

 Browse and buy 24/7  Access to suppliers worldwide  Compare products and services  No ‘sales people’  Delivery to home/office

Disadvantages

 Cannot see the product ‘in the flesh’  Organisation becomes ‘faceless’  Badly designed websites can become frustrating

21

The Impact of ICT on Work Practices

Impact on Working Practices

 Ease of access to vast amounts of data  Centralisation of data  Automation of tasks  Internet meetings (videoconference)  Hot-desking  Teleworking  Homeworking

Data Management Systems

ITFM – Outcome 1

Define: Data Management

 Data management is about setting up systems, procedures and controls relating to the way in which data is: input, stored and retrieved:  Who has access to the data and information?

 How is it kept up-to-date?

 How is it kept secure?

“Management Information Systems”

 Purchase hardware/software  Maintenance  Setting up systems and procedures  User policies  Codes of practice  ICT training  IT helpdesk  User guides

26

Centralised IT Department

Advantages

 Overview of the organisation  Standardise systems  Prioritise purchases across the whole company  The department will build up expertise and be able to effectively advise users on the best solutions  Training and support more easily coordinated

Disadvantages

 ‘one hat doesn’t necessarily fit all’

27

Hardware Considerations

 Selection of appropriate hardware – can affect the speed of the system  Keeping up-to-date – keeping up with the latest advances to ensure full efficiency  Rolling upgrade programme  Appropriate storage devices (in line with company policies)  Input devices: consider touch screen; hand-held devices; OCR; voice recognition; MICR; smart cards; barcode readers; optical marks

28

Software Considerations

Operating system

– this is used to set up folder structures for your data, provide an interface between your hardware and application software and control the operation of the computer as a whole 

Utility programs

– these include virus checkers, and defragmenting utilities

29

Electronic File Management

ITFM – Outcome 1

What is File Management?

 Choosing appropriate

file locations

Folder structures and File Names

Version Control

Housekeeping

procedures 

Backup

procedures

File Management

Benefits of Good…

 Less time wasted finding files  Improved customer service  Improved security of data  More efficient use of storage  Compliance with Data Protection Act

Consequences of Poor…

 Out-of-Date information accessed  Sharing files difficult – can’t find the right file  Confidential information accessed  Workflow disrupted

32

Security and Confidentiality Procedures

ITFM – Outcome 1

Some Security Terms

Security:

means protecting data against theft, damage and destruction 

Integrity:

means ensuring that the data is accurate, up-to date and error free 

Privacy:

means that the data must be held securely so that only those who need access to the data can access it 

Confidentiality:

means that those who do not have access to the data respect it, and do not discuss it with others that do not have a right to know what it says

Physical Threats

 Ensures offices are locked and windows closed  Alarm the building  Use CCTV to monitor the premises  Restrict the access points  Keep visitors away from restricted areas  Security guards/lights on in the grounds  Train staff on moving equipment (prevent damage)  Fire doors closed/fire fighting equipment provided  Lag pipes to save bursts in winter  Take out adequate insurance

35

Protecting Electronic Files

Password protect

– restricts access, must be changed regularly 

Regular backups

– ideally stored offsite, saves recreating files from scratch 

Anti-virus software

– prevents unauthorised modification of files 

Access rights

– ensure that only authorised personnel can read/edit/delete 

Lock workstation

– when away eg on a break or helping a customer 

Voice/Iris/Fingerprint/Dongle

– restricts access 

Read-only Files

– cannot be edited

36

Protecting Paper-Based Files

 Return files to the filing cabinet after use  Keep filing cabinets locked  Don’t leave papers at the photocopier (very easy to do!)  Don’t leave papers unattended  Shred and dispose of unneeded items

37

Legislation

ITFM – Outcome 1

The Data Protection Act

There are eight principles. Data must be: 

Fairly and lawfully obtained

and processed 

Accurate and up-to-date

Adequate, relevant and not excessive

Processed for limited purposes

 Held

securely

Not retained for longer than necessary

Not transferred outwith the EU

(unless adequate protection is available)

39

Fairly Processed?

 The data subject must have consented to the processing  The processing must be necessary  The processing is necessary under a legal obligation  The processing is necessary to protect the interests of the data subject  Needed to carry out a public function eg in court  It is necessary to pursue the legitimate interests of the data controller or third parties (unless it could unjustifiably prejudice the interest of the individual)

40

DPA: Rights of the Individual

Subject Access: you can find out what is held on computer about you  Prevent Processing: you can ask a data controller not to process your information  Direct Marketing: you can ask that your data is not used for direct marketing  Automatic Decision Making: you can object to decisions being made on your behalf on account of the data held  Rectify, Block, Erase and Destroy: inaccurate data can be requested to be amended or deleted

41

Freedom of Information Act

The Freedom of Information Act came into force on 1st January 2005.

 It gives you the right to ask any public body for all the information they have on any subject you choose.

 Unless there’s a good reason, they have to give it you within a month. You can also ask for all the personal information they hold on you.

42

Copyright, Designs and Patents Act

 It gives the creators of literary, dramatic, musical and artistic works the right to control the ways in which their material may be used.  The rights cover: broadcast and public performance, copying, adapting, issuing, renting and lending copies to the public. In many cases, the creator will also have the right to be identified as the author and to object to distortions of his work.

 Copyright arises when an individual or organisation creates a work, and applies to a work if it is regarded as original, and exhibits a degree of

labour, skill or judgement.

 If a work is produced as part of employment then normally the work belongs to the person/company who hired the individual.

 Only the owner, or his exclusive licensee can bring proceedings in the courts against an infringement.

43

Computer Misuse Act

accessing computer material without

permission e.g. looking at someone else's files 

accessing computer material without permission with intent to commit further

criminal offences e.g. account

hacking

into the bank's computer and increasing the amount in your 

altering computer material without

permission e.g. writing a virus to destroy someone else's

data

writing a virus is illegal. or deliberately spreading one 44

Impact of ICT on Work Practices and Management of Info

ITFM – Outcome 2