Safety Towards Telecommunications and Technology Research Paper

Pages: 3 (1120 words)  ·  Bibliography Sources: 5  ·  File: .docx  ·  Level: Doctorate  ·  Topic: Business - Management

SAMPLE EXCERPT . . .
The other DSS include knowledge driven, document driven and model driven. Model driven use the available types of models in manipulation of data. Knowledge driven DSS is a system that uses expertise to solve problems. Document driven uses analysis, summary and retrieving of data; it provides as a summary of the documents relevance hence used to make decisions for continuing functionality (Khosrowpour, 2005).

Without electronic communication, there will be reduced speed in communication, no ease at work and reduced work output. Technology helps in managing the most complicated tasks in an organization, organization's profitability, and survival depends on IT. Absence or inappropriateness in the IT sector can lead to the collapse of an organization.

Online back up

When a disaster occurs in an organization, communication and technology can sometimes help to mitigate the effects. It also leads to the attainment of certainty which may result in attaining desired goal preventing disasters. It helps organizations to respond to changing circumstances adequately, hence prevent a disaster from affecting the business much. Configurations and security setting should be reviewed first. All employees should be informed on the security incidents, when they occur and how they should be reexamined. There should be redundancy planning to approach redundant IT infrastructure. For a reliable system, back up online systems can also be used when a disaster occurs to prevent paralyzing a business that depends on one system.Get full Download Microsoft Word File access
for only $8.97.

Research Paper on Safety Towards Telecommunications and Technology Assignment

An audit is done first before development of an online system. When implementation is carried out, the system should be easy to follow. Procedures, training and a support system on how the system will function should be well communicated (Vacca 2009). This process requires commitment across all levels. When designing the system the best animations, sound and images should be used to communicate the business idea. The most efficient and effective way of communication should be used while including the most relevant information. The system should be secured with log on security or other types of security to prevent hackers. Built in quality in the system will ensure that their image is well communicated to all audiences. It will also ensure consistency in handling information across all product lines, projects and companies.

Conclusion

Recommendation Risk and vulnerable areas in an organization should be identified. Risk assessments should be done, and then they should be constantly updated. There should be a priority on the risk areas that should be dealt with first. Observing changes in Operating environments and organizational information system will help to monitor results which keep the organization aware of the risks. It helps the leaders in performing near real time risk management. Organizations should use past disasters to provide solutions; they should also try using other unique disaster management strategies. Diverse methods can be tried to deal with a disaster or emergency problem. Corrective, preventive, and detective control measures should be adopted to prevent disasters. Preventive-prevents a disaster from occurring, detective- detects something occurring that is not meant to occur and corrective- address existing nonconformities as they make improvements.

References

Khosrowpour, M. (2005). Encyclopedia Of Information Science And Technology. Chicago: Idea Group Inc.

Koehler, G. (1997). What Disaster Response Management Can Learn From Chaos Theory . London: Diane.

Lane, D. (2010). The Chief Information Officers Body Of Knowledge. Atlanta: Willey.

Takai, M.F. Managing Information Security Risk. Atlanta: Diane.

Vacca, J. (2009).… [END OF PREVIEW] . . . READ MORE

Two Ordering Options:

?
Which Option Should I Choose?
1.  Buy full paper (3 pages)Download Microsoft Word File

Download the perfectly formatted MS Word file!

- or -

2.  Write a NEW paper for me!✍🏻

We'll follow your exact instructions!
Chat with the writer 24/7.

Designing a New Regulatory Framework for Telecommunications Interception and Access in Jordan Multiple Chapters


Technologies Involved in Telemedicine and Its Role Term Paper


Mobile Services, Safety, Security, Usage and Acceptance Research Proposal


Information Technology and Its Uses in the Nano Thesis


Analyzing Technology for Decision Making Essay


View 200+ other related papers  >>

How to Cite "Safety Towards Telecommunications and Technology" Research Paper in a Bibliography:

APA Style

Safety Towards Telecommunications and Technology.  (2012, May 30).  Retrieved March 1, 2021, from https://www.essaytown.com/subjects/paper/safety-towards-telecommunications-technology/9194278

MLA Format

"Safety Towards Telecommunications and Technology."  30 May 2012.  Web.  1 March 2021. <https://www.essaytown.com/subjects/paper/safety-towards-telecommunications-technology/9194278>.

Chicago Style

"Safety Towards Telecommunications and Technology."  Essaytown.com.  May 30, 2012.  Accessed March 1, 2021.
https://www.essaytown.com/subjects/paper/safety-towards-telecommunications-technology/9194278.