IT Really Matters to Me

When I first step inside the computer laboratory listening to requirements, expectations and schedule of activities, I got hesitation and fear. Will I be able to finish the subject? With all the demands of the subject and pressure at the workplace, fear started to slowly sink in my mind. After three months, I have overcome my fear and learn more that what I expected from the subject.

I have learned that manager plays a key role in Information Technology (IT). Managers must lead the effort to pursue IT policies that best meet organizational needs and goals. In order to implement best IT policies, I must learn it myself. Now I understand the feeling why some members of the organization fear change to embrace technology. Their fear was also my fear when I started the subject. Understanding the importance of the subject made me feel comfortable to explore and learn something new. With this in mind, I realized that when I proposed something for my subordinate I must also let them understand the purpose and the outcome of embracing something that is not part of the routine.

Manager must be visionary and strategically aware of where the IT program leads to. I also learned how to make information strategic plan. Although, I may not be competent to make one, but I have tried to prepare one. It is something I cannot deny that help me see the IT status of our organization. The actual experience I have during laboratory activities opened an opportunity for me to try and learn how to use applications I was not familiar. Managers must have a deeper understanding of the strategic mission and vision for IT project of the organization.

Implementing an IT project has a rise and fall, thus as manager I must be prepared for it. Based on Murphy’s law “Things will go wrong, and at the worst possible time”. Managers must take the risk and project manager must be able to prepare for the worst to come in line with IT projects. Thus, a rigorous effort to identify all risks associated with the IT project must be done by the project manager and the best way to do this is to develop a backup plan.

I have also learned reasons for outsourcing and issues associated with outsourcing such as quality problems, legal issues, negative impact on customer relationships and satisfaction, data security and integrity issues. I have also learned what to outsource and how to establishing a “Smart” outsourcing strategy.

I was made to understand IT governance specifically on the its primary goals. I have learned that there should be a balance between the value and the risk brought about by IT project. I also learned whose responsible for decision-making and implementation of IT projects.

Now, I that I am aware of the different collaborative tools, it can be helpful in achieving the organizational goals and objectives. This are very helpful and strengthening what we know and experience the comfort it can provide us. From entertainment, health, family life and many others.
Through my subject MIS, I got an idea on knowledge management. Knowledge management involves creating value from an organization’s intellectual assets through codifying what employees, suppliers, business partners and customers know and then sharing that information with employees and even with other companies to devise best practices. It has the purpose of improving the creation, retention, sharing and reuse of knowledge. The unforgettable thought I learned from knowledge management is that “The right people leaves and the wrong people can ruin a supply chain”. With this, it is important that before a person retire, the tacit knowledge has been cloned to somebody who will take over the one who leaves.

The ethics and privacy issues related to social media have thought me to be a responsible user of social media. I realized that I can maintain professionalism on the way I express my thought and influence others on what I believe is right. I won’t use IT to ruin lives of others as well as bring reputation of others at stake.

What I learned through the subject can truly be helpful for me especially in using IT to maximize my potential and to develop others to achieve goals in life as well as participate in achieving the goals of the organization I am currently employed.

Admittedly, the course was very demanding especially now that the pressure in my work is heavy. Enrolling MIS is worth the sacrifice waking at 4:30, travelling at 5:30 and arriving in school at 7, and a times taking exams without studying and getting a low score.

With all this mind, IT really matters to me

Image

Social Media

Social media can either built or break an individual. However, responsible use of social media can be very useful for personal growth and professional development of an individual.

I am not a powerful user of social media. I find it time-consuming and I can can’t afford to waste my time being online. However, I can’t deny the fact that social media plays an important role in my personal growth and development. Through social media I have gain friends and have constant relatives and loved ones. In fact, through social media I have reunited with my nephew and my niece whom I have not seen for 15 years. Having no communication for the past years, social media served as a venue for us.

Through social media, I can read educational materials and subscribe to programs that can help me learn new information and approaches to address health concerns. Health programs are readily available through social media.

We can share information on topics that are of common interests to us. We can also exchange ideas and have meaningful conversations. You can read inspirational message that will serve as a guiding light to live our lives to the fullest.

Social media–facilitated idea sharing and online personal learning networks. We can form groups and exchange ideas that will facilitate learning. Assignments can be uploaded and shared online. The more we share our ideas the more we get insights on the topic we want to learn. Educational information can be accessible anytime and anywhere. You can connect and gain brightest ideas and insights from others in a cost-effective way.

As a responsible user of social media, I will:

  • be responsible for whatever I post. I will never post information that will solicit negative reaction from my friend resulting to damage reputation of others
  • be cautious in posting pictures that will offend others instead post inspiring quotes that will lighten the burdens of others
  • exercise best judgement before I react to what have been posted in the social media
  • maintain professionalism on the kind of language I am going to use. Never will I use foul word in my comments
  • keep my personal information

Software Piracy

Punishment is not effective way to stop piracy, thus software companies must think of other creative ways to combat piracy. Among the options could be the following:
Instead of pushing the government to run after piracy, request the government offices to have inventory of unlicensed software. After having a data on the number of unlicensed software, the government must negotiate from legal vendor for a good package or reasonable discount. We cannot deny the fact that some government agencies are using counterfeit software. With limited government funds for IT, some may be tempted to use pirated software to save on cost not considering the moral aspect.
Negotiate with the government for tax exemption for distribution of the licensed. Removing or lowering the tax will have a domino effect on the cost of the license. If the cost of the license is not expensive, citizens with lesser income can afford to buy license software
Provide larger companies who purchase volume of legal MS Office bigger discounts. Although the cost may be lower but because they purchase in volume, suppliers can have a margin.
Provide stronger security measure for the use of the software. For instance, the Microsoft producers must collaborate with internet provider to require license number before they can have access. Lower cost cannot compensate functionality.
Buying of license software must require one time registration. Then, a database of the licensed software buyer must be maintained and issued a unique password that will be require when trying to access internet connection. Those having no license cannot access, thus having a pirated software can have a limited use. Further, distribution of software should be regulated.
Above all, values formation must be part of their program to uphold the moral of the consumers.

Knowledge Management

Knowledge management can be very useful in the success of an organization. This will help retain the best practices of the organization and promote quality of service to its client.
Knowledge management can help our organization to be more efficient. This may be difficult to start but it will increase productivity. For instance lesser time will be spent to search files if KM is in place
Our organization can benefit from knowledge management in the retention of valuable employees and passing through the knowledge before they left from service just like retirement. KM is an to opportunity to adapt and do great things
Through KM routine tasks are made easier since information is easily shared between staff members, and that knowledge isn’t lost if someone goes on vacation, gets sick, or leaves the company. Before an employee separate from service, she has already passed the skills required to perform the job that will be left, thus the services continuous despite separation of employee from service. Monopoly of knowledge can be eliminated, thus no one can boast that he is indispensable in the organization.
Knowledge management gives staff members the knowledge they need to do their jobs better. This makes them more productive. Because ideas can be shared easily, knowledge management may also increase innovation and help create better customer relationships. And if the company has a global team, knowledge management can create a more powerful workforce when all of those different cultures are brought together to share assets.

Implementing KM is not that easy. There are barrier that must be overcome. These are:

1. Resistance to change
Properly managing knowledge may require changes or a complete revamp of on the organizational culture. Overcoming resistance to change can be a painful and lengthy process. Oftentimes this happened because employees have not understood the entire project. Thus it is important that it understood by the employees who will be involved by inviting leaders involved early on to champion the initiative, and communicate as much as possible with your people to ease their fears. The more you talk about the change and the more you involve your colleagues, the less scary it becomes.
2. Misconception about KM and IT project.
Organization sometimes successful in KM projects, however, on the latter it seems that the KM project has turned to totally IT project. Thus, there will be hesitation among employees to engage in the project. KM works when it is focussed on focus on establishing a simple process that’s embraced by everyone – it’s not about turning the whole endeavour into a costly IT project.
3. Ruining KM with a bad tool
Once you start sharing knowledge often and with many players, it’s probably best to get a real tool that will suit your needs. Involve people in the selection process to ease adoption and try to not set your sights on some horrible piece of software straight out of 1998 that nobody wants to use. Outdated tools are great to hold outdated knowledge.
4. Lack of Accessibility
KM is most useful if knowledge is available exactly when needed. Make knowledge accessible anywhere, anytime. Ensure access to your knowledge is convenient and simple or your people will give up very quickly, thus effectively killing your KM initiative.

Knowledge is Power but Knowledge sharing is Empowering

Knowledge in a powerful tool in an organization. If it not shared, possessing such knowledge is futile. It can’t be utilize by an organization for various processes that will improve current status of the organization. However, if it shared it will result to improved processes that will result to recognition of the organization for the valuable contribution for the success of the organization. It will give the person who shared the knowledge the authority and respect among members of the organization.

Business Intelligence

Business Intelligence(BI) is an important tool in the organization. It facilitates fast and reliable data generation that aids decision making of managers to achieve organizational goals.

We can encourage employees to get involved in Business Intelligence by explaining to the employees what business intelligence is and its importance in the operation of the organization. After they have understood the importance of BI, get the employee involved in the planning process. Include in the planning process attractive compensation for employees involved in the implementation of BI. Giving of incentive for a successful implementation of BI using BI tools. Explaining the benefit of embracing/accommodating BI tools. Lessen the workload for those who use BI. With BI, there will be improved efficiency and efficacy delivery of services, data generation becomes accurate and reliable.

Giving of reward motivates the employee, thus reward program is more appropriate than punitive program. Employees respond more on reward than punishment. Punishment for not engaging in business intelligence tool will result to lip service. An employee who does her work not because of punishment is more effective. We also have to consider that in business intelligence, garbage in, garbage out. Employee who are not motivated commit more mistakes than those who are highly motivated.

Punishment is no longer effective in the implementation of BI for mature employees. Mature employees know their rights and existing duties and responsibilities, so they consider BI as an additional workload for them and they have their right to refuse.

Online Shopping, Convenience for Customers (5th Blog)

In this internet generation, convenience is one of the considerations of the customers to avail of services. Thus, shopping online gains popularity because of the convenience it can provide to customers. Through online shopping, customers need not leave their home to buy items they need or they want. They can save time, effort and money. If they opt to do shopping online, they need not go to the malls, experience traffic congestion and long time waiting in the cashier to pay for the items they want to buy. The items they bought online will be delivered right at their door step. They can also choose a range of prices they want to buy on line. Further, they can also avoid air borne diseases and heat stroke that can be acquired in a crowded and high temperature urban areas while doing the shopping.
However, they are also inconvenience in online shopping. If you are shopping on malls, you can immediately exchange items if the size doesn’t fit you right and items with defective part without paying the courier service. Prices in small business centers can be negotiated whereas the cost in shopping online is fix. Items sold online can’t be touched, smelled, tasted, tried or test-driven. The picture of the items may not be exactly the same with what you are expecting. Whereas, if you do actual shopping you can feel, try and check on the quality of the products you are buying. For example, you are buying a dress. When the dress was delivered, the size doesn’t fit you right. What you need to do is to request for the replacement. You have to sent it back, request for a different size and wait until the replacement will be delivered.
The following are the products we can purchase online without hesitation:

1. Fashion (clothing, shoes and accessories). These are products that can be accurately described with a written description and photographs. This makes it simple for potential customers to see what they are buying without having to touch and try it on. For example, clothing stores provide a standard sizing chart for each brand of clothing they sell. This makes it easier to decide if an item will fit properly.
2. Electronics/gadgets. A vivid description and the brand of the gadget will give you an idea that the product is of good quality or not. These are small items that can be easily shipped.
3. Books. It contains the title, author, edition and publisher. You will really get exactly what you buy online without compromise.

There also products that you really have to think before you decide to buy online. These are:

1. Foods. Foods have expiry date and it might be contaminated especially if the temperature is poorly maintained
2. Jewelry. Although fashion accessories can be bought online, you will really think twice before buying it online because you cannot try it. The cost is expensive and you won’t take the risk of losing big amount of money for an items you have not actually seen.

Therefore think about this, convenience is good, however, never compromise the risks for convenience sake.

Online Shopping, Convenience for Customers (5th Blog)

In this internet generation, convenience is one of the considerations of the customers to avail of services. Thus, shopping online gains popularity because of the convenience it can provide to customers. Through online shopping, customers need not leave their home to buy items they need or they want. They can save time, effort and money. If they opt to do shopping online, they need not go to the malls, experience traffic congestion and long time waiting in the cashier to pay for the items they want to buy. The items they bought online will be delivered right at their door step. They can also choose a range of prices they want to buy on line. Further, they can also avoid air borne diseases and heat stroke that can be acquired in a crowded and high temperature urban areas while doing the shopping.
However, they are also inconvenience in online shopping. If you are shopping on malls, you can immediately exchange items if the size doesn’t fit you right and items with defective part without paying the courier service. Prices in small business centers can be negotiated whereas the cost in shopping online is fix. Items sold online can’t be touched, smelled, tasted, tried or test-driven. The picture of the items may not be exactly the same with what you are expecting. Whereas, if you do actual shopping you can feel, try and check on the quality of the products you are buying. For example, you are buying a dress. When the dress was delivered, the size doesn’t fit you right. What you need to do is to request for the replacement. You have to sent it back, request for a different size and wait until the replacement will be delivered.
The following are the products we can purchase online without hesitation:

1. Fashion (clothing, shoes and accessories). These are products that can be accurately described with a written description and photographs. This makes it simple for potential customers to see what they are buying without having to touch and try it on. For example, clothing stores provide a standard sizing chart for each brand of clothing they sell. This makes it easier to decide if an item will fit properly.
2. Electronics/gadgets. A vivid description and the brand of the gadget will give you an idea that the product is of good quality or not. These are small items that can be easily shipped.
3. Books. It contains the title, author, edition and publisher. You will really get exactly what you buy online without compromise.

There also products that you really have to think before you decide to buy online. These are:

1. Foods. Foods have expiry date and it might be contaminated especially if the temperature is poorly maintained
2. Jewelry. Although fashion accessories can be bought online, you will really think twice before buying it online because you cannot try it. The cost is expensive and you won’t take the risk of losing big amount of money for an items you have not actually seen.

Therefore think about this, convenience is good, however, never compromise the risks for convenience sake.

Wireless Network Technolgies Opportunities (4th Blog)

There are a lot of opportunities brought about by wireless technologies. One of the opportunities is communication. Communication, specifically mobile communication provides a cheaper and accessible communications with our loved ones away from home. We can talk to them face to face because of wireless communication. We are not limited to the four corners of the room to reach our family. With one peso you can send special message and show them how much you care. Mobile communication also provide safety because of embedded features such as the alarm notification.
Saving on time through wireless technologies. There is no need to go to the bank and shopping mall to transact. Online banking and shopping are readily available. There is no need to travel and waste time passing through traffic congested streets to pay bills and purchase items. With just a few steps, you can get what you want.
Online programs and information are accessible whenever needed. Like to instance, the statistical tools for research. In the past, you need to conduct survey and tally all the responses get the result. At this time, you only need to input the data and click. Bravo! You get the result with explanation. Surveys can be conducted online, leading to a be paperless processes.
Request for data can be gathered and finalized in a shorter period of time. You can send a single request to various offices and obtain data needed without leaving your work station. What you need to do is send a form for the units to fill up. After it has been filled up, simply sort the data and finalized.
Wireless communication among various units of an organization is very helpful because it is time saving and less expenses. All units of an organization can access the data at the same time. Miscommunication can also be avoided because similar information can be transmitted to various units of the organization. Further, Employees of an organization will get first hand information from the administration. An example of this is the use of info board wherein all announcement of the organization can reach mobile unit of employees.
In order to provide safety among wireless users, a password should be required. This password must be change regularly. In other words, password will also have an expiry if not being used.
For mobile network users, mobile sim card registration must be required for security purposes. Criminals can be traced by means of the sim card they are using. Second, presentation of two valid identification card when purchasing a sim card. third, registration of unit and user/mobile unit’s sim card prior to issuance of password. Finally, filtering of websites that the employees can access. Filtering the website accessible to employees will help limit the use wireless network connection among employees of the organization. this a way of saving the resources of the organization and protecting the employee from harmful influence.

Wireless Network Technologies Opportunities (4th Blog)

There are a lot of opportunities brought about by wireless technologies. One of the opportunities is communication. Communication, specifically mobile communication provides a cheaper and accessible communications with our loved ones away from home. We can talk to them face to face because of wireless communication. We are not limited to the four corners of the room to reach our family. With one peso you can send special message and show them how much you care. Mobile communication also provide safety because of embedded features such as the alarm notification.
Saving on time through wireless technologies. There is no need to go to the bank and shopping mall to transact. Online banking and shopping are readily available. There is no need to travel and waste time passing through traffic congested streets to pay bills and purchase items. With just a few steps, you can get what you want.
Online programs and information are accessible whenever needed. Like to instance, the statistical tools for research. In the past, you need to conduct survey and tally all the responses get the result. At this time, you only need to input the data and click. Bravo! You get the result with explanation. Surveys can be conducted online, leading to a be paperless processes.
Request for data can be gathered and finalized in a shorter period of time. You can send a single request to various offices and obtain data needed without leaving your work station. What you need to do is send a form for the units to fill up. After it has been filled up, simply sort the data and finalized.
Wireless communication among various units of an organization is very helpful because it is time saving and less expenses. All units of an organization can access the data at the same time. Miscommunication can also be avoided because similar information can be transmitted to various units of the organization. Further, Employees of an organization will get first hand information from the administration. An example of this is the use of info board wherein all announcement of the organization can reach mobile unit of employees.
In order to provide safety among wireless users, a password should be required. This password must be change regularly. In other words, password will also have an expiry if not being used.
For mobile network users, mobile sim card registration must be required for security purposes. Criminals can be traced by means of the sim card they are using. Second, presentation of two valid identification card when purchasing a sim card. third, registration of unit and user/mobile unit’s sim card prior to issuance of password. Finally, filtering of websites that the employees can access. Filtering the website accessible to employees will help limit the use wireless network connection among employees of the organization. this a way of saving the resources of the organization and protecting the employee from harmful influence.

Outsourcing IT Security

Outsourcing has gain its popularity nowadays. Many companies and agencies engaged in outsourcing to save on cost and establish linkage with other agencies. However, this venture also post risk on the agency specifically on the security aspect.

IT security should not be outsource for the following reasons. One is the conflicting interest between the outsourcer and outsourcee. Although privacy is being considered prior to commitment to engage in outsourcing, outsourcers may be tempted to break the rules when there is a better offer from other organization. Thus, maintaining confidentiality is at stake. Second, if T security is being outsource, the organization will lost control over security matter. The organization will be totally dependent on the outsourcer. Should there be problems pertaining to security, manager of the organization cannot act immediately unless it has consulted the IT expert of the outsourcer. Outsourcee will also be subject to threat. The organization will have to give in otherwise, confidentiality of information will be taken for granted.

In case there is really a need to outsource, security features should be strictly considered in order to maintain the confidentiality of information been the two organization. The outsourcee (oraganization) should indicate in the agreement the ownership over IT security program of the organization upon installation of the software. Should there be leakage on the information of the agency, the outsourcers should be totally liable. Further, once installed, system developed specifically for IT should no longer be used by other organization. Ownership over the IT security should be managed by the IT expert of the organization rather than the IT expert of the outsourcer.

 There is nothing wrong with outsourcing, however, security features should carefully studied to avoid problems on security.