Findings on absence of IT governance in a small enterprise
1. No, the host company Phoenix technology does not have the place in the formal IT Governance network. The Phoenix technology is the small ITindustry that provide the network security tools to the online business sectors. The company has the strength with less than 500 employees.Having the intranet does not state the company has been following the IT governance(Olutoyin and Flowerday2016.). The company has less than 200 employees. The IT governance is quite limited in the small enterprise in the company. This is due to the limited resources in the small business; the company might face some financial setbacks in implementing the IT governance in the company. In order to imply the IT governance framework in the company the following characteristics are needed to be implement in the firm.
- The company would have to provide3 provision for business without any higher authority structures namely board of the directors.
- The plans made under this governance must be done under the provided limited resources.
- The framework should not be prone to the problems of IT jargon and the framework should be understandable to all the people belonging to the organisation.
- The framework that has to be implemented should be easy and simple to implement
- The framework implemented should be cost effective
The framework should be made in context of the preinstalled software packages like spreadsheets, word processors, email, MS office tool kits, data management kits.
2. As an intern in the Phoenix technology, I have not experienced any case where I had to use the Australian standard to fulfill the ICT task (Hillson and David,2017).. The ICT might need help of the Australian standard in decision making while doing an IT project. The requirements, the decision have involved in the case of the It projects are due to business disruption, unacceptable cost or any mitigation risk is taken under the Australian standard. The Australian standard makes sure that there is a proper work delivered by the developer to the customer. Suppose if I have been given a task for the development of Network security software. Under the Australian standard, I will make sure that there is It project has met the objective set by the client, it is understandable, it could. The software might be followed under the data protection act. The quality of the software will tested and implemented under the Australian Standard of IT governance (Bergeron et al. 2015).The Australian standard will provide me the way to deliver the effective, efficient methods so that the project seemed to be acceptable to the client. The Australian standard helps in careful planning of the project and help setting the ethical rules for the increasing the productivity of the organization. Under the Australian act, the demonstration of the prototype is primarily done in order to ensure the quality of the project. As an intern in order to fulfil, the IT task this set of formal rules will help me in creating the quality projects that could meet the objectives.
3. In the course of work that has been personally experienced, there has been an incidence where there has been an Australian Standard followed for the completion of an ICT task. The development of a software for an online music portal has been considered which followed the Australian Legal Standards for completion while there had been contents present in the software that were developed with ideas referenced from a source where an original developer had implemented these ideas before. The idea was to develop the software, but the contents would be derived from external sources. The music that was present in the software were produced and developed by different derived sources, which were given proper credit for fulfilling all the legalized documentations and other legalities as per the Australian Intellectual Property Law. This has been a credit for the organization which initiated the idea as the entire software had the legal rights of playing all the music and audio clips in the software, with due property rights paid to the reference from where the audio has been sourced from. This way, the software rights for intellectual property was not violated as per the Australian Intellectual Property Rights, and the software development method fulfilled the progression of the project.
4.i. In the task where the project team is developing an app for iOs, Android, and Windows phones, the development team lead identifies a risk with the Windows phones. The team was found to have little experience with the Windows mobile operating system and the operating system of Windows is not capable of performing many of the required functions without using commercial plugins and APIs. This is why the company decided on removing Windows compatibility from the project. This process is known as Avoidance as a risk treatment method. This is where the risk factor is completely removed from the system.
ii. If during the entire process, a risk is identified that is unavoidable, the risk treatment factor that should be followed is the Acceptance policy. Acceptance tends to accept the risk factor and continues to mitigate the additional risks that creep up due to the unavoidable risk factor within the system.
Examples of Australian standards and legislation being followed
iii. Yes, this is an example of transference where the entire problem or the risk factor is transferred from the source to the third party. The Specialist knowledge shifts departments which is the main criteria of the risk treatment factor being a transference process.
iv. The main difference between the risk processes of Avoidance and Acceptance is that the factor due to which risk is detected in the system is entirely removed from the system or process in the project in avoidance method. On the other hand, acceptance tends to accept the risk factor and continues to mitigate the additional risks that creep up due to the unavoidable risk factor within the system.
5.
- Blind or visually impaired clients
Implementing audio bots within the entire software system would help the blind or visually impaired client to browse the software.
- Clients with limited or poor hand coordination
Use of key board shortcuts that would aid the navigation process would help in the browsing of the software for limited or poor hand coordination people.
6. The following are ways by which in which an organisation can use ICT to reduce your carbon footprint, and contribute to Green ICT:
- Turning off PCs when not in use: This is a way by which if both the monitor and CPU are left on for 8 hours according to the average workday, five days a week, in a month up to 58 kWh could be used. This way, the energy can be saved and it would enhance the power consumption rate in the organization. As an individual as well, it can be justified to implement this way as it would also be a good practice to make the energy consumptions less in every area also.
- Limit the use of screensavers: Although screensavers are a way to personalize your PC, when they are triggered, they can keep the both the computer and monitor active. No power savings are realized. However, some might contend that having a screensaver shields the images on their computer screens from prying eyes.
- Use greener equipment: There is a direct relationship between the equipment used and power consumed. For example laptops are considerably more efficient than desktop computer systems. However, laptops tend to be more expensive than desktops and generally, they need to be replaced more often than desktops, which can be more easily upgraded or have parts replaced.
7.
- Building a computer, on a production line of identical computers
Thisis a process as the primary criteria of a process are that the execution of a particular deliverable would have no end and no specific completion. Since the production of the computer is not the only one in line and the company under which the manufacturing of the computer is ongoing has to produce numerous identical computers. The deliverable would not have a fixed time and it would require that it would go on producing as many computers it can. Thus it can be regarded as a process, rather than a project.
- Building a house, as one of a series of identical houses all over Australia
This is also a process, since the building of the house is not a task that would have a limited time to get completed and it the company is in line for producing identical houses all over Australia. The entire task for the company is not dependant on time, unlike a project, and the entire building development would not stop with the single house. Therefore, the entire work progression denotes that this is a process.
- Upgrading a computer from Windows 7 to Windows 10
The upgrading of one computer from Windows 7 to Windows 10 is a deliverable that has an end time and there is no scope of reoccurrence of the same deliverable over a period of time. Thus this particular task can be termed as a project rather than a process, where a single computer would have its operating system upgraded from Windows 7 to Windows 10 and the task would end there. Thus, this is a project rather than a process.
- Upgrading all 120 computers from Windows 7 to Windows 10
When a computer is upgraded from Windows 7 to Windows 10, it is termed as a project since it has a set goal that has a end point when the upgradation is complete. When a series of computer is doing the same task, it can also be said that it is a project than being a process since may how many computers are involved in the project, it would still be a process as the work would come to a completion when the last computer is upgraded to Windows 10.
References
Bergeron, F., Croteau, A.M., Uwizeyemungu, S. and Raymond, L., 2015, January. IT Governance Theories and the Reality of SMEs: Bridging the Gap. In System Sciences (HICSS), 2015 48th Hawaii International Conference on (pp. 4544-4553). IEEE.
Hillson, David. Managing risk in projects. Routledge, 2017.
Olutoyin, O. and Flowerday, S., 2016. Successful IT governance in SMES: an application of the Technology-Organisation-Environment theory. South African Journal of Information Management, 18(1), pp.1-8.