logo

Information System Risk and Technology

   

Added on  2022-10-19

11 Pages2729 Words93 Views
 | 
 | 
 | 
Running head: INFORMATION SYSTEM RISK AND TECHNOLOGY
INFORMATION SYSTEM RISK AND TECHNOLOGY
Name of the Student
Name of the university
Author note
Information System Risk and Technology_1

1INFORMATION SYSTEM RISK AND TECHNOLOGY
Table of Contents
Purpose of the report..................................................................................................................3
Value Creation Activities of CoM.............................................................................................3
Key roles and responsibilities....................................................................................................4
Information assets......................................................................................................................6
Identified risks to CoM’s important information asset..............................................................7
Likelihood and impact analyses for CoM’s significant risks.....................................................8
Conclusion..................................................................................................................................9
Information System Risk and Technology_2

2INFORMATION SYSTEM RISK AND TECHNOLOGY
Purpose of the report
The report focuses on the risks associated with Information Systems and Security.
The Case Study that will be referred to is that of the City of Melbourne (CoM). CoM is
inspecting on the applications of digital technology in its region. The process has been
initiated by organizing an event called CoM connect that has brought together thinkers,
technologists, urbanists, community leaders, designers and makers to provide their reviews
on the topic. Melbourne city encompasses land area of 36sqkm. The Annual Plan and Budget
mentions the priorities of the Council relating to capital, maintenance and operating programs
in the year 2012-2013. As per the Budget, investment to be done on infrastructure is $110
million and on community service is $365. The main objective of this report is to carry out
the risk assessment audit for the charity.
Value Creation Activities of CoM
CoM actively participates in marketing activities so that its target markets could be
expanded. Social media platforms have been used for web-marketing strategy launching
appeals from the website. Some specific users of social networking sites have been targeted
by the help of web-ad agency launched by CoM. The profile of CoM in social media has been
increasing since its launch and thus the serves as the best platform to create value. A web-
marketing and web-hosting company assists CoM in web-related infrastructures. CoM
launches “knock-on-doors” appeal sending volunteers to communicate with householders and
public to request donations from the society. The donors have the provision to talk to CoM
representatives to make donations using the credit card. Credit card payment facility is a good
strategy to create value and this has contributed almost 80% of the funding of CoM previous
year. The web-initiative taken by CoM allows web-based transactions and it plans to
introduce micro-donation via the social media. It needs to abide by PCIDSS to carry on with
Information System Risk and Technology_3

3INFORMATION SYSTEM RISK AND TECHNOLOGY
credit card transactions. The CoM officers handling operations in different parts of the
country are provided with communication devices which include smart phones, satellite
phones and laptop. These are distributed to the local or regional staffs and these staffs have to
report to the regional office on a periodic basis to provide updates relating to Community
Development Authority (CDA), team, communities and themselves. The charter of CoM lays
stress on caring for the ones working for its projects. CoM had allowed its staffs to carry their
own communication devices so that they can work on devices they are familiar with. CoM
understands that the people giving donations want to know how the money they are donating
is being used and thus it had recognized that greater level of transparency and accountability
needs to be introduced in their work.
In situations where the staffs are allowed to bring their own devices gives rise to
operational issues such as compatibility issue that might be the staff is working with a certain
file format and has sent the file to the other staffs without converting it to appropriate format.
Malicious codes introduced in the office systems affected the local operations and the
headquarters have already witnessed disruptions in their work due to this (Senft, Gallegos and
Davis 2016). The web-hosting company which helps the CoM with the website also manages
its payment gateways and customers data. This can be a risk as these are providing services at
low cost or for free so it can be that the customers data is misused in the long run.
Key roles and responsibilities
In a risk management plan four important roles can be identified which are as follows:
1) Anyone who is associated with the project- This includes the staffs of CoM, the project
consultants, suppliers, subcontractors and anyone from the CoM who are related with the
project. To assess risks in a project, the stakeholders can be participants in risk identification.
The stakeholders can notify the project managers if they find out risks in the project
(Hoffmann, Kiedrowicz and Stanik 2016). The stakeholders in this case are CoM staffs and
Information System Risk and Technology_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
RISK ASSESMENT 12 12 RISK ASSESMENT Author Notes
|14
|2919
|12

The CoM City of Melbourne Case Study 2022
|15
|3462
|29

Equifax Data Breach: Incident Report and Analysis
|13
|4146
|67

E-Commerce Assignment: Innovation in Mobile
|11
|2843
|292

ICT Management in Mall Bank: Strategies and Implementation
|9
|2228
|172

Study Material on Bitcoin, M-commerce, Disruptive Technology and Digital Marketing
|6
|1052
|157