logo

Information Systems Management and Strategy Assignment 2022

   

Added on  2022-10-02

5 Pages1093 Words21 Views
 | 
 | 
 | 
Running head: INFORMATION SYSTEMS MANAGEMENT AND STRATEGY
Information Systems Management and Strategy
Name of the Student:
Name of the University:
Information Systems Management and Strategy Assignment 2022_1

1INFORMATION SYSTEMS MANAGEMENT AND STRATEGY
Challenges in the management of information systems
The frequent growth of Information Technology (IT) application and its considerable
effect on enhancing public and private organizations productivity globally, different types of
Information Systems are used. The case scenario of good city council car park system identifies
detail operational system, process followed to entering to the car parking lot, payment process,
leaving car parking area and security visit recording process. The potential ethical challenges in
managing Information system are elaborated in the below section:
The first ethical challenge that the Good City Council Car Park System may face is issues
with data protection. The entire car parking process is available for two types of customers:
ordinary customers and season ticket holders. The ordinary customers pay only when use the
services on the other hand, the season ticket holders pay a specific amount for the time slot of
either 3, 6 or 12 months. The availability of vacant places in the car parking slots are known to
the users as soon as they press the button in the control pillar. The users may not have enough
information, knowledge and ideas regarding the needs and IT application. The designer may fail
to understand details of the IT applications conducting in the Car parking lot. If enough
information is not available regarding season ticket holders and ordinary customers then the
process may fail to provide expected parking facilities to the customers.
The payment date, payment time and other details of the customers are stored in the
server. If the server is found to be not enough secured from the security perspective then data
may be hijacked and misused by external attackers. The tickets give to the customer hold
addresses, name and other details which must not disclosed. If proper encryption security
measures are not taken by system owners then data will be lost and misused as well. It is a
Information Systems Management and Strategy Assignment 2022_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents