Analysis of Information Systems and Security at Lambton College

Verified

Added on  2020/04/13

|5
|320
|58
Report
AI Summary
This report examines the information systems at Lambton College, focusing on its organizational structure and security measures. The report begins by identifying the college's flat organizational structure and explains its components, including employees, procedures, data, software, and hardware. It also includes an organizational chart illustrating the college's structure. Furthermore, the report discusses the importance of information security and includes references to relevant academic sources such as Ashkenas et al. (2015), Laudon & Laudon (2015), and Peppard & Ward (2016). The report also includes a section on designing an information security awareness poster.
Document Page
Running head: INFORMATION SYSTEMS
Information systems
Name of the student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1INFORMATION SYSTEMS
Answer to question 1: Define the sort of organization is Lambton College in Mississauga
The Lambton College in Mississauga has a flat organization structure. A flat
organizational structure has no middle layers of management whereas a hierarchical organization
consists of layered management structure which represents a pyramid (Ashkenas et al., 2015).
This can be seen from the components of the traditional system of the college. The major
components are the people in the college comprising of employees and non-employees,
procedures, information data, software and hardware (Principles of Information Security, Fifth
Edition, 2017). Along with this, the network components are also included in the main
components of the college. Thus, the organizational structure is considered to be of flat model to
support these components.
Document Page
2INFORMATION SYSTEMS
Answer to question 2: Organizational chart for Lambton College
Figure 1: Organizational chart
(Source: Created by the author)
College head
Manager
trusted
employees and
staffs
Visitors
Chief security
officer
Senior software
manager
Senior hardware
manager
Data controller
Network
adminsitrator
Policy
administrator
IT and business
standards
implementor
Document Page
3INFORMATION SYSTEMS
Answer to question 3. Designing an information security awareness poster
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4INFORMATION SYSTEMS
References:
Ashkenas, R., Ulrich, D., Jick, T., & Kerr, S. (2015). The boundaryless organization: Breaking
the chains of organizational structure. John Wiley & Sons.
Laudon, K. C., & Laudon, J. P. (2015). Management Information Systems: Managing the Digital
Firm Plus MyMISLab with Pearson eText--Access Card Package. Prentice Hall Press.
Peppard, J., & Ward, J. (2016). The strategic management of information systems: Building a
digital strategy. John Wiley & Sons.
Principles of Information Security, Fifth Edition. (2017). Retrieved from
http://1857955_257717431_5-ISN1003Ch05RiskManagement-Co.pdf
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]