Analyzing IT Governance, Risk, and Compliance in ICT Projects
VerifiedAdded on 2023/05/31
|9
|2305
|495
Homework Assignment
AI Summary
This assignment delves into various aspects of Information and Communication Technology (ICT) within a business context. It examines the presence of a formal IT Governance framework within a host company, highlighting the characteristics needed for effective implementation, such as alignment with business objectives and cost-effectiveness. The assignment also explores the application of Australian Standards in fulfilling ICT tasks, emphasizing their role in ensuring project objectives are met, data protection is maintained, and software quality is assured. Furthermore, it addresses compliance with Australian legislation, particularly intellectual property law, in software development. The document also discusses risk treatment methods like avoidance and acceptance, illustrating their application with practical examples. Finally, the assignment touches upon designing software for clients with disabilities and strategies for reducing carbon footprint through Green ICT practices, alongside differentiating between projects and processes in an IT context. Desklib offers this document as part of its collection of student-contributed assignments.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head: INFORMATION AND COMMUNICATION TECHNOLOGY
Information and Communication Technology
Name of the Student
Name of the University
Author Note
Information and Communication Technology
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1INFORMATION AND COMMUNICATION TECHNOLOGY
Question 1
Does your host company have in place a formal IT Governance framework? Some clues as
to its existence might be that there is a Corporate Governance or IT Governance policy
document; the corporate intranet might contain references to governance. Structures may
exist, at higher levels that are the decision making bodies and which control activities in the
company for all levels through delegated authority.
No, the host company Phoenix technology does not have the place in the formal IT
Governance network. The Phoenix technology is the small ITindustry that provide the network
security tools to the online business sectors. The company has the strength with less than 500
employees.Having the intranet does not state the company has been following the IT
governance(Olutoyin and Flowerday2016.). The company has less than 200 employees. The IT
governance is quite limited in the small enterprise in the company. This is due to the limited
resources in the small business; the company might face some financial setbacks in
implementing the IT governance in the company. In order to imply the IT governance framework
in the company the following characteristics are needed to be implement in the firm.
1. The company would have to provide3 provision for business without any higher
authority structures namely board of the directors.
2. The plans made under this governance must be done under the provided limited
resources.
3. The framework should not be prone to the problems of IT jargon and the framework
should be understandable to all the people belonging to the organisation.
4. The framework that has to be implemented should be easy and simple to implement
5. The framework implemented should be cost effective
Question 1
Does your host company have in place a formal IT Governance framework? Some clues as
to its existence might be that there is a Corporate Governance or IT Governance policy
document; the corporate intranet might contain references to governance. Structures may
exist, at higher levels that are the decision making bodies and which control activities in the
company for all levels through delegated authority.
No, the host company Phoenix technology does not have the place in the formal IT
Governance network. The Phoenix technology is the small ITindustry that provide the network
security tools to the online business sectors. The company has the strength with less than 500
employees.Having the intranet does not state the company has been following the IT
governance(Olutoyin and Flowerday2016.). The company has less than 200 employees. The IT
governance is quite limited in the small enterprise in the company. This is due to the limited
resources in the small business; the company might face some financial setbacks in
implementing the IT governance in the company. In order to imply the IT governance framework
in the company the following characteristics are needed to be implement in the firm.
1. The company would have to provide3 provision for business without any higher
authority structures namely board of the directors.
2. The plans made under this governance must be done under the provided limited
resources.
3. The framework should not be prone to the problems of IT jargon and the framework
should be understandable to all the people belonging to the organisation.
4. The framework that has to be implemented should be easy and simple to implement
5. The framework implemented should be cost effective

2INFORMATION AND COMMUNICATION TECHNOLOGY
The framework should be made in context of the preinstalled software packages like
spreadsheets, word processors, email, MS office tool kits, data management kits.
Question 2
Describe a situation in your internship, or previous work, where you have taken account of
an Australian Standard in fulfilling your ICT task, and why. If you have not already
experienced such situation, describe a situation in your internship where you will need to
take account of an Australian standard in fulfilling your ICT task, and why.
As an intern in the Phoenix technology, I have not experienced any case where I had to
use the Australian standard to fulfill the ICT task (Hillson and David,2017).. The ICT might need
help of the Australian standard in decision making while doing an IT project. The requirements,
the decision have involved in the case of the It projects are due to business disruption,
unacceptable cost or any mitigation risk is taken under the Australian standard. The Australian
standard makes sure that there is a proper work delivered by the developer to the customer.
Suppose if I have been given a task for the development of Network security software. Under the
Australian standard, I will make sure that there is It project has met the objective set by the
client, it is understandable, it could. The software might be followed under the data protection
act. The quality of the software will tested and implemented under the Australian Standard of IT
governance (Bergeron et al. 2015).The Australian standard will provide me the way to deliver
the effective, efficient methods so that the project seemed to be acceptable to the client. The
Australian standard helps in careful planning of the project and help setting the ethical rules for
the increasing the productivity of the organization. Under the Australian act, the demonstration
of the prototype is primarily done in order to ensure the quality of the project. As an intern in
The framework should be made in context of the preinstalled software packages like
spreadsheets, word processors, email, MS office tool kits, data management kits.
Question 2
Describe a situation in your internship, or previous work, where you have taken account of
an Australian Standard in fulfilling your ICT task, and why. If you have not already
experienced such situation, describe a situation in your internship where you will need to
take account of an Australian standard in fulfilling your ICT task, and why.
As an intern in the Phoenix technology, I have not experienced any case where I had to
use the Australian standard to fulfill the ICT task (Hillson and David,2017).. The ICT might need
help of the Australian standard in decision making while doing an IT project. The requirements,
the decision have involved in the case of the It projects are due to business disruption,
unacceptable cost or any mitigation risk is taken under the Australian standard. The Australian
standard makes sure that there is a proper work delivered by the developer to the customer.
Suppose if I have been given a task for the development of Network security software. Under the
Australian standard, I will make sure that there is It project has met the objective set by the
client, it is understandable, it could. The software might be followed under the data protection
act. The quality of the software will tested and implemented under the Australian Standard of IT
governance (Bergeron et al. 2015).The Australian standard will provide me the way to deliver
the effective, efficient methods so that the project seemed to be acceptable to the client. The
Australian standard helps in careful planning of the project and help setting the ethical rules for
the increasing the productivity of the organization. Under the Australian act, the demonstration
of the prototype is primarily done in order to ensure the quality of the project. As an intern in

3INFORMATION AND COMMUNICATION TECHNOLOGY
order to fulfil, the IT task this set of formal rules will help me in creating the quality projects that
could meet the objectives.
Question 3
Describe a situation in your internship, or previous work, where you have taken account of
compliance (legislation) in fulfilling your ICT task, and why. If you have not already
experienced such situation, describe a situation in your internship where you will need to
take account of Australian legislation in fulfilling your ICT task, and why
In the course of work that has been personally experienced, there has been an incidence
where there has been an Australian Standard followed for the completion of an ICT task. The
development of a software for an online music portal has been considered which followed the
Australian Legal Standards for completion while there had been contents present in the software
that were developed with ideas referenced from a source where an original developer had
implemented these ideas before. The idea was to develop the software, but the contents would be
derived from external sources. The music that was present in the software were produced and
developed by different derived sources, which were given proper credit for fulfilling all the
legalized documentations and other legalities as per the Australian Intellectual Property Law.
This has been a credit for the organization which initiated the idea as the entire software had the
legal rights of playing all the music and audio clips in the software, with due property rights paid
to the reference from where the audio has been sourced from. This way, the software rights for
intellectual property was not violated as per the Australian Intellectual Property Rights, and the
software development method fulfilled the progression of the project.
Question 4
order to fulfil, the IT task this set of formal rules will help me in creating the quality projects that
could meet the objectives.
Question 3
Describe a situation in your internship, or previous work, where you have taken account of
compliance (legislation) in fulfilling your ICT task, and why. If you have not already
experienced such situation, describe a situation in your internship where you will need to
take account of Australian legislation in fulfilling your ICT task, and why
In the course of work that has been personally experienced, there has been an incidence
where there has been an Australian Standard followed for the completion of an ICT task. The
development of a software for an online music portal has been considered which followed the
Australian Legal Standards for completion while there had been contents present in the software
that were developed with ideas referenced from a source where an original developer had
implemented these ideas before. The idea was to develop the software, but the contents would be
derived from external sources. The music that was present in the software were produced and
developed by different derived sources, which were given proper credit for fulfilling all the
legalized documentations and other legalities as per the Australian Intellectual Property Law.
This has been a credit for the organization which initiated the idea as the entire software had the
legal rights of playing all the music and audio clips in the software, with due property rights paid
to the reference from where the audio has been sourced from. This way, the software rights for
intellectual property was not violated as per the Australian Intellectual Property Rights, and the
software development method fulfilled the progression of the project.
Question 4
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4INFORMATION AND COMMUNICATION TECHNOLOGY
Which risk treatment method is this?
In the task where the project team is developing an app for iOs, Android, and
Windows phones, the development team lead identifies a risk with the Windows phones. The
team was found to have little experience with the Windows mobile operating system and the
operating system of Windows is not capable of performing many of the required functions
without using commercial plugins and APIs. This is why the company decided on removing
Windows compatibility from the project. This process is known as Avoidance as a risk treatment
method. This is where the risk factor is completely removed from the system.
Which risk treatment method should be used when a section of the project is too difficult
for the company to perform?
If during the entire process, a risk is identified that is unavoidable, the risk treatment
factor that should be followed is the Acceptance policy. Acceptance tends to accept the risk
factor and continues to mitigate the additional risks that creep up due to the unavoidable risk
factor within the system.
You are managing a project which uses subroutines and libraries from a number of
different sources. You are concerned that the project might accidentally contravene the
law. So you ask the HR department to employ someone with specialist knowledge in the
area. Is this an example of “Transference”?
Yes, this is an example of transference where the entire problem or the risk factor is
transferred from the source to the third party. The Specialist knowledge shifts departments which
is the main criteria of the risk treatment factor being a transference process.
What is the difference between “Avoidance” and “Acceptance”?
Which risk treatment method is this?
In the task where the project team is developing an app for iOs, Android, and
Windows phones, the development team lead identifies a risk with the Windows phones. The
team was found to have little experience with the Windows mobile operating system and the
operating system of Windows is not capable of performing many of the required functions
without using commercial plugins and APIs. This is why the company decided on removing
Windows compatibility from the project. This process is known as Avoidance as a risk treatment
method. This is where the risk factor is completely removed from the system.
Which risk treatment method should be used when a section of the project is too difficult
for the company to perform?
If during the entire process, a risk is identified that is unavoidable, the risk treatment
factor that should be followed is the Acceptance policy. Acceptance tends to accept the risk
factor and continues to mitigate the additional risks that creep up due to the unavoidable risk
factor within the system.
You are managing a project which uses subroutines and libraries from a number of
different sources. You are concerned that the project might accidentally contravene the
law. So you ask the HR department to employ someone with specialist knowledge in the
area. Is this an example of “Transference”?
Yes, this is an example of transference where the entire problem or the risk factor is
transferred from the source to the third party. The Specialist knowledge shifts departments which
is the main criteria of the risk treatment factor being a transference process.
What is the difference between “Avoidance” and “Acceptance”?

5INFORMATION AND COMMUNICATION TECHNOLOGY
The main difference between the risk processes of Avoidance and Acceptance is that the
factor due to which risk is detected in the system is entirely removed from the system or process
in the project in avoidance method. On the other hand, acceptance tends to accept the risk factor
and continues to mitigate the additional risks that creep up due to the unavoidable risk factor
within the system.
Question 5
Discuss ways in which you can design your software and applications for 2 of the following:
1. Blind or visually impaired clients
Implementing audio bots within the entire software system would help the blind or
visually impaired client to browse the software.
2. Clients with limited or poor hand coordination
Use of key board shortcuts that would aid the navigation process would help in the
browsing of the software for limited or poor hand coordination people.
Question 6
Discuss 3 ways in which you (or your organisation), can use ICT to reduce your carbon
footprint, and contribute to Green ICT.
The following are ways by which in which an organisation can use ICT to reduce your
carbon footprint, and contribute to Green ICT:
Turning off PCs when not in use: This is a way by which if both the monitor
and CPU are left on for 8 hours according to the average workday, five days a
week, in a month up to 58 kWh could be used. This way, the energy can be saved
The main difference between the risk processes of Avoidance and Acceptance is that the
factor due to which risk is detected in the system is entirely removed from the system or process
in the project in avoidance method. On the other hand, acceptance tends to accept the risk factor
and continues to mitigate the additional risks that creep up due to the unavoidable risk factor
within the system.
Question 5
Discuss ways in which you can design your software and applications for 2 of the following:
1. Blind or visually impaired clients
Implementing audio bots within the entire software system would help the blind or
visually impaired client to browse the software.
2. Clients with limited or poor hand coordination
Use of key board shortcuts that would aid the navigation process would help in the
browsing of the software for limited or poor hand coordination people.
Question 6
Discuss 3 ways in which you (or your organisation), can use ICT to reduce your carbon
footprint, and contribute to Green ICT.
The following are ways by which in which an organisation can use ICT to reduce your
carbon footprint, and contribute to Green ICT:
Turning off PCs when not in use: This is a way by which if both the monitor
and CPU are left on for 8 hours according to the average workday, five days a
week, in a month up to 58 kWh could be used. This way, the energy can be saved

6INFORMATION AND COMMUNICATION TECHNOLOGY
and it would enhance the power consumption rate in the organization. As an
individual as well, it can be justified to implement this way as it would also be a
good practice to make the energy consumptions less in every area also.
Limit the use of screensavers: Although screensavers are a way to personalize
your PC, when they are triggered, they can keep the both the computer and
monitor active. No power savings are realized. However, some might contend that
having a screensaver shields the images on their computer screens from prying
eyes.
Use greener equipment: There is a direct relationship between the equipment
used and power consumed. For example laptops are considerably more efficient
than desktop computer systems. However, laptops tend to be more expensive than
desktops and generally, they need to be replaced more often than desktops, which
can be more easily upgraded or have parts replaced.
Question 7
Which of the following are projects, and which are processes? Explain your answer
1. Building a computer, on a production line of identical computers
Thisis a process as the primary criteria of a process are that the execution of a particular
deliverable would have no end and no specific completion. Since the production of the computer
is not the only one in line and the company under which the manufacturing of the computer is
ongoing has to produce numerous identical computers. The deliverable would not have a fixed
time and it would require that it would go on producing as many computers it can. Thus it can be
regarded as a process, rather than a project.
and it would enhance the power consumption rate in the organization. As an
individual as well, it can be justified to implement this way as it would also be a
good practice to make the energy consumptions less in every area also.
Limit the use of screensavers: Although screensavers are a way to personalize
your PC, when they are triggered, they can keep the both the computer and
monitor active. No power savings are realized. However, some might contend that
having a screensaver shields the images on their computer screens from prying
eyes.
Use greener equipment: There is a direct relationship between the equipment
used and power consumed. For example laptops are considerably more efficient
than desktop computer systems. However, laptops tend to be more expensive than
desktops and generally, they need to be replaced more often than desktops, which
can be more easily upgraded or have parts replaced.
Question 7
Which of the following are projects, and which are processes? Explain your answer
1. Building a computer, on a production line of identical computers
Thisis a process as the primary criteria of a process are that the execution of a particular
deliverable would have no end and no specific completion. Since the production of the computer
is not the only one in line and the company under which the manufacturing of the computer is
ongoing has to produce numerous identical computers. The deliverable would not have a fixed
time and it would require that it would go on producing as many computers it can. Thus it can be
regarded as a process, rather than a project.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7INFORMATION AND COMMUNICATION TECHNOLOGY
2. Building a house, as one of a series of identical houses all over Australia
This is also a process, since the building of the house is not a task that would have a
limited time to get completed and it the company is in line for producing identical houses all
over Australia. The entire task for the company is not dependant on time, unlike a project, and
the entire building development would not stop with the single house. Therefore, the entire work
progression denotes that this is a process.
3. Upgrading a computer from Windows 7 to Windows 10
The upgrading of one computer from Windows 7 to Windows 10 is a deliverable that has
an end time and there is no scope of reoccurrence of the same deliverable over a period of time.
Thus this particular task can be termed as a project rather than a process, where a single
computer would have its operating system upgraded from Windows 7 to Windows 10 and the
task would end there. Thus, this is a project rather than a process.
4. Upgrading all 120 computers from Windows 7 to Windows 10
When a computer is upgraded from Windows 7 to Windows 10, it is termed as a project
since it has a set goal that has a end point when the upgradation is complete. When a series of
computer is doing the same task, it can also be said that it is a project than being a process since
may how many computers are involved in the project, it would still be a process as the work
would come to a completion when the last computer is upgraded to Windows 10.
2. Building a house, as one of a series of identical houses all over Australia
This is also a process, since the building of the house is not a task that would have a
limited time to get completed and it the company is in line for producing identical houses all
over Australia. The entire task for the company is not dependant on time, unlike a project, and
the entire building development would not stop with the single house. Therefore, the entire work
progression denotes that this is a process.
3. Upgrading a computer from Windows 7 to Windows 10
The upgrading of one computer from Windows 7 to Windows 10 is a deliverable that has
an end time and there is no scope of reoccurrence of the same deliverable over a period of time.
Thus this particular task can be termed as a project rather than a process, where a single
computer would have its operating system upgraded from Windows 7 to Windows 10 and the
task would end there. Thus, this is a project rather than a process.
4. Upgrading all 120 computers from Windows 7 to Windows 10
When a computer is upgraded from Windows 7 to Windows 10, it is termed as a project
since it has a set goal that has a end point when the upgradation is complete. When a series of
computer is doing the same task, it can also be said that it is a project than being a process since
may how many computers are involved in the project, it would still be a process as the work
would come to a completion when the last computer is upgraded to Windows 10.

8INFORMATION AND COMMUNICATION TECHNOLOGY
References
Bergeron, F., Croteau, A.M., Uwizeyemungu, S. and Raymond, L., 2015, January. IT
Governance Theories and the Reality of SMEs: Bridging the Gap. In System Sciences (HICSS),
2015 48th Hawaii International Conference on (pp. 4544-4553). IEEE.
Hillson, David. Managing risk in projects. Routledge, 2017.
Olutoyin, O. and Flowerday, S., 2016. Successful IT governance in SMES: an application of the
Technology-Organisation-Environment theory. South African Journal of Information
Management, 18(1), pp.1-8.
References
Bergeron, F., Croteau, A.M., Uwizeyemungu, S. and Raymond, L., 2015, January. IT
Governance Theories and the Reality of SMEs: Bridging the Gap. In System Sciences (HICSS),
2015 48th Hawaii International Conference on (pp. 4544-4553). IEEE.
Hillson, David. Managing risk in projects. Routledge, 2017.
Olutoyin, O. and Flowerday, S., 2016. Successful IT governance in SMES: an application of the
Technology-Organisation-Environment theory. South African Journal of Information
Management, 18(1), pp.1-8.
1 out of 9
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.