Satisfying internal customer demand

Document Type:Business Plan

Subject Area:Management

Document 1

It should be done in such a way that quality of the final product is not compromised. This is the case with the pharmaceutical company in the case study. The CIO’s department is working hard to have a standardized software and hardware application. This is all in efforts to reduce costs as well as ensuring that there is compatibility. However, this fails to resonate with all people in the company. Procurement of information of IT systems normally needs assessments to be done before approval for purchase is granted. These assessments are usually done by research and development in collaboration with finance department. It is always a good practice to have standardized software. Before accepting non-standard hardware, there should be concerns associated with its operation.

Sign up to view the full document!

The first concern is quality of the hardware. It will be a major concern if the software gives incorrect calculations. This is especially in functions like date and financial calculations. The greatest danger is that incompatible hardware might give wrong calculations which leads to loss of money in finance sector. Another disadvantage is that wrong calculations will be temper with dates and prescription of drugs hence drug abuse. Similarly, the non-standard software being incompatible with current computers will fail to apply existing edits. They will have to dedicate more time to be trained on using new computers as well as getting used to them. Besides time, there will be another cost to be incurred by the Company in the training and installation of the new computers.

Sign up to view the full document!

Question 1B There are many stakeholders in any Company. The pharmaceutical Company is no difference. Its stakeholders include IT specialists, mangers and customers among others. This is the reason why they have interest in IT functioning of the Company. There are customers who are good in technical matters. They should be allowed to offer a solution to the Company. This means that all customers should be consulted before hardware or a particular hardware is acquired by the management. For instance, in the case of pharmaceutical company, some of the customers might have been involved in selling the required hardware and software. Therefore increasing series of customer interactions with company is important in boasting customer satisfaction. As a result more revenue will be boosted.

Sign up to view the full document!

Similarly, the cost of serving customers will be greatly lowered by around 20%. Therefore, it is important to involve customers to provide IT solutions to any Company since this will increase interaction between customers and the Company hence customer satisfaction. Apart from this, it will bring in new ways of thinking. All of these people feel that they are right. The challenge is how to convince them to come into a common agreement in which a solution can be arrived at. The best mechanisms for conflict resolution are those that makes gets the entire team back to track. In the case of this company, it is apparent that no one wants to be wrong. It means that they will not want to hear from someone telling them that they are wrong.

Sign up to view the full document!

One of the causes of conflict is when a party justifies that it is right without accepting to listen to an optional reasoning. Such parties normally tell other that they are wrong and is likely to be accused of being so defensive. If management wishes to interfere in between and get solution, then there is a need to play a middle ground. This means that the mediator has to listen to all sides before making decision. The decision should not appear to be biased. Digital communication has revolutionized the way we communicate with other people. Internet forms the platform of digital communication. As much as this has had many benefits to people, it has its disadvantages too. The drawbacks of the internet arise from wrong use and an attempt to access information in an unauthorized way.

Sign up to view the full document!

This can be achieved through cyber security in computing context. But how do they achieve this? Organization culture plays an important role in cyber security. Most organizations have a culture ongoing awareness through training and building experts. Management knows how important security can be in everything that it does. This is why many of them are spending heavily in this technology so that all of their data is safe. The culture of being aware of security of concern of its information is now being told to all people who are involved in handling raw data and even those dealing with stored data in the internet. Third, it is rewarding. For people to invest their efforts and time, they should be aware of the return that comes with doing so.

Sign up to view the full document!

Finally, there is incentive when organizations participate in information security. The main reason why people get involved in these measures is to lower vulnerabilities and improve their offering. There is a multiple return on efforts that are made. Those who do not comply with the decisions made are subjected to disciplinary measures. For example those found to have intruded into Company’s websites are punished and they may even be laid off from their jobs depending on the magnitude of their actions. It is clear that human beings are the weakest leak of information. The cyber security is not meant for computers but is meant for people. Computers do not interfere with the stored information. This is because their job affects our lives directly.

Sign up to view the full document!

These personnel must show high levels of integrity since they deal with confidential information of either individuals or organizations. Information is similar to patents and must be protected from any unauthorized intruders. Now that they have a great power in dealing with our secret information, they must be checked and be compelled to check on their behaviors. If not controlled, they can easily abuse this power either inadvertently or deliberately. This is important in ensuring that the trust of workers in functioning of the company is highly boosted and all people trust. Otherwise it will be difficult for people to give their vital information because they lack trust in the Company. As a company trades with society, it needs to keep their personal information so that it can be used to keep contact with them.

Sign up to view the full document!

Professionals of cyber security need to trust themselves that they will behave ethically. They are tasked with responsibility of ensuring that data integrity is upheld. This is because the victims are denied their fundamental rights to access their information as they previously did. Computer systems are viewed as medium of speech. Unauthorized access into this platform makes it unsafe to be used by many people. When people shun off from these platforms it means that they are denied their rights to access their platforms used to express their speech. It implies that one of their rights is violated. References Brey, P. (2007), “Ethical Aspects of Information Security and Privacy”, in: Security, Privacy, and Trust in Modern Data Management, M. Petković and W.

Sign up to view the full document!

From $10 to earn access

Only on Studyloop

Original template

Downloadable