IT Challenges in the Workplace.

IT Challenges in the Workplace
In my field of information systems, Excel is most significant software program that is used for daily functioning at the workplace. We use this essential end-user computing tool to not only perform our daily functional tasks but also to for key decision support. All functions at my workplace would ground if this element of the information system was to be compromised. Excel has the capacity to run spreadsheets reaching a million rows and 16,000 columns, enabling us to import and work with large amounts of data plus attain faster calculation performance.
There is need to replace or upgrade the computer hardware at my workplace. We are using computer hardware and software that were used a decade ago meaning that our productivity has remained constant while our IT expenses rise. I would prefer an upgrade to system upgrade that will help us manage our IT costs, boost productivity and improve office functionalities at the workplace. There is great likelihood that this will done because of the changing tecchnologial environment.

Essay 2: IT Security
Information Systems Security refers to the protection of information sytems from any unauthorized access or modification of the information. At the workplace, there are security measures to the effect that only only authorised personnel are allowed to access, modify, release or destroy any personal data.
 There is a policy administrator tasked with updating, revising, and enforcing information security policy
 Definite procedure to classify systems by conducting an inventory of all systems and nature of their use in the organization
 A pre-determined security priorities for individual systems
 Assigned risk factors i.e. an understanding of risks of not following the information security policy
 Established acceptable and unacceptable conduct i.e. defined standards of the security policy.
 Conducting security awareness training for entire staff.
At some times, there are security lapses at workplaces relating to information security because of lack of updating. For instance, there are unauthorized access of the system leading to disruption and denial of service and inappropriate response procedures (National Research Council (U.S.)., 1991).

Essay 3: How do IT Managers Fail?
A failed manager is one that adopts to blame game when things go wrong instead of taking responsibility, unable to create and maintain high morale levels among employees, incorrectly identifies solutions to problems, deals with people ineffectively, ineffective planning and organization, inflexible & self-centered, fails to encourage juniors to offer ideas and suggestions, neglects team building, quick-tempered, does not see the bigger picture, fails to develop subordinates, lacks self-confidence, poor communication skills, lacks follow-thorough, and is indifferent to chanfe and new ideas (Baldwin, 1996).
Managers need to beware of the following pitfalls: overlooking the need for experience, sloppy record keeping, irresponsible money management, planning failure, poor use of time, avoiding marketing, assuming the human resources, and not cultivating talent.
In order to avoid pitfalls, managers need to develop people skills learn effective decision-making skills, develop desirable communication skills, and improve both interpersonal and intrapersonals skills.
Essay 4: Database Management
database oversight has to have centralized controls so as to improve identity management of an organization. This is to say that the most significant consideration of database oversight relates to security of the data or information carried in it. Secondly, much consideration has to be put on the performance of the database itself (Schulz, 2011).
Cloud storage utilizes networked online storage meaning that data or information is stored in virtual storage that are hosted by third parties. A manager using a cloud based storage for their database should keep in mind that the organization has chance to concentrate on its core business because all storage maintenance needs are taken care by the service provider (Schulz, 2012). However, there is increased danger of the date to be accessible to unathorized users because cloud based architecture replicates and moved data more frequently. Also, the manager should be aware that cloud requires extra LAN at the data control centre and WAN so as to connect the two thus increasing the number of networks. The data is highly accessible to people with criminal intent (EMC Education Services, 2012).

Essay 5: CIOs and the Organization
Any organization that largely relies on IT department greatly requires a CIO. The CIO must be able to translate from the requirements of the board of directors to IT capabilities and then back again. In order to well engage with all this goups, a CIO will need skills that are more organizational and political skills and some technical skills. The CIO should also have enough respect for IT with the knowledge that critical IT decisions can’t be adopted without having consulted the IT team to some extent to deliberate on issues of practicality and cost. A CIO needs to have management experience and technological know-how. In order to effectively engage with the end users, the CIO will need to have good interpersonal skills so as to communicate well with the customers. he/she will also have the business acumen so that can convince the dissatified customers to stay while making efforts to address their complaints.

Essay 6: Continuous Master of Science in Information Technology Management (MSITM) Program Innovation and Renewal
The Master of Science in Information Technology Management (MSITM) Project brings together managerial and tecchnologial elements to produce individuals who can effectively handle a variety and complexity of aspected relating to successful application of IT within organizations (Oakland University, 2012).
The MSITM programs has three modules:
1. Foundation Course – this is a module that greatly affords the learners with essential skills pertaining to analysis, design together with implementation.
2. Elective Courses – This section serves to develop in-depth knowledge in a particular area of interest. It prepares one tobe an effective leader.
3. Capstone Project – this is a key element of MSITM Project which go a long way to synthesize the knowledge of students and apply it to tackle issues in a single or more sections of concentration.
The Foundation Courses of MSITM project ought to emphasized more because it introduces the learner to the whole project meaning a thorough understanding helps one to in the subsequent courses (Khosrow-Pour, 2006).
References:
Baldwin, Allen, David. (1996). The Academic Librarian’s Human Resources Handbook: Employer Rights and Responsibilities. United States, Libraries Unlimited.
EMC Education Services. (2012). Information Storage and Management: Storing, Managing, and Protecting Digital Information. New York, John Wiley & Sons.
National Research Council (U.S.). (1991). Computers at Risk: Safe Computing in the Information Age. Washington, National Academies Press.
Khosrow-Pour, Mehdi. (2006). Emerging Trends and Challenges in Information Technology Management: 2006 Information Resources Management Association International Conference, Washington, DC, USA, May 21-24, 2006, Volume 1. Pennyslavania, Idea Group Inc.
Oakland University. (2012). Master of Science in Information Technology Management (MSITM). Retrieved from http://www.oakland.edu/MSITM/
Schulz, Greg. (2011). Cloud and Virtual Data Storage Networking. United States, CRC Press.

Latest Assignments