My Tacit Learning with MGT 286

tacit knowledgeLooking at the course outline today makes me appreciate the course: MGT 286. Before, I thought information technology/system would only deal with computers; of having such thought in mind I had a connotation of not liking the subject at first. For me, I am not fond of computers – I use computer to do excel in my line of job, not so for social media because I can readily access it through my phone. But now, I have a better understanding why management for IT and IS are important for an organization. Ironically, MIS is often taken for granted especially in government agencies like ours.

The course outline and course requirements are comprehensive which undertakes the major areas in information management, I believe all of these (lectures, blogs, laboratory activities, ect.) are important in weaving the attainment of the objectives of MGT 286. This entire thing not just taught me of the bits and pieces of information technology, but more importantly it taught me of the lessons not found in books or learning materials. First, time management – for the entire second trimester I was again able to joggle deadlines from work to school requirements with constant duties to fulfill at home as a daughter and a mother. And secondly, I am grateful for learning the meaning of the word “cool” – as in taking things lightly. Being in graduate school is not easy, but what keeps me insane with all the anxiety and pressure of the real world and school life is the “light” atmosphere in the classroom. Credits to my beaming classmates and supple and organized professor, they made my early Saturdays ritual worthy. Lastly, just as to put into record my favorite topic discussed was the Responsible Use of Social Media and the one word I will not forget is “primary key” in Access/Database Application – if only I had a second chance at the practical exam.

The Other Side of Social Media

The best way to define social media is to break it down. Media is an instrument on communication, like a newspaper or a radio, so social media would be a social instrument of communication. In Web 2.0 terms, this would be a website that doesn’t just give you information, but interacts with you while giving you that information. Without FaceBook, Flickers, Instagram, Blogging sites, etc. we will be having a difficulty in staying connected with the so called “outside world”. Social media serve various purposes depending on its users, some use it for sharing photos and connecting with friends, others use it as an important tool for business opportunities.

Social Media as a tool for:social_media

  1. Personal Development – In using FaceBook for instance, post or share ideas that conveys positivity. Whenever you share something bear in mind that a lot of people can read it. There is a proper situation/forum wherein you can express your disappointments, personal disagreements and annoyance. Always practice this – think before you click.
  2. Professional Growth – Put in mind the moment you assume your virtual self to always be professional, at all times. This also includes your proper use of language and not posting things that may debase your reputation. Always proceed with caution. Remember that anything you post is accessible by anyone else, as others say “cyberspace is foreverspace”. Like, follow, share or post topics that would leverage your knowledge and career advancement.

If only more people would realize the power of making Personal Development and Professional Growth a social media experience.  As a start this would be my personal commitment:

  1. I would limit my self to an hour in facebook and other social media websites and set an example especially to my child.
  2. I would only post or share good things that matter.
  3. I would see to it that my personal and professional growth must always come first and not at the expense of losing my precious time in constantly checking news feeds.

This does not stop here, may this create a ripple effect to readers to take on their share in the responsible use of social media.

Software Piracy Issues

Software piracy is tdownload_keyhe unauthorized copying/distribution of software. Most retail programs are licensed for use at just one computer site or for use by only one user at any time. Purchasing software means that you are actually purchasing a license to use the software. That license defines how you may lawfully use that software. Any use of the software beyond the scope of the license, would be a violation of the license and possibly, copyright law. You are allowed to make copies of the program for backup purposes, but it is against the law to give copies to friends and colleagues.  http://definitions.uslegal.com/s/software-piracy/

Some common types of software piracy include counterfeit softwareOEM unbundlingsoftliftinghard disk loadingcorporate software piracy, and Internet software piracy. Software piracy is widespread in our country; one can not deny that even offices have counterfeit copies of MS Office. The major reason for this is that these are costly; a genuine license for it would cost an equivalent of two months salary for an average working Filipino. The problem on software piracy is comparable also to problems faced by the movie/entertainment industry. Note that even movies and record labels are rampantly being pirated which should only cost hundreds of peso, how much more for software licenses. The laidback implementation of pertinent laws, also noting that the crime is bailable under Philippine law are the reasons why software piracy rate increased to 70% in 2011 thereby causing significant losses to software industry in 2013. http://www.iipa.com/rbc/2014/2014SPEC301PHILIPPINES.PDF

From my personal point of view, still software piracy is a big NO. It is like the line “The end does not justify the means”. It all boils down to ethics. Yes, these pirated copies indeed save you a lot of money but of course these still entails a lot of risk. The perceived “savings” of using pirated software can be wiped out in a single security breach or critical incident resulting in downtime and other expensive remedies.

Software companies can work hand in hand with the government to eradicate these piracy problems through the proper implementation of the laws. Companies may also offer in the market much lower priced software that would encourage users in the developing countries. It is like introducing a “tingi” marketing strategy of offering a product without affecting the quality and purpose (e.g. prepaid load for cell phones). Also, software companies must strengthen their product activation process, since even now hackers can manipulate it.   Combating piracy in the software industry is a global leap that requires local efforts.

Knowledge Management a Catalyst of Innovation

Knowledge management in existing literature is defined in a variety of ways. Gartner defines knowledge management as “a discipline that promotes an integrated approach to identifying, managing and sharing all of an enterprise’s information needs. These information assets may include databases, documents, policies and procedures as well as previously unarticulated expertise and experience resident in individual workers.”

In the government/public sector these are the few benefits of applying Knowledge Management:

  1. Maximizing efficiencies across all public services by connecting silos of information across different levels of government and across borders
  2. Improving accountability and mitigating risk by making informed decisions and resolving issues faster, supported by access to integrated, transparent information across all organizational boundaries
  3. Delivering better and more cost-effective constituent services such as enhancing partnerships with and responsiveness to the public

However, it is noted that the application of KM in the public sector is not widespread. Researchers argue that among the most obvious reasons for such limited application in the public sector are related to the “cultures and contracts which serve to impede rather than support the collaborative and improvement focused culture”. http://lide.uhk.cz/fim/ucitel/buresvl1/publications/CulturalBarriers.pdf

The value of sharing of information and knowledge within the organization is crucial in attaining the objectives of KM. Cultivating a culture of sharing will promote a culture of learning that should in turn contribute to growth and sustainable development.  Nonetheless, global trends point to an opportunity for organizations in both public and private sectors to use knowledge management as a key driver towards increasing productivity and building a more user-centric business model.

Efficient Decisions through Business Intelligence

Business intelligence (BI) is a process which employs the use of technology in analyzing data using different business intelligence tools. These data are then pulled to help in the decision making of managers and end users. It is important for an organization to have a pull of relevant and up-to-date information – old and obsolete data results to poor managerial decisions.

Internet Shopping Pros and Cons

online shoppingEcommerce and internet shopping is taking a great leap in businesses worldwide. Through this, small to big enterprise takes advantage of the direct connection of buyers and sellers in the absence of the physical store – brick and mortar. Ecommerce offers great convenience to both customers and sellers, sale of goods and services are faster and with a promising market scope and product variety. In the fast paced way of life of the generation today, one need not come to the store nor travel afar to buy something but in the own convenience of their homes they can order and the goods shall be delivered at their doorstep.

However, if internet shopping offers convenience at times it discourages others. Inconveniences like dealing with the hassles of return or exchange of ordered products in case of discrepancies. Some shoppers are discouraged to buy from the internet because they miss the part where they can actually touch and see the products that they are ordering. Some online shops have deceptive pictures of their items that on the time it was delivered it is not the same as expected. Also, others fear the risk of using their credit/debit cards for the items purchased. Therefore, it is always advised to purchase from legitimate sellers after thoroughly understanding their privacy policies.

As to me, I can order items – clothes and apparel, home and living, kids toys – that are not that expensive without any hesitation as long as the prices are reasonable. However, items like electronic gadgets, jewelries/watches and signature bags would make me think a lot more before purchasing; issues like product authenticity and the actual feel/experience shall make me hesitant. And products that are sold like home appliances, computer and laptops and all other items that are way too expensive are the things that I shall never purchase from an online store.

No matter what a shopping website sells, it should provide value and quality, make shopping easy, deliver products on time, and provide good customer support.

Safeguarding Your Wi-Fi

Effective communication is a building block of a successful organization. It is important for managers to perform its basic managerial functions – planning, organizing, leading and controlling. The day to day operation of any organization is devoted mainly to communication. Today, electronic messaging and networking tools enabled faster communication within the organization and extending the benefits to its stakeholders. A faster communication process brought about by wireless network technology contributed to an improved productivity of the organizations workforce, faster decision making of managers and cost saving measures in the long run. Because of these benefits, more and more organizations have integrated in their operation the capabilities of wireless network technology.

However, given that Wi-Fi networks provide various benefits, an unprotected network can result in unauthorized use and damage unless precautions are taken. There can be risk that unauthorized users can access the data of your organization or infect your computer systems with viruses. More so, you need to protect your network from unauthorized activities like download of unlawful contents and sending of spam and which can be traced back to your network.  Go to the link http://www.fcc.gov/guides/protecting-your-wireless-network  for tips and guidelines on how to better protect your wireless network against unauthorized access and thereby maximize the opportunities brought about by the wireless network technologies.

 

Proceed with Caution: Outsource Security and its Issues

Outsourcing has become a major leap in businesses worldwide. An organization can outsource human resources, customer service, IT support, desktop support; there is also a relatively increase in number of organizations investing in e-commerce systems, data center hosting and software and application development, but security outsourcing continues to be a challenge.

Enterprise networks have become so complex that few IT departments truly have the resources and expertise to manage them entirely on their own, particularly when it comes to keeping them secure. Outsourcing certain aspects of physical security – such as lobby guards – is common place, but enterprises have only relatively recently begun turning to third party managed security services (MSS) to block spam and filter web and email content (quoted from Dark Reading’s – Security Services Tech Center).

According to a survey by the Corporate IT Forum, only 5% considers outsourcing security and 48% said they would not outsource their IT security teams. Yes, even with the numerous benefits derived from security outsourcing its risk attributes discourages organizations. One can only imagine how great company data will be put into third party’s hands. Organizations need to take a fully informed, risk-managed approach to outsourcing security services. In general, many security processes can be effectively outsourced, those that require a lot of hands-on decision making – such as firewall management, where nearly every decision requires a custom response may be better left in-house. However, those that can give a better security at a lower cost than what can be delivered by an IT team is a consideration to secure outsourcing.

It is not just what to outsource that needs to be considered but also what third party you outsource with and bind it with a contractual obligation. Several security requirements must be clearly stipulated in order to safeguard the electronic assets of the company – examples are confidentiality clause, proper handling of critical information, security roles and responsibilities, third-party access control, audit and monitoring requirements.

It is important for organizations to understand their outsourcing needs, related security risks, proper handling of outsourcing in the right manner and correct context. Only with this, will it then be possible for the related risks on IT security outsourcing be mitigated to an acceptable level.

Three A’s: Going Back with the Basics

     Today when competition and modernization is inseparable, managers are confronted on how to properly address the challenges brought about by one factor: change. Modernization and technological advancement are moving so fast, that products and jobs get quickly commoditized or even eliminated. To maintain a good standing, managers of organizations must increase flexibility, expand skills and take on the qualities of being multidimensional. Though how modern and technical business environment is now, it is still important for a manager to possess these basic skills – the three fundamental A’s that would help in Information System (IS) decisions.

     Adaptability – Managers must be adaptable, flexible and can easily adjust to its environment. They are always looking for opportunities. IS decisions are mainly rooted on exploration of new ideas and managers must learn on how to be receptive yet mindful of the many perspectives and possibilities.

     Analytical Thinking – Managers must be decisive; this includes business, personnel and IS related decisions. A good manager solves the problem logically, applies educated decisions with the help of research and continuous learning thus, avoid biased conclusions even under pressure. With analytical thinking managers can be able to weigh a healthy level of risk vis-a-vis the profit/benefit derived from a project or decision. A healthy risk tolerance means taking all possible steps to mitigate or eliminate risks, and then making a well-calculated one.

    Administration – Administration and leadership enable managers to set priorities, delegate and motivate subordinates to become top performers. Managers must set high but not unattainable standards and expect subordinates to achieve them. Communication is a big tool here; this is where managers can constantly remind its employees on the objectives of the organization. Through administration, managers will be able to oversee the impact of the IS decision and further assess the viability of the taken course of action.

     These three A are skills to provide a firm foundation on how to become an effective IS decision maker equipped to hurdle the challenges brought about by modernization and constant change.  Given the complexities of IT related progress in the business world it is still important to impart and go back with the basics.

IT and My World

      IT on a typical day for me starts as I put on my office computer and start working on MS Excel and MS Word.  In between breaks at the office and duties being a mother I usually open Google to consult assignments in school both for me and my grade 1 daughter.  Then checking notifications for my Yahoo Mail and Facebook where I update myself on the comings and goings outside my daily activities.  That’s it basically.  I am not well versed with the information technology jargon.  To put to record, this is the first time I encountered WordPress and my very first blog writing, big thanks to MGT 286.  Though all of these seem so ordinary, I can not negate the great help Information Technology brought to my existence.  Just imagine life without the perks of these IT brought advancement.

     Information Technology made our world smaller.  With our fingertips we can now access much information, expounding the meaning of the word “instant” as defined twenty years ago.  All of us today are faced with the challenge on how to use this wealth of information responsibly, given the accessibility of the internet, smartphones, computers and all other gadgets.  Information Technology as vague and wide as the word itself seems to be our future is still undefined.  What would life be twenty years from now?  But for the moment I am taking it one at a time.