Wednesday, May 6, 2020

Introduction of IT Technological Advancements

Question: Discuss about the Introduction of IT Technological Advancements. Answer: Introduction Co.As.It was set up in the year 1968 and is joint venture of Australian-Italian governments. It has been providing quality services to the people in the areas of education, health care and living. Additional services such as primary school and education, personality grooming, personality development and training certificates along with timely health check-ups are also provided to the people (Coasit.org.au, 2016). Requirement of IT for Co.As.It It is difficult to manage and track several workers associated with the company such as the support workers, staff members, medical professionals, volunteers and administrative members. Reporting of the tasks such as aged care, mental health department and drug programs. Proper allocation of duties is difficult to manage through manual processes. Importance of IT for business survival There are many reasons which explain the importance of IT for the survival of business of Co.As.It in an efficient manner. Planning IT makes it easier to prepare several plans that are associated with the project such as the project plan, test plan and many others. Collection of the data for the same is also easier with the help of automated systems. Design, development and deployment There are a number of checks and phases that are involved during the development and design of the system. The process becomes easy to execute through the aid of IT. Reporting and performance management Manual processes fail to execute these tasks with perfection and the reporting along with management of the performance becomes easy through the application of IT Steps to implement IT Planning This is the first step that is involved which includes defining the scope of the project on the basis of the objectives and goals that have been provided. A well-defined project plan is made in this phase covering the assumptions, deliverables and milestones. Requirement Analysis Requirements must be well studied and gathered from all the potential sources. It is necessary to have discussions and meeting with the stakeholders and customers to understand the specifications in the best possible manner. It would help in the designing of a requirement specification document and would also help in delivering a solution as per the expectations of the customer. Design This is the phase which is used to bring about a blueprint of the entire process with the help of various models and diagrams such as data flow diagrams, function hierarchies and entity-relationship diagrams. These help in the practical application and execution of the entire process. Implementation This phase is based upon the earlier three phases in order to implement the same. The requirements, design diagrams and project plan help in the coding and database design for the solution. Testing It is the best practice to test before delivering the solution. This is the phase which revolves around the creation of test strategy and test approach for the creating of test cases and test scenarios. Execution of these test cases helps in finding out the errors and bugs that are lying in the system. Deployment and Maintenance The code is deployed in the real-world for the end-users and the maintenance and support is provided for the post-production issues (Ghahrai, 2015). Use of IT in Co.As.It Internal Use Rostering function in the software helps the workers and management to prevent the cases such as double bookings. It makes it simpler for the staff coordinators to make timely visits to the clients and also reach to the correct location (Bolden, 2015). It helps the nurses to interact with the doctors. External Use Customers make use of IT to provide feedback to the staff member. Co-ordination with the staff member to decide the time and location of visit becomes easier which provide the client with the surety of quality service. There are a number of services provided by the organization and varied equipments are used to cater the same. These are provided by a number of different suppliers and the tracking and management of the same becomes easy with IT. Benefits and Advantages of IT to Co.As.It Efficiencies and management becomes easy with the help of electronic management systems which also aids in gaining a competitive advantage. Cost-savings and cost-effective solution is another area that has benefitted with the help of automated software. Working of all the team members becomes easy and also simple to execute. Revenue that is generated for the organization also improves owing to improved reputation among the customers. There is also increased level of customer satisfaction and improved experience owing to the quality services that are provided. Risks involved with IT There is a huge amount of data that is associated with Co.As.It which includes the information around the denizens of Australian-Italian community in terms of their personal, professional and health care details. Sensitive: This is the information that is most critical to the organization and the loss or damage to the same can have devastating effects. For instance, health care information of a person is extremely sensitive in nature which required critical degree of protection. Confidential: This is the information that is of high importance for all the stakeholders that are involved with the business. The third parties and the external sources that are involved with the organization and the information related to the same is confidential in nature. Private: The information that belongs to personal use and purpose is private in nature. Demographic details such as address information, contact details and e-mail id are the details that are private. Public: The pieces of information that are fine to be shared with the public come under this category. There are a number of risks that emerge as a result of automated information systems and solutions through the help and application of IT. These are as listed below: Virus These are the programs or a set of instructions that are designed for malicious intent or purpose. These get transferred from one system to the other through the use of storage media or get injected in the system through shared network such as internet. Spyware These are the tools and programs that are injected in the system to capture and monitor the activity on a system such as keystrokes, chat logs and many others (Spychecker.com. 2016). Man-in-the-middle These are the attacks in which the man or the attacker sits on the network that is used to access and transfer the information from the source to the destination. The attacker acquires all of the information by monitoring the network through unauthorized means. DDoS It stands for the distributed denial of service which is an attack wherein an attacker floods the network or service with unwanted traffic (Digitalattackmap.com. 2016). Spoofing It is the attack where impersonation is used to mislead the user or the victim to make him or her perform an activity. The user gets victimized by trusting the source as an original (Ttu.edu. 2016) Phishing The attack attempts at acquiring the confidential and sensitive details by misleading the users through false mails and messages (Ttu.edu. 2016). Conclusion Co.As.IT is an organization that works for Australian-Italian community by proving them quality and community services in the areas of health care, living and education. The organization has been working for people since over 40 years and has expanded to a vast network. The manual processes that are used by the organization fail to track and manage the several services that are part of the entire system. The use of IT and automated software such as Home Care Manager help in the efficient management of health services. These help the medical staff and the end-users to communicate with each other in quick response time and also help in the assignment of roles and duties. The application of the IT takes place in a step by step process which involves planning, requirement gathering and analysis, design and implementation along with testing and maintenance of the integrated system. There are pros and cons of every technology and IT is no different. The introduction of IT in practice resul ts in increased possibility of risks which may harm the sensitive, confidential and private information associated with the system. Attacks such as those of viruses, denial of services, distributed denial of service, spoofing and phishing also takes place through the introduction of IT. References Bolden, S. (2015). Co.As.It makes significant mileage cost savings with Home Care Manager software - iCareHealth. [online] Icarehealth.com.au. Available at: https://icarehealth.com.au/blog/co-as-it-makes-significant-mileage-cost-savings-with-home-care-manager-software/ [Accessed 19 May 2016]. Coasit.org.au. (2016). Co.As.It. Sydney Italian Language Community Services. [online] Available at: https://www.coasit.org.au/ [Accessed 19 May 2016]. Ghahrai, A. (2015). SDLC Phases - Software Development Life Cycle. [online] Testing Excellence. Available at: https://www.testingexcellence.com/software-development-life-cycle-sdlc-phases/ [Accessed 19 May 2016]. NueMD. (2013). The importance of proper IT implementation in healthcare. [online] Available at: https://www.nuemd.com/news/2015/07/20/importance-proper-implementation-healthcare [Accessed 19 May 2016]. Spychecker.com. (2016). What is spyware and adware?. [online] Available at: https://www.spychecker.com/spyware.html [Accessed 19 May 2016]. Ttu.edu. (2016). Scams Spam, Phishing, Spoofing and Pharming | Be in Charge of Your Digital Life | CPI: Lubbock | TTU. [online] Available at: https://www.ttu.edu/cybersecurity/lubbock/digital-life/digital-identity/scams-spam-phishing-spoofing-pharming.php [Accessed 19 May 2016]. Digitalattackmap.com. (2016). Digital Attack Map. [online] Available at: https://www.digitalattackmap.com/understanding-ddos/ [Accessed 19 May 2016]. Softwaretestinghelp.com. (2016). What is Software Testing Life Cycle (STLC)?. [online] Available at: https://www.softwaretestinghelp.com/what-is-software-testing-life-cycle-stlc/ [Accessed 19 May 2016].

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.