Final exam

docx

School

Strathmore University *

*We aren’t endorsed by this school

Course

MISC

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

4

Uploaded by DukeMinkMaster907

Report
1. Why is a Business Continuity Plan needed? What are key components of a Business Continuity Plan and what are the most important aspects? Business continuity plan is a function that ensures that the company in question continues operating in case a disaster occurs. The plan is important since without this critical function, the business will close down. Some essential elements of the business continuity plan includes the following: Defined team Detailed written plan Effective testing Crisis communications Employee safety Uninterrupted access to business resources Continuous IT operations 2. What is the difference between a fully functional 13 step Systems Development Life Cycle (SDLC) and a fully functional 3 step SDLC? The main difference between 13 step Systems Development Life Cycle (SDLC) and a fully functional 3 step SDLC is number of phase to develop and achieve system requirement. The 13 step system development life cycle need long time and the 3 - step system development life cycle needs short period. Additionally, the 13 step SDLC is traditional and very time taking but the new 3 step is modern SDLC and time saving. 3. What is the process of Risk mitigation? Describe a minimum of 3 techniques used for the management of risk?
Risk mitigation is the process of reducing the potential impact of risk on an organization's operations or a project. There are a number of techniques used for the management of risk, including risk avoidance, risk transfer, risk reduction, and risk acceptance. Risk avoidance involves avoiding activities or situations that pose a risk. Risk transfer involves transferring the risk to another party, such as through insurance. Risk reduction involves reducing the potential impact of risk by taking proactive measures, such as implementing safety protocols. Risk acceptance involves accepting that there are risks associated with certain activities and taking steps to manage them. 4. Why it is important to identify requirements for regulatory compliance? Identify one governmental regulation as it relates to Information assurance It is important to identify requirements for regulatory compliance because of the need to manage risks related to the use, processing, storage, and transmission of information or data. A government regulation relating to information assurance is HIPAA. HIPAA is a government regulation which includes privacy and security rules governing the collection, disclosure, and security of PHI. 5. What is the difference between outsourcing and insourcing? Why are these different sourcing models necessary? Outsourcing refers to the process where an organization hires another party to complete specific tasks from outside and the party is not affiliated with the organization. On the other hand, insourcing is a business practice that an organization performs within its operational infrastructure. The two are differentiated by the methods of working. An
organization needs both outsourcing and insourcing for the purpose of obtaining something they do not have or a talent they may not have within the organization. 6. Why is it important to use scholarly resources when researching a topic? It is important to use scholarly resource when researching a topic because they are authoritative and credible. With this authority and credibility, scholarly sources make important contribution to the overall quality of a research paper. Additionally, such sources are usually trustworthy because their publication also includes peer-review. 7. Why do we use APA formatting when writing research papers? APA formatting is used when writing research papers because the format provides research writers with consistency in the writing format that they can use every time they are writing. When research papers have consistency, they help researchers to efficiently organize their arguments. From the first page, every section of a research paper has a specific predetermined format which is easy to follow. 8. Discuss some common IT metrics for strategic initiatives and how/why they are measured. Metrics are used for measuring any purpose such as, success or performance of an organization. IT metrics are used for measuring the performance as well as the success of the projects or the whole organization. Some IT metrics include performance. Performance is measured by how well IT department can support an organization’s technology needs. Another metric is organization which is measured by how healthy the workplace environment is. There is also the cost metric which is measured by how well financial metrics are tracked for regular reporting and measuring IT efficiency.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
9. Provide 3 examples of policies that should be implemented to address an organization's ethical compliance. Describe each policy . code of conduct Whistleblower policy ethics officer responsible for overseeing the implementation of ethical policies and ensuring compliance with them 10. Discuss the relationship between critical success factors and key performance indicators in measuring success Efficiency measures how well you use your resources to achieve a goal. It is about getting the best results from what you have available. In the business environment, it's essential to be efficient to maximize output with minimal costs. While Effectiveness is a measure of how well something achieves its desired result. It's about getting the best results possible, given what you have available. In the business environment, it's essential to effectively meet desired goals within a specific time frame and budget constraints.