StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Sciences and Information Technology - Coursework Example

Cite this document
Summary
This discussion talks that outsourcing is contracting another company or a competent person to carry out a particular task, that is goods or services related. Almost every organization outsource goods or services. Some tasks in an organization are not related to the core business…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.7% of users find it useful
Computer Sciences and Information Technology
Read Text Preview

Extract of sample "Computer Sciences and Information Technology"

 Computer Sciences and Information Technology Outsourcing is contracting another company or a competent person to carry out a particular task, that is goods or services related. Almost every organization outsource goods or services. Some tasks in an organization are not related to the core business and hence a higher need for outsourcing. In production some goods can’t be found locally and hence the need for importation or outsourcing the goods. The following represent reasons for outsourcing goods and services: When a company is in its’ exponential growth there is usually a higher need to expand its’ customer base and hence outsourcing of experts to guide on the strategy to be utilized is of importance. Outsourcing aids in mitigation of risks, through trainings to employees by professionals outsourced on subjects as catastrophes, hazards and prevention methods, and hence there are minimal injuries. Due to competition amongst companies, research on new products and services is very crucial, this entails introduction of new processing lines, improvement in service delivery, analysis and testing of the new products among others, All these requires the input of a third party and it will involve outsourcing as the introduction of the new techniques requires professionals (Belohlavek, 2007). Insourcing is a business model in which a company awards a contract or give a certain task to its’ own employees and hence work that would have been done by a third party is done inhouse. Through the use of its’ employees in carrying out functions, there is creation of a team of skilled personnel who understands the system better, this ultimately improves the efficiency and tasks are done well and at the right time. Insourcing also aids in reduction of the cost of labour as insourcing requires the input of permanent personnel employed by the firm (Belohlavek, 2007). I.T portfolio management system entails use of scoring model systems in rating projects whereby a list of criteria is developed whereby projects are rated on each criterion to yield attractiveness scores for each project and hence projects can be rated in relation to the attractiveness scores. There are different kinds of scoring systems; Celanese scoring model, Dupont scoring model, Exfo model and computer based scoring model. Scoring models are very important and they are a source of data which is utilized in meetings whereby project attractiveness is compared to cut off criterion, thereby in portfolio review stage the outputs used in ranking the projects. Celanese scoring model mode focuses on long term projects and it comprises of nineteen questions in five categories which are; business strategy fit, strategic leverage, probability of technical success, probability of commercial success and reward to the company. Each of the five categories has a measure which is done by the management and thereafter there is an attractiveness score which is the sum of scores from the five categories. The project attractiveness score is a very important stage in ranking of projects as the project with the highest score is the highest successful project while the project with the lowest attractiveness score is termed as poor, and hence prioritization of projects is achieved (Cooper, Edgegett $ Kleinschmidi, 2001). Other considerations that would be of importance in ranking a project include, market attractiveness - this incorporate market margin and growth, customer need and satisfaction. Strategic alignment is also a very important value and answers the question of appropriate balance of projects, resources needed and resource availability, even after the ranking of projects. Without resources the project can’t be viable. Technological advancement is on the rise in information technology sector. Companies are requiring skilled and competent information security experts who have to be certified showing that they are competent and hence can be able to use information technology and apply it appropriately for the benefit of their employer and the society. Examples of I.T certifications are: Microsoft certified solutions expert which involves design solutions across multiple technologies, Microsoft certified solutions, whereby deepest product expertise is demonstrated. Professional witnesses are paid on hourly basis. Average hourly fee for incourt testimony for non medical expert - $248, medical expert - $555. Rate for file review and depositions for all experts is $385 per hour. incourt testimony- $353- depositions per hour. Professionals witnesses should be polite, respectful and communicate clearly, should have knowledge beyond normal experience, should be able to have all kinds of records, facts and data when forming an opinion. Computer crimes are crimes invoving use of computer or network. Examples of internet crimes are; child pornography, computer viruses, malware, cyberstalking and hacking. Certified I.T professional can add credibility to a case for example in testifying on how malice software infection could cause downloading of pornographic images to a persons’ computer without his or her knowledge, since the IT professional has knowledge and expertise pertaining to the subject moreover he/she can be able to back the case with hard data moreover reports generated by the software could be relevant to the case. Besides I.T professionals have the technical certifications and professional licenses and hence they are of value in computer crime cases (Moore, 2005). When testifying for dispositions and trials there are steps that require the understanding of the expert witness, crime cases can either be criminal or civil. Criminal cases are usually brought by the state whereas civil cases are brought by individuals or private corporations. It’s important to know the legal process in relation to computer and networking and also the chain of jurisdictions in order to be compliant with the court processes for instance, time to present the evidence. The quality aspect of the evidence is also very crucial, as an expert since he/she has knowledge in computer systems and information, evidence such as photographs and computer hard disk with data are some of the important facts to present as evidence of computer crime. Experts are supposed to be certified, qualified, experienced and they are supposed to use a simple and clear language when testifying especially on technical terms and hence the jury will be able to make informed decisions regarding the evidence presented. Lack of physical evidence when testifying jeopardise the computer crime cases, relying on second hand information or hearsay may bring forth doubts on the evidence presented. If an expert use difficult technical terms that are difficult to understand to the jury or attorney when testifying, understanding of the evidence presented may be difficult. Use of unqualified experts in testifying a computer crime case is a great challenge as the expert lacks the understanding of the subject matter and may end up presenting substandard evidence moreover he/she may be emotional if provocative questions are posed, moreover they have no knowledge on the legal process (Belohlavek, 2007). References Belohlavek, P. (2007). The natural organization of outsourcing and insourcing. Blue eagle group: Emerald. Cooper, R. Edgett, S. Keinschmidi, E. (2001). Portfolio management for new products. Product development institute: Perseus. Moore, R . (2005). Cyber crime. Cleverland Mississippi: Anderson. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Sciences and Information Technology Coursework”, n.d.)
Computer Sciences and Information Technology Coursework. Retrieved from https://studentshare.org/information-technology/1610311-please-see-directions-below
(Computer Sciences and Information Technology Coursework)
Computer Sciences and Information Technology Coursework. https://studentshare.org/information-technology/1610311-please-see-directions-below.
“Computer Sciences and Information Technology Coursework”, n.d. https://studentshare.org/information-technology/1610311-please-see-directions-below.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Sciences and Information Technology

Computer Sciences and Information Technology

Word 2010 may be used for making professional reports, resume, memos or invoices. Excel is a program used to Computer Sciences and Information Technology There are several programs included in the Microsoft Office Some of these programs are Word, Excel, PowerPoint, Publisher and Access (Microsoft Corporation, n.... It is used to manage and organize information with the use of its templates and other modular components....
1 Pages (250 words) Essay

Compare the characteristics of an operational database and a dimensional database

Key performance metric of operational database is the recovery and consistency for Compare the characteristics of an operational database and a dimensional database First Computer Sciences and Information Technology Instructor's NameDatedCompare the characteristics of an operational database and a dimensional databaseOperational Database:Operational database supports for the information of the organization.... imensional Database: Current databases are multidimensional, and technology is applied to distributed data....
1 Pages (250 words) Essay

Adding value by analyzing an issue in a website

After Computer Sciences and Information Technology Application to the undergraduate program at Trent The application process is an easy and exciting one since the guidelines are given and very easy to follow.... This process starts by the interested student visiting the Trent's University website, and selecting the undergraduate link on the menu bar. The undergraduate webpage… First of all, there is a link to a page where the student can ask any question regarding the application process and the courses they might be interested....
1 Pages (250 words) Article

Standard Army Maintenance System-Enhanced

This is a management information system for the US Army that ensures sustainable management of Army supplies, logistics, combat services, army equipment, as well as field and… This system is useful for enterprise resource planning in the US Army and helps the Army to manage over one million American soldiers around the world on various missions.... The SAMS-E system has various benefits and disadvantages like any other information system.... The system is able to provide timely delivery of information and reports on various issues thus facilitating management processes....
4 Pages (1000 words) Assignment

Computer Security

Many people do not even Computer Sciences and Information Technology 18 august, COMPUTER SECURITY “Flame” virus is developed by the joint efforts of United States and the Israel.... Iran's computer networks were secretly mapped and… Flame is a bug which is one of the most powerful cyber. Flame and Stuxnet are the viruses that have been found recently.... Iran's computer networks were secretly mapped and observed by the massive piece of malware, sending back a stable stream of intelligence to prepare for a campaign of a cyber-warfare....
1 Pages (250 words) Assignment

Computer Sciences and Information Technology - Microsoft Access

Forms helps Computer Sciences and Information Technology Microsoft Access Microsoft Access is one of the computer-based applications utilized in the development of electronic databases on personal computers.... The application can also be employed in personal information management.... The application can also be employed in personal information management.... The reports in Microsoft access give a comprehensive summary of the information contained in the database (Viescas 39)....
1 Pages (250 words) Essay

Assessing reliability of network

The security is considered in two dimensions, hardware and Computer Sciences and Information Technology By: s Assessing Reliability of Network Lecturer's Benchmark ofMeasuring Network ReliabilityIn order to develop a secure network, it is vital to view the fundamental features of a network such as the speed of data transfer, the security of data and reliability of its traffic.... illiam, S 2004, Computer Networking with Internet Protocols and technology, Pearson Education, p....
1 Pages (250 words) Essay

Payword, Millicent, and MicroMint - which is the best

It reduces operational cost Computer Sciences and Information Technology By: Payword, Millicent, and MicroMint - Which is the Best Lecturer's Date1.... Bank Systems & technology, p.... Pay word micropayment system however breaches the application of anonymity whereby vendors obtain the personal information of the users for verification.... Vendors also obtain the personal information of the users....
1 Pages (250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us