Providing security for an organization can be a costly venture. The cost of safeguarding our information and resources should never exceed the value of that information and resource. As an MIS manager we are forced to make some very tough decisions each day. Based on what you read in chapter 10 or researched online, select a security measure that you feel may be too costly and/or provides only minimized benefit and explain why.
Try to discuss this from a different perspective than your classmates, if possible.
From the perspective of an MIS manager, one security measure that could be considered too costly and provides only minimized benefit is implementing a biometric authentication system for all employees’ access to the organization’s systems and facilities.
While biometric authentication, such as fingerprint or retina scanning, might seem like a robust security solution, there are several reasons why it could be considered costly and not necessarily provide significant benefits:
Implementation Costs: The Financial Challenge
One significant concern with implementing a biometric authentication system is the substantial upfront investment required. This includes the purchase of specialized hardware like fingerprint scanners or retina scanners, which can be quite expensive. However, the financial commitment doesn’t end there. Integrating this hardware with the organization’s existing systems and software can lead to additional costs, potentially requiring custom development or software modifications to ensure seamless compatibility.
Maintenance and Support: Ongoing Commitment
Once the biometric system is in place, ongoing maintenance, calibration, and technical support become crucial aspects. These tasks demand consistent attention and resources. Organizations need to allocate resources for training IT staff to effectively troubleshoot potential issues that might arise with the biometric hardware or software. Furthermore, regular updates are necessary to ensure the system continues to function effectively and securely. This not only incurs additional costs but also requires a continuous commitment to keep the system operational.
Privacy Concerns: Protecting Sensitive Data
The collection and storage of biometric data raise significant privacy concerns. Biometric information is deeply personal and sensitive, making its protection a top priority. Organizations must navigate complex regulations surrounding data privacy and security, which may involve substantial investments in security measures to safeguard this data from potential breaches or unauthorized use.
Usability and Accessibility: Inclusive Considerations
Not all employees will find biometric systems equally accessible or usable. Physical disabilities, medical conditions, or cultural factors might prevent some individuals from comfortably using the system. This limitation can lead to decreased user satisfaction and even hinder overall efficiency as employees struggle with a mode of authentication that doesn’t cater to their individual needs.
False Positives and Negatives: Disrupting Workflow
Biometric systems, though advanced, are not immune to errors. False positives occur when unauthorized individuals are mistakenly granted access, while false negatives deny entry to authorized personnel. These inaccuracies can disrupt workflows, causing frustration among employees who may face unnecessary delays or challenges due to authentication errors.
Alternative Authentication Methods: Considering Existing Measures
Many organizations have already implemented robust security measures such as strong password policies and multi-factor authentication (MFA). These methods strike a balance between security and cost-effectiveness. Adding another layer of authentication through biometrics might not significantly enhance security beyond what is already achieved with existing measures, making the investment in biometrics less justifiable.
ROI Calculation: Weighing Costs and Benefits
Ultimately, the decision to invest in a biometric authentication system must be grounded in a clear understanding of the potential return on investment (ROI). This involves comparing the costs of implementing and maintaining the system against the potential losses that security breaches aim to prevent. If the probability and potential impact of breaches are relatively low, the organization may find that the expected ROI does not justify the substantial expenditure on a biometric system.
Given these considerations, an MIS manager might find that the costs associated with implementing and maintaining a biometric authentication system might not be justified by the relatively limited security benefits it provides compared to other available security measures. It’s essential to perform a comprehensive cost-benefit analysis and consider the organization’s specific needs and risk profile before making such a decision.
Describe the four phases of the systems development life cycle (SDLC) and discuss the role of the systems analyst in each phase of the life cycle. Provide specific examples of what the systems analyst might do in each phase of the life cycle
Post a description of strategic planning in social work organizations. What are the elements of a strategic plan? How is it useful to leadership and to the organization as a whole? Finally, identify and explain one potential problem that could arise during the strategic planning process.
As a recent graduate of the State Bank’s Management Trainee Program, Ted Banacek is now working as assistant manager in one of the busier branches. While his manager was away on vacation, a customer asked for a $3.75 service charge refund, which Ted politely refused. Shortly thereafter, the customer complained to Judy Miller, a new accounts clerk working for Ted. Judy, who believes that she would have been promoted into the positioned now occupies, agreed with the customer and ridiculed Ted’s decision. Ted ignored this incident, but the next day, he counseled Judy in front of another employee about a processing error she had made. Since then, it seems all employees in the branch are giving Ted a cold shoulder. Ted feels he is failing as a manager and calls Sandy McGill, a friend who is also a manager, for advice.
Sandy suggests privately talking to Judy the next day. Even though Ted does not like the idea, he agrees. Acting on advice from a colleague, Ted meets with Judy the next morning. After a brief statement expressing his concerns, Judy explodes and accuses Ted of picking on her and embarrassing her. She quits and storms out of his office. Ted is stunned and the tension in the branch is almost unbearable.
1. What went wrong? How should Ted have handled this discussion with Judy?
2. Now that Judy has stormed out of the office, what should Ted do?
· With the staff that remains?
· In notifying Human Resources of this incident?
· With Judy Miller?