Chapter 4 Information and communication technologies
Chapter 4 Information and communication technologies
Over the years, machines have replaced man for mechanical tasks. Computers have replaced
man for many mental and intellectual jobs.
Technological change has a huge impact on the nature of products and services
Companies need to maintain technological developments in the design and manufacture of
products, and in the provision of services, in order to remain competitive.
1) Downsizing
Means the reduction in size of a business organisation. Its business activities are conducted
by a smaller number of people.
Technological change makes downsizing possible
2) De-layering
3) Restructuring
Entity would focus activities within the entity on core competencies, with aim of gaining
more competitive advantage in these core areas.
Entity would outsource work to entities that have core competencies in these areas of work.
Outsourced work might require specialist skills that the entity cannot employ internally
Virtual organisation
Big Data
Extremely large data sets are being gathered, analysed computationally to reveal patterns,
fashions, trends, associations and preferences, especially relating to human behaviour
These big data sets are being used to take business decisions.
Different business segments are using arti icial intelligence, various services are being
provided with the help of arti icial intelligence (like frequently asked questions)
Chapter 4: Information and communication technologies Page 22
IT developments have resulted in many new products & improvements in existing products
IT developments have also radically altered methods of communication.
The Internet has emerged as a major source of external and easily accessible information.
Commercial transactions can be processed more quickly.
Changes in IT will continue, and these will have a signi icant impact on business strategy.
IT and changes in IT affect every business entity.
Business entities should be prepared to change as IT changes, and to take advantage of new
opportunities provided by IT, rather than try to oppose change.
IT should be used constructively for setting strategic targets and implementing strategies
Businesses depend on information technology for everything from running daily operations
to making strategic decisions.
Computers are the tools of this information age, performing extremely complex operations
as well as everyday jobs such as word processing and creating spreadsheets.
Businesses collect a great deal of data (i.e. raw, unorganized facts that can be moved and
stored) in their daily operations.
Only through well-designed IT systems and computers, this data can be processed into
meaningful and useful information
One such form of business information is the database
(an electronic iling system that collects and organizes data and information)
Using software called a database management system (DBMS), you can quickly and easily
enter, store, organize, select, and retrieve data in a database.
Databases are at the core of business information systems.
- E.g. customer database containing name, address, payment method, products ordered,
price, order history, and similar data provides information to many departments.
- Marketing can track new orders and determine what products are selling best;
- Sales can identify high-volume customers or contact customers about new offerings
- Operations use order information to obtain inventory and schedule production;
- Finance uses sales data to prepare inancial statements.
Data warehouse combines many databases across whole company into 1 central database.
With this, managers can easily access and share data across the enterprise to get a broad
overview rather than just small pieces of information.
Data warehouses include software to extract data from databases, maintain the data in the
warehouse, and provide data to users.
They can analyze data much faster than transaction-processing systems.
Data warehouses may contain many data marts
(special subsets of a data warehouse that each deal with particular area or department).
Companies use data warehouses to gather, secure, and analyzing data for many purposes,
including customer relationship management, fraud detection and product-line analysis
- Retailers might wish to identify customer demographics and shopping patterns
- Banks can more easily spot credit-card fraud, as well as customer usage patterns.
Changes in IS and IT systems have already affected the organisation of many entities.
Many organisations have a ‘ latter’ management hierarchy, with fewer middle managers.
Decisions are taken either centrally by head of ice or locally by junior management.
No need for employees to work together in an of ice, because they can communicate easily.
Virtual organisations are working on their own, often from home, linked by IS/IT systems.
Chapter 4: Information and communication technologies Page 24
General controls are controls that are applied to all IT systems and in particular to the
development, security and use of computer programs. Examples of general controls are:
Physical security measures and controls
Physical protection against risks to the continuity of IT operations
General controls within software such as passwords, encryption software, and irewalls
General controls over the introduction and use of new versions of a computer program
The application of IT Standards.
Application controls are speci ic controls that are unique to a particular IT system or IT
application. They include controls that are written into computer software
General controls in IT
Putting locks on doors to computer rooms when there are no authorised staff in the room.
Putting bars on windows, and shatterproof glass in computer room windows
Locating hardware in places that are not at risk from looding
Physical protection for cables (to provide protection against ire and loods)
Back-up power generators, in the event of a loss of power supply
Installing smoke detectors, ire alarms and ire doors
Regular ire drills, so that staff know the measures to protect data and iles in emergency
Obtaining insurance cover against losses in the event of a ire or looding.
Arrangements with different providers of hot and cold sites (in case of emergency shifting)
Chapter 4: Information and communication technologies Page 25
Passwords
A security culture should be developed within the organisation, so that the user’s staff are aware
of the security risks and take suitable precautions.
Encryption
Encryption involves coding of data into a form that is not understandable to casual reader.
Data can be encrypted (converted into a coded language) using an encryption key.
A hacker would not be able to read the data, and would not be able to convert it back into a
readable form without a special decryption key.
Encryption is commonly used to protect data that is being communicated across a network.
The on-line shopping system should provide for encryption of sender’s details (using
‘public key’) and the decryption of message at seller’s end (using a ‘private key’)
Firewalls
Firewalls are either software or a hardware device between user’s computer and modem.
Purpose is to detect and prevent any attempt to gain unauthorised entry through Internet
into a user’s computer or Intranet system.
A irewall:
- Will block suspicious messages from Internet, and prevent them from entering system
- May provide an on-screen report to the user whenever it has blocked a message
Firewalls can be purchased from suppliers.
Some irewall software can be downloaded free of charge from the Internet.
Chapter 4: Information and communication technologies Page 26
Computer viruses
Viruses are computer software that is designed to deliberately corrupt computer systems.
Viruses are written with malicious intent, but they may be transmitted accidentally.
Viruses can be introduced into a system on a ile containing the virus.
A virus may be contained in a ile attachment to an e-mail or On a storage device like DVD.
Viruses vary in their virulence (amount of damage they may cause to software or data)
New viruses are being written continually.
IT Standards
IT Standards are a form of general control within IT that help to reduce the risk of IT system
weaknesses and processing errors, for entities that apply the Standards.
A range of IT Standards have been issued (e.g. ISO has issued IT security system standards).
There are also IT Standards for the development and testing of new IT systems.
Application controls in IT
Application controls are controls that are designed for a speci ic IT system.
Common example of application controls is data validation. These are checks on speci ic
items that are input to a computer system, to test the logical ‘correctness’ of the data. E.g.:
- If a transaction is input to system without value, an error report should be produced.
- Entered value should be within a range of codes, otherwise error would be generated
- Key code numbers can be designed to include a ‘check digit’.
Monitoring of controls
It is important within an internal control system that management should review and monitor
the operation of the controls, on a systematic basis
IT controls audit
Exception reporting